Search dblp for Publications

export results for "toc:db/conf/sp/sp2013.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/AlFardanP13,
  author       = {Nadhem J. AlFardan and
                  Kenneth G. Paterson},
  title        = {Lucky Thirteen: Breaking the {TLS} and {DTLS} Record Protocols},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {526--540},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.42},
  doi          = {10.1109/SP.2013.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AlFardanP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlvisiCELP13,
  author       = {Lorenzo Alvisi and
                  Allen Clement and
                  Alessandro Epasto and
                  Silvio Lattanzi and
                  Alessandro Panconesi},
  title        = {SoK: The Evolution of Sybil Defense via Social Networks},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {382--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.33},
  doi          = {10.1109/SP.2013.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/AlvisiCELP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BellareHKR13,
  author       = {Mihir Bellare and
                  Viet Tung Hoang and
                  Sriram Keelveedhi and
                  Phillip Rogaway},
  title        = {Efficient Garbling from a Fixed-Key Blockcipher},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {478--492},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.39},
  doi          = {10.1109/SP.2013.39},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BellareHKR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BhargavanFKPS13,
  author       = {Karthikeyan Bhargavan and
                  C{\'{e}}dric Fournet and
                  Markulf Kohlweiss and
                  Alfredo Pironti and
                  Pierre{-}Yves Strub},
  title        = {Implementing {TLS} with Verified Cryptographic Security},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {445--459},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.37},
  doi          = {10.1109/SP.2013.37},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BhargavanFKPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BiryukovPW13,
  author       = {Alex Biryukov and
                  Ivan Pustogarov and
                  Ralf{-}Philipp Weinmann},
  title        = {Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {80--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.15},
  doi          = {10.1109/SP.2013.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BiryukovPW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ClarkO13,
  author       = {Jeremy Clark and
                  Paul C. van Oorschot},
  title        = {SoK: {SSL} and {HTTPS:} Revisiting Past Challenges and Evaluating
                  Certificate Trust Model Enhancements},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {511--525},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.41},
  doi          = {10.1109/SP.2013.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ClarkO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrewalRBR13,
  author       = {Gurchetan S. Grewal and
                  Mark Dermot Ryan and
                  Sergiu Bursuc and
                  Peter Y. A. Ryan},
  title        = {Caveat Coercitor: Coercion-Evidence in Electronic Voting},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {367--381},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.32},
  doi          = {10.1109/SP.2013.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/GrewalRBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HarrisJRAW13,
  author       = {William R. Harris and
                  Somesh Jha and
                  Thomas W. Reps and
                  Jonathan Anderson and
                  Robert N. M. Watson},
  title        = {Declarative, Temporal, and Practical Programming with Capabilities},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {18--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.11},
  doi          = {10.1109/SP.2013.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HarrisJRAW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HoumansadrBS13,
  author       = {Amir Houmansadr and
                  Chad Brubaker and
                  Vitaly Shmatikov},
  title        = {The Parrot Is Dead: Observing Unobservable Network Communications},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {65--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.14},
  doi          = {10.1109/SP.2013.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HoumansadrBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HritcuGKPM13,
  author       = {Catalin Hritcu and
                  Michael Greenberg and
                  Ben Karel and
                  Benjamin C. Pierce and
                  Greg Morrisett},
  title        = {All Your IFCException Are Belong to Us},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.10},
  doi          = {10.1109/SP.2013.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HritcuGKPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HundWH13,
  author       = {Ralf Hund and
                  Carsten Willems and
                  Thorsten Holz},
  title        = {Practical Timing Side Channel Attacks against Kernel Space {ASLR}},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {191--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.23},
  doi          = {10.1109/SP.2013.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HundWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JanaNS13,
  author       = {Suman Jana and
                  Arvind Narayanan and
                  Vitaly Shmatikov},
  title        = {A Scanner Darkly: Protecting User Privacy from Perceptual Applications},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {349--363},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.31},
  doi          = {10.1109/SP.2013.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/JanaNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KangLG13,
  author       = {Min Suk Kang and
                  Soo Bum Lee and
                  Virgil D. Gligor},
  title        = {The Crossfire Attack},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {127--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.19},
  doi          = {10.1109/SP.2013.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/KangLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KuneBCKRFKX13,
  author       = {Denis Foo Kune and
                  John D. Backes and
                  Shane S. Clark and
                  Daniel B. Kramer and
                  Matthew R. Reynolds and
                  Kevin Fu and
