Top results
this paper is included in the proceedings of the 25th usenix security symposium august 10–12, 2016 • austin, tx isbn 978-1-931971-32-4 open access to the proceedings…
august 20–22, 2014, san diego, ca 23rd usenix security symposium sponsored by usenix important dates paper submissions due: thursday, february 27, 2014, 8:59 p.m. est
supply chain securityfilippo valsorda three supply chain security players 1. language — enables trust provenance availability 1. language — enables trust three
open access to the proceedings of the 22nd usenix security symposium is sponsored by usenix this paper is included in the proceedings of the 22nd usenix security symposium.
security bugs in protocols are really bad! marsh ray phonefactor protocol bugs objectives discuss the complexities in mitigating security bugs occurring in network protocols.…
proceedings of the 23rd u sen ix security sym posium sponsored by © 2014 by the usenix association all rights reserved this volume is published as a collective work.
open access to the proceedings of the 24th usenix security symposium is sponsored by usenix cloudy with a chance of breach: forecasting cyber security incidents yang liu…
time inconsistent preferences and social securityinstitute for empirical macroeconomics federal reserve bank of minneapolis 90 hennepin avenue minneapolis, minnesota 55480-0291
symposium the advanced computing systems association © 2001 by the usenix association all rights reserved for more information about the usenix association: phone: 1
software confidence. achieved. august 2009 building security in maturity model gary mcgraw, ph.d. chief technology officer, cigital brian chess, ph.d. chief scientist, fortify…
mulval: a logic-based network security analyzer xinming ou, sudhakar govindavajhala, and andrew w. appel princeton university 14th usenix security symposium, august 2005…
usenix association 25th usenix security symposium 1153 harvesting inconsistent security configurations in custom android roms via differential analysis yousra aafer, xiao…
kratos: discovering inconsistent security policy enforcement in the android framework yuru shao jason ott† qi alfred chen zhiyun qian† z morley mao university of michigan…
kratos: discovering inconsistent security policy enforcement in the android framework yuru shao jason ott† qi alfred chen zhiyun qian† z morley mao university of michigan…
usenix association 18th usenix security symposium 399 crying wolf: an empirical study of ssl warning effectiveness joshua sunshine serge egelman hazim almuhimedi neha atri…
kratos: discovering inconsistent security policy enforcement in the android framework yuru shao, jason ott†, qi alfred chen, zhiyun qian†, z. morley mao university of…
this paper is included in the proceedings of the 24th usenix security symposium august 12–14, 2015 • washington, d.c. isbn 978-1-931971-232 open access to the proceedings…
inference of user demographics and habits from seemingly benign smartphone sensors manar safi, irwin reyes, serge egelman university of california – berkeley international…
usenix association proceedings of the 12th usenix security symposium washington, d.c., usa august 4–8, 2003 the advanced computing systems association © 2003 by the usenix…
open access to the proceedings of the 22nd usenix security symposium is sponsored by usenix this paper is included in the proceedings of the 22nd usenix security symposium.…