ACSAC A

61 papers

YearTitle / Authors
200521st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA
2005A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX.
Stig Andersson, Andrew J. Clark, George M. Mohay, Bradley L. Schatz, Jacob Zimmermann
2005A Host-Based Approach to Network Attack Chaining Analysis.
Paul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey
2005A Nitpicker's guide to a minimal-complexity secure GUI.
Norman Feske, Christian Helmuth
2005A User-level Framework for Auditing and Monitoring.
Yongzheng Wu, Roland H. C. Yap
2005An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis.
Ramaswamy Chandramouli, Scott Rose
2005Automated and Safe Vulnerability Assessment.
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
2005Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models.
Zhenkai Liang, R. Sekar
2005Building Evidence Graphs for Network Forensics Analysis.
Wei Wang, Thomas E. Daniels
2005Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn
2005Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers.
Jan Jürjens
2005Conference Committee.
2005Copyright.
2005Countering Trusting Trust through Diverse Double-Compiling.
David A. Wheeler
2005Defensive Execution of Transactional Processes against Attacks.
Meng Yu, Wanyu Zang, Peng Liu
2005Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers.
Weidong Cui, Randy H. Katz, Wai-Tian Tan
2005Detecting Intra-enterprise Scanning Worms based on Address Resolution.
David Whyte, Paul C. van Oorschot, Evangelos Kranakis
2005Dynamic Taint Propagation for Java.
Vivek Haldar, Deepak Chandra, Michael Franz
2005Evolving Successful Stack Overflow Attacks for Vulnerability Testing.
Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood
2005Exploiting Independent State For Network Intrusion Detection.
Robin Sommer, Vern Paxson
2005Fault Attacks on Dual-Rail Encoded Systems.
Jason Waddle, David A. Wagner
2005Generating Policies for Defense in Depth.
Paul Rubel, Michael Ihde, Steven A. Harp, Charles N. Payne
2005Graphical Passwords: A Survey.
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
2005Have the cake and eat it too - Infusing usability into text-password based authentication systems.
Sundararaman Jeyaraman, Umut Topkara
2005Highlights from the 2005 New Security Paradigms Workshop.
Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
2005How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI?
2005How to Develop a Career in Information Assurance and How to Advance in this Field.
Marla Collier
2005Improved Port Knocking with Strong Authentication.
Rennie deGraaf, John Aycock, Michael J. Jacobson Jr.
2005Intrusion Detection in RBAC-administered Databases.
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali
2005Java for Mobile Devices: A Security Study.
Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua
2005Layering Public Key Distribution Over Secure DNS using Authenticated Delegation.
John P. Jones, Daniel F. Berger, Chinya V. Ravishankar
2005Lessons Learned: A Security Analysis of the Internet Chess Club.
John Black, Martin Cochran, Ryan W. Gardner
2005Looking Back at the Bell-La Padula Model.
David Elliott Bell
2005Message from Conference Chair.
2005Model Checking An Entire Linux Distribution for Security Violations.
Benjamin Schwarz, Hao Chen, David A. Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West
2005Multi-Level Security Requirements for Hypervisors.
Paul A. Karger
2005Paranoid: A Global Secure File Access Control System.
Fareed Zaffar, Gershon Kedem, Ashish Gehani
2005PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness.
Sara Sinclair, Sean W. Smith
2005Privacy Requirements Implemented with a JavaCard.
Anas Abou El Kalam, Yves Deswarte
2005Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach.
Dingbang Xu, Peng Ning
2005Program Committee.
2005Replay Attack in TCG Specification and Solution.
Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga
2005Reviewers.
2005ScriptGen: an automated script generation tool for honeyd.
Corrado Leita, Ken Mermoud, Marc Dacier
2005Securing Email Archives through User Modeling.
Yiru Li, Anil Somayaji
2005Speaker Biographies.
2005Stealth Breakpoints.
Amit Vasudevan, Ramesh Yerraballi
2005Strengthening Software Self-Checksumming via Self-Modifying Code.
Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger
2005Survivability Architecture of a Mission Critical System: The DPASA Example.
Jennifer Chong, Partha P. Pal, Michael Atighetchi, Paul Rubel, Franklin Webber
2005TARP: Ticket-based Address Resolution Protocol.
Wesam Lootah, William Enck, Patrick D. McDaniel
2005The Pump: A Decade of Covert Fun.
Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
2005Title Page.
2005Tutorial Committee.
2005Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices.
Steven Noel, Sushil Jajodia
2005Uniform Application-level Access Control Enforcement of Organizationwide Policies.
Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen
2005User-Centered Security: Stepping Up to the Grand Challenge.
Mary Ellen Zurko
2005Using Continuous Biometric Verification to Protect Interactive Login Sessions.
Sandeep Kumar, Terence Sim, Rajkumar Janakiraman, Sheng Zhang
2005Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis.
Jingmin Zhou, Adam J. Carlson, Matt Bishop
2005We Need Assurance!
Brian D. Snow
2005e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing.
Gaurav S. Kc, Angelos D. Keromytis
2005mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients.
Jun Li, Xun Kang