USENIX Security '06 | Lessons from the Sony CD DRM Episode | J. Alex Halderman, Edward W. Felten |
USENIX Security '06 | Milk or Wine: Does Software Security Improve with Age? | Andy Ozment, Stuart E. Schechter |
USENIX Security '06 | N-Variant Systems: A Secretless Framework for Security through Diversity | Benjamin Cox, David Evans |
USENIX Security '06 | Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks | Wei Xu, Sandeep Bhatkar, R. Sekar |
USENIX Security '06 | A Usability Study and Critique of Two Password Managers | Sonia Chiasson, P.C. van Oorschot, Robert Biddle |
USENIX Security '06 | On the Release of CRLs in Public Key Infrastructure | Chengyu Ma, Nan Hu, Yingjiu Li |
USENIX Security '06 | Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing | Lucas Ballard, Fabian Monrose, Daniel Lopresti |
USENIX Security '05 | Detecting Targeted Attacks Using Shadow Honeypots | K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytis |
USENIX Security '05 | Where's the FEEB? The Effectiveness of Instruction Set Randomization | Ana Nora Sovarel, David Evans, Nathanael Paul |
USENIX Security '05 | Automating Mimicry Attacks Using Static Binary Analysis | Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna |
USENIX Security '05 | Non-Control-Data Attacks Are Realistic Threats | Shuo Chen, Jun Xu, Emre C. Sezer |
USENIX Security '05 | Mapping Internet Sensors with Probe Response Attacks | John Bethencourt, Jason Franklin, Mary Vernon |
USENIX Security '05 | Vulnerabilities of Passive Internet Threat Monitors | Yoichi Shinoda, Ko Ikai, Motomu Itoh |
USENIX Security '05 | On the Effectiveness of Distributed Worm Monitoring | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
USENIX Security '05 | Protecting Against Unexpected System Calls | C. M. Linn, M. Rajagopalan, S. Baker, C. Collberg, S. K. Debray, J. H. Hartman |
USENIX Security '05 | Efficient Techniques for Comprehensive Protection from Memory Error Exploits | Sandeep Bhatkar, Daniel C. DuVarney |
USENIX Security '05 | Finding Security Vulnerabilities in Java Applications with Static Analysis | V. Benjamin Livshits, Monica S. Lam |
USENIX Security '05 | OPUS: Online Patches and Updates for Security | Gautam Altekar, Ilya Bagrak, Paul Burstein, Andrew Schultz |
USENIX Security '05 | Fixing Races for Fun and Profit: How to Abuse atime | Nikita Borisov, Rob Johnson |
USENIX Security '05 | Building an Application-aware IPsec Policy System | Heng Yin, Haining Wang |
USENIX Security '05 | Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation | Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum |
USENIX Security '05 | Security Analysis of a Cryptographically-Enabled RFID Device | Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo |
USENIX Security '05 | Stronger Password Authentication Using Browser Extensions | Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C Mitchell |
USENIX Security '05 | Cryptographic Voting Protocols: A Systems Perspective | Chris Karlof, Naveen Sastry, David Wagner |
USENIX Security '05 | Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network | Ju Wang, Xin Liu, Andrew A. Chien |