Papers

Search results

    ConferenceTitleAuthor(s)
    LISA '03ISconf: Theory, Practice, and BeyondLuke Kanies
    LISA '03Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration ManagementJohn Hart, Elizabeth G. Idhaw, Dominic Kallas
    LISA '03Archipelago: A Network Security Analysis ToolTuva Stang, Fahimeh Pourbayat, Mark Burgess, Geoffrey Canright, Kenth Engø, Åsmund Weltzien
    LISA '03Three Practical Ways to Improve Your NetworkKevin Miller
    LISA '03Tossing Packets Over the Wall Using Transmit-Only Ethernet CablesJon Meek, Frank Colosimo
    LISA '03The Realities of Deploying Desktop LinuxBevis King, Roger Webb, Graeme Wilford
    LISA '03STRIDER: A Black-box, State-based Approach to Change and Configuration Management and SupportYi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang
    LISA '03CDSS: Secure Distribution of Software Installation Media Images in a Heterogeneous EnvironmentTed Cabeen, Job Bogan
    LISA '03Virtual Appliances for Deploying and Maintaining SoftwareConstantine Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum
    LISA '03Generating Configuration Files: The Director's CutJon Finke
    LISA '03Preventing Wheel Reinvention: The psgconf System Configuration FrameworkMark D. Roth
    LISA '03SmartFrog Meets LCFG: Autonomous Reconfiguration with Central Policy ControlPaul Anderson, Patrick Goldsack, Jim Paterson
    LISA '03Distributed Tarpitting: Impeding Spam Across Multiple ServersTim Hunter, Paul Terry, Alan Judge
    LISA '03Using Service Grammar to Diagnose BGP Configuration ErrorsXiaohu Qie, Sanjai Narain
    LISA '03Splat: A Network Switch/Port Configuration Management ToolCary Abrahamson, Michael Blodgett, Adam Kunen, Nathan Mueller
    USENIX Security '03Remote Timing Attacks Are PracticalDavid Brumley, Dan Boneh
    USENIX Security '03802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical SolutionsJohn Bellardo, Stefan Savage
    USENIX Security '03Denial of Service via Algorithmic Complexity AttacksScott A. Crosby, Dan S. Wallach
    USENIX Security '03Plug-and-Play PKI: A PKI Your Mother Can UsePeter Gutmann
    USENIX Security '03Analyzing Integrity Protection in the SELinux Example PolicyTrent Jaeger, Reiner Sailer, Xiaolan Zhang
    USENIX Security '03Security Holes . . . Who Cares?Eric Rescorla
    USENIX Security '03PointGuard™: Protecting Pointers from Buffer Overflow VulnerabilitiesCrispin Cowan, Steve Beattie, John Johansen, Perry Wagle
    USENIX Security '03Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error ExploitsSandeep Bhatkar, Daniel C. DuVarney, R. Sekar
    USENIX Security '03High Coverage Detection of Input-Related Security FaultsEric Larson, Todd Austin
    USENIX Security '03Storage-based Intrusion Detection: Watching Storage Activity for Suspicious BehaviorAdam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A.N. Soules, Garth R. Goodson, Gregory R. Ganger

    Pages