LISA '03 | ISconf: Theory, Practice, and Beyond | Luke Kanies |
LISA '03 | Seeking Closure in an Open World: A Behavioral Agent Approach to Configuration Management | John Hart, Elizabeth G. Idhaw, Dominic Kallas |
LISA '03 | Archipelago: A Network Security Analysis Tool | Tuva Stang, Fahimeh Pourbayat, Mark Burgess, Geoffrey Canright, Kenth Engø, Åsmund Weltzien |
LISA '03 | Three Practical Ways to Improve Your Network | Kevin Miller |
LISA '03 | Tossing Packets Over the Wall Using Transmit-Only Ethernet Cables | Jon Meek, Frank Colosimo |
LISA '03 | The Realities of Deploying Desktop Linux | Bevis King, Roger Webb, Graeme Wilford |
LISA '03 | STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support | Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, Zheng Zhang |
LISA '03 | CDSS: Secure Distribution of Software Installation Media Images in a Heterogeneous Environment | Ted Cabeen, Job Bogan |
LISA '03 | Virtual Appliances for Deploying and Maintaining Software | Constantine Sapuntzakis, David Brumley, Ramesh Chandra, Nickolai Zeldovich, Jim Chow, Monica S. Lam, Mendel Rosenblum |
LISA '03 | Generating Configuration Files: The Director's Cut | Jon Finke |
LISA '03 | Preventing Wheel Reinvention: The psgconf System Configuration Framework | Mark D. Roth |
LISA '03 | SmartFrog Meets LCFG: Autonomous Reconfiguration with Central Policy Control | Paul Anderson, Patrick Goldsack, Jim Paterson |
LISA '03 | Distributed Tarpitting: Impeding Spam Across Multiple Servers | Tim Hunter, Paul Terry, Alan Judge |
LISA '03 | Using Service Grammar to Diagnose BGP Configuration Errors | Xiaohu Qie, Sanjai Narain |
LISA '03 | Splat: A Network Switch/Port Configuration Management Tool | Cary Abrahamson, Michael Blodgett, Adam Kunen, Nathan Mueller |
USENIX Security '03 | Remote Timing Attacks Are Practical | David Brumley, Dan Boneh |
USENIX Security '03 | 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions | John Bellardo, Stefan Savage |
USENIX Security '03 | Denial of Service via Algorithmic Complexity Attacks | Scott A. Crosby, Dan S. Wallach |
USENIX Security '03 | Plug-and-Play PKI: A PKI Your Mother Can Use | Peter Gutmann |
USENIX Security '03 | Analyzing Integrity Protection in the SELinux Example Policy | Trent Jaeger, Reiner Sailer, Xiaolan Zhang |
USENIX Security '03 | Security Holes . . . Who Cares? | Eric Rescorla |
USENIX Security '03 | PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities | Crispin Cowan, Steve Beattie, John Johansen, Perry Wagle |
USENIX Security '03 | Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits | Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar |
USENIX Security '03 | High Coverage Detection of Input-Related Security Faults | Eric Larson, Todd Austin |
USENIX Security '03 | Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior | Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A.N. Soules, Garth R. Goodson, Gregory R. Ganger |