Archive
2025 | 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 |
Results
Showing: 301 to 325 of 894Affiliation shown is the affiliation at the time the talk was given.
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
Yonghwi Kwon - Purdue University
SUPOR: Precise and Scalable Sensitive User Input Detection for Mobile Apps
Jianjun Huang - Purdue University
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
Samuel Jero - Purdue University
Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet
Steve Bellovin - Columbia University
CERIAS Poster Contest Winners
Rohit Ranchal & Payuna Uday & Zhemei Fang - Purdue University
Privacy Potpourri: Changing Privacy from the Bottom Up
Rebecca Herold - Rebecca Herold & Associates, LLC
Breaking Mobile Social Networks for Automated User Location Tracking
Kui Ren - University at Buffalo
Aiding Security Analytics -- From Dempster-Shafer Theory to Anthropology
Xinming Ou - Kansas State University
Regulatory Compliance Checking Over Encrypted Audit Logs
Omar Chowdhury - Purdue University
Practical Confidentiality Preserving Big Data Analysis in Untrusted Clouds
Savvas Savvides - Purdue University
Learning from Information Security Maturity: A Textual Analysis
Jackie Rees Ulmer - Purdue University
How Program Analysis can be Used in Security Applications
Xiangyu Zhang - Purdue University
Improving Analyst Team Performance and Capability in NOC / SOC Operations Centers
Barrett Caldwell and Omar Eldardiry - Purdue University