USENIX Security '02 | Deanonymizing Users of the SafeWeb Anonymizing Service | David Martin, Andrew Schulman |
USENIX Security '02 | VeriSign CZAG: Privacy Leak in X.509 Certificates | Scott G. Renfro |
USENIX Security '02 | How to Own the Internet in Your Spare Time | Stuart Staniford, Vern Paxson, Nicholas Weaver |
USENIX Security '02 | Setuid Demystified | Hao Chen, David Wagner, Drew Dean |
USENIX Security '02 | Secure Execution via Program Shepherding | Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe |
USENIX Security '02 | A Flexible Containment Mechanism for Executing Untrusted Code | David S. Peterson, Matt Bishop, Raju Pandey |
USENIX Security '02 | SSLACC: A Clustered SSL Accelerator | Eric Rescorla, Adam Cain, Brian Korver |
USENIX Security '02 | Infranet: Circumventing Web Censorship and Surveillance | Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger |
USENIX Security '02 | Trusted Paths for Browsers | Zishuang (Eileen) Ye, Sean Smith |
USENIX Security '02 | Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices | Fabian Monrose, Michael Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih |
USENIX Security '02 | Secure History Preservation Through Timeline Entanglement | Petros Maniatis, Mary Baker |
USENIX Security '02 | Lessons Learned in Implementing and Deploying Crypto Software | Peter Gutmann |
USENIX Security '02 | Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption | John Black, Hector Urtubia |
USENIX Security '02 | Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking | Markus Jakobsson, Ari Juels, Ronald L. Rivest |
USENIX Security '01 | Using Client Puzzles to Protect TLS | Drew Dean, Adam Stubblefield |
USENIX Security '01 | Inferring Internet Denial-of-Service Activity | David Moore, Geoffrey M. Voelker, Stefan Savage |
USENIX Security '01 | MULTOPS: A Data-Structure for Bandwidth Attack Detection | Thomer M. Gil, Massimiliano Poletto |
USENIX Security '01 | Data Remanence in Semiconductor Devices | Peter Gutmann |
USENIX Security '01 | StackGhost: Hardware Facilitated Stack Protection | Mike Frantzen, Mike Shuey |
USENIX Security '01 | Improving DES Coprocessor Throughput for Short Operations | Mark Lindemann, Sean W. Smith |
USENIX Security '01 | Architecting the Lumeta Firewall Analyzer | Avishai Wool |
USENIX Security '01 | Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host | Peter M. Gleitz, Steven M. Bellovin |
USENIX Security '01 | Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics | Mark Handley, Vern Paxson, Christian Kreibich |
USENIX Security '01 | Reading Between the Lines: Lessons from the SDMI Challenge | Scott A. Craver, Min Wu, Bede Liu, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten |
USENIX Security '01 | Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats | |