Search dblp for Publications

export results for "toc:db/conf/uss/uss2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/uss/AggarwalBJB10,
  author       = {Gaurav Aggarwal and
                  Elie Bursztein and
                  Collin Jackson and
                  Dan Boneh},
  title        = {An Analysis of Private Browsing Modes in Modern Browsers},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {79--94},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Aggarwal.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AggarwalBJB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Akritidis10,
  author       = {Periklis Akritidis},
  title        = {Cling: {A} Memory Allocator to Mitigate Dangling Pointers},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {177--192},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Akritidis.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Akritidis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AntonakakisPDLF10,
  author       = {Manos Antonakakis and
                  Roberto Perdisci and
                  David Dagon and
                  Wenke Lee and
                  Nick Feamster},
  title        = {Building a Dynamic Reputation System for {DNS}},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {273--290},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Antonakakis.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AntonakakisPDLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BackesDGPS10,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Sebastian Gerling and
                  Manfred Pinkal and
                  Caroline Sporleder},
  title        = {Acoustic Side-Channel Attacks on Printers},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {307--322},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Backes.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BackesDGPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BalaschRTPVG10,
  author       = {Josep Balasch and
                  Alfredo Rial and
                  Carmela Troncoso and
                  Bart Preneel and
                  Ingrid Verbauwhede and
                  Christophe Geuens},
  title        = {PrETP: Privacy-Preserving Electronic Toll Pricing},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {63--78},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Balasch.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BalaschRTPVG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BandhakaviKMW10,
  author       = {Sruthi Bandhakavi and
                  Samuel T. King and
                  P. Madhusudan and
                  Marianne Winslett},
  title        = {{VEX:} Vetting Browser Extensions for Security Vulnerabilities},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {339--354},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Bandhakavi.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BandhakaviKMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BittauHHMB10,
  author       = {Andrea Bittau and
                  Michael Hamburg and
                  Mark Handley and
                  David Mazi{\`{e}}res and
                  Dan Boneh},
  title        = {The Case for Ubiquitous Transport-Level Encryption},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {403--418},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Bittau.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BittauHHMB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BurkhartSMD10,
  author       = {Martin Burkhart and
                  Mario Strasser and
                  Dilip Many and
                  Xenofontas A. Dimitropoulos},
  title        = {{SEPIA:} Privacy-Preserving Aggregation of Multi-Domain Network Events
                  and Statistics},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {223--240},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Burkhart.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BurkhartSMD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BurnettFV10,
  author       = {Sam Burnett and
                  Nick Feamster and
                  Santosh S. Vempala},
  title        = {Chipping Away at Censorship Firewalls with User-Generated Content},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {463--468},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Burnett.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BurnettFV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/CarbackCCCEHMPRSSV10,
  author       = {Richard Carback and
                  David Chaum and
                  Jeremy Clark and
                  John Conway and
                  Aleksander Essex and
                  Paul S. Herrnson and
                  Travis Mayberry and
                  Stefan Popoveniuc and
                  Ronald L. Rivest and
                  Emily Shen and
                  Alan T. Sherman and
                  Poorvi L. Vora},
  title        = {Scantegrity {II} Municipal Election at Takoma Park: The First {E2E}
                  Binding Governmental Election with Ballot Privacy},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {291--306},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Carback.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/CarbackCCCEHMPRSSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DasBN10,
  author       = {Tathagata Das and
                  Ranjita Bhagwan and
                  Prasad Naldurg},
  title        = {Baaz: {A} System for Detecting Access Control Misconfigurations},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {161--176},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Das.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DasBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DjericG10,
  author       = {Vladan Djeric and
                  Ashvin Goel},
  title        = {Securing Script-Based Extensibility in Web Browsers},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {355--370},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Djeric.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DjericG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DuanYCZ10,
  author       = {Yitao Duan and
                  NetEase Youdao and
                  John F. Canny and
                  Justin Z. Zhan},
  title        = {{P4P:} Practical Large-Scale Privacy-Preserving Distributed Computation
                  Robust against Malicious Users},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {207--222},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Duan.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DuanYCZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EnsafiPKC10,
  author       = {Roya Ensafi and
                  Jong Chun Park and
                  Deepak Kapur and
                  Jedidiah R. Crandall},
  title        = {Idle Port Scanning and Non-interference Analysis of Network Protocol
                  Stacks Using Model Checking},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {257--272},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Ensafi.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EnsafiPKC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FelmetsgerCKV10,
  author       = {Viktoria Felmetsger and
                  Ludovico Cavedon and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Toward Automated Detection of Logic Vulnerabilities in Web Applications},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {143--160},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Felmetsger.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FelmetsgerCKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GillGWL10,
  author       = {Phillipa Gill and
                  Yashar Ganjali and
                  Bernard Wong and
