default search action
20. ACSAC 2004: Tucson, Arizona, USA
- 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA. IEEE Computer Society 2004, ISBN 0-7695-2252-1
Distinguished Practitioner
- Steven B. Lipner:
The Trustworthy Computing Security Development Lifecycle. 2-13
Intrusion Detection
- Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer:
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. 16-27 - Shai Rubin, Somesh Jha, Barton P. Miller:
Automatic Generation and Analysis of NIDS Attacks. 28-38 - Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves:
Reasoning About Complementary Intrusion Evidence. 39-48
Start Seeing Security
- Julie Thorpe, Paul C. van Oorschot:
Towards Secure Design Choices for Implementing Graphical Passwords. 50-60 - Zhuowei Li, Amitabha Das:
Visualizing and Identifying Intrusion Context from System Calls Trace. 61-70 - J. J. Brennan, Mindy Rudell, Donald B. Faatz, Carson Zimmerman:
Visualizing Enterprise-Wide Security (VIEWS). 71-79
Software Safety
- Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu:
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). 82-90 - Christopher Krügel, William K. Robertson, Giovanni Vigna:
Detecting Kernel-Level Rootkits Through Binary Analysis. 91-100 - Haizhi Xu, Wenliang Du, Steve J. Chapin:
Detecting Exploit Code Execution in Loadable Kernel Modules. 101-110
Panel
- Marshall D. Abrams:
The Relationship of System & Product Specifications and Evaluations. 112-113
Malware
- Ajay Gupta, Daniel C. DuVarney:
Using Predators to Combat Worms and Viruses: A Simulation-Based Study. 116-125 - Kalyan S. Perumalla, Srikanth Sundaragopalan:
High-Fidelity Modeling of Computer Network Worms. 126-135 - Guofei Gu, Monirul Islam Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley:
Worm Detection, Early Warning and Response Based on Local Victim Information. 136-145 - Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuji Yamaoka:
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets. 146-155
Audit Analysis
- Emilie Lundin Barse, Erland Jonsson:
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection. 158-167 - Jingyu Zhou, Giovanni Vigna:
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. 168-178 - Tzi-cker Chiueh, Dhruv Pilania:
Design, Implementation, and Evaluation of A Repairable Database Management System. 179-188 - Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya:
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates. 189-204
Classic Papers
- Marvin Schaefer:
If A1 is the Answer, What was the Question? An Edgy Na?f's Retrospective on Promulgating the Trusted Computer Systems Evaluation Criteria. 204-228 - Steven M. Bellovin:
A Look Back at "Security Problems in the TCP/IP Protocol Suite". 229-249
Middleware
- Mudhakar Srivatsa, Ling Liu:
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. 252-261 - Ninghui Li, John C. Mitchell, Derrick Tong:
Securing Java RMI-Based Distributed Applications. 262-271 - Nathanael Paul, David Evans:
.NET Security: Lessons Learned and Missed from Java. 272-281
Insider Threat
- Amit Purohit, Vishnu Navda, Tzi-cker Chiueh:
Tracing the Root of "Rootable" Processes. 284-303 - John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian:
Open-Source Applications of TCPA Hardware. 294-303 - Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya:
Security Policies to Mitigate Insider Threat in the Document Control Domain. 304-313
Network Security
- Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon:
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. 316-325 - Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala:
Static Analyzer of Vicious Executables (SAVE). 326-334 - Fu-Hau Hsu, Tzi-cker Chiueh:
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security. 335-344
Panel
- Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin:
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. 346-347
Event Correlation
- Steven Noel, Eric Robertson, Sushil Jajodia:
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. 350-359 - Dingbang Xu, Peng Ning:
Alert Correlation through Triggering Events and Common Resources. 360-369 - Xinzhou Qin, Wenke Lee:
Attack Plan Recognition and Prediction Using Causal Networks. 370-379
Panel
- Carla Marceau, Simon N. Foley:
Themes and Highlights of the New Security Paradigms Workshop 2004. 382-383
Access Control Policy
- Sye Loong Keoh, Emil Lupu, Morris Sloman:
PEACE: A Policy-Based Establishment of Ad-hoc Communities. 386-395 - Ezedin Barka, Ravi S. Sandhu:
Role-Based Delegation Model/ Hierarchical Roles (RBDM1). 396-404 - Mohammad A. Al-Kahtani, Ravi S. Sandhu:
Mohammad A. Al-Kahtani, Ravi Sandhu. 405-415
Innovative Design
- Neil C. Rowe:
Designing Good Deceptions in Defense of Information Systems. 418-427 - Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé:
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. 428-437 - Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. Smetters:
Securing a Remote Terminal Application with a Mobile Trusted Device. 438-447
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.