Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '03High Coverage Detection of Input-Related Security FaultsEric Larson, Todd Austin
    USENIX Security '03Storage-based Intrusion Detection: Watching Storage Activity for Suspicious BehaviorAdam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A.N. Soules, Garth R. Goodson, Gregory R. Ganger
    USENIX Security '03Detecting Malicious Java Code Using Virtual Machine AuditingSunil Soman, Chandra Krintz, Giovanni Vigna
    USENIX Security '03Static Analysis of Executables to Detect Malicious PatternsMihai Christodorescu, Somesh Jha
    USENIX Security '03SSL Splitting: Securely Serving Data from Untrusted CachesChris Lesniewski-Laas, M. Frans Kaashoek
    USENIX Security '03A New Two-Server Approach for Authentication with Short SecretsJohn Brainard, Ari Juels, Burt Kaliski, Michael Szydlo
    USENIX Security '03Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSECD. K. Smetters, Glenn Durfee
    USENIX Security '02Using CQUAL for Static Analysis of Authorization Hook PlacementXiaolan Zhang, Antony Edwards, Trent Jaeger
    USENIX Security '02Using Text Categorization Techniques for Intrusion DetectionYihua Liao, V. Rao Vemuri
    USENIX Security '02Detecting Manipulated Remote Call StreamsJonathon T. Giffin, Somesh Jha, Barton P. Miller
    USENIX Security '02Type-Assisted Dynamic Buffer Overflow DetectionKyung-suk Lhee, Steve J. Chapin
    USENIX Security '02A General and Flexible Access-Control System for the WebLujo Bauer, Michael A. Schneider, Edward W. Felten
    USENIX Security '02Access and Integrity Control in a Public-Access, High-Assurance Configuration Management SystemJonathan S. Shapiro, John Vanderburgh
    USENIX Security '02Deanonymizing Users of the SafeWeb Anonymizing ServiceDavid Martin, Andrew Schulman
    USENIX Security '02VeriSign CZAG: Privacy Leak in X.509 CertificatesScott G. Renfro
    USENIX Security '02How to Own the Internet in Your Spare TimeStuart Staniford, Vern Paxson, Nicholas Weaver
    USENIX Security '02Setuid DemystifiedHao Chen, David Wagner, Drew Dean
    USENIX Security '02Secure Execution via Program ShepherdingVladimir Kiriansky, Derek Bruening, Saman Amarasinghe
    USENIX Security '02A Flexible Containment Mechanism for Executing Untrusted CodeDavid S. Peterson, Matt Bishop, Raju Pandey
    USENIX Security '02SSLACC: A Clustered SSL AcceleratorEric Rescorla, Adam Cain, Brian Korver
    USENIX Security '02Infranet: Circumventing Web Censorship and SurveillanceNick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger
    USENIX Security '02Trusted Paths for BrowsersZishuang (Eileen) Ye, Sean Smith
    USENIX Security '02Toward Speech-Generated Cryptographic Keys on Resource-Constrained DevicesFabian Monrose, Michael Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih
    USENIX Security '02Secure History Preservation Through Timeline EntanglementPetros Maniatis, Mary Baker
    USENIX Security '02Lessons Learned in Implementing and Deploying Crypto SoftwarePeter Gutmann

Pages