Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
Roman Schlegel, Kehuan Zhang, Xiayong Zhou, Mehool Intwala, Apu Kapadia and Xiaofeng Wang
A Security API for Distributed Social Networks
Michael Backes , Matteo Maffei and Kim Pecina
Location Privacy via Private Proximity Testing
Arvind Narayanan , Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg and Dan Boneh
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Aurelien Francillon , Boris Danev and Srdjan Capkun
Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks
Omid Fatemieh , Ali Farhadi, Ranyeer Chandra and Carl A. Gunter
Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas
Liang Cai, Kai Zeng, Hao Chen and Prasant Mohapatra
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions
Xi Xiong , Donghai Tian and Peng Liu
Efficient Monitoring of Untrusted Kernel-Mode Execution
Abhinav Srivastava and Jonathon Giffin
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures
Zhiqiang Lin , Junghwan Rhee, Xiangyu Zhang, Dongyan Xu and Xuxian Jiang
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
Max Schuchard , Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim and Eugene Y. Vasserman
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
Leyla Bilge , Engin Kirda, Christopher Kruegel and Marco Balduzzi
Howard: A Dynamic Excavator for Reverse Engineering Data Structures
Asia Slowinska , Traian Stancescu and Herbert Bos
No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects
David Dewey and Patrick Traynor
TIE: Principled Reverse Engineering of Types in Binary Programs
JongHyup Lee, Thanassis Avgerinos and David Brumley
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation
Min Gyung Kang, Stephen McCamant, Pongsin Poosankam and Dawn Song
AEG: Automatic Exploit Generation
Thanassis Avgerinos , Brent Lim Tze Hao and David Brumley
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications
Marco Balduzzi , Carmen Torrano Gimenez, Davide Balzarotti and Engin Kirda
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications
Zhichun Li , Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu and Clint Sbisa
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows
Xiapu Luo , Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang and Roberto Perdisci
Accurate and Provably Secure Latency Estimation with Treeple
Eric Chan-Tin and Nicholas Hopper
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses
Scott Coull and Fabian Monrose
SWIRL: A Scalable Watermark to Detect Correlated Network Flows
Amir Houmansadr and Nikita Borisov
SPARE: Replicas on Hold
Tobias Distler, Ivan Popov, Wolfgang Schroder-Preikschat, Hans P. Reiser and Ruediger Kapitza
Efficient Privacy-Preserving Biometric Identification
Yan Huang, Lior Malka, David Evans and Jonathan Katz
Usability Testing a Malware-Resistant Input Mechanism
Alana Libonati , Jonathan M. McCune and Michael K. Reiter
Tracker: Security and Privacy for RFID-based Supply Chains
Erik-Oliver Blass , Kaotar Elkhiyaoui and Refik Molva
PiOS: Detecting Privacy Leaks in iOS Applications
Manuel Egele, Christopher Kruegel, Engin Kirda and Giovanni Vigna
Privacy-Preserving Aggregation of Time-Series Data
Elaine Shi, T-H. Hubert Chan, Eleanor Rieffel, Richard Chow and Dawn Song