default search action
11th USENIX Security Symposium 2002: San Francisco, California, USA
- Dan Boneh:
Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002. USENIX 2002, ISBN 1-931971-00-5
OS Security
- Russ Cox, Eric Grosse, Rob Pike, David L. Presotto, Sean Quinlan:
Security in Plan 9. 3-16 - Chris Wright, Crispin Cowan, Stephen Smalley, James Morris, Greg Kroah-Hartman:
Linux Security Modules: General Security Support for the Linux Kernel. 17-31 - Xiaolan Zhang, Antony Edwards, Trent Jaeger:
Using CQUAL for Static Analysis of Authorization Hook Placement. 33-48
Intrusion Detection/Protection
- Yihua Liao, V. Rao Vemuri:
Using Text Categorization Techniques for Intrusion Detection. 51-59 - Jonathon T. Giffin, Somesh Jha, Barton P. Miller:
Detecting Manipulated Remote Call Streams. 61-79 - Kyung-suk Lhee, Steve J. Chapin:
Type-Assisted Dynamic Buffer Overflow Detection. 81-88
Access Control
- Lujo Bauer, Michael A. Schneider, Edward W. Felten:
A General and Flexible Access-Control System for the Web. 93-108 - Jonathan S. Shapiro, John Vanderburgh:
Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System. 109-120
Hacks/Attacks
- David M. Martin Jr., Andrew Schulman:
Deanonymizing Users of the SafeWeb Anonymizing Service. 123-137 - Scott G. Renfro:
VeriSign CZAG: Privacy Leak in X.509 Certificates. 139-148 - Stuart Staniford, Vern Paxson, Nicholas Weaver:
How to Own the Internet in Your Spare Time. 149-167
Sandboxing
- Hao Chen, David A. Wagner, Drew Dean:
Setuid Demystified. 171-190 - Vladimir Kiriansky, Derek Bruening, Saman P. Amarasinghe:
Secure Execution via Program Shepherding. 191-206 - David S. Peterson, Matt Bishop, Raju Pandey:
A Flexible Containment Mechanism for Executing Untrusted Code. 207-225
Web Security
- Eric Rescorla, Adam Cain, Brian Korver:
SSLACC: A Clustered SSL Accelerator. 229-246 - Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David R. Karger:
Infranet: Circumventing Web Censorship and Surveillance. 247-262 - Zishuang (Eileen) Ye, Sean W. Smith:
Trusted Paths for Browsers. 263-279
Generating Keys and Timestamps
- Fabian Monrose, Michael K. Reiter, Qi Li, Daniel P. Lopresti, Chilin Shih:
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices. 283-296 - Petros Maniatis, Mary Baker:
Secure History Preservation Through Timeline Entanglement. 297-312
Deploying Crypto
- Peter Gutmann:
Lessons Learned in Implementing and Deploying Crypto Software. 315-325 - John Black, Hector Urtubia:
Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. 327-338 - Markus Jakobsson, Ari Juels, Ronald L. Rivest:
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. 339-353
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.