Michael Franz. E unibus pluram: Massive-Scale Software Diversity as a
San-Tsai Sun, Yazan Boshmaf, Kirstie Hawkey and Konstantin Beznosov. A
Billion Keys, but Few Locks: The Crisis of Web Single Sign-On.
Shamal Faily and Ivan Flechais. To boldly go where invention isn¹t secure:
applying Security Entrepreneurship to secure systems design.
Mohammed I. Al-Saleh and Jedidiah R. Crandall. On Information Flow for
Intrusion Detection: What if Accurate Full-system Dynamic Information Flow
Tracking Was Possible?
Matt Bishop, Justin Cummins, Sean Peisert, Anhad Singh, Bhume Bhumiratana,
Deborah Agarwal, Deborah Frincke and Michael Hogarth. Relationships and Data
Sanitization: A Study in Scarlet.
Elahe Kani-Zabihi and Lizzie Coles-Kemp. On-line Privacy and Consent: A
Dialogue, Not a Monologue.
Tyler Moore, Allan Friedman and Ariel Procaccia. Would a 'Cyber Warrior'
Protect Us? Exploring Trade-offs Between Attack and Defense of Information
Simon Parkin, Aad van Moorsel, Philip Inglesant and M. Angela Sasse. A
Stealth Approach to Usable Security: Helping IT Security Managers to
Identify Workable Security Solutions.
Roy Maxion, Tom Longstaff and John McHugh. Why is there no Science in Cyber
Victor Raskin, Julia M. Taylor and Christian F. Hempelmann. Ontological
Semantic Technology for Detecting Insider Threat and Social Engineering.
Leszek Lilien, Adawia Al-Alawneh, and Lotfi Ben Othmane. The Pervasive Trust
Foundation for Security in Next Generation Networks.
David Molnar, Serge Egelman and Nicolas Christin. This Is Your Data on
Drugs:Lessons Computer Security Can Learn From The Drug War.
Sergey Bratus, Michael Locasto, Ashwin Ramaswamy and Sean Smith. VM-based
Security Overkill: A Lament for Applied Systems Security Research.
Andre van Cleeff. A Risk Management Process for Consumers: The Next Step in