EVT '07 | Three Voting Protocols: ThreeBallot, VAV, and Twin | Warren D. Smith |
SRUTI '07 | BotTorrent: Misusing BitTorrent to Launch DDoS Attacks | Karim El Defrawy, Minas Gjoka |
SRUTI '07 | Boundary Detection and Containment of Local Worm Infections | Diego Zamboni, James Riordan, Milton Yates |
SRUTI '07 | Analyzing Network and Content Characteristics of Spim Using Honeypots | Aarjav J. Trivedi, Paul Q. Judge, Sven Krasser |
SRUTI '07 | A New Service for Increasing the Effectiveness of Network Address Blacklists | Jian Zhang, Phillip Porras, Johannes Ullrich |
SRUTI '07 | Accountability as a Service | Adam Bender, Neil Spring, Dave Levin, Bobby Bhattacharjee |
USENIX ATC '07 | Energy Management for Hypervisor-Based Virtual Machines | Jan Stoess, Christian Lang, Frank Bellosa |
USENIX ATC '07 | Xenprobes, a Lightweight User-Space Probing Framework for Xen Virtual Machine | Nguyen Anh Quynh, Kuniyasu Suzaki |
USENIX ATC '07 | Virtual Machine Memory Access Tracing with Hypervisor Exclusive Cache | Pin Lu and Kai Shen |
USENIX ATC '07 | Hyperion: High Volume Stream Archival for Retrospective Querying | Peter Desnoyers, Prashant Shenoy |
USENIX ATC '07 | Load Shedding in Network Monitoring Applications | Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanjuàs-Cuxart, Diego Amores-López, Josep Solé-Pareta |
USENIX ATC '07 | Configuration Management at Massive Scale: System Design and Experience | William Enck, Patrick McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Sanjay Rao, William Aiello |
USENIX ATC '07 | Events Can Make Sense | Maxwell Krohn, Eddie Kohler, M. Frans Kaashoek |
USENIX ATC '07 | MapJAX: Data Structure Abstractions for Asynchronous Web Applications | Daniel S. Myers, Jennifer N. Carlisle, James A. Cowling, Barbara H. Liskov |
USENIX ATC '07 | Sprockets: Safe Extensions for Distributed File Systems | Daniel Peek, Edmund B. Nightingale, Brett D. Higgins, Puspesh Kumar, Jason Flinn |
USENIX ATC '07 | SafeStore: A Durable and Practical Storage System | Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin |
USENIX ATC '07 | POTSHARDS: Secure Long-Term Storage Without Encryption | Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti |
USENIX ATC '07 | Dandelion: Cooperative Content Distribution with Robust Incentives | Michael Sirivianos, Jong Han Park, Xiaowei Yang, Stanislaw Jarecki |
USENIX ATC '07 | Using Provenance to Aid in Personal File Search | Sam Shah, Craig A.N. Soules, Gregory R. Ganger, Brian D. Noble |
USENIX ATC '07 | Supporting Practical Content-Addressable Caching with CZIP Compression | KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S. Pai |
USENIX ATC '07 | Short Paper: Implementation and Performance Evaluation of Fuzzy File Block Matching | Bo Han, Pete Keleher |
USENIX ATC '07 | From Trusted to Secure: Building and Executing Applications That Enforce System Security | Boniface Hicks, Sandra Rueda, Trent Jaeger |
USENIX ATC '07 | From STEM to SEAD: Speculative Execution for Automated Defense | Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis |
USENIX ATC '07 | Dynamic Spyware Analysis | Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Song |
USENIX ATC '07 | Evaluating Block-level Optimization Through the IO Path | Alma Riska |