USENIX Security Symposium A*

23 papers

YearTitle / Authors
2002A Flexible Containment Mechanism for Executing Untrusted Code.
David S. Peterson, Matt Bishop, Raju Pandey
2002A General and Flexible Access-Control System for the Web.
Lujo Bauer, Michael A. Schneider, Edward W. Felten
2002Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System.
Jonathan S. Shapiro, John Vanderburgh
2002Deanonymizing Users of the SafeWeb Anonymizing Service.
David M. Martin Jr., Andrew Schulman
2002Detecting Manipulated Remote Call Streams.
Jonathon T. Giffin, Somesh Jha, Barton P. Miller
2002How to Own the Internet in Your Spare Time.
Stuart Staniford, Vern Paxson, Nicholas Weaver
2002Infranet: Circumventing Web Censorship and Surveillance.
Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David R. Karger
2002Lessons Learned in Implementing and Deploying Crypto Software.
Peter Gutmann
2002Linux Security Modules: General Security Support for the Linux Kernel.
Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman
2002Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking.
Markus Jakobsson, Ari Juels, Ronald L. Rivest
2002Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002
Dan Boneh
2002SSLACC: A Clustered SSL Accelerator.
Eric Rescorla, Adam Cain, Brian Korver
2002Secure Execution via Program Shepherding.
Vladimir Kiriansky, Derek Bruening, Saman P. Amarasinghe
2002Secure History Preservation Through Timeline Entanglement.
Petros Maniatis, Mary Baker
2002Security in Plan 9.
Russ Cox, Eric Grosse, Rob Pike, David L. Presotto, Sean Quinlan
2002Setuid Demystified.
Hao Chen, David A. Wagner, Drew Dean
2002Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption.
John Black, Hector Urtubia
2002Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices.
Fabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih
2002Trusted Paths for Browsers.
Zishuang (Eileen) Ye, Sean W. Smith
2002Type-Assisted Dynamic Buffer Overflow Detection.
Kyung-suk Lhee, Steve J. Chapin
2002Using CQUAL for Static Analysis of Authorization Hook Placement.
Xiaolan Zhang, Antony Edwards, Trent Jaeger
2002Using Text Categorization Techniques for Intrusion Detection.
Yihua Liao, V. Rao Vemuri
2002VeriSign CZAG: Privacy Leak in X.509 Certificates.
Scott G. Renfro