Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '04Making a Game of Network SecurityMarc Dougherty
    LISA '04Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any System Paul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob Knauerhause, Aaron Klingaman
    LISA '04Secure Automation: Achieving Least Privilege with SSH, Sudo, and SuidRobert A. Napier
    LISA '04Experience in Implementing an HTTP Service ClosureSteven Schwartzberg
    LISA '04Meta Change Queue: Tracking Changes to People, Places, and ThingsJon Finke
    LISA '04Solaris Zones: Operating System Support for Consolidating Commercial WorkloadsDaniel Price, Andrew Tucker
    USENIX Security '04A Virtual Honeypot FrameworkNiels Provos
    USENIX Security '04Collapsar: A VM-Based Architecture for Network Attack Detention CenterXuxian Jiang, Dongyan Xu
    USENIX Security '04Very Fast Containment of Scanning WormsNicholas Weaver, Stuart Staniford, Vern Paxson
    USENIX Security '04TIED, LibsafePlus: Tools for Runtime Buffer Overflow ProtectionKumar Avijit, Prateek Gupta, Deepak Gupta
    USENIX Security '04Privtrans: Automatically Partitioning Programs for Privilege SeparationDavid Brumley, Dawn Song
    USENIX Security '04Avfs: An On-Access Anti-Virus File SystemYevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok
    USENIX Security '04Side Effects Are Not Sufficient to Authenticate SoftwareUmesh Shankar, Monica Chew, J.D. Tygar
    USENIX Security '04On Gray-Box Program Tracking for Anomaly DetectionDebin Gao, Michael K. Reiter
    USENIX Security '04Finding User/Kernel Pointer Bugs with Type InferenceRob Johnson, David Wagner
    USENIX Security '04Graphical Dictionaries and the Memorable Space of Graphical PasswordsJulie Thorpe, Paul van Oorschot
    USENIX Security '04On User Choice in Graphical Password SchemesDarren Davis, Fabian Monrose, Michael K. Reiter
    USENIX Security '04Design of the EROS Trusted Window SystemJonathan S. Shapiro, John Vanderburgh, Eric Northup, David Chizmadia
    USENIX Security '04Copilot—a Coprocessor-based Kernel Runtime Integrity MonitorNick L. Petroni, Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh
    USENIX Security '04Fixing Races for Fun and Profit: How to Use access(2)Drew Dean, Alan J. Hu
    USENIX Security '04Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a MinuteDirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart
    USENIX Security '04Design and Implementation of a TCG-based Integrity Measurement ArchitectureReiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn
    USENIX Security '04Privacy-Preserving Sharing and Correlation of Security AlertsPatrick Lincoln, Phillip Porras, Vitaly Shmatikov
    USENIX Security '04Static Disassembly of Obfuscated BinariesChristopher Kruegel, William Robertson, Fredrik Valeur, Giovanni Vigna
    USENIX Security '04Autograph: Toward Automated, Distributed Worm Signature DetectionHyang-Ah Kim, Brad Karp

Pages