USENIX Security '05 | Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network | Ju Wang, Xin Liu, Andrew A. Chien |
USENIX Security '05 | Robust TCP Stream Reassembly in the Presence of Adversaries | Sarang Dharmapurikar, Vern Paxson |
USENIX Security '05 | Countering Targeted File Attacks Using LocationGuard | Mudhakar Srivatsa, Ling Liu |
USENIX Security '05 | An Architecture for Generating Semantic Aware Signatures | Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, Somesh Jha |
USENIX Security '05 | MulVAL: A Logic-based Network Security Analyzer | Xinming Ou, Sudhakar Govindavajhala, Andrew W. Appel |
USENIX Security '05 | Detecting Targeted Attacks Using Shadow Honeypots | K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytis |
USENIX Security '05 | Where's the FEEB? The Effectiveness of Instruction Set Randomization | Ana Nora Sovarel, David Evans, Nathanael Paul |
USENIX Security '05 | Automating Mimicry Attacks Using Static Binary Analysis | Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna |
USENIX Security '05 | Non-Control-Data Attacks Are Realistic Threats | Shuo Chen, Jun Xu, Emre C. Sezer |
USENIX Security '05 | Mapping Internet Sensors with Probe Response Attacks | John Bethencourt, Jason Franklin, Mary Vernon |
USENIX Security '05 | Vulnerabilities of Passive Internet Threat Monitors | Yoichi Shinoda, Ko Ikai, Motomu Itoh |
USENIX Security '05 | On the Effectiveness of Distributed Worm Monitoring | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
USENIX Security '05 | Protecting Against Unexpected System Calls | C. M. Linn, M. Rajagopalan, S. Baker, C. Collberg, S. K. Debray, J. H. Hartman |
USENIX Security '05 | Efficient Techniques for Comprehensive Protection from Memory Error Exploits | Sandeep Bhatkar, Daniel C. DuVarney |
USENIX Security '05 | Finding Security Vulnerabilities in Java Applications with Static Analysis | V. Benjamin Livshits, Monica S. Lam |
USENIX Security '05 | OPUS: Online Patches and Updates for Security | Gautam Altekar, Ilya Bagrak, Paul Burstein, Andrew Schultz |
USENIX Security '05 | Fixing Races for Fun and Profit: How to Abuse atime | Nikita Borisov, Rob Johnson |
USENIX Security '05 | Building an Application-aware IPsec Policy System | Heng Yin, Haining Wang |
USENIX Security '05 | Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation | Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum |
SRUTI '05 | Using Routing and Tunneling to Combat DoS Attacks | Adam Greenhalgh, Mark Handley, Felipe Huici |
SRUTI '05 | Reducing Unwanted Traffic in a Backbone Network | Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya |
SRUTI '05 | Analyzing Cooperative Containment of Fast Scanning Worms | Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz |
SRUTI '05 | Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic | Zhenhai Duan, Kartik Gopalan |
SRUTI '05 | Detecting Spam in VoIP Networks | Ram Dantu, Prakash Kolan |
SRUTI '05 | The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets | Evan Cooke, Farnam Jahanian |