USENIX Security Symposium A*

23 papers

YearTitle / Authors
2005An Architecture for Generating Semantic Aware Signatures.
Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, Somesh Jha
2005Automating Mimicry Attacks Using Static Binary Analysis.
Christopher Kruegel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna
2005Building an Application-aware IPsec Policy System.
Heng Yin, Haining Wang
2005Countering Targeted File Attacks Using LocationGuard.
Mudhakar Srivatsa, Ling Liu
2005Cryptographic Voting Protocols: A Systems Perspective.
Chris Karlof, Naveen Sastry, David A. Wagner
2005Detecting Targeted Attacks Using Shadow Honeypots.
Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos P. Markatos, Angelos D. Keromytis
2005Efficient Techniques for Comprehensive Protection from Memory Error Exploits.
Sandeep Bhatkar, Daniel C. DuVarney
2005Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network.
Ju Wang, Xin Liu, Andrew A. Chien
2005Finding Security Vulnerabilities in Java Applications with Static Analysis.
V. Benjamin Livshits, Monica S. Lam
2005Fixing Races for Fun and Profit: How to Abuse atime.
Nikita Borisov, Robert Johnson
2005Mapping Internet Sensors with Probe Response Attacks.
John Bethencourt, Jason Franklin, Mary K. Vernon
2005MulVAL: A Logic-based Network Security Analyzer.
Xinming Ou, Sudhakar Govindavajhala, Andrew W. Appel
2005Non-Control-Data Attacks Are Realistic Threats.
Shuo Chen, Jun Xu, Emre Can Sezer
2005OPUS: Online Patches and Updates for Security.
Gautam Altekar, Ilya Bagrak, Paul Burstein, Andrew Schultz
2005On the Effectiveness of Distributed Worm Monitoring.
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis
2005Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005
Patrick D. McDaniel
2005Protecting Against Unexpected System Calls.
Cullen Linn, Mohan Rajagopalan, Scott Baker, Christian S. Collberg, Saumya K. Debray, John H. Hartman
2005Robust TCP Stream Reassembly in the Presence of Adversaries.
Sarang Dharmapurikar, Vern Paxson
2005Security Analysis of a Cryptographically-Enabled RFID Device.
Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael Szydlo
2005Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation.
Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum
2005Stronger Password Authentication Using Browser Extensions.
Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C. Mitchell
2005Vulnerabilities of Passive Internet Threat Monitors.
Yoichi Shinoda, Ko Ikai, Motomu Itoh
2005Where's the FEEB? The Effectiveness of Instruction Set Randomization.
Ana Nora Sovarel, David Evans, Nathanael Paul