USENIX ATC '03 | The TrustedBSD MAC Framework: Extensible Kernel Access Control for FreeBSD 5.0 | Robert Watson, Wayne Morrison, Chris Vance, Brian Feldman |
USENIX ATC '03 | Robust, Portable I/O Scheduling with the Disk Mimic | Florentina I. Popovici, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
USENIX ATC '03 | Controlling Your PLACE in the File System with Gray-box Techniques | James A. Nugent |
USENIX ATC '03 | Operating System I/O Speculation: How Two Invocations Are Faster Than One | Keir Fraser, Fay Chang |
USENIX ATC '03 | Using Read-Copy-Update Techniques for System V IPC in the Linux 2.5 Kernel | Andrea Arcangeli, Mingming Cao, Paul McKenney, Dipankar Sarma |
USENIX ATC '03 | An Implementation of User-level Restartable Atomic Sequences on the NetBSD Operating System | Gregory McGarry |
USENIX ATC '03 | Providing a Linux API on the Scalable K42 Kernel | David Edelsohn |
USENIX Security '00 | MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications | Anurag Acharya, Mandar Raje |
USENIX Security '00 | A Secure Java Virtual Machine | Leendert van Doorn |
USENIX Security '00 | Encrypting Virtual Memory | Niels Provos |
USENIX Security '00 | Deja Vu--A User Study: Using Images for Authentication | Rachna Dhamija, Adrian Perrig |
USENIX Security '00 | Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System | Marc Waldman, Aviel D. Rubin, Lorrie F. Cranor |
USENIX Security '00 | Probabilistic Counting of Large Digital Signature Collections | Markus G. Kuhn |
USENIX Security '00 | Can Pseudonymity Really Guarantee Privacy? | Josyula R. Rao, Pankaj Rohatgi |
USENIX Security '00 | An Open-Source Cryptographic Coprocessor | Peter Gutmann |
USENIX Security '00 | Secure Coprocessor Integration with Kerberos V5 | Naomaru Itoi |
USENIX Security '00 | Analysis of the Intel Pentium's Ability to Support a Secure Virtual Machine Monitor | John Scott Robin, Cynthia E. Irvine |
USENIX Security '00 | Detecting and Countering System Intrusions Using Software Wrappers | Calvin Ko, Timothy Fraser, Lee Badger, Douglas Kilpatrickv |
USENIX Security '00 | Detecting Backdoors | Yin Zhang, Vern Paxson |
USENIX Security '00 | Detecting Stepping Stones | |
USENIX Security '00 | Automated Response Using System-Call Delay | Anil Somayaji, Stephanie Forrest |
USENIX Security '00 | CenterTrack: An IP Overlay Network for Tracking DoS Floods | Robert Stone |
USENIX Security '00 | A Multi-Layer IPSEC Protocol | Yongguang Zhang, Bikramjit Singh |
USENIX Security '00 | Defeating TCP/IP Stack Fingerprinting | Matthew Smart, G. Robert Malan, Farnam Jahanian |
USENIX Security '00 | A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols | Jonathan Katz, Bruce Schneier |