BSDCon 2003 | devd—A Device Configuration Daemon | M. Warner Losh |
BSDCon 2003 | ULE: A Modern Scheduler for FreeBSD | Jeff Roberson |
BSDCon 2003 | An Automated Binary Security Update System for FreeBSD | Colin Percival |
BSDCon 2003 | Building a High-performance Computing Cluster Using FreeBSD | Brooks Davis, Michael AuYeung, Gary Green, Craig Lee |
BSDCon 2003 | build.sh: Cross-building NetBSD | Luke Mewburn, Matthew Green |
BSDCon 2003 | GBDE—GEOM Based Disk Encryption | Poul-Henning Kamp |
BSDCon 2003 | Cryptographic Device Support for FreeBSD | Samuel J. Leffler |
BSDCon 2003 | Enhancements to the Fast Filesystem to Support Multi-Terabyte Storage Systems | |
BSDCon 2003 | Running BSD Kernels as User Processes by Partial Emulation and Rewriting of Machine Instructions | Hideki Eiraku, Yasushi Shinjo |
BSDCon 2003 | A Digital Preservation Network Appliance Based on OpenBSD | David S. H. Rosenthal |
BSDCon 2003 | Using FreeBSD to Render Realtime Localized Audio and Video | John H. Baldwin |
BSDCon 2003 | Tagging Data in the Network Stack: mbuf_tags | Angelos D. Keromytis |
BSDCon 2003 | Fast IPSec: A High-Performance IPsec Implementation | |
BSDCon 2003 | The WHBA Project: Experiences "deeply embedding" NetBSD | Jason R. Thorpe, Allen K. Briggs |
USENIX Security '03 | 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions | John Bellardo, Stefan Savage |
USENIX Security '03 | Denial of Service via Algorithmic Complexity Attacks | Scott A. Crosby, Dan S. Wallach |
USENIX Security '03 | Plug-and-Play PKI: A PKI Your Mother Can Use | Peter Gutmann |
USENIX Security '03 | Analyzing Integrity Protection in the SELinux Example Policy | Trent Jaeger, Reiner Sailer, Xiaolan Zhang |
USENIX Security '03 | Security Holes . . . Who Cares? | Eric Rescorla |
USENIX Security '03 | PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities | Crispin Cowan, Steve Beattie, John Johansen, Perry Wagle |
USENIX Security '03 | Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits | Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar |
USENIX Security '03 | High Coverage Detection of Input-Related Security Faults | Eric Larson, Todd Austin |
USENIX Security '03 | Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior | Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A.N. Soules, Garth R. Goodson, Gregory R. Ganger |
USENIX Security '03 | Detecting Malicious Java Code Using Virtual Machine Auditing | Sunil Soman, Chandra Krintz, Giovanni Vigna |
USENIX Security '03 | Static Analysis of Executables to Detect Malicious Patterns | Mihai Christodorescu, Somesh Jha |