Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '06PHAS: A Prefix Hijack Alert SystemMohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang
    USENIX Security '06Passive Data Link Layer 802.11 Wireless Device Driver FingerprintingJason Franklin, Damon McCoy
    USENIX Security '06Static Detection of Security Vulnerabilities in Scripting LanguagesYichen Xie, Alex Aiken
    USENIX Security '06Rule-Based Static Analysis of Network Protocol ImplementationsOctavian Udrea, Cristian Lumezanu
    USENIX Security '06Evaluating SFI for a CISC ArchitectureStephen McCamant, Greg Morrisett
    USENIX Security '06SigFree: A Signature-free Buffer Overflow Attack BlockerXinran Wang, Chi-Chun Pan
    USENIX Security '06Polymorphic Blending AttacksPrahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee
    USENIX Security '06Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionHolger Dreger, Anja Feldmann
    USENIX Security '06Behavior-based Spyware DetectionEngin Kirda, Christopher Kruegel
    USENIX Security '06An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic DataNick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh
    USENIX Security '06vTPM: Virtualizing the Trusted Platform ModuleStefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn
    USENIX Security '06Designing Voting Machines for VerificationNaveen Sastry
    SRUTI '06The Rising Tide: DDoS from Defective Designs and DefaultsRichard Clayton
    SRUTI '06Efficient and Secure Source Authentication with Packet PassportsXin Liu, Xiaowei Yang, David Wetherall, Thomas Anderson
    SRUTI '06Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood ProtectionMartin Casado, Aditya Akella, Pei Cao, Niels Provos, Scott Shenker
    SRUTI '06Separating Wheat from the Chaff: A Deployable Approach to Counter SpamYoungsang Shin, Minaxi Gupta, Rob Henderson, Aaron Emigh
    SRUTI '06Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-SquattingYi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, Brad Daniels
    SRUTI '06Tracking the Role of Adversaries in Measuring Unwanted TrafficMark Allman, Paul Barford, Balachander Krishnamurthy, Jia Wang
    SRUTI '06An Algorithm for Anomaly-based Botnet DetectionJames R. Binkley, Suresh Singh
    SRUTI '06Revealing Botnet Membership Using DNSBL Counter-IntelligenceAnirudh Ramachandran, Nick Feamster, David Dagon
    SRUTI '06Leveraging Good Intentions to Reduce Malicious Network TrafficMarianne Shaw
    USENIX ATC '06Antfarm: Tracking Processes in a Virtual Machine Environment Stephen T. Jones, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
    USENIX ATC '06Optimizing Network Virtualization in Xen Aravind Menon, Alan L. Cox, Willy Zwaenepoel
    USENIX ATC '06High Performance VMM-Bypass I/O in Virtual Machines Jiuxing Liu, Wei Huang, Bulent Abali, Dhabaleswar K. Panda
    USENIX ATC '06Provenance-Aware Storage Systems Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, Margo Seltzer

Pages