SRUTI '06 | Revealing Botnet Membership Using DNSBL Counter-Intelligence | Anirudh Ramachandran, Nick Feamster, David Dagon |
SRUTI '06 | Leveraging Good Intentions to Reduce Malicious Network Traffic | Marianne Shaw |
SRUTI '06 | The Rising Tide: DDoS from Defective Designs and Defaults | Richard Clayton |
SRUTI '06 | Strider Typo-Patrol: Discovery and Analysis of Systematic Typo-Squatting | Yi-Min Wang, Doug Beck, Jeffrey Wang, Chad Verbowski, Brad Daniels |
USENIX ATC '06 | System- and Application-level Support for Runtime Hardware Reconfiguration on SoC Platforms | Dimitris Syrivelis, Spyros Lalis |
USENIX ATC '06 | Resilient Connections for SSH and TLS | Teemu Koponen, Pasi Eronen, Mikko Särelä |
USENIX ATC '06 | Structured and Unstructured Overlays under the Microscope: A Measurement-based View of Two P2P Systems That People Use | Yi Qiao, Fabián E. Bustamante |
USENIX ATC '06 | Reclaiming Network-wide Visibility Using Ubiquitous Endsystem Monitors | Evan Cooke, Richard Mortier, Austin Donnelly, Paul Barham, Rebecca Isaacs |
USENIX ATC '06 | Integrated Scientific Workflow Management for the Emulab Network Testbed | Eric Eide, Leigh Stoller, Tim Stack, Juliana Freire, Jay Lepreau |
USENIX ATC '06 | How DNS Misnaming Distorts Internet Topology Mapping | Ming Zhang, Yaoping Ruan |
USENIX ATC '06 | Efficient Query Subscription Processing for Prospective Search Engines | Utku Irmak, Svilen Mihaylov, Torsten Suel, Samrat Ganguly, Rauf Izmailov |
USENIX ATC '06 | IP Only Server | Muli Ben-Yehuda, Oleg Goldshmidt, Elliot K. Kolodner, Zorik Machulsky, Vadim Makhervaks, Julian Satran, Marc Segal, Leah Shalev, Ilan Shimony |
USENIX ATC '06 | Understanding and Validating Database System Administration | Fábio Oliveira, Kiran Nagaraja, Rekha Bachwani, Ricardo Bianchini, Richard P. Martin, Thu D. Nguyen |
USENIX ATC '06 | SMART: An Integrated Multi-Action Advisor for Storage Systems | Li Yin, Sandeep Uttamchandani, Madhukar Korupolu, Kaladhar Voruganti, Randy Katz |
USENIX ATC '06 | sMonitor: A Non-Intrusive Client-Perceived End-to-End Performance Monitor of Secured Internet Services | Jianbin Wei, Cheng-Zhong Xu |
USENIX ATC '06 | Privacy Analysis for Data Sharing in *nix Systems | Aameek Singh, Ling Liu, Mustaque Ahamad |
USENIX ATC '06 | Securing Web Service by Automatic Robot Detection | KyoungSoo Park, Vivek S. Pai, Kang-Won Lee, Seraphin Calo |
USENIX ATC '06 | Cutting through the Confusion: A Measurement Study of Homograph Attacks | Tobias Holgers, David E. Watson, Steven D. Gribble |
USENIX ATC '06 | Stealth Probing: Efficient Data-Plane Security for IP Routing | Ioannis Avramopoulos, Jennifer Rexford |
USENIX ATC '06 | Service Placement in a Shared Wide-Area Platform | David Oppenheimer, Brent Chun, David Patterson, Alex C. Snoeren, Amin Vahdat |
USENIX ATC '06 | Replay Debugging for Distributed Applications | Dennis Geels, Gautam Altekar, Scott Shenker, Ion Stoica |
USENIX ATC '06 | Loose Synchronization for Large-Scale Networked Systems | Jeannie Albrecht, Christopher Tuttle |
USENIX ATC '06 | Provenance-Aware Storage Systems | Kiran-Kumar Muniswamy-Reddy, David A. Holland, Uri Braun, Margo Seltzer |
USENIX ATC '06 | Thresher: An Efficient Storage Manager for Copy-on-write Snapshots | Liuba Shrira, Hao Xu |
USENIX ATC '06 | Design Tradeoffs in Applying Content Addressable Storage to Enterprise-scale Systems Based on Virtual Machines | Partho Nath, Michael A. Kozuch, David R. O'Hallaron, Jan Harkes, M. Satyanarayanan, Niraj Tolia, Matt Toups |