USENIX Security Symposium A*

22 papers

YearTitle / Authors
2003802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
John Bellardo, Stefan Savage
2003A New Two-Server Approach for Authentication with Short Secrets.
John G. Brainard, Ari Juels, Burt Kaliski, Michael Szydlo
2003Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits.
Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar
2003Analyzing Integrity Protection in the SELinux Example Policy.
Trent Jaeger, Reiner Sailer, Xiaolan Zhang
2003Denial of Service via Algorithmic Complexity Attacks.
Scott A. Crosby, Dan S. Wallach
2003Detecting Malicious Java Code Using Virtual Machine Auditing.
Sunil Soman, Chandra Krintz, Giovanni Vigna
2003Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC.
Diana K. Smetters, Glenn Durfee
2003Dynamic Detection and Prevention of Race Conditions in File Accesses.
Eugene Tsyrklevich, Bennet Yee
2003Establishing the Genuinity of Remote Computer Systems.
Rick Kennell, Leah H. Jamieson
2003High Coverage Detection of Input-Related Security Faults.
Eric Larson, Todd M. Austin
2003Implementing and Testing a Virus Throttle.
Jamie Twycross, Matthew M. Williamson
2003Improving Host Security with System Call Policies.
Niels Provos
2003Plug-and-Play PKI: A PKI Your Mother Can Use.
Peter Gutmann
2003PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities.
Crispin Cowan, Steve Beattie, John Johansen, Perry Wagle
2003Preventing Privilege Escalation.
Niels Provos, Markus Friedl, Peter Honeyman
2003Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003
2003Remote Timing Attacks Are Practical.
David Brumley, Dan Boneh
2003SSL Splitting: Securely Serving Data from Untrusted Caches.
Chris Lesniewski-Laas, M. Frans Kaashoek
2003Scrash: A System for Generating Secure Crash Information.
Peter Broadwell, Matthew Harren, Naveen Sastry
2003Security Holes . . . Who Cares?
Eric Rescorla
2003Static Analysis of Executables to Detect Malicious Patterns.
Mihai Christodorescu, Somesh Jha
2003Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior.
Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A. N. Soules, Garth R. Goodson, Gregory R. Ganger