Conferences

Search results

    TitleConferenceSpeaker(s)
    Deploying a Sensor Network on an Active Volcano USENIX ATC '06Matt Welsh
    Panel: Open Source Software Business Models USENIX ATC '06Mike Olsen, Brian Aker, Miguel de Icaza
    Success, Failure, and Alternative Solutions for Network Security USENIX ATC '06Peiter "Mudge" Zatko
    Panel: Is University Systems Teaching and Research Relevant to Industry? USENIX ATC '06Gernot Heiser
    Architectures and Algorithms for Biomolecular Simulation USENIX ATC '06Cliff Young
    Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography USENIX ATC '06Steven M. Bellovin
    Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research USENIX ATC '06Butler Lampson
    Routing Without Tears, Bridging Without Danger USENIX ATC '06Radia Perlman
    Exploiting Online Games USENIX Security '07Gary McGraw
    Integrity Checking in Cryptographic File Systems with Constant Trusted StorageUSENIX Security '07Alina Oprea, Michael K. Reiter
    Discoverer: Automatic Protocol Reverse Engineering from Network TracesUSENIX Security '07Weidong Cui, Jayanthkumar Kannan, Helen J. Wang
    Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationUSENIX Security '07David Brumley, Juan Caballero, Zhenkai Liang, James Newsome
    Computer Security in a Large EnterpriseUSENIX Security '07Jerry Brady
    PANELUSENIX Security '07Ron Buskey, John Larson, Simon Mizikovsky, Thomas La Porta, Patrick Traynor
    Mobile MalwareUSENIX Security '07Mikko Hypponen
    OSLO: Improving the Security of Trusted ComputingUSENIX Security '07Bernhard Kauer
    Secretly Monopolizing the CPU Without Superuser PrivilegesUSENIX Security '07Dan Tsafrir, Yoav Etsion, Dror G. Feitelson
    Memory Performance Attacks: Denial of Memory Service in Multi-Core SystemsUSENIX Security '07Thomas Moscibroda, Onur Mutlu
    Computer Security and VotingUSENIX Security '07David Dill
    Report of the California Voting Systems ReviewUSENIX Security '07David Wagner
    Binary Obfuscation Using SignalsUSENIX Security '07Igor V. Popov, Saumya K. Debray, Gregory R. Andrews
    Active Hardware Metering for Intellectual Property Protection and SecurityUSENIX Security '07Yousra M. Alkabani, Farinaz Koushanfar
    Advanced RootkitsUSENIX Security '07Greg Hoglund
    On Attack Causality in Internet-Connected Cellular NetworksUSENIX Security '07Patrick McDaniel
    Proximity Breeds Danger: Emerging Threats in Metro-area Wireless NetworksUSENIX Security '07P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis

    Pages