Abstract is missing.
- RICH: Automatically Protecting Against Integer-Based VulnerabilitiesDavid Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin. [doi]
- OPTWALL: A Hierarchical Traffic-Aware FirewallSubrata Acharya, Bryan N. Mills, Mehmud Abliz, Taieb Znati, Jia Wang, Zihui Ge, Albert G. Greenberg. [doi]
- Attribute-Based Publishing with Hidden Credentials and Hidden PoliciesApu Kapadia, Patrick P. Tsang, Sean W. Smith. [doi]
- Consumable Credentials in Linear-Logic-Based Access-Control SystemsKevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter. [doi]
- Cryptographic Methods for Storing Ballots on a Voting MachineJohn Bethencourt, Dan Boneh, Brent Waters. [doi]
- Army of BotnetsRyan Vogt, John Aycock, Michael J. Jacobson Jr.. [doi]
- A Quantitative Study of Forum Spamming Using Context-based AnalysisYuan Niu, Hao Chen, Francis Hsu, Yi-Min Wang, Ming Ma. [doi]
- Secret Handshakes with Dynamic and Fuzzy MatchingGiuseppe Ateniese, Jonathan Kirsch, Marina Blanton. [doi]
- Generic Application-Level Protocol Analyzer and its LanguageNikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo. [doi]
- Playing Devil s Advocate: Inferring Sensitive Information from Anonymized Network TracesScott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter. [doi]
- Fig: Automatic Fingerprint GenerationShobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Xiaodong Song. [doi]
- Cross Site Scripting Prevention with Dynamic Data Tainting and Static AnalysisPhilipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna. [doi]
- Shedding Light on the Configuration of Dark AddressesSushant Sinha, Michael Bailey, Farnam Jahanian. [doi]
- Low-Rate TCP-Targeted DoS Attack Disrupts Internet RoutingYing Zhang, Zhuoqing Morley Mao, Jia Wang. [doi]
- Phinding Phish: An Evaluation of Anti-Phishing ToolbarsLorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang. [doi]
- On the Practicality of Private Information RetrievalRadu Sion, Bogdan Carbunar. [doi]
- File System Design with Assured DeleteRadia Perlman. [doi]