USENIX Security '06 | PHAS: A Prefix Hijack Alert System | Mohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang |
USENIX Security '06 | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | Jason Franklin, Damon McCoy |
USENIX Security '06 | Static Detection of Security Vulnerabilities in Scripting Languages | Yichen Xie, Alex Aiken |
USENIX Security '06 | Rule-Based Static Analysis of Network Protocol Implementations | Octavian Udrea, Cristian Lumezanu |
USENIX Security '06 | Evaluating SFI for a CISC Architecture | Stephen McCamant, Greg Morrisett |
USENIX Security '06 | SigFree: A Signature-free Buffer Overflow Attack Blocker | Xinran Wang, Chi-Chun Pan |
USENIX Security '06 | Polymorphic Blending Attacks | Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee |
USENIX Security '06 | Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection | Holger Dreger, Anja Feldmann |
USENIX Security '06 | Behavior-based Spyware Detection | Engin Kirda, Christopher Kruegel |
USENIX Security '06 | An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data | Nick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh |
USENIX Security '06 | vTPM: Virtualizing the Trusted Platform Module | Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn |
USENIX Security '06 | Designing Voting Machines for Verification | Naveen Sastry |
SRUTI '06 | The Rising Tide: DDoS from Defective Designs and Defaults | Richard Clayton |
SRUTI '06 | Efficient and Secure Source Authentication with Packet Passports | Xin Liu, Xiaowei Yang, David Wetherall, Thomas Anderson |
SRUTI '06 | Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection | Martin Casado, Aditya Akella, Pei Cao, Niels Provos, Scott Shenker |
SRUTI '06 | Separating Wheat from the Chaff: A Deployable Approach to Counter Spam | Youngsang Shin, Minaxi Gupta, Rob Henderson, Aaron Emigh |
SRUTI '06 | Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting | Yi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, Brad Daniels |
SRUTI '06 | Tracking the Role of Adversaries in Measuring Unwanted Traffic | Mark Allman, Paul Barford, Balachander Krishnamurthy, Jia Wang |
SRUTI '06 | An Algorithm for Anomaly-based Botnet Detection | James R. Binkley, Suresh Singh |
SRUTI '06 | Revealing Botnet Membership Using DNSBL Counter-Intelligence | Anirudh Ramachandran, Nick Feamster, David Dagon |
SRUTI '06 | Leveraging Good Intentions to Reduce Malicious Network Traffic | Marianne Shaw |
USENIX ATC '06 | Antfarm: Tracking Processes in a Virtual Machine Environment | Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
USENIX ATC '06 | Optimizing Network Virtualization in Xen | Aravind Menon, Alan L. Cox, Willy Zwaenepoel |
USENIX ATC '06 | High Performance VMM-Bypass I/O in Virtual Machines | Jiuxing Liu, Wei Huang, Bulent Abali, Dhabaleswar K. Panda |
USENIX ATC '06 | Provenance-Aware Storage Systems | Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, Margo Seltzer |