USENIX Security '04 | Kerf: Machine Learning to Aid Intrusion Analysts | Sergey Bratus, Javed Aslam, David Kotz, Ron Peterson, Daniela Rus |
USENIX Security '04 | Recovering from Faulty Device Drivers | Nathanael Paul |
USENIX Security '04 | Secure and Robust loose time synchronization mechanism for Wireless Sensor Networks | |
USENIX Security '04 | Toward a Verified, Secure, General-Purpose Microkernel | Jonathan S. Shapiro, Eric Northup, M. Scott Doerrie, Swaroop Sridhar |
USENIX Security '04 | TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection | Kumar Avijit, Prateek Gupta, Deepak Gupta |
USENIX Security '04 | Privtrans: Automatically Partitioning Programs for Privilege Separation | David Brumley, Dawn Song |
USENIX Security '04 | Avfs: An On-Access Anti-Virus File System | Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok |
USENIX Security '04 | Side Effects Are Not Sufficient to Authenticate Software | Umesh Shankar, Monica Chew, J.D. Tygar |
USENIX Security '04 | On Gray-Box Program Tracking for Anomaly Detection | Debin Gao, Michael K. Reiter |
USENIX Security '04 | Finding User/Kernel Pointer Bugs with Type Inference | Rob Johnson, David Wagner |
USENIX Security '04 | Graphical Dictionaries and the Memorable Space of Graphical Passwords | Julie Thorpe, Paul van Oorschot |
USENIX Security '04 | On User Choice in Graphical Password Schemes | Darren Davis, Fabian Monrose, Michael K. Reiter |
USENIX Security '04 | Design of the EROS Trusted Window System | Jonathan S. Shapiro, John Vanderburgh, Eric Northup, David Chizmadia |
USENIX Security '04 | Copilot—a Coprocessor-based Kernel Runtime Integrity Monitor | Nick L. Petroni, Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh |
USENIX Security '04 | Fixing Races for Fun and Profit: How to Use access(2) | Drew Dean, Alan J. Hu |
USENIX Security '04 | Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute | Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart |
USENIX Security '04 | Design and Implementation of a TCG-based Integrity Measurement Architecture | Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn |
USENIX Security '04 | A Virtual Honeypot Framework | Niels Provos |
USENIX Security '04 | Collapsar: A VM-Based Architecture for Network Attack Detention Center | Xuxian Jiang, Dongyan Xu |
USENIX Security '04 | Very Fast Containment of Scanning Worms | Nicholas Weaver, Stuart Staniford, Vern Paxson |
USENIX ATC '04 | mGTK: An SML Binding of Gtk+ | Ken Friis Larsen, Henning Niss |
USENIX ATC '04 | Xen and the Art of Repeated Research | Bryan Clark, Todd Deshane, Eli Dow, Stephen Evanchik, Matthew Finlayson, Jason Herne, Jeanna Neefe Matthews |
USENIX ATC '04 | Migrating an MVS Mainframe Application to a PC | Glenn S. Fowler, Andrew G. Hume, David G. Korn, Kiem-Phong Vo |
USENIX ATC '04 | C-JDBC: Flexible Database Clustering Middleware | Emmanuel Cecchet, Julie Marguerite, Willy Zwaenepoel |
USENIX ATC '04 | Wayback: A User-level Versioning File System for Linux | Brian Cornell, Peter A. Dinda, Fabián E. Bustamante |