Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '05Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy NetworkJu Wang, Xin Liu, Andrew A. Chien
    USENIX Security '05Robust TCP Stream Reassembly in the Presence of AdversariesSarang Dharmapurikar, Vern Paxson
    USENIX Security '05Countering Targeted File Attacks Using LocationGuardMudhakar Srivatsa, Ling Liu
    USENIX Security '05An Architecture for Generating Semantic Aware SignaturesVinod Yegneswaran, Jonathon T. Giffin, Paul Barford, Somesh Jha
    USENIX Security '05MulVAL: A Logic-based Network Security AnalyzerXinming Ou, Sudhakar Govindavajhala, Andrew W. Appel
    USENIX Security '05Detecting Targeted Attacks Using Shadow HoneypotsK. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytis
    USENIX Security '05Where's the FEEB? The Effectiveness of Instruction Set RandomizationAna Nora Sovarel, David Evans, Nathanael Paul
    USENIX Security '05Automating Mimicry Attacks Using Static Binary AnalysisChristopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna
    USENIX Security '05Non-Control-Data Attacks Are Realistic ThreatsShuo Chen, Jun Xu, Emre C. Sezer
    USENIX Security '05Mapping Internet Sensors with Probe Response AttacksJohn Bethencourt, Jason Franklin, Mary Vernon
    USENIX Security '05Vulnerabilities of Passive Internet Threat MonitorsYoichi Shinoda, Ko Ikai, Motomu Itoh
    USENIX Security '05On the Effectiveness of Distributed Worm MonitoringMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis
    USENIX Security '05Protecting Against Unexpected System CallsC. M. Linn, M. Rajagopalan, S. Baker, C. Collberg, S. K. Debray, J. H. Hartman
    USENIX Security '05Efficient Techniques for Comprehensive Protection from Memory Error ExploitsSandeep Bhatkar, Daniel C. DuVarney
    USENIX Security '05Finding Security Vulnerabilities in Java Applications with Static AnalysisV. Benjamin Livshits, Monica S. Lam
    USENIX Security '05OPUS: Online Patches and Updates for SecurityGautam Altekar, Ilya Bagrak, Paul Burstein, Andrew Schultz
    USENIX Security '05Fixing Races for Fun and Profit: How to Abuse atimeNikita Borisov, Rob Johnson
    USENIX Security '05Building an Application-aware IPsec Policy SystemHeng Yin, Haining Wang
    USENIX Security '05Shredding Your Garbage: Reducing Data Lifetime Through Secure DeallocationJim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum
    SRUTI '05Using Routing and Tunneling to Combat DoS AttacksAdam Greenhalgh, Mark Handley, Felipe Huici
    SRUTI '05Reducing Unwanted Traffic in a Backbone NetworkKuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
    SRUTI '05Analyzing Cooperative Containment of Fast Scanning WormsJayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz
    SRUTI '05Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic Zhenhai Duan, Kartik Gopalan
    SRUTI '05Detecting Spam in VoIP NetworksRam Dantu, Prakash Kolan
    SRUTI '05The Zombie Roundup: Understanding, Detecting, and Disrupting BotnetsEvan Cooke, Farnam Jahanian

Pages