default search action
15th USENIX Security Symposium 2006: Vancouver, BC, Canada
- Angelos D. Keromytis:
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006. USENIX Association 2006 - Nick L. Petroni Jr., Timothy Fraser, Aaron Walters, William A. Arbaugh:
An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data. - Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn:
vTPM: Virtualizing the Trusted Platform Module. - Naveen Sastry:
Designing Voting Machines for Verification. - Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu:
SigFree: A Signature-free Buffer Overflow Attack Blocker. - Prahlad Fogla, Monirul Islam Sharif, Roberto Perdisci, Oleg M. Kolesnikov, Wenke Lee:
Polymorphic Blending Attacks. - Holger Dreger, Anja Feldmann:
Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. - Engin Kirda, Christopher Kruegel:
Behavior-based Spyware Detection. - Octavian Udrea, Cristian Lumezanu:
Rule-Based Static Analysis of Network Protocol Implementations. - Stephen McCamant, Greg Morrisett:
Evaluating SFI for a CISC Architecture. - Yichen Xie, Alex Aiken:
Static Detection of Security Vulnerabilities in Scripting Languages. - Martín Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown:
SANE: A Protection Architecture for Enterprise Networks. - Mohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang:
PHAS: A Prefix Hijack Alert System. - Jason Franklin, Damon McCoy:
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. - Andy Ozment, Stuart E. Schechter:
Milk or Wine: Does Software Security Improve with Age? - Benjamin Cox, David Evans:
N-Variant Systems: A Secretless Framework for Security through Diversity. - Wei Xu, Sandeep Bhatkar, R. Sekar:
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. - Ilan Kirschenbaum, Avishai Wool:
How to Build a Low-Cost, Extended-Range RFID Skimmer. - Gaurav Shah, Andrés Molina:
Keyboards and Covert Channels. - J. Alex Halderman, Edward W. Felten:
Lessons from the Sony CD DRM Episode. - Sonia Chiasson, Paul C. van Oorschot, Robert Biddle:
A Usability Study and Critique of Two Password Managers. - Chengyu Ma, Nan Hu, Yingjiu Li:
On the Release of CRLs in Public Key Infrastructure. - Lucas Ballard, Fabian Monrose, Daniel P. Lopresti:
Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.