USENIX Security '06 | Keyboards and Covert Channels | Gaurav Shah, Andres Molina |
USENIX Security '06 | Lessons from the Sony CD DRM Episode | J. Alex Halderman, Edward W. Felten |
USENIX Security '06 | Milk or Wine: Does Software Security Improve with Age? | Andy Ozment, Stuart E. Schechter |
USENIX Security '06 | N-Variant Systems: A Secretless Framework for Security through Diversity | Benjamin Cox, David Evans |
USENIX Security '06 | Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks | Wei Xu, Sandeep Bhatkar, R. Sekar |
USENIX Security '06 | SANE: A Protection Architecture for Enterprise Networks | Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown |
USENIX Security '06 | PHAS: A Prefix Hijack Alert System | Mohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang |
USENIX Security '06 | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | Jason Franklin, Damon McCoy |
USENIX Security '06 | Static Detection of Security Vulnerabilities in Scripting Languages | Yichen Xie, Alex Aiken |
USENIX Security '06 | Rule-Based Static Analysis of Network Protocol Implementations | Octavian Udrea, Cristian Lumezanu |
USENIX Security '06 | Evaluating SFI for a CISC Architecture | Stephen McCamant, Greg Morrisett |
USENIX Security '06 | SigFree: A Signature-free Buffer Overflow Attack Blocker | Xinran Wang, Chi-Chun Pan |
USENIX Security '06 | Polymorphic Blending Attacks | Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee |
USENIX Security '06 | Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection | Holger Dreger, Anja Feldmann |
USENIX Security '06 | Behavior-based Spyware Detection | Engin Kirda, Christopher Kruegel |
USENIX Security '06 | An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data | Nick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh |
USENIX Security '06 | vTPM: Virtualizing the Trusted Platform Module | Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn |
USENIX Security '06 | Designing Voting Machines for Verification | Naveen Sastry |
USENIX Security '05 | Security Analysis of a Cryptographically-Enabled RFID Device | Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo |
USENIX Security '05 | Stronger Password Authentication Using Browser Extensions | Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C Mitchell |
USENIX Security '05 | Cryptographic Voting Protocols: A Systems Perspective | Chris Karlof, Naveen Sastry, David Wagner |
USENIX Security '05 | Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network | Ju Wang, Xin Liu, Andrew A. Chien |
USENIX Security '05 | Robust TCP Stream Reassembly in the Presence of Adversaries | Sarang Dharmapurikar, Vern Paxson |
USENIX Security '05 | Countering Targeted File Attacks Using LocationGuard | Mudhakar Srivatsa, Ling Liu |
USENIX Security '05 | An Architecture for Generating Semantic Aware Signatures | Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, Somesh Jha |