USENIX Security '01 | MULTOPS: A Data-Structure for Bandwidth Attack Detection | Thomer M. Gil, Massimiliano Poletto |
USENIX Security '01 | Data Remanence in Semiconductor Devices | Peter Gutmann |
USENIX Security '01 | StackGhost: Hardware Facilitated Stack Protection | Mike Frantzen, Mike Shuey |
USENIX Security '01 | Improving DES Coprocessor Throughput for Short Operations | Mark Lindemann, Sean W. Smith |
USENIX Security '01 | Architecting the Lumeta Firewall Analyzer | Avishai Wool |
USENIX Security '01 | Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host | Peter M. Gleitz, Steven M. Bellovin |
USENIX Security '01 | Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics | Mark Handley, Vern Paxson, Christian Kreibich |
USENIX Security '01 | Reading Between the Lines: Lessons from the SDMI Challenge | Scott A. Craver, Min Wu, Bede Liu, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten |
USENIX Security '01 | Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats | |
USENIX Security '01 | Secure Data Deletion for Linux File Systems | Steven Bauer, Nissanka B. Priyantha |
USENIX Security '01 | RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities | Crispin Cowan, Steve Beattie, Chris Wright, Greg Kroah-Hartman |
USENIX Security '01 | Statically Detecting Likely Buffer Overflow Vulnerabilities | David Larochelle, David Evans |
USENIX Security '01 | FormatGuard: Automatic Protection From printf Format String Vulnerabilities | Matt Barringer, Mike Frantzen, Jamie Lokier |
USENIX Security '01 | Capability File Names: Separating Authorisation From User Management in an Internet File System | Jude T. Regan, Christian D. Jensen |
USENIX Security '01 | Kerberized Credential Translation: A Solution to Web Access Control | Olga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman |
USENIX Security '01 | The Dos and Don'ts of Client Authentication on the Web | Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster |
USENIX Security '01 | SC-CFS: Smartcard Secured Cryptographic File System | Naomaru Itoi |
USENIX Security '01 | Secure Distribution of Events in Content-Based Publish Subscribe Systems | Lukasz Opyrchal, Atul Prakash |
USENIX Security '01 | A Method for Fast Revocation of Public Key Certificates and Security Capabilities | Dan Boneh, Xuhua Ding, Gene Tsudik, Chi Ming Wong |
USENIX Security '01 | Detecting Format String Vulnerabilities with Type Qualifiers | Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David Wagner |
USENIX Security '01 | PDM: A New Strong Password-Based Protocol | Charlie Kaufman, Radia Perlman |
USENIX Security '01 | Defending Against Statistical Steganalysis | Niels Provos |
USENIX Security '01 | Timing Analysis of Keystrokes and Timing Attacks on SSH | Dawn Xiaodong Song, David Wagner, Xuqing Tian |
USENIX ATC '01 | Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor | Jeremy Sugerman, Ganesh Venkitachalam, Beng-Hong Lim |
USENIX ATC '01 | Magazines and Vmem: Extending the Slab Allocator to Many CPUs and Arbitrary Resources | Jeff Bonwick, Jonathan Adams |