USENIX Security '06 | How to Build a Low-Cost, Extended-Range RFID Skimmer | Ilan Kirschenbaum, Avishai Wool |
USENIX Security '06 | Keyboards and Covert Channels | Gaurav Shah, Andres Molina |
USENIX Security '06 | Lessons from the Sony CD DRM Episode | J. Alex Halderman, Edward W. Felten |
USENIX Security '06 | Milk or Wine: Does Software Security Improve with Age? | Andy Ozment, Stuart E. Schechter |
USENIX Security '06 | N-Variant Systems: A Secretless Framework for Security through Diversity | Benjamin Cox, David Evans |
USENIX Security '06 | Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks | Wei Xu, Sandeep Bhatkar, R. Sekar |
HotSec '06 | Security Through Publicity | Eric Osterweil, Dan Massey, Batsukh Tsendjav, Beichuan Zhang, Lixia Zhang |
HotSec '06 | Shame on Trust in Distributed Systems | Trent Jaeger, Patrick McDaniel, Luke St. Clair, Ramón Cáceres, Reiner Sailer |
HotSec '06 | Sensor Network Security: More Interesting Than You Think | Madhukar Anand, Eric Cronin, Micah Sherr, Zachary Ives, Insup Lee |
HotSec '06 | Johnny Can Obfuscate: Beyond Mother’s Maiden Name | William Cheswick |
HotSec '06 | Secure Software Updates: Disappointments and New Challenges | Anthony Bellissimo, John Burgess, Kevin Fu |
HotSec '06 | Privacy as an Operating System Service | Sotiris Ioannidis, Stelios Sidiroglou, Angelos D. Keromytis |
HotSec '06 | Exposure Maps: Removing Reliance on Attribution During Scan Detection | David Whyte, P.C. van Oorschot, Evangelos Kranakis |
HotSec '06 | Towards Attack-Agnostic Defenses | David Brumley, Dawn Song |
HotSec '06 | Rethinking Hardware Support for Network Analysis and Intrusion Prevention | V. Paxson, K. Asanović, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, N. Weaver |
USENIX Security '06 | A Usability Study and Critique of Two Password Managers | Sonia Chiasson, P.C. van Oorschot, Robert Biddle |
USENIX Security '06 | On the Release of CRLs in Public Key Infrastructure | Chengyu Ma, Nan Hu, Yingjiu Li |
USENIX Security '06 | Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing | Lucas Ballard, Fabian Monrose, Daniel Lopresti |
HotSec '06 | Incentive-Centered Design for Information Security | Rick Wash, Jeffrey K. MacKie-Mason |
HotSec '06 | Password Rescue: A New Approach to Phishing Prevention | Dinei Florêncio, Cormac Herley |
SRUTI '06 | Efficient and Secure Source Authentication with Packet Passports | Xin Liu, Xiaowei Yang, David Wetherall, Thomas Anderson |
SRUTI '06 | Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood Protection | Martin Casado, Aditya Akella, Pei Cao, Niels Provos, Scott Shenker |
SRUTI '06 | Separating Wheat from the Chaff: A Deployable Approach to Counter Spam | Youngsang Shin, Minaxi Gupta, Rob Henderson, Aaron Emigh |
SRUTI '06 | Tracking the Role of Adversaries in Measuring Unwanted Traffic | Mark Allman, Paul Barford, Balachander Krishnamurthy, Jia Wang |
SRUTI '06 | An Algorithm for Anomaly-based Botnet Detection | James R. Binkley, Suresh Singh |