| Securing Electronic Mail on the National Research and Academic Network of Italy | LISA '06 | Roberto Cecchini, Fulvia Costa, Alberto D'Ambrosio, Domenico Diacono, Giacomo Fazio, Antonio Forte, Matteo Genghini, Michele Michelotto, Ombretta Pinazza, Alfonso Sparano |
| A Forensic Analysis of a Distributed Two-Stage Web-Based Spam Attack | LISA '06 | Daniel V. Klein |
| Teaching Problem Solving: You Can and You Should | LISA '06 | Elizabeth Zwicky |
| Sysadmins, Network Managers, and Wiretap Law | LISA '06 | Alex Muentz |
| Firewall Analysis with Policy-Based Host Classification | LISA '06 | Robert Marmorstein, Phil Kearns |
| Secure Mobile Code Execution Service | LISA '06 | Lap-chung Lam, Yang Yu, Tzi-cker Chiueh |
| FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs | LISA '06 | Adam Slagell, Kiran Lakkaraju, Katherine Luo |
| Site Reliability at Google/My First Year at Google | LISA '06 | Tom Limoncelli |
| Leveraging the IT Community | LISA '06 | Patrick McGovern |
| Centralized Security Policy Support for Virtual Machine | LISA '06 | Nguyen Anh Quynh, Ruo Ando, Yoshiyasu Takefuji |
| Bigtable: A Distributed Storage System for Structured Data | OSDI '06 | Fay Chang, Jeffrey Dean, Sanjay Ghemawat, Wilson C. Hsieh, Deborah A. Wallach, Mike Burrows, Tushar Chandra, Andrew Fikes, Robert E. Gruber |
| Polymorphic Blending Attacks | USENIX Security '06 | Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee |
| Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection | USENIX Security '06 | Holger Dreger, Anja Feldmann |
| Behavior-based Spyware Detection | USENIX Security '06 | Engin Kirda, Christopher Kruegel |
| DRM Wars: The Next Generation | USENIX Security '06 | Ed Felten |
| An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data | USENIX Security '06 | Nick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh |
| vTPM: Virtualizing the Trusted Platform Module | USENIX Security '06 | Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn |
| Designing Voting Machines for Verification | USENIX Security '06 | Naveen Sastry |
| Academic Department or Corporate Lab, Which Fits? | USENIX Security '06 | Bill Aiello |
| Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery | USENIX Security '06 | Radmilo Racic, Denys Ma, Hao Chen |
| Applying Machine-model Based Countermeasure Design to Improve Protection Against Code Injection Attacks | USENIX Security '06 | Yves Younan, Frank Piessens, Wouter Joosen |
| Building a Trusted Network Connect Evaluation Test Bed | USENIX Security '06 | Jesus Molina |
| The SAAM Project at UBC | USENIX Security '06 | Jason Crampton, Wing Leung |
| ID-SAVE: Incrementally Deployable Source Address Validity Enforcement | USENIX Security '06 | Toby Ehrenkranz |
| Automatic Repair Validation | USENIX Security '06 | Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis |