Search results

    Behavior-based Spyware DetectionUSENIX Security '06Engin Kirda, Christopher Kruegel
    A Usability Study and Critique of Two Password Managers USENIX Security '06Sonia Chiasson, P.C. van Oorschot, Robert Biddle
    On the Release of CRLs in Public Key InfrastructureUSENIX Security '06Chengyu Ma, Nan Hu, Yingjiu Li
    Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's ClothingUSENIX Security '06Lucas Ballard, Fabian Monrose, Daniel Lopresti
    Security Vulnerabilities, Exploits, and Attack Patterns: 15 Years of Art, Pseudo-Science, Fun, and ProfitUSENIX Security '06Ivan Arce
    How to Build a Low-Cost, Extended-Range RFID SkimmerUSENIX Security '06Ilan Kirschenbaum, Avishai Wool
    Keyboards and Covert ChannelsUSENIX Security '06Gaurav Shah, Andres Molina
    Lessons from the Sony CD DRM EpisodeUSENIX Security '06J. Alex Halderman, Edward W. Felten
    Usable Security: Quo Vadis?USENIX Security '06Dirk Balfanz, Konstantin Beznosov, Paul Van Oorschot, Ka-Ping Yee
    Milk or Wine: Does Software Security Improve with Age?USENIX Security '06Andy Ozment, Stuart E. Schechter
    N-Variant Systems: A Secretless Framework for Security through DiversityUSENIX Security '06Benjamin Cox, David Evans
    Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of AttacksUSENIX Security '06Wei Xu, Sandeep Bhatkar, R. Sekar
    Signaling Vulnerabilities in Law Enforcement Wiretapping SystemsUSENIX Security '06Matt Blaze
    SANE: A Protection Architecture for Enterprise NetworksUSENIX Security '06Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown
    PHAS: A Prefix Hijack Alert SystemUSENIX Security '06Mohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang
    Passive Data Link Layer 802.11 Wireless Device Driver FingerprintingUSENIX Security '06Jason Franklin, Damon McCoy
    Turing Around the Security ProblemUSENIX Security '06Crispin Cowan
    Major Security Blunders of the Past 30 YearsUSENIX Security '06Virgil Gligor, Peter Neumann
    Aspect-Oriented Programming: Radical Research in ModularityUSENIX Security '06Gregor Kiczales
    Evaluating SFI for a CISC ArchitectureUSENIX Security '06Stephen McCamant, Greg Morrisett
    Opening Remarks, Awards, and KeynoteUSENIX Security '06
    Keynote Address The Current State of the War on Terrorism and What It Means for Homeland Security and TechnologyUSENIX Security '06Richard A. Clarke
    Selling Security to Software Developers: Lessons Learned While Building a Commercial Static Analysis ToolUSENIX Security '06Brian Chess
    Real Operating Systems for Real-time Motion Control USENIX ATC '06Trevor Blackwell
    Routing Without Tears, Bridging Without Danger USENIX ATC '06Radia Perlman