17. CCS 2010: Chicago, Illinois, USA

Security analysis

System security

Wireless and phone security

Applied cryptography I

Passwords and CAPTCHAs

Sandboxing

Attacks on secure hardware

Information flow

Anonymity networks

Formal methods

Malware

Applied cryptography II

Cryptographic protocols

Memory safety and binary code

Web security

Demo presentations

Poster presentations