LISA '04 | Making a Game of Network Security | Marc Dougherty |
LISA '04 | Securing the PlanetLab Distributed Testbed: How to Manage Security in an Environment with No Firewalls, with All Users Having Root, and No Direct Physical Control of Any System | Paul Brett, Mic Bowman, Jeff Sedayao, Robert Adams, Rob Knauerhause, Aaron Klingaman |
LISA '04 | Secure Automation: Achieving Least Privilege with SSH, Sudo, and Suid | Robert A. Napier |
LISA '04 | Experience in Implementing an HTTP Service Closure | Steven Schwartzberg |
LISA '04 | Meta Change Queue: Tracking Changes to People, Places, and Things | Jon Finke |
LISA '04 | Solaris Zones: Operating System Support for Consolidating Commercial Workloads | Daniel Price, Andrew Tucker |
USENIX Security '04 | A Virtual Honeypot Framework | Niels Provos |
USENIX Security '04 | Collapsar: A VM-Based Architecture for Network Attack Detention Center | Xuxian Jiang, Dongyan Xu |
USENIX Security '04 | Very Fast Containment of Scanning Worms | Nicholas Weaver, Stuart Staniford, Vern Paxson |
USENIX Security '04 | TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection | Kumar Avijit, Prateek Gupta, Deepak Gupta |
USENIX Security '04 | Privtrans: Automatically Partitioning Programs for Privilege Separation | David Brumley, Dawn Song |
USENIX Security '04 | Avfs: An On-Access Anti-Virus File System | Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok |
USENIX Security '04 | Side Effects Are Not Sufficient to Authenticate Software | Umesh Shankar, Monica Chew, J.D. Tygar |
USENIX Security '04 | On Gray-Box Program Tracking for Anomaly Detection | Debin Gao, Michael K. Reiter |
USENIX Security '04 | Finding User/Kernel Pointer Bugs with Type Inference | Rob Johnson, David Wagner |
USENIX Security '04 | Graphical Dictionaries and the Memorable Space of Graphical Passwords | Julie Thorpe, Paul van Oorschot |
USENIX Security '04 | On User Choice in Graphical Password Schemes | Darren Davis, Fabian Monrose, Michael K. Reiter |
USENIX Security '04 | Design of the EROS Trusted Window System | Jonathan S. Shapiro, John Vanderburgh, Eric Northup, David Chizmadia |
USENIX Security '04 | Copilot—a Coprocessor-based Kernel Runtime Integrity Monitor | Nick L. Petroni, Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh |
USENIX Security '04 | Fixing Races for Fun and Profit: How to Use access(2) | Drew Dean, Alan J. Hu |
USENIX Security '04 | Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute | Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart |
USENIX Security '04 | Design and Implementation of a TCG-based Integrity Measurement Architecture | Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn |
USENIX Security '04 | Privacy-Preserving Sharing and Correlation of Security Alerts | Patrick Lincoln, Phillip Porras, Vitaly Shmatikov |
USENIX Security '04 | Static Disassembly of Obfuscated Binaries | Christopher Kruegel, William Robertson, Fredrik Valeur, Giovanni Vigna |
USENIX Security '04 | Autograph: Toward Automated, Distributed Worm Signature Detection | Hyang-Ah Kim, Brad Karp |