                  Yongdae Kim and
                  Wenyuan Xu},
  title        = {Ghost Talk: Mitigating {EMI} Signal Injection Attacks against Analog
                  Sensors},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {145--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.20},
  doi          = {10.1109/SP.2013.20},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KuneBCKRFKX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LeeDWWK13,
  author       = {Michael Z. Lee and
                  Alan M. Dunn and
                  Brent Waters and
                  Emmett Witchel and
                  Jonathan Katz},
  title        = {Anon-Pass: Practical Anonymous Subscriptions},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {319--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.29},
  doi          = {10.1109/SP.2013.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LeeDWWK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiAXYW13,
  author       = {Zhou Li and
                  Sumayah A. Alrwais and
                  Yinglian Xie and
                  Fang Yu and
                  XiaoFeng Wang},
  title        = {Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated
                  Hosts on Malicious Web Infrastructures},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {112--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.18},
  doi          = {10.1109/SP.2013.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiAXYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MiersG0R13,
  author       = {Ian Miers and
                  Christina Garman and
                  Matthew Green and
                  Aviel D. Rubin},
  title        = {Zerocoin: Anonymous Distributed E-Cash from Bitcoin},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {397--411},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.34},
  doi          = {10.1109/SP.2013.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MiersG0R13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MoweryWKSS13,
  author       = {Keaton Mowery and
                  Michael Yung Chung Wei and
                  David Kohlbrenner and
                  Hovav Shacham and
                  Steven Swanson},
  title        = {Welcome to the Entropics: Boot-Time Entropy in Embedded Devices},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {589--603},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.46},
  doi          = {10.1109/SP.2013.46},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MoweryWKSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MurrayMBGBSLGK13,
  author       = {Toby C. Murray and
                  Daniel Matichuk and
                  Matthew Brassil and
                  Peter Gammie and
                  Timothy Bourke and
                  Sean Seefried and
                  Corey Lewis and
                  Xin Gao and
                  Gerwin Klein},
  title        = {seL4: From General Purpose to a Proof of Information Flow Enforcement},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {415--429},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.35},
  doi          = {10.1109/SP.2013.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MurrayMBGBSLGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NikiforakisKJKPV13,
  author       = {Nick Nikiforakis and
                  Alexandros Kapravelos and
                  Wouter Joosen and
                  Christopher Kruegel and
                  Frank Piessens and
                  Giovanni Vigna},
  title        = {Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {541--555},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.43},
  doi          = {10.1109/SP.2013.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NikiforakisKJKPV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NikolaenkoWIJBT13,
  author       = {Valeria Nikolaenko and
                  Udi Weinsberg and
                  Stratis Ioannidis and
                  Marc Joye and
                  Dan Boneh and
                  Nina Taft},
  title        = {Privacy-Preserving Ridge Regression on Hundreds of Millions of Records},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {334--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.30},
  doi          = {10.1109/SP.2013.30},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/NikolaenkoWIJBT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/OnarliogluMRK13,
  author       = {Kaan Onarlioglu and
                  Collin Mulliner and
                  William K. Robertson and
                  Engin Kirda},
  title        = {PrivExec: Private Execution as an Operating System Service},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {206--220},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.24},
  doi          = {10.1109/SP.2013.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/OnarliogluMRK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ParnoHG013,
  author       = {Bryan Parno and
                  Jon Howell and
                  Craig Gentry and
                  Mariana Raykova},
  title        = {Pinocchio: Nearly Practical Verifiable Computation},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {238--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.47},
  doi          = {10.1109/SP.2013.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ParnoHG013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PopaLZ13,
  author       = {Raluca A. Popa and
                  Frank H. Li and
                  Nickolai Zeldovich},
  title        = {An Ideal-Security Protocol for Order-Preserving Encoding},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {463--477},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.38},
  doi          = {10.1109/SP.2013.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PopaLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReardonBC13,
  author       = {Joel Reardon and
                  David A. Basin and
                  Srdjan Capkun},
  title        = {SoK: Secure Data Deletion},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {301--315},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.28},
  doi          = {10.1109/SP.2013.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ReardonBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RossowAWSPDB13,
  author       = {Christian Rossow and
                  Dennis Andriesse and
                  Tillmann Werner and
                  Brett Stone{-}Gross and
                  Daniel Plohmann and
                  Christian J. Dietrich and
                  Herbert Bos},
  title        = {SoK: {P2PWNED} - Modeling and Evaluating the Resilience of Peer-to-Peer
