Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '06Keyboards and Covert ChannelsGaurav Shah, Andres Molina
    USENIX Security '06Lessons from the Sony CD DRM EpisodeJ. Alex Halderman, Edward W. Felten
    USENIX Security '06Milk or Wine: Does Software Security Improve with Age?Andy Ozment, Stuart E. Schechter
    USENIX Security '06N-Variant Systems: A Secretless Framework for Security through DiversityBenjamin Cox, David Evans
    USENIX Security '06Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of AttacksWei Xu, Sandeep Bhatkar, R. Sekar
    USENIX Security '06SANE: A Protection Architecture for Enterprise NetworksMartin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown
    USENIX Security '06PHAS: A Prefix Hijack Alert SystemMohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang
    USENIX Security '06Passive Data Link Layer 802.11 Wireless Device Driver FingerprintingJason Franklin, Damon McCoy
    USENIX Security '06Static Detection of Security Vulnerabilities in Scripting LanguagesYichen Xie, Alex Aiken
    USENIX Security '06Rule-Based Static Analysis of Network Protocol ImplementationsOctavian Udrea, Cristian Lumezanu
    USENIX Security '06Evaluating SFI for a CISC ArchitectureStephen McCamant, Greg Morrisett
    USENIX Security '06SigFree: A Signature-free Buffer Overflow Attack BlockerXinran Wang, Chi-Chun Pan
    USENIX Security '06Polymorphic Blending AttacksPrahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee
    USENIX Security '06Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionHolger Dreger, Anja Feldmann
    USENIX Security '06Behavior-based Spyware DetectionEngin Kirda, Christopher Kruegel
    USENIX Security '06An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic DataNick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh
    USENIX Security '06vTPM: Virtualizing the Trusted Platform ModuleStefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn
    USENIX Security '06Designing Voting Machines for VerificationNaveen Sastry
    USENIX Security '05Security Analysis of a Cryptographically-Enabled RFID DeviceSteve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo
    USENIX Security '05Stronger Password Authentication Using Browser ExtensionsBlake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C Mitchell
    USENIX Security '05Cryptographic Voting Protocols: A Systems PerspectiveChris Karlof, Naveen Sastry, David Wagner
    USENIX Security '05Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy NetworkJu Wang, Xin Liu, Andrew A. Chien
    USENIX Security '05Robust TCP Stream Reassembly in the Presence of AdversariesSarang Dharmapurikar, Vern Paxson
    USENIX Security '05Countering Targeted File Attacks Using LocationGuardMudhakar Srivatsa, Ling Liu
    USENIX Security '05An Architecture for Generating Semantic Aware SignaturesVinod Yegneswaran, Jonathon T. Giffin, Paul Barford, Somesh Jha

Pages