USENIX Security '03 | High Coverage Detection of Input-Related Security Faults | Eric Larson, Todd Austin |
USENIX Security '03 | Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior | Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A.N. Soules, Garth R. Goodson, Gregory R. Ganger |
USENIX Security '03 | Detecting Malicious Java Code Using Virtual Machine Auditing | Sunil Soman, Chandra Krintz, Giovanni Vigna |
USENIX Security '03 | Static Analysis of Executables to Detect Malicious Patterns | Mihai Christodorescu, Somesh Jha |
USENIX Security '03 | SSL Splitting: Securely Serving Data from Untrusted Caches | Chris Lesniewski-Laas, M. Frans Kaashoek |
USENIX Security '03 | A New Two-Server Approach for Authentication with Short Secrets | John Brainard, Ari Juels, Burt Kaliski, Michael Szydlo |
USENIX Security '03 | Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC | D. K. Smetters, Glenn Durfee |
USENIX Security '02 | Using CQUAL for Static Analysis of Authorization Hook Placement | Xiaolan Zhang, Antony Edwards, Trent Jaeger |
USENIX Security '02 | Using Text Categorization Techniques for Intrusion Detection | Yihua Liao, V. Rao Vemuri |
USENIX Security '02 | Detecting Manipulated Remote Call Streams | Jonathon T. Giffin, Somesh Jha, Barton P. Miller |
USENIX Security '02 | Type-Assisted Dynamic Buffer Overflow Detection | Kyung-suk Lhee, Steve J. Chapin |
USENIX Security '02 | A General and Flexible Access-Control System for the Web | Lujo Bauer, Michael A. Schneider, Edward W. Felten |
USENIX Security '02 | Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System | Jonathan S. Shapiro, John Vanderburgh |
USENIX Security '02 | Deanonymizing Users of the SafeWeb Anonymizing Service | David Martin, Andrew Schulman |
USENIX Security '02 | VeriSign CZAG: Privacy Leak in X.509 Certificates | Scott G. Renfro |
USENIX Security '02 | How to Own the Internet in Your Spare Time | Stuart Staniford, Vern Paxson, Nicholas Weaver |
USENIX Security '02 | Setuid Demystified | Hao Chen, David Wagner, Drew Dean |
USENIX Security '02 | Secure Execution via Program Shepherding | Vladimir Kiriansky, Derek Bruening, Saman Amarasinghe |
USENIX Security '02 | A Flexible Containment Mechanism for Executing Untrusted Code | David S. Peterson, Matt Bishop, Raju Pandey |
USENIX Security '02 | SSLACC: A Clustered SSL Accelerator | Eric Rescorla, Adam Cain, Brian Korver |
USENIX Security '02 | Infranet: Circumventing Web Censorship and Surveillance | Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger |
USENIX Security '02 | Trusted Paths for Browsers | Zishuang (Eileen) Ye, Sean Smith |
USENIX Security '02 | Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices | Fabian Monrose, Michael Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih |
USENIX Security '02 | Secure History Preservation Through Timeline Entanglement | Petros Maniatis, Mary Baker |
USENIX Security '02 | Lessons Learned in Implementing and Deploying Crypto Software | Peter Gutmann |