HotSec '07 | Turtles All the Way Down: Research Challenges in User-Based Attestation | Jonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn |
HotSec '07 | Securing Network Input via a Trusted Input Proxy | Kevin Borders, Atul Prakash |
HotSec '07 | Self-Signed Executables: Restricting Replacement of Program Binaries by Malware | Glenn Wurster, P.C. van Oorschot |
HotSec '07 | The Strengths of Weaker Identities: Opportunistic Personas | Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver |
HotSec '07 | Do Strong Web Passwords Accomplish Anything? | Dinei Florêncio, Cormac Herley, Baris Coskun |
HotSec '06 | Incentive-Centered Design for Information Security | Rick Wash, Jeffrey K. MacKie-Mason |
HotSec '06 | Password Rescue: A New Approach to Phishing Prevention | Dinei Florêncio, Cormac Herley |
HotSec '06 | Security Through Publicity | Eric Osterweil, Dan Massey, Batsukh Tsendjav, Beichuan Zhang, Lixia Zhang |
HotSec '06 | Shame on Trust in Distributed Systems | Trent Jaeger, Patrick McDaniel, Luke St. Clair, Ramón Cáceres, Reiner Sailer |
HotSec '06 | Sensor Network Security: More Interesting Than You Think | Madhukar Anand, Eric Cronin, Micah Sherr, Zachary Ives, Insup Lee |
HotSec '06 | Johnny Can Obfuscate: Beyond Mother’s Maiden Name | William Cheswick |
HotSec '06 | Secure Software Updates: Disappointments and New Challenges | Anthony Bellissimo, John Burgess, Kevin Fu |
HotSec '06 | Privacy as an Operating System Service | Sotiris Ioannidis, Stelios Sidiroglou, Angelos D. Keromytis |
HotSec '06 | Exposure Maps: Removing Reliance on Attribution During Scan Detection | David Whyte, P.C. van Oorschot, Evangelos Kranakis |
HotSec '06 | Towards Attack-Agnostic Defenses | David Brumley, Dawn Song |
HotSec '06 | Rethinking Hardware Support for Network Analysis and Intrusion Prevention | V. Paxson, K. Asanović, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, N. Weaver |