Login / Signup
HotSec
2006
2009
2012
2006
2012
Keyphrases
Publications
2012
Markus Jakobsson
,
Mayank Dhiman
The Benefits of Understanding Passwords.
HotSec
(2012)
Stefano Ortolani
,
Bruno Crispo
NoisyKey: Tolerating Keyloggers via Keystrokes Hiding.
HotSec
(2012)
Chengyu Song
,
Paul Royal
,
Wenke Lee
Impeding Automated Malware Analysis with Environment-sensitive Malware.
HotSec
(2012)
Mohit Tiwari
,
Prashanth Mohan
,
Andrew Osheroff
,
Hilfi Alkaff
,
Elaine Shi
,
Eric Love
,
Dawn Song
,
Krste Asanovic
Context-centric Security.
HotSec
(2012)
Saran Neti
,
Anil Somayaji
,
Michael E. Locasto
Software Diversity: Security, Entropy and Game Theory.
HotSec
(2012)
Adrienne Porter Felt
,
Serge Egelman
,
Matthew Finifter
,
Devdatta Akhawe
,
David A. Wagner
How to Ask for Permission.
HotSec
(2012)
Shane S. Clark
,
Benjamin Ransford
,
Kevin Fu
Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional Computing.
HotSec
(2012)
Robert Templeman
,
Apu Kapadia
GANGRENE: Exploring the Mortality of Flash Memory.
HotSec
(2012)
Robert J. Walls
,
Shane S. Clark
,
Brian Neil Levine
Functional Privacy or Why Cookies Are Better with Milk.
HotSec
(2012)
7th USENIX Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012
HotSec
(2012)
Feng Lu
,
Jiaqi Zhang
,
Stefan Savage
When Good Services Go Wild: Reassembling Web Services for Unintended Purposes.
HotSec
(2012)
Zheng Dong
,
L. Jean Camp
PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security.
HotSec
(2012)
2011
Murph Finnicum
,
Samuel T. King
Building Secure Robot Applications.
HotSec
(2011)
6th USENIX Workshop on Hot Topics in Security, HotSec'11, San Francisco, CA, USA, August 9, 2011
HotSec
(2011)
Jessica Staddon
,
Andrew Swerdlow
Public vs. Publicized: Content Use Trends and Privacy Expectations.
HotSec
(2011)
Suku Nair
,
Subil Abraham
,
Omar Al-Ibrahim
Security Fusion: A New Security Architecture for Resource-Constrained Environments.
HotSec
(2011)
Yan Huang
,
Peter Chapman
,
David Evans
Privacy-Preserving Applications on Smartphones.
HotSec
(2011)
Jason Croft
,
Matthew Caesar
Towards Practical Avoidance of Information Leakage in Enterprise Networks.
HotSec
(2011)
Joel Weinberger
,
Adam Barth
,
Dawn Song
Towards Client-side HTML Security Policies.
HotSec
(2011)
Liang Cai
,
Hao Chen
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.
HotSec
(2011)
Youngjune Gwon
,
H. T. Kung
,
Dario Vlah
DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements.
HotSec
(2011)
Stephen E. McLaughlin
On Dynamic Malware Payloads Aimed at Programmable Logic Controllers.
HotSec
(2011)
Mihir Nanavati
,
Nathan Taylor
,
William Aiello
,
Andrew Warfield
Herbert West - Deanonymizer.
HotSec
(2011)
Robert J. Walls
,
Brian Neil Levine
,
Marc Liberatore
,
Clay Shields
Effective Digital Forensics Research Is Investigator-Centric.
HotSec
(2011)
2010
Stephen E. McLaughlin
,
Dmitry Podkuiko
,
Adam Delozier
,
Sergei Miadzvezhanka
,
Patrick D. McDaniel
Embedded Firmware Diversity for Smart Electric Meters.
HotSec
(2010)
5th USENIX Workshop on Hot Topics in Security, HotSec'10, Washington, D.C., USA, August 10, 2010
HotSec
(2010)
Tiffany Hyun-Jin Kim
,
Lujo Bauer
,
James Newsome
,
Adrian Perrig
,
Jesse Walker
Challenges in Access Right Assignment for Secure Home Networks.
HotSec
(2010)
Marten van Dijk
,
Ari Juels
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing.
HotSec
(2010)
Adam J. Aviv
,
Micah Sherr
,
Matt Blaze
,
Jonathan M. Smith
Evading Cellular Data Monitoring with Human Movement Networks.
HotSec
(2010)
Charalampos Andrianakis
,
Paul Seymer
,
Angelos Stavrou
Scalable Web Object Inspection and Malfease Collection.
HotSec
(2010)
Terri Oda
,
Anil Somayaji
Visual Security Policy for the Web.
HotSec
(2010)
Kuniyasu Suzaki
,
Toshiki Yagi
,
Kengo Iijima
,
Anh-Quynh Nguyen
,
Cyrille Artho
,
Yoshihito Watanebe
Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine.
HotSec
(2010)
Gerald Friedland
,
Robin Sommer
Cybercasing the Joint: On the Privacy Implications of Geo-Tagging.
HotSec
(2010)
Stuart E. Schechter
,
Cormac Herley
,
Michael Mitzenmacher
Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing Attacks.
HotSec
(2010)
Markus Jakobsson
,
Karl-Anders Johansson
Retroactive Detection of Malware with Applications to Mobile Platforms.
HotSec
(2010)
Prateek Mittal
,
Nikita Borisov
,
Carmela Troncoso
,
Alfredo Rial
Scalable Anonymous Communication with Provable Security.
HotSec
(2010)