Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1855768guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
SSYM'09: Proceedings of the 18th conference on USENIX security symposium
2009 Proceeding
Publisher:
  • USENIX Association
  • 2560 Ninth St. Suite 215 Berkeley, CA
  • United States
Conference:
Montreal Canada August 10 - 14, 2009
Published:
10 August 2009

Reflects downloads up to 13 Jan 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Compromising electromagnetic emanations of wired and wireless keyboards
Pages 1–16

Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The ...

Article
Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems
Pages 17–32

A multi-user system usually involves a large amount of information shared among its users. The security implications of such information can never be underestimated. In this paper, we present a new attack that allows a malicious user to eavesdrop on ...

Article
A practical congestion attack on tor using long paths
Pages 33–50

In 2005, Murdoch and Danezis demonstrated the first practical congestion attack against a deployed anonymity network. They could identify which relays were on a target Tor user's path by building paths one at a time through every Tor relay and ...

Article
Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors
Pages 51–66

Attacks that exploit out-of-bounds errors in C and C++ programs are still prevalent despite many years of research on bounds checking. Previous backwards compatible bounds checking techniques, which can be applied to unmodified C and C++ programs, ...

Article
Dynamic test generation to find integer bugs in x86 binary linux programs
Pages 67–82

Recently, integer bugs, including integer overflow, width conversion, and signed/unsigned conversion errors, have risen to become a common root cause for serious security vulnerabilities. We introduce new methods for discovering integer bugs using ...

Article
Memory safety for low-level software/hardware interactions
Pages 83–100

Systems that enforce memory safety for today's operating system kernels and other system software do not account for the behavior of low-level software/hardware interactions such as memory-mapped I/O, MMU configuration, and context switching. Bugs in ...

Article
Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine
Pages 101–118

Users and network administrators need ways to filter email messages based primarily on the reputation of the sender. Unfortunately, conventional mechanisms for sender reputation--notably, IP blacklists--are cumbersome to maintain and evadable. This ...

Article
Improving tor using a TCP-over-DTLS tunnel
Pages 119–134

The Tor network gives anonymity to Internet users by relaying their traffic through the world over a variety of routers. All traffic between any pair of routers, even if they represent circuits for different clients, are multiplexed over a single TCP ...

Article
Locating prefix hijackers using LOCK
Pages 135–150

Prefix hijacking is one of the top known threats on today's Internet. A number of measurement based solutions have been proposed to detect prefix hijacking events. In this paper we take these solutions one step further by addressing the problem of ...

Article
GATEKEEPER: mostly static enforcement of security and reliability policies for javascript code
Pages 151–168

The advent of Web 2.0 has lead to the proliferation of client-side code that is typically written in JavaScript. This code is often combined -- or mashed-up -- with other code and content from disparate, mutually untrusting parties, leading to ...

Article
NOZZLE: a defense against heap-spraying code injection attacks
Pages 169–186

Heap spraying is a security attack that increases the exploitability of memory corruption errors in type-unsafe applications. In a heap-spraying attack, an attacker coerces an application to allocate many objects containing malicious code in the heap, ...

Article
Cross-origin javascript capability leaks: detection, exploitation, and defense
Pages 187–198

We identify a class of Web browser implementation vulnerabilities, cross-origin JavaScript capability leaks, which occur when the browser leaks a JavaScript pointer from one security origin to another. We devise an algorithm for detecting these ...

Article
Physical-layer identification of RFID devices
Pages 199–214

In this work we perform the first comprehensive study of physical-layer identification of RFID transponders. We propose several techniques for the extraction of RFID physical-layer fingerprints. We show that RFID transponders can be accurately ...

Article
CCCP: secure remote storage for computational RFIDs
Pages 215–230

Passive RFID tags harvest their operating energy from an interrogating reader, but constant energy shortfalls severely limit their computational and storage capabilities. We propose Cryptographic Computational Continuation Passing (CCCP), a mechanism ...

Article
Jamming-resistant broadcast communication without shared keys
Pages 231–248

Jamming-resistant broadcast communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. These applications share the need for guaranteed authenticity ...

Article
xBook: redesigning privacy control in social networking platforms
Pages 249–266

Social networking websites have recently evolved from being service providers to platforms for running third party applications. Users have typically trusted the social networking sites with personal data, and assume that their privacy preferences are ...

Article
Nemesis: preventing authentication & access control vulnerabilities in web applications
Pages 267–282

This paper presents Nemesis, a novel methodology for mitigating authentication bypass and access control vulnerabilities in existing web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to ...

Article
Static enforcement of web application integrity through strong typing
Pages 283–298

Security vulnerabilities continue to plague web applications, allowing attackers to access sensitive data and co-opt legitimate web sites as a hosting ground for malware. Accordingly, researchers have focused on various approaches to detecting and ...

Article
Vanish: increasing data privacy with self-destructing data
Pages 299–316

Today's technical and legal landscape presents formidable challenges to personal data privacy. First, our increasing reliance on Web services causes personal data to be cached, copied, and archived by third parties, often without our knowledge or ...

Article
Efficient data structures for tamper-evident logging
Pages 317–334

Many real-world applications wish to collect tamperevident logs for forensic purposes. This paper considers the case of an untrusted logger, serving a number of clients who wish to store their events in the log, and kept honest by a number of auditors ...

Article
VPriv: protecting privacy in location-based vehicular services
Pages 335–350

A variety of location-based vehicular services are currently being woven into the national transportation infrastructure in many countries. These include usage- or congestion-based road pricing, traffic law enforcement, traffic monitoring, "pay-as-you-...

Article
Effective and efficient malware detection at the end host
Pages 351–366

Malware is one of the most serious security threats on the Internet today. In fact, most Internet problems such as spam e-mails and denial of service attacks have malware as their underlying cause. That is, computers that are compromised with malware ...

Article
Protecting confidential data on personal computers with storage capsules
Pages 367–382

Protecting confidential information is a major concern for organizations and individuals alike, who stand to suffer huge losses if private data falls into the wrong hands. One of the primary threats to confidentiality is malicious software on personal ...

Article
Return-oriented rootkits: bypassing kernel code integrity protection mechanisms
Pages 383–398

Protecting the kernel of an operating system against attacks, especially injection of malicious code, is an important factor for implementing secure operating systems. Several kernel integrity protection mechanism were proposed recently that all have a ...

Article
Crying wolf: an empirical study of SSL warning effectiveness
Pages 399–416

Web users are shown an invalid certificate warning when their browser cannot validate the identity of the websites they are visiting. While these warnings often appear in benign situations, they can also signal a man-in-the-middle attack. We conducted a ...

Article
The multi-principal OS construction of the gazelle web browser
Pages 417–432

Original web browsers were applications designed to view static web content. As web sites evolved into dynamic web applications that compose content from multiple web sites, browsers have become multiprincipal operating environments with resources ...

Recommendations