USENIX Security '02 | Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System | Jonathan S. Shapiro, John Vanderburgh |
USENIX Security '02 | Deanonymizing Users of the SafeWeb Anonymizing Service | David Martin, Andrew Schulman |
USENIX Security '02 | VeriSign CZAG: Privacy Leak in X.509 Certificates | Scott G. Renfro |
USENIX Security '02 | How to Own the Internet in Your Spare Time | Stuart Staniford, Vern Paxson, Nicholas Weaver |
USENIX Security '02 | Setuid Demystified | Hao Chen, David Wagner, Drew Dean |
USENIX Security '02 | Secure Execution via Program Shepherding | Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe |
USENIX Security '02 | A Flexible Containment Mechanism for Executing Untrusted Code | David S. Peterson, Matt Bishop, Raju Pandey |
USENIX Security '02 | SSLACC: A Clustered SSL Accelerator | Eric Rescorla, Adam Cain, Brian Korver |
USENIX Security '02 | Infranet: Circumventing Web Censorship and Surveillance | Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger |
USENIX Security '02 | Trusted Paths for Browsers | Zishuang (Eileen) Ye, Sean Smith |
USENIX Security '02 | Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices | Fabian Monrose, Michael Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih |
USENIX Security '02 | Secure History Preservation Through Timeline Entanglement | Petros Maniatis, Mary Baker |
USENIX Security '02 | Lessons Learned in Implementing and Deploying Crypto Software | Peter Gutmann |
USENIX Security '02 | Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption | John Black, Hector Urtubia |
USENIX Security '02 | Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking | Markus Jakobsson, Ari Juels, Ronald L. Rivest |
Java VM '02 | Concurrent Remembered Set Refinement in Generational Garbage Collection | David Detlefs, Ross Knippel, William D. Clinger, Matthias Jacob |
Java VM '02 | To Collect or Not to Collect? Machine Learning for Memory Management | Eva Andreasson, Frank Hoffmann, Olof Lindholm |
Java VM '02 | Optimizing Precision Overhead for x86 Processors | Takeshi Ogasawara, Hideaki Komatsu, Toshio Nakatani |
Java VM '02 | Experiences Porting the Jikes RVM to Linux/IA32 | Bowen Alpern, Maria Butrico, Anthony Cocchi, Julian Dolby, Stephen Fink, David Grove, Ton Ngo |
Java VM '02 | A Modular and Extensible JVM Infrastructure | Patrick Doyle, Tarek S. Abdelrahman |
Java VM '02 | Cross-Architectural Performance Portability of a Java Virtual Machine Implementation | Keith Randall |
Java VM '02 | An Empirical Study of Method In-lining for a Java Just-in-Time Compiler | Toshio Suganuma, Toshiaki Yasue, Toshio Nakatani |
Java VM '02 | Stress-testing Control Structures for Dynamic Dispatch in Java | Olivier Zendra, Karel Driesen |
Java VM '02 | A Just-in-Time Compiler for Memory-Constrained Low-Power Devices | Nik Shaylor |
Java VM '02 | sEc: A Portable Interpreter Optimizing Technique for Embedded Java Virtual Machine | Venugopal K S, Geetha Manjunath, Venkatesh Krishnan |