USENIX Security '05 | MulVAL: A Logic-based Network Security Analyzer | Xinming Ou, Sudhakar Govindavajhala, Andrew W. Appel |
USENIX Security '05 | Detecting Targeted Attacks Using Shadow Honeypots | K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytis |
USENIX Security '05 | Where's the FEEB? The Effectiveness of Instruction Set Randomization | Ana Nora Sovarel, David Evans, Nathanael Paul |
USENIX Security '05 | Automating Mimicry Attacks Using Static Binary Analysis | Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna |
USENIX Security '05 | Non-Control-Data Attacks Are Realistic Threats | Shuo Chen, Jun Xu, Emre C. Sezer |
USENIX Security '05 | Mapping Internet Sensors with Probe Response Attacks | John Bethencourt, Jason Franklin, Mary Vernon |
USENIX Security '05 | Vulnerabilities of Passive Internet Threat Monitors | Yoichi Shinoda, Ko Ikai, Motomu Itoh |
USENIX Security '05 | On the Effectiveness of Distributed Worm Monitoring | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
USENIX Security '05 | Protecting Against Unexpected System Calls | C. M. Linn, M. Rajagopalan, S. Baker, C. Collberg, S. K. Debray, J. H. Hartman |
USENIX Security '05 | Efficient Techniques for Comprehensive Protection from Memory Error Exploits | Sandeep Bhatkar, Daniel C. DuVarney |
USENIX Security '05 | Finding Security Vulnerabilities in Java Applications with Static Analysis | V. Benjamin Livshits, Monica S. Lam |
USENIX Security '05 | OPUS: Online Patches and Updates for Security | Gautam Altekar, Ilya Bagrak, Paul Burstein, Andrew Schultz |
USENIX Security '05 | Fixing Races for Fun and Profit: How to Abuse atime | Nikita Borisov, Rob Johnson |
USENIX Security '05 | Building an Application-aware IPsec Policy System | Heng Yin, Haining Wang |
USENIX Security '05 | Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation | Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum |
USENIX Security '04 | A Virtual Honeypot Framework | Niels Provos |
USENIX Security '04 | Collapsar: A VM-Based Architecture for Network Attack Detention Center | Xuxian Jiang, Dongyan Xu |
USENIX Security '04 | Very Fast Containment of Scanning Worms | Nicholas Weaver, Stuart Staniford, Vern Paxson |
USENIX Security '04 | TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection | Kumar Avijit, Prateek Gupta, Deepak Gupta |
USENIX Security '04 | Privtrans: Automatically Partitioning Programs for Privilege Separation | David Brumley, Dawn Song |
USENIX Security '04 | Avfs: An On-Access Anti-Virus File System | Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok |
USENIX Security '04 | Side Effects Are Not Sufficient to Authenticate Software | Umesh Shankar, Monica Chew, J.D. Tygar |
USENIX Security '04 | On Gray-Box Program Tracking for Anomaly Detection | Debin Gao, Michael K. Reiter |
USENIX Security '04 | Finding User/Kernel Pointer Bugs with Type Inference | Rob Johnson, David Wagner |
USENIX Security '04 | Graphical Dictionaries and the Memorable Space of Graphical Passwords | Julie Thorpe, Paul van Oorschot |