USENIX Security Symposium A*

33 papers

YearTitle / Authors
2004A Virtual Honeypot Framework.
Niels Provos
2004Autograph: Toward Automated, Distributed Worm Signature Detection.
Hyang-Ah Kim, Brad Karp
2004Avfs: An On-Access Anti-Virus File System.
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok
2004Collapsar: A VM-Based Architecture for Network Attack Detention Center.
Xuxian Jiang, Dongyan Xu
2004Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor.
Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh
2004Design and Implementation of a TCG-based Integrity Measurement Architecture.
Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn
2004Design of the EROS Trusted Window System.
Jonathan S. Shapiro, John Vanderburgh, Eric Northup, David Chizmadia
2004Exploiting Software.
Gary McGraw
2004Fairplay - Secure Two-Party Computation System.
Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella
2004Fighting Computer Virus Attacks.
Peter Szor
2004Finding User/Kernel Pointer Bugs with Type Inference.
Robert Johnson, David A. Wagner
2004Fixing Races for Fun and Profit: How to Use access(2).
Drew Dean, Alan J. Hu
2004Graphical Dictionaries and the Memorable Space of Graphical Passwords.
Julie Thorpe, Paul C. van Oorschot
2004I Voted? How the Law Increasingly Restricts Independent Security Research.
Cindy Cohn
2004Keynote Address: Back to the Future.
William Earl Boebert
2004Metrics, Economics, and Shared Risk at the National Scale.
Daniel E. Geer Jr.
2004Military Strategy in CyberSpace.
Stuart Staniford
2004My Dad's Computer, Microsoft, and the Future of Internet Security.
Bill Cheswick
2004Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute.
Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart
2004Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography.
Steven M. Bellovin
2004On Gray-Box Program Tracking for Anomaly Detection.
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
2004On User Choice in Graphical Password Schemes.
Darren Davis, Fabian Monrose, Michael K. Reiter
2004Privacy-Preserving Sharing and Correlation of Security Alerts.
Patrick Lincoln, Phillip A. Porras, Vitaly Shmatikov
2004Privtrans: Automatically Partitioning Programs for Privilege Separation.
David Brumley, Dawn Xiaodong Song
2004Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA
Matt Blaze
2004RFID: Security and Privacy for Five-Cent Computers.
Ari Juels
2004Side Effects Are Not Sufficient to Authenticate Software.
Umesh Shankar, Monica Chew, J. D. Tygar
2004Static Disassembly of Obfuscated Binaries.
Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna
2004TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection.
Kumar Avijit, Prateek Gupta, Deepak Gupta
2004Tor: The Second-Generation Onion Router.
Roger Dingledine, Nick Mathewson, Paul F. Syverson
2004Understanding Data Lifetime via Whole System Simulation (Awarded Best Paper!).
Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum
2004Very Fast Containment of Scanning Worms.
Nicholas Weaver, Stuart Staniford, Vern Paxson
2004What Biology Can (and Can't) Teach Us About Security.
David Evans