default search action
14th USENIX Security Symposium 2005: Baltimore, MD, USA
- Patrick D. McDaniel:
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005. USENIX Association 2005 - Nikita Borisov, Robert Johnson:
Fixing Races for Fun and Profit: How to Abuse atime. - Heng Yin, Haining Wang:
Building an Application-aware IPsec Policy System. - Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum:
Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. - Cullen Linn, Mohan Rajagopalan, Scott Baker, Christian S. Collberg, Saumya K. Debray, John H. Hartman:
Protecting Against Unexpected System Calls. - Sandeep Bhatkar, Daniel C. DuVarney:
Efficient Techniques for Comprehensive Protection from Memory Error Exploits. - V. Benjamin Livshits, Monica S. Lam:
Finding Security Vulnerabilities in Java Applications with Static Analysis. - Gautam Altekar, Ilya Bagrak, Paul Burstein, Andrew Schultz:
OPUS: Online Patches and Updates for Security. - John Bethencourt, Jason Franklin, Mary K. Vernon:
Mapping Internet Sensors with Probe Response Attacks. - Yoichi Shinoda, Ko Ikai, Motomu Itoh:
Vulnerabilities of Passive Internet Threat Monitors. - Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis:
On the Effectiveness of Distributed Worm Monitoring. - Ana Nora Sovarel, David Evans, Nathanael Paul:
Where's the FEEB? The Effectiveness of Instruction Set Randomization. - Christopher Kruegel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna:
Automating Mimicry Attacks Using Static Binary Analysis. - Shuo Chen, Jun Xu, Emre Can Sezer:
Non-Control-Data Attacks Are Realistic Threats. - Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, Somesh Jha:
An Architecture for Generating Semantic Aware Signatures. - Xinming Ou, Sudhakar Govindavajhala, Andrew W. Appel:
MulVAL: A Logic-based Network Security Analyzer. - Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Konstantinos Xinidis, Evangelos P. Markatos, Angelos D. Keromytis:
Detecting Targeted Attacks Using Shadow Honeypots. - Ju Wang, Xin Liu, Andrew A. Chien:
Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network. - Sarang Dharmapurikar, Vern Paxson:
Robust TCP Stream Reassembly in the Presence of Adversaries. - Mudhakar Srivatsa, Ling Liu:
Countering Targeted File Attacks Using LocationGuard. - Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael Szydlo:
Security Analysis of a Cryptographically-Enabled RFID Device. - Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh, John C. Mitchell:
Stronger Password Authentication Using Browser Extensions. - Chris Karlof, Naveen Sastry, David A. Wagner:
Cryptographic Voting Protocols: A Systems Perspective.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.