ACSAC A

45 papers

YearTitle / Authors
200622nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA
2006A Framework for a Collaborative DDoS Defense.
George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson
2006A General Dynamic Information Flow Tracking Framework for Security Applications.
Lap-Chung Lam, Tzi-cker Chiueh
2006A Module System for Isolating Untrusted Software Extensions.
Philip W. L. Fong, Simon A. Orr
2006A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs.
Lillian Røstad, Ole Edsberg
2006Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software.
Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning
2006Address-Space Randomization for Windows Systems.
Lixin Li, James E. Just, R. Sekar
2006Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks.
David Whyte, Paul C. van Oorschot, Evangelos Kranakis
2006An Internet Voting System Supporting User Privacy.
Aggelos Kiayias, Michael Korman, David Walluck
2006Anomaly Based Web Phishing Page Detection.
Ying Pan, Xuhua Ding
2006Automatic Evaluation of Intrusion Detection Systems.
Frédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture
2006Back to the Future: A Framework for Automatic Malware Removal and System Repair.
Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su
2006Backtracking Algorithmic Complexity Attacks against a NIDS.
Randy Smith, Cristian Estan, Somesh Jha
2006Bluetooth Worms: Models, Dynamics, and Defense Implications.
Guanhua Yan, Stephan J. Eidenbenz
2006Covert and Side Channels Due to Processor Architecture.
Zhenghong Wang, Ruby B. Lee
2006CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection.
Guillaume Duc, Ronan Keryell
2006Data Sandboxing: A Technique for Enforcing Confidentiality Policies.
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan
2006Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine.
Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian
2006Detecting Policy Violations through Traffic Analysis.
Jeffrey Horton, Reihaneh Safavi-Naini
2006Engineering Sufficiently Secure Computing.
Brian Witten
2006Enhancing Collaborative Spam Detection with Bloom Filters.
Jeff Yan, Pook Leong Cho
2006Extended Protection against Stack Smashing Attacks without Performance Loss.
Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen
2006Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing.
Jeremy Epstein
2006Foreign Code Detection on the Windows/X86 Platform.
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
2006From Languages to Systems: Understanding Practical Application Development in Security-typed Languages.
Boniface Hicks, Kiyan Ahmadizadeh, Patrick D. McDaniel
2006How to Automatically and Accurately Sandbox Microsoft IIS.
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
2006KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy.
Dinei A. F. Florêncio, Cormac Herley
2006Known/Chosen Key Attacks against Software Instruction Set Randomization.
Yoav Weiss, Elena Gabriela Barrantes
2006NetSpy: Automatic Generation of Spyware Signatures for NIDS.
Hao Wang, Somesh Jha, Vinod Ganapathy
2006Offloading IDS Computation to the GPU.
Nigel Jacob, Carla E. Brodley
2006On Detecting Camouflaging Worm.
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
2006PAST: Probabilistic Authentication of Sensor Timestamps.
Ashish Gehani, Surendar Chandra
2006PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware.
Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee
2006Practical Attack Graph Generation for Network Defense.
Kyle Ingols, Richard Lippmann, Keith Piwowarski
2006Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety.
Dixie B. Baker
2006Protecting Privacy in Key-Value Search Systems.
Yinglian Xie, Michael K. Reiter, David R. O'Hallaron
2006Risks of Untrustworthiness.
Peter G. Neumann
2006Secure Distributed Cluster Formation in Wireless Sensor Networks.
Kun Sun, Pai Peng, Peng Ning, Cliff Wang
2006Shamon: A System for Distributed Mandatory Access Control.
Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer
2006Specification-Based Intrusion Detection in WLANs.
Rupinder Gill, Jason Smith, Andrew J. Clark
2006Static Detection of Vulnerabilities in x86 Executables.
Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna
2006Towards Database Firewall: Mining the Damage Spreading Patterns.
Kun Bai, Peng Liu
2006Using Attribute-Based Access Control to Enable Attribute-Based Messaging.
Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana
2006V-COPS: A Vulnerability-Based Cooperative Alert Distribution System.
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia
2006Vulnerability Analysis of MMS User Agents.
Collin Mulliner, Giovanni Vigna