Papers

  1. Understanding Android Security, W. Enck, M. Ongtang, P. McDaniel
  2. HMMPayl: an application of HMM to the analysis of the HTTP Payload, D, Ariu and G. Giacinto
  3. A Survey of BGP Security, K. Butler, T. Farley, P. McDaniel, J. Rexford
  4. Bypassing Browser Memory Protections: Setting back browser security by 10 years, A. Sotirov and M. Dowd
  5. Busting Frame Busting: A Study of Clickjacking Vulnerabilities on Popular Sites, G. Rydstedt, E. Bursztein, D. Boneh, C. Jackson
  6. The Security Architecture of the Chromium Browser, A. Barth, C. Jackson, C. Reis, Google Chrome Team
  7. Robust Defenses for Cross-Site Request Forgery, A. Barth, C. Jackson, J. C. Mitchell
  8. Cross Site Scripting Explained, A. Klein
  9. A Security Evaluation of DNSSEC with NSEC3, J. Bau, J. C. Mitchell
  10. A DoS-limiting Network Architecture, X. Yang, D. Wetherall, T. Anderson
  11. Effective Bug Discovery: Kernel-Mode Coverage Analysis, vf
  12. ForceHTTPS: Protecting High-Security Web Sites from Network Attacks, C. Jackson, A. Barth
  13. The Ghost In The Browser: Analysis of Web-based Malware N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu
  14. Practical Network Support for IP Traceback, S. Savage, D. Wetherall, A. Karlin, and T. Anderson
  15. Real World Fuzzing, C. Miller
  16. Advanced SQL Injection In SQL Server Applications, C. Anley
  17. Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL, C. Soghoian and S. Stamm
  18. Terra: A Virtual Machine-Based Platform for Trusted Computing, T. Garfinkel, B. Pfaff, J. Chow, Me. Rosenblum, Dan Boneh
  19. Secure Session Management With Cookies for Web Applications, C. Palmer
  20. An Illustrated Guide to the Kaminsky DNS Vulnerability, S. Friedl


Presentation Schedule