Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '07VoIP with NATs and Firewalls
    LISA '07OpenLDAP: Highlights for 2.4Howard Chu
    LISA '07Ruby: Productivity or Penance?Andrew Hume
    LISA '07Ganeti: An Open Source High-Availability Cluster Based on XenGuido Trotter
    LISA '07How to Get Your LISA Paper AcceptedTom Limoncelli
    HotSec '07Transaction Generators: Root Kits for Web Collin Jackson, Dan Boneh, John Mitchell
    HotSec '07Delegating Responsibility in Digital Systems: Horton's "Who Done It?"Mark S. Miller, James E. Donnelley, Alan H. Karp
    HotSec '07Quantifying the Strength of Security SystemsDavid Lie, M. Satyanarayanan
    HotSec '07Towards Application-Aware Anonymous Routing Micah Sherr, Boon Thau Loo, Matt Blaze
    HotSec '07Rethinking Antivirus: Executable Analysis in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian
    HotSec '07Turtles All the Way Down: Research Challenges in User-Based AttestationJonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn
    HotSec '07Securing Network Input via a Trusted Input Proxy Kevin Borders, Atul Prakash
    HotSec '07Self-Signed Executables: Restricting Replacement of Program Binaries by MalwareGlenn Wurster, P.C. van Oorschot
    HotSec '07The Strengths of Weaker Identities: Opportunistic PersonasMark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver
    HotSec '07Do Strong Web Passwords Accomplish Anything?Dinei Florêncio, Cormac Herley, Baris Coskun
    DETER 2007Design, Deployment, and Use of the DETER TestbedTerry Benzel, Robert Braden, Dongho Kim, Anthony Joseph, Clifford Neuman, Ron Ostrenga , Stephen Schwab, Keith Sklower
    DETER 2007SEER: A Security Experimentation EnviRonment for DETERBrett Wilson, Calvin Ko, Alefiya Hussain
    DETER 2007A Hypervisor Based Security TestbedDan Duchamp, Greg DeAngelis
    DETER 2007Automating DDoS ExperimentationJelena Mirkovic, Sonia Fahmy, Peter Reiher, Roshan Thomas
    DETER 2007Evaluation of Collaborative Worm Containments on DETER TestbedL. Li, P. Liu, Y.C. Jhi, G. Kesidis
    DETER 2007Design and Implementation of an Isolated Sandbox with Mimetic Internet Used to Analyze MalwaresShinsuke MIWA, Toshiyuki MIYACHI, Masashi ETO, Masashi YOSHIZUMI, Yoichi SHINODA
    DETER 2007Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER TestbedYu Chen, Kai Hwang, Wei-Shinn Ku
    DETER 2007Dependency-based Distributed Intrusion DetectionJi Li, Dah-Yoh Lim, Karen Sollins
    DETER 2007Stress Testing Cluster BroNicholas Weaver, Robin Sommer
    DETER 2007A Plan for Malware Containment in the DETER TestbedRon Ostrenga, TBD

Pages