Conferences

Search results

    TitleConferenceSpeaker(s)
    Building a Trusted Network Connect Evaluation Test BedUSENIX Security '06Jesus Molina
    The SAAM Project at UBCUSENIX Security '06Jason Crampton, Wing Leung
    ID-SAVE: Incrementally Deployable Source Address Validity EnforcementUSENIX Security '06Toby Ehrenkranz
    Automatic Repair ValidationUSENIX Security '06Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis
    Secure Software Updates: Not ReallyUSENIX Security '06Kevin Fu
    The Utility vs. Strength Tradeoff: Anonymization for Log SharingUSENIX Security '06Kiran Lakkaraju
    Malware Prevalence in the KaZaA File-Sharing NetworkUSENIX Security '06Jaeyeon Jung
    Election AuditsUSENIX Security '06Arel Cordero
    The Joe-E Subset of JavaUSENIX Security '06Adrian Mettler
    Prerendered User Interfaces for Higher-Assurance Electronic VotingUSENIX Security '06Ka-Ping Yee
    Fine-Grained Secure Localization for 802.11 NetworksUSENIX Security '06Patrick Traynor
    KernelSecNetUSENIX Security '06Manigandan Radhakrishnan, Jon A. Solworth
    Taking Malware Detection To The Next Level (Down)USENIX Security '06Adrienne Felt, Nathanael Paul, David Evans, Sudhanva Gurumurthi
    Data Sandboxing for ConfidentialityUSENIX Security '06Tejas Khatiwala, Raj Swaminathan
    Static Detection of Security Vulnerabilities in Scripting LanguagesUSENIX Security '06Yichen Xie, Alex Aiken
    Rule-Based Static Analysis of Network Protocol ImplementationsUSENIX Security '06Octavian Udrea, Cristian Lumezanu
    Polymorphic Blending AttacksUSENIX Security '06Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee
    Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionUSENIX Security '06Holger Dreger, Anja Feldmann
    Behavior-based Spyware DetectionUSENIX Security '06Engin Kirda, Christopher Kruegel
    A Usability Study and Critique of Two Password Managers USENIX Security '06Sonia Chiasson, P.C. van Oorschot, Robert Biddle
    On the Release of CRLs in Public Key InfrastructureUSENIX Security '06Chengyu Ma, Nan Hu, Yingjiu Li
    Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's ClothingUSENIX Security '06Lucas Ballard, Fabian Monrose, Daniel Lopresti
    Security Vulnerabilities, Exploits, and Attack Patterns: 15 Years of Art, Pseudo-Science, Fun, and ProfitUSENIX Security '06Ivan Arce
    How to Build a Low-Cost, Extended-Range RFID SkimmerUSENIX Security '06Ilan Kirschenbaum, Avishai Wool
    Keyboards and Covert ChannelsUSENIX Security '06Gaurav Shah, Andres Molina

Pages