Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '06How to Build a Low-Cost, Extended-Range RFID SkimmerIlan Kirschenbaum, Avishai Wool
    USENIX Security '06Keyboards and Covert ChannelsGaurav Shah, Andres Molina
    USENIX Security '06Lessons from the Sony CD DRM EpisodeJ. Alex Halderman, Edward W. Felten
    USENIX Security '06Milk or Wine: Does Software Security Improve with Age?Andy Ozment, Stuart E. Schechter
    USENIX Security '06N-Variant Systems: A Secretless Framework for Security through DiversityBenjamin Cox, David Evans
    USENIX Security '06Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of AttacksWei Xu, Sandeep Bhatkar, R. Sekar
    HotSec '06Security Through Publicity Eric Osterweil, Dan Massey, Batsukh Tsendjav, Beichuan Zhang, Lixia Zhang
    HotSec '06Shame on Trust in Distributed SystemsTrent Jaeger, Patrick McDaniel, Luke St. Clair, Ramón Cáceres, Reiner Sailer
    HotSec '06Sensor Network Security: More Interesting Than You Think Madhukar Anand, Eric Cronin, Micah Sherr, Zachary Ives, Insup Lee
    HotSec '06Johnny Can Obfuscate: Beyond Mother’s Maiden Name William Cheswick
    HotSec '06Secure Software Updates: Disappointments and New Challenges Anthony Bellissimo, John Burgess, Kevin Fu
    HotSec '06Privacy as an Operating System Service Sotiris Ioannidis, Stelios Sidiroglou, Angelos D. Keromytis
    HotSec '06Exposure Maps: Removing Reliance on Attribution During Scan Detection David Whyte, P.C. van Oorschot, Evangelos Kranakis
    HotSec '06Towards Attack-Agnostic Defenses David Brumley, Dawn Song
    HotSec '06Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson, K. Asanović, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, N. Weaver
    USENIX Security '06A Usability Study and Critique of Two Password Managers Sonia Chiasson, P.C. van Oorschot, Robert Biddle
    USENIX Security '06On the Release of CRLs in Public Key InfrastructureChengyu Ma, Nan Hu, Yingjiu Li
    USENIX Security '06Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's ClothingLucas Ballard, Fabian Monrose, Daniel Lopresti
    HotSec '06Incentive-Centered Design for Information Security Rick Wash, Jeffrey K. MacKie-Mason
    HotSec '06Password Rescue: A New Approach to Phishing Prevention Dinei Florêncio, Cormac Herley
    SRUTI '06Efficient and Secure Source Authentication with Packet PassportsXin Liu, Xiaowei Yang, David Wetherall, Thomas Anderson
    SRUTI '06Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood ProtectionMartin Casado, Aditya Akella, Pei Cao, Niels Provos, Scott Shenker
    SRUTI '06Separating Wheat from the Chaff: A Deployable Approach to Counter SpamYoungsang Shin, Minaxi Gupta, Rob Henderson, Aaron Emigh
    SRUTI '06Tracking the Role of Adversaries in Measuring Unwanted TrafficMark Allman, Paul Barford, Balachander Krishnamurthy, Jia Wang
    SRUTI '06An Algorithm for Anomaly-based Botnet DetectionJames R. Binkley, Suresh Singh

Pages