LISA '04 | Solaris Zones: Operating System Support for Consolidating Commercial Workloads | Daniel Price, Andrew Tucker |
LISA '04 | Real-time Log File Analysis Using the Simple Event Correlator (SEC) | John P. Rouillard |
LISA '04 | Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault Diagnosis | Ni Lao, Ji-Rong Wen |
LISA '04 | autoMAC: A Tool for Automating Network Moves, Adds, and Changes | Christopher J. Tengi, James M. Roberts, Joseph R. Crouthamel, Chris M. Miller, Christopher M. Sanchez |
LISA '04 | More Netflow Tools for Performance and Security | Carrie Gates, Michael Collins, Michael Duggan, Andrew Kompanek, Mark Thomas |
LISA '04 | A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing | Sufatrio , Roland H. C. Yap |
LISA '04 | DigSig: Runtime Authentication of Binaries at Kernel Level | Axelle Apvrille, David Gordon |
LISA '04 | I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System | Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, Erez Zadok |
LISA '04 | Nix: A Safe and Policy-Free System for Software Deployment | Eelco Dolstra, Merijn de Jonge |
LISA '04 | Auto-configuration by File Construction: Configuration Management with newfig | William LeFebvre, DCNN Internet Technologiesavid Snyder |
LISA '04 | AIS: A Fast, Disk Space Efficient "Adaptable Installation System" Supporting Multitudes of Diverse Software Configurations | Sergei Mikhailov, Jonathan Stanton |
LISA '04 | Scalable Centralized Bayesian Spam Mitigation with Bogofilter | Jeremy Blosser, David Josephsen |
LISA '04 | DIGIMIMIR: A Tool for Rapid Situation Analysis of Helpdesk and Support Email | Nils Einar Eide, Andreas N. Blaafadt |
LISA '04 | Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management | Yi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo |
USENIX Security '04 | Privacy-Preserving Sharing and Correlation of Security Alerts | Patrick Lincoln, Phillip Porras, Vitaly Shmatikov |
USENIX Security '04 | Static Disassembly of Obfuscated Binaries | Christopher Kruegel, William Robertson, Fredrik Valeur, Giovanni Vigna |
USENIX Security '04 | Autograph: Toward Automated, Distributed Worm Signature Detection | Hyang-Ah Kim, Brad Karp |
USENIX Security '04 | Fairplay—A Secure Two-Party Computation System | Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella |
USENIX Security '04 | Tor: The Second-Generation Onion Router | Roger Dingledine, Nick Mathewson, Paul Syverson |
USENIX Security '04 | Understanding Data Lifetime via Whole System Simulation | Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum |
USENIX Security '04 | CryptoGraphics: Secret Key Cryptography Using Graphics Cards | Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Zurgen |
USENIX Security '04 | http://usenix.org/publications/library/proceedings/sec04/tech/wips/wips/01-cook-cryptographics.pdf | Christopher J. Calabrese |
USENIX Security '04 | Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide Files | Yi-Min Wang, Binh Vo, Roussi Roussev, Chad Verbowski, Aaron Johnson |
USENIX Security '04 | The Nizza Security Architecture | Michael Hohmuth, Hermann Härtig |
USENIX Security '04 | Improving the Resilience of Indirection-Based DDoS Protection Mechanisms Using Per-Packet Path Diversity | Angelos Stavrou |