USENIX Security '03 | Static Analysis of Executables to Detect Malicious Patterns | Mihai Christodorescu, Somesh Jha |
USENIX Security '03 | SSL Splitting: Securely Serving Data from Untrusted Caches | Chris Lesniewski-Laas, M. Frans Kaashoek |
USENIX Security '03 | A New Two-Server Approach for Authentication with Short Secrets | John Brainard, Ari Juels, Burt Kaliski, Michael Szydlo |
USENIX Security '03 | Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC | D. K. Smetters, Glenn Durfee |
USENIX Security '03 | Preventing Privilege Escalation | Niels Provos, Markus Friedl, Peter Honeyman |
USENIX Security '03 | Dynamic Detection and Prevention of Race Conditions in File Accesses | Eugene Tsyrklevich, Bennet Yee |
USENIX Security '03 | Improving Host Security with System Call Policies | |
USENIX Security '03 | Scrash: A System for Generating Secure Crash Information | Pete Broadwell, Matt Harren, Naveen Sastry |
USENIX Security '03 | Implementing and Testing a Virus Throttle | Jamie Twycross, Matthew M. Williamson |
USENIX Security '03 | Establishing the Genuinity of Remote Computer Systems | Rick Kennell, Leah H. Jamieson |
USENIX Security '02 | Security in Plan 9 | Russ Cox, Eric Grosse, Rob Pike, Dave Presotto, Sean Quinlan |
USENIX Security '02 | Linux Security Modules: General Security Support for the Linux Kernel | Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman |
USENIX Security '02 | Using CQUAL for Static Analysis of Authorization Hook Placement | Xiaolan Zhang, Antony Edwards, Trent Jaeger |
USENIX Security '02 | Using Text Categorization Techniques for Intrusion Detection | Yihua Liao, V. Rao Vemuri |
USENIX Security '02 | Detecting Manipulated Remote Call Streams | Jonathon T. Giffin, Somesh Jha, Barton P. Miller |
USENIX Security '02 | Type-Assisted Dynamic Buffer Overflow Detection | Kyung-suk Lhee, Steve J. Chapin |
USENIX Security '02 | A General and Flexible Access-Control System for the Web | Lujo Bauer, Michael A. Schneider, Edward W. Felten |
USENIX Security '02 | Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System | Jonathan S. Shapiro, John Vanderburgh |
USENIX Security '02 | Deanonymizing Users of the SafeWeb Anonymizing Service | David Martin, Andrew Schulman |
USENIX Security '02 | VeriSign CZAG: Privacy Leak in X.509 Certificates | Scott G. Renfro |
USENIX Security '02 | How to Own the Internet in Your Spare Time | Stuart Staniford, Vern Paxson, Nicholas Weaver |
USENIX Security '02 | Setuid Demystified | Hao Chen, David Wagner, Drew Dean |
USENIX Security '02 | Secure Execution via Program Shepherding | Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe |
USENIX Security '02 | A Flexible Containment Mechanism for Executing Untrusted Code | David S. Peterson, Matt Bishop, Raju Pandey |
USENIX Security '02 | SSLACC: A Clustered SSL Accelerator | Eric Rescorla, Adam Cain, Brian Korver |