| 2005 | 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA |
| 2005 | A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. Stig Andersson, Andrew J. Clark, George M. Mohay, Bradley L. Schatz, Jacob Zimmermann |
| 2005 | A Host-Based Approach to Network Attack Chaining Analysis. Paul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey |
| 2005 | A Nitpicker's guide to a minimal-complexity secure GUI. Norman Feske, Christian Helmuth |
| 2005 | A User-level Framework for Auditing and Monitoring. Yongzheng Wu, Roland H. C. Yap |
| 2005 | An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis. Ramaswamy Chandramouli, Scott Rose |
| 2005 | Automated and Safe Vulnerability Assessment. Fanglu Guo, Yang Yu, Tzi-cker Chiueh |
| 2005 | Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. Zhenkai Liang, R. Sekar |
| 2005 | Building Evidence Graphs for Network Forensics Analysis. Wei Wang, Thomas E. Daniels |
| 2005 | Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn |
| 2005 | Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. Jan Jürjens |
| 2005 | Conference Committee. |
| 2005 | Copyright. |
| 2005 | Countering Trusting Trust through Diverse Double-Compiling. David A. Wheeler |
| 2005 | Defensive Execution of Transactional Processes against Attacks. Meng Yu, Wanyu Zang, Peng Liu |
| 2005 | Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. Weidong Cui, Randy H. Katz, Wai-Tian Tan |
| 2005 | Detecting Intra-enterprise Scanning Worms based on Address Resolution. David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
| 2005 | Dynamic Taint Propagation for Java. Vivek Haldar, Deepak Chandra, Michael Franz |
| 2005 | Evolving Successful Stack Overflow Attacks for Vulnerability Testing. Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood |
| 2005 | Exploiting Independent State For Network Intrusion Detection. Robin Sommer, Vern Paxson |
| 2005 | Fault Attacks on Dual-Rail Encoded Systems. Jason Waddle, David A. Wagner |
| 2005 | Generating Policies for Defense in Depth. Paul Rubel, Michael Ihde, Steven A. Harp, Charles N. Payne |
| 2005 | Graphical Passwords: A Survey. Xiaoyuan Suo, Ying Zhu, G. Scott Owen |
| 2005 | Have the cake and eat it too - Infusing usability into text-password based authentication systems. Sundararaman Jeyaraman, Umut Topkara |
| 2005 | Highlights from the 2005 New Security Paradigms Workshop. Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov |
| 2005 | How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI? |
| 2005 | How to Develop a Career in Information Assurance and How to Advance in this Field. Marla Collier |
| 2005 | Improved Port Knocking with Strong Authentication. Rennie deGraaf, John Aycock, Michael J. Jacobson Jr. |
| 2005 | Intrusion Detection in RBAC-administered Databases. Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali |
| 2005 | Java for Mobile Devices: A Security Study. Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua |
| 2005 | Layering Public Key Distribution Over Secure DNS using Authenticated Delegation. John P. Jones, Daniel F. Berger, Chinya V. Ravishankar |
| 2005 | Lessons Learned: A Security Analysis of the Internet Chess Club. John Black, Martin Cochran, Ryan W. Gardner |
| 2005 | Looking Back at the Bell-La Padula Model. David Elliott Bell |
| 2005 | Message from Conference Chair. |
| 2005 | Model Checking An Entire Linux Distribution for Security Violations. Benjamin Schwarz, Hao Chen, David A. Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West |
| 2005 | Multi-Level Security Requirements for Hypervisors. Paul A. Karger |
| 2005 | Paranoid: A Global Secure File Access Control System. Fareed Zaffar, Gershon Kedem, Ashish Gehani |
| 2005 | PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. Sara Sinclair, Sean W. Smith |
| 2005 | Privacy Requirements Implemented with a JavaCard. Anas Abou El Kalam, Yves Deswarte |
| 2005 | Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. Dingbang Xu, Peng Ning |
| 2005 | Program Committee. |
| 2005 | Replay Attack in TCG Specification and Solution. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga |
| 2005 | Reviewers. |
| 2005 | ScriptGen: an automated script generation tool for honeyd. Corrado Leita, Ken Mermoud, Marc Dacier |
| 2005 | Securing Email Archives through User Modeling. Yiru Li, Anil Somayaji |
| 2005 | Speaker Biographies. |
| 2005 | Stealth Breakpoints. Amit Vasudevan, Ramesh Yerraballi |
| 2005 | Strengthening Software Self-Checksumming via Self-Modifying Code. Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger |
| 2005 | Survivability Architecture of a Mission Critical System: The DPASA Example. Jennifer Chong, Partha P. Pal, Michael Atighetchi, Paul Rubel, Franklin Webber |
| 2005 | TARP: Ticket-based Address Resolution Protocol. Wesam Lootah, William Enck, Patrick D. McDaniel |
| 2005 | The Pump: A Decade of Covert Fun. Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck |
| 2005 | Title Page. |
| 2005 | Tutorial Committee. |
| 2005 | Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. Steven Noel, Sushil Jajodia |
| 2005 | Uniform Application-level Access Control Enforcement of Organizationwide Policies. Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen |
| 2005 | User-Centered Security: Stepping Up to the Grand Challenge. Mary Ellen Zurko |
| 2005 | Using Continuous Biometric Verification to Protect Interactive Login Sessions. Sandeep Kumar, Terence Sim, Rajkumar Janakiraman, Sheng Zhang |
| 2005 | Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. Jingmin Zhou, Adam J. Carlson, Matt Bishop |
| 2005 | We Need Assurance! Brian D. Snow |
| 2005 | e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. Gaurav S. Kc, Angelos D. Keromytis |
| 2005 | mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. Jun Li, Xun Kang |