                  Botnets},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {97--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.17},
  doi          = {10.1109/SP.2013.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RossowAWSPDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RuhrmairD13,
  author       = {Ulrich R{\"{u}}hrmair and
                  Marten van Dijk},
  title        = {PUFs in Security Protocols: Attack Models and Security Evaluations},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {286--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.27},
  doi          = {10.1109/SP.2013.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/RuhrmairD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShenNHD13,
  author       = {Wenbo Shen and
                  Peng Ning and
                  Xiaofan He and
                  Huaiyu Dai},
  title        = {Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own
                  Wireless Connectivity at the Same Time},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {174--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.22},
  doi          = {10.1109/SP.2013.22},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ShenNHD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SnowMDDLS13,
  author       = {Kevin Z. Snow and
                  Fabian Monrose and
                  Lucas Davi and
                  Alexandra Dmitrienko and
                  Christopher Liebchen and
                  Ahmad{-}Reza Sadeghi},
  title        = {Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address
                  Space Layout Randomization},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {574--588},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.45},
  doi          = {10.1109/SP.2013.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SnowMDDLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/StefanovS13,
  author       = {Emil Stefanov and
                  Elaine Shi},
  title        = {ObliviStore: High Performance Oblivious Cloud Storage},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {253--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.25},
  doi          = {10.1109/SP.2013.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/StefanovS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SzekeresPWS13,
  author       = {Laszlo Szekeres and
                  Mathias Payer and
                  Tao Wei and
                  Dawn Song},
  title        = {SoK: Eternal War in Memory},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {48--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.13},
  doi          = {10.1109/SP.2013.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SzekeresPWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TippenhauerMRC13,
  author       = {Nils Ole Tippenhauer and
                  Luka Malisa and
                  Aanjhan Ranganathan and
                  Srdjan Capkun},
  title        = {On Limitations of Friendly Jamming for Confidentiality},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {160--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.21},
  doi          = {10.1109/SP.2013.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TippenhauerMRC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VanegueL13,
  author       = {Julien Vanegue and
                  Shuvendu K. Lahiri},
  title        = {Towards Practical Reactive Security Audit Using Extended Static Checkers},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {33--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.12},
  doi          = {10.1109/SP.2013.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/VanegueL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VasudevanCJMND13,
  author       = {Amit Vasudevan and
                  Sagar Chaki and
                  Limin Jia and
                  Jonathan M. McCune and
                  James Newsome and
                  Anupam Datta},
  title        = {Design, Implementation and Verification of an eXtensible and Modular
                  Hypervisor Framework},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {430--444},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.36},
  doi          = {10.1109/SP.2013.36},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/VasudevanCJMND13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VuSBW13,
  author       = {Victor Vu and
                  Srinath T. V. Setty and
                  Andrew J. Blumberg and
                  Michael Walfish},
  title        = {A Hybrid Architecture for Interactive Verifiable Computation},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {223--237},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.48},
  doi          = {10.1109/SP.2013.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/VuSBW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangYXKS13,
  author       = {Yinglei Wang and
                  Wing{-}Kei S. Yu and
                  Sarah Q. Xu and
                  Edwin Kan and
                  G. Edward Suh},
  title        = {Hiding Information in Flash Memory},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {271--285},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.26},
  doi          = {10.1109/SP.2013.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WangYXKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZahurE13,
  author       = {Samee Zahur and
                  David Evans},
  title        = {Circuit Structures for Improving Efficiency of Security and Privacy
                  Tools},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {493--507},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.40},
  doi          = {10.1109/SP.2013.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZahurE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangWCDSMSZ13,
  author       = {Chao Zhang and
                  Tao Wei and
                  Zhaofeng Chen and
                  Lei Duan and
                  Laszlo Szekeres and
                  Stephen McCamant and
                  Dawn Song and
                  Wei Zou},
  title        = {Practical Control Flow Integrity and Randomization for Binary Executables},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {559--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.44},
  doi          = {10.1109/SP.2013.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangWCDSMSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2013,
  title        = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6547086/proceeding},
  isbn         = {978-1-4673-6166-8},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics