Papers

Search results

    ConferenceTitleAuthor(s)
    HotSec '07Turtles All the Way Down: Research Challenges in User-Based AttestationJonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn
    HotSec '07Securing Network Input via a Trusted Input Proxy Kevin Borders, Atul Prakash
    HotSec '07Self-Signed Executables: Restricting Replacement of Program Binaries by MalwareGlenn Wurster, P.C. van Oorschot
    HotSec '07The Strengths of Weaker Identities: Opportunistic PersonasMark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver
    HotSec '07Do Strong Web Passwords Accomplish Anything?Dinei Florêncio, Cormac Herley, Baris Coskun
    HotSec '06Incentive-Centered Design for Information Security Rick Wash, Jeffrey K. MacKie-Mason
    HotSec '06Password Rescue: A New Approach to Phishing Prevention Dinei Florêncio, Cormac Herley
    HotSec '06Security Through Publicity Eric Osterweil, Dan Massey, Batsukh Tsendjav, Beichuan Zhang, Lixia Zhang
    HotSec '06Shame on Trust in Distributed SystemsTrent Jaeger, Patrick McDaniel, Luke St. Clair, Ramón Cáceres, Reiner Sailer
    HotSec '06Sensor Network Security: More Interesting Than You Think Madhukar Anand, Eric Cronin, Micah Sherr, Zachary Ives, Insup Lee
    HotSec '06Johnny Can Obfuscate: Beyond Mother’s Maiden Name William Cheswick
    HotSec '06Secure Software Updates: Disappointments and New Challenges Anthony Bellissimo, John Burgess, Kevin Fu
    HotSec '06Privacy as an Operating System Service Sotiris Ioannidis, Stelios Sidiroglou, Angelos D. Keromytis
    HotSec '06Exposure Maps: Removing Reliance on Attribution During Scan Detection David Whyte, P.C. van Oorschot, Evangelos Kranakis
    HotSec '06Towards Attack-Agnostic Defenses David Brumley, Dawn Song
    HotSec '06Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson, K. Asanović, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, N. Weaver

Pages