Conferences

Search results

    TitleConferenceSpeaker(s)
    Rule-Based Static Analysis of Network Protocol ImplementationsUSENIX Security '06Octavian Udrea, Cristian Lumezanu
    Evaluating SFI for a CISC ArchitectureUSENIX Security '06Stephen McCamant, Greg Morrisett
    SigFree: A Signature-free Buffer Overflow Attack BlockerUSENIX Security '06Xinran Wang, Chi-Chun Pan
    Security Vulnerabilities, Exploits, and Attack Patterns: 15 Years of Art, Pseudo-Science, Fun, and ProfitUSENIX Security '06Ivan Arce
    How to Build a Low-Cost, Extended-Range RFID SkimmerUSENIX Security '06Ilan Kirschenbaum, Avishai Wool
    Keyboards and Covert ChannelsUSENIX Security '06Gaurav Shah, Andres Molina
    Lessons from the Sony CD DRM EpisodeUSENIX Security '06J. Alex Halderman, Edward W. Felten
    Usable Security: Quo Vadis?USENIX Security '06Dirk Balfanz, Konstantin Beznosov, Paul Van Oorschot, Ka-Ping Yee
    Milk or Wine: Does Software Security Improve with Age?USENIX Security '06Andy Ozment, Stuart E. Schechter
    N-Variant Systems: A Secretless Framework for Security through DiversityUSENIX Security '06Benjamin Cox, David Evans
    Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of AttacksUSENIX Security '06Wei Xu, Sandeep Bhatkar, R. Sekar
    Signaling Vulnerabilities in Law Enforcement Wiretapping SystemsUSENIX Security '06Matt Blaze
    Opening Remarks, Awards, and KeynoteUSENIX Security '06
    Keynote Address The Current State of the War on Terrorism and What It Means for Homeland Security and TechnologyUSENIX Security '06Richard A. Clarke
    A Usability Study and Critique of Two Password Managers USENIX Security '06Sonia Chiasson, P.C. van Oorschot, Robert Biddle
    On the Release of CRLs in Public Key InfrastructureUSENIX Security '06Chengyu Ma, Nan Hu, Yingjiu Li
    Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's ClothingUSENIX Security '06Lucas Ballard, Fabian Monrose, Daniel Lopresti
    Selling Security to Software Developers: Lessons Learned While Building a Commercial Static Analysis ToolUSENIX Security '06Brian Chess
    An Introduction to Software Radio USENIX ATC '06Eric Blossom
    Hackers and Founders USENIX ATC '06Paul Graham
    Real Operating Systems for Real-time Motion Control USENIX ATC '06Trevor Blackwell
    Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography USENIX ATC '06Steven M. Bellovin
    Gold and Fool's Gold: Successes, Failures, and Futures in Computer Systems Research USENIX ATC '06Butler Lampson
    Routing Without Tears, Bridging Without Danger USENIX ATC '06Radia Perlman
    Deploying a Sensor Network on an Active Volcano USENIX ATC '06Matt Welsh

Pages