Server-side Verification of Client Behavior in Online Games
Darrell Bethea, Robert Cochran and Michael Reiter
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel
Stealth DoS Attacks on Secure Channels
Amir Herzberg and Haya Shulman
Protecting Browsers from Extension Vulnerabilities
Adam Barth, Adrienne Porter Felt, Prateek Saxena, and Aaron Boodman
Adnostic: Privacy Preserving Targeted Advertising
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum and Solon Barocas
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications
Prateek Saxena, Steve Hanna, Pongsin Poosankam and Dawn Song
Effective Anomaly Detection with Scarce Training Data
William Robertson, Federico Maggi, Christopher Kruegel and Giovanni Vigna
Large-Scale Automatic Classification of Phishing Pages
Colin Whittaker, Brian Ryner and Marria Nazif
A Systematic Characterization of IM Threats using Honeypots
Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos and Spiros Antonatos
On Network-level Clusters for Spam Detection
Zhiyun Qian, Zhuoqing Mao, Yinglian Xie and Fang Yu
Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation
Sushant Sinha, Michael Bailey and Farnam Jahanian
Botnet Judo: Fighting Spam with Itself
Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver and Stefan Savage
Contractual Anonymity
Edward J. Schwartz, David Brumley and Jonathan M. McCune
A3: An Extensible Platform for Application-Aware Anonymity
Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo and Matt Blaze
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography
Thomas Ristenpart and Scott Yilek
InvisiType: Object-Oriented Security Policies
Jiwon Seo and Monica S. Lam
A Security Evaluation of DNSSEC with NSEC3
Jason Bau and John Mitchell
On the Safety of Enterprise Policy Deployment
Yudong Gao, Ni Pan, Xu Chen and Z. Morley Mao
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
Suresh Chari, Shai Halevi and Wietse Venema
Joe-E: A Security-Oriented Subset of Java
Adrian Mettler, David Wagner and Tyler Close
Preventing Capability Leaks in Secure JavaScript Subsets
Matthew Finifter, Joel Weinberger and Adam Barth
Binary Code Extraction and Interface Identification for Security Applications
Juan Caballero, Noah M. Johnson, Stephen McCamant, and Dawn Song
Automatic Reverse Engineering of Data Structures from Binary Execution
Zhiqiang Lin, Xiangyu Zhang and Dongyan Xu
Efficient Detection of Split Personalities in Malware
Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel and Giovanni Vigna