default search action
26th S&P 2005: Oakland, California, USA
- 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA. IEEE Computer Society 2005, ISBN 0-7695-2339-0
- Message from the Program Chairs.
- Conference Organizers.
- Program Committee.
Session: Intrusion Detection
- Shai Rubin, Somesh Jha, Barton P. Miller:
Language-Based Generation and Evaluation of NIDS Signatures. 3-17 - Rajeev Gopalakrishna, Eugene H. Spafford, Jan Vitek:
Efficient Intrusion Detection using Automaton Inlining. 18-31 - Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant:
Semantics-Aware Malware Detection. 32-46
Session: Sensor Networks
- Bryan Parno, Adrian Perrig, Virgil D. Gligor:
Distributed Detection of Node Replication Attacks in Sensor Networks. 49-63 - Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter:
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. 64-78
Session: Access Control and Authentication
- Lujo Bauer, Scott Garriss, Michael K. Reiter:
Distributed Proving in Access-Control Systems. 81-95 - Ninghui Li, Mahesh V. Tripunitara:
On Safety in Discretionary Access Control. 96-109 - Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. 110-124
Session: Integrity
- Glenn Wurster, Paul C. van Oorschot, Anil Somayaji:
A Generic Attack on Checksumming-Based Software Tamper Resistance. 127-138 - Dwaine E. Clarke, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk, Srinivas Devadas:
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. 139-153 - Elaine Shi, Adrian Perrig, Leendert van Doorn:
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. 154-168
Session: Cryptography and Protocols
- Michael Backes, Birgit Pfitzmann:
Relating Symbolic and Cryptographic Secrecy. 171-182 - Steven J. Murdoch, George Danezis:
Low-Cost Traffic Analysis of Tor. 183-195 - Michael T. Goodrich:
Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts. 196-207
Session: Worms and Network Forensics
- Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy:
Remote Physical Device Fingerprinting. 211-225 - James Newsome, Brad Karp, Dawn Xiaodong Song:
Polygraph: Automatically Generating Signatures for Polymorphic Worms. 226-241 - Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang:
Worm Origin Identification Using Random Moonwalks. 242-256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.