                  David Lie},
  title        = {Dude, Where's That IP? Circumventing Measurement-based {IP} Geolocation},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {241--256},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Gill.pdf},
  timestamp    = {Sun, 07 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GillGWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GuptaG10,
  author       = {Payas Gupta and
                  Debin Gao},
  title        = {Fighting Coercion Attacks in Key Generation using Skin Conductance},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {469--484},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Gupta.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GuptaG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JohnYXAK10,
  author       = {John P. John and
                  Fang Yu and
                  Yinglian Xie and
                  Mart{\'{\i}}n Abadi and
                  Arvind Krishnamurthy},
  title        = {Searching the Searchers with SearchAudit},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {127--142},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/John.pdf},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JohnYXAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KimZ10,
  author       = {Taesoo Kim and
                  Nickolai Zeldovich},
  title        = {Making Linux Protection Mechanisms Egalitarian with UserFS},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {13--28},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Kim.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KimZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LouwGV10,
  author       = {Mike Ter Louw and
                  Karthik Thotta Ganesh and
                  V. N. Venkatakrishnan},
  title        = {AdJail: Practical Enforcement of Confidentiality and Integrity Policies
                  on Web Advertisements},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {371--388},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/TerLouw.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LouwGV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MarchenkoK10,
  author       = {Petr Marchenko and
                  Brad Karp},
  title        = {Structuring Protocol Implementations to Protect Sensitive Data},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {47--62},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Marchenko.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MarchenkoK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MeiklejohnEKHL10,
  author       = {Sarah Meiklejohn and
                  C. Christopher Erway and
                  Alptekin K{\"{u}}p{\c{c}}{\"{u}} and
                  Theodora Hinkle and
                  Anna Lysyanskaya},
  title        = {{ZKPDL:} {A} Language-Based System for Efficient Zero-Knowledge Proofs
                  and Electronic Cash},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {193--206},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Meiklejohn.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MeiklejohnEKHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MeinersPNTL10,
  author       = {Chad R. Meiners and
                  Jignesh Patel and
                  Eric Norige and
                  Eric Torng and
                  Alex X. Liu},
  title        = {Fast Regular Expression Matching Using Small TCAMs for Network Intrusion
                  Detection and Prevention Systems},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {111--126},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Meiners.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MeinersPNTL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MotoyamaLKMVS10,
  author       = {Marti Motoyama and
                  Kirill Levchenko and
                  Chris Kanich and
                  Damon McCoy and
                  Geoffrey M. Voelker and
                  Stefan Savage},
  title        = {Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic
                  Context},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {435--462},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Motoyama.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MotoyamaLKMVS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NagarajaMHCB10,
  author       = {Shishir Nagaraja and
                  Prateek Mittal and
                  Chi{-}Yao Hong and
                  Matthew Caesar and
                  Nikita Borisov},
  title        = {BotGrep: Finding {P2P} Bots with Structured Graph Analysis},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {95--110},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Nagaraja.pdf},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/NagarajaMHCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaleariMPDFGJ10,
  author       = {Roberto Paleari and
                  Lorenzo Martignoni and
                  Emanuele Passerini and
                  Drew Davidson and
                  Matt Fredrikson and
                  Jonathon T. Giffin and
                  Somesh Jha},
  title        = {Automatic Generation of Remediation Procedures for Malware Infections},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {419--434},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Paleari.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PaleariMPDFGJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RasmussenC10,
  author       = {Kasper Bonne Rasmussen and
                  Srdjan Capkun},
  title        = {Realization of {RF} Distance Bounding},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {389--402},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Rasmussen.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RasmussenC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RoufMMTOXGTS10,
  author       = {Ishtiaq Rouf and
                  Robert D. Miller and
                  Hossen Asiful Mustafa and
                  Travis Taylor and
                  Sangho Oh and
                  Wenyuan Xu and
                  Marco Gruteser and
                  Wade Trappe and
                  Ivan Seskar},
  title        = {Security and Privacy Vulnerabilities of In-Car Wireless Networks:
                  {A} Tire Pressure Monitoring System Case Study},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {323--338},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Rouf.pdf},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RoufMMTOXGTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SehrMBKPSYC10,
  author       = {David Sehr and
                  Robert Muth and
                  Cliff Biffle and
                  Victor Khimenko and
                  Egor Pasko and
                  Karl Schimpf and
                  Bennet Yee and
                  Brad Chen},
  title        = {Adapting Software Fault Isolation to Contemporary {CPU} Architectures},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {1--12},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Sehr.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SehrMBKPSYC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WatsonALK10,
  author       = {Robert N. M. Watson and
                  Jonathan Anderson and
                  Ben Laurie and
                  Kris Kennaway},
  title        = {Capsicum: Practical Capabilities for {UNIX}},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {29--46},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Watson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WatsonALK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2010,
  title        = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2010},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics