Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '04Solaris Zones: Operating System Support for Consolidating Commercial WorkloadsDaniel Price, Andrew Tucker
    LISA '04Real-time Log File Analysis Using the Simple Event Correlator (SEC) John P. Rouillard
    LISA '04Combining High Level Symptom Descriptions and Low Level State Information for Configuration Fault DiagnosisNi Lao, Ji-Rong Wen
    LISA '04autoMAC: A Tool for Automating Network Moves, Adds, and ChangesChristopher J. Tengi, James M. Roberts, Joseph R. Crouthamel, Chris M. Miller, Christopher M. Sanchez
    LISA '04More Netflow Tools for Performance and SecurityCarrie Gates, Michael Collins, Michael Duggan, Andrew Kompanek, Mark Thomas
    LISA '04A Machine-Oriented Vulnerability Database for Automated Vulnerability Detection and Processing Sufatrio , Roland H. C. Yap
    LISA '04DigSig: Runtime Authentication of Binaries at Kernel LevelAxelle Apvrille, David Gordon
    LISA '04I3FS: An In-Kernel Integrity Checker and Intrusion Detection File SystemSwapnil Patil, Anand Kashyap, Gopalan Sivathanu, Erez Zadok
    LISA '04Nix: A Safe and Policy-Free System for Software Deployment Eelco Dolstra, Merijn de Jonge
    LISA '04Auto-configuration by File Construction: Configuration Management with newfig William LeFebvre, DCNN Internet Technologiesavid Snyder
    LISA '04AIS: A Fast, Disk Space Efficient "Adaptable Installation System" Supporting Multitudes of Diverse Software ConfigurationsSergei Mikhailov, Jonathan Stanton
    LISA '04Scalable Centralized Bayesian Spam Mitigation with BogofilterJeremy Blosser, David Josephsen
    LISA '04DIGIMIMIR: A Tool for Rapid Situation Analysis of Helpdesk and Support EmailNils Einar Eide, Andreas N. Blaafadt
    LISA '04Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware ManagementYi-Min Wang, Roussi Roussev, Chad Verbowski, Aaron Johnson, Ming-Wei Wu, Yennun Huang, Sy-Yen Kuo
    USENIX Security '04Privacy-Preserving Sharing and Correlation of Security AlertsPatrick Lincoln, Phillip Porras, Vitaly Shmatikov
    USENIX Security '04Static Disassembly of Obfuscated BinariesChristopher Kruegel, William Robertson, Fredrik Valeur, Giovanni Vigna
    USENIX Security '04Autograph: Toward Automated, Distributed Worm Signature DetectionHyang-Ah Kim, Brad Karp
    USENIX Security '04Fairplay—A Secure Two-Party Computation SystemDahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella
    USENIX Security '04Tor: The Second-Generation Onion RouterRoger Dingledine, Nick Mathewson, Paul Syverson
    USENIX Security '04Understanding Data Lifetime via Whole System SimulationJim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum
    USENIX Security '04CryptoGraphics: Secret Key Cryptography Using Graphics CardsDebra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Zurgen
    USENIX Security '04http://usenix.org/publications/library/proceedings/sec04/tech/wips/wips/01-cook-cryptographics.pdfChristopher J. Calabrese
    USENIX Security '04Strider GhostBuster: Why It's A Bad Idea For Stealth Software To Hide FilesYi-Min Wang, Binh Vo, Roussi Roussev, Chad Verbowski, Aaron Johnson
    USENIX Security '04The Nizza Security ArchitectureMichael Hohmuth, Hermann Härtig
    USENIX Security '04Improving the Resilience of Indirection-Based DDoS Protection Mechanisms Using Per-Packet Path DiversityAngelos Stavrou

Pages