LISA '07 | VoIP with NATs and Firewalls | |
LISA '07 | OpenLDAP: Highlights for 2.4 | Howard Chu |
LISA '07 | Ruby: Productivity or Penance? | Andrew Hume |
LISA '07 | Ganeti: An Open Source High-Availability Cluster Based on Xen | Guido Trotter |
LISA '07 | How to Get Your LISA Paper Accepted | Tom Limoncelli |
HotSec '07 | Transaction Generators: Root Kits for Web | Collin Jackson, Dan Boneh, John Mitchell |
HotSec '07 | Delegating Responsibility in Digital Systems: Horton's "Who Done It?" | Mark S. Miller, James E. Donnelley, Alan H. Karp |
HotSec '07 | Quantifying the Strength of Security Systems | David Lie, M. Satyanarayanan |
HotSec '07 | Towards Application-Aware Anonymous Routing | Micah Sherr, Boon Thau Loo, Matt Blaze |
HotSec '07 | Rethinking Antivirus: Executable Analysis in the Network Cloud | Jon Oberheide, Evan Cooke, Farnam Jahanian |
HotSec '07 | Turtles All the Way Down: Research Challenges in User-Based Attestation | Jonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn |
HotSec '07 | Securing Network Input via a Trusted Input Proxy | Kevin Borders, Atul Prakash |
HotSec '07 | Self-Signed Executables: Restricting Replacement of Program Binaries by Malware | Glenn Wurster, P.C. van Oorschot |
HotSec '07 | The Strengths of Weaker Identities: Opportunistic Personas | Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver |
HotSec '07 | Do Strong Web Passwords Accomplish Anything? | Dinei Florêncio, Cormac Herley, Baris Coskun |
DETER 2007 | Design, Deployment, and Use of the DETER Testbed | Terry Benzel, Robert Braden, Dongho Kim, Anthony Joseph, Clifford Neuman, Ron Ostrenga , Stephen Schwab, Keith Sklower |
DETER 2007 | SEER: A Security Experimentation EnviRonment for DETER | Brett Wilson, Calvin Ko, Alefiya Hussain |
DETER 2007 | A Hypervisor Based Security Testbed | Dan Duchamp, Greg DeAngelis |
DETER 2007 | Automating DDoS Experimentation | Jelena Mirkovic, Sonia Fahmy, Peter Reiher, Roshan Thomas |
DETER 2007 | Evaluation of Collaborative Worm Containments on DETER Testbed | L. Li, P. Liu, Y.C. Jhi, G. Kesidis |
DETER 2007 | Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze Malwares | Shinsuke MIWA, Toshiyuki MIYACHI, Masashi ETO, Masashi YOSHIZUMI, Yoichi SHINODA |
DETER 2007 | Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed | Yu Chen, Kai Hwang, Wei-Shinn Ku |
DETER 2007 | Dependency-based Distributed Intrusion Detection | Ji Li, Dah-Yoh Lim, Karen Sollins |
DETER 2007 | Stress Testing Cluster Bro | Nicholas Weaver, Robin Sommer |
DETER 2007 | A Plan for Malware Containment in the DETER Testbed | Ron Ostrenga, TBD |