Abstract is missing.
- So You Think You Can Dance?Richard A. Kemmerer. 3-17 [doi]
- Establishing and Sustaining System Integrity via Root of Trust InstallationLuke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel. 19-29 [doi]
- Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-VotingAggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan. 30-39 [doi]
- Toward a Medium-Robustness Separation Kernel Protection ProfileRance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin. 40-51 [doi]
- Improving Signature Testing through Dynamic Data Flow AnalysisChristopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna. 53-63 [doi]
- HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like NetworksMengjun Xie, Zhenyu Wu, Haining Wang. 64-73 [doi]
- Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic WormsMatthew Van Gundy, Hao Chen, Zhendong Su, Giovanni Vigna. 74-85 [doi]
- Toward Realistic and Artifact-Free Insider-Threat DataKevin S. Killourhy, Roy A. Maxion. 87-96 [doi]
- Database Isolation and Filtering against Data Corruption AttacksMeng Yu, Wanyu Zang, Peng Liu. 97-106 [doi]
- Sania: Syntactic and Semantic Analysis for Automated Testing against SQL InjectionYuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hishiyama, Yu Takahama. 107-117 [doi]
- Closed-Circuit Unobservable Voice over IPCarlos Aguilar Melchor, Yves Deswarte, Julien Iguchi-Cartigny. 119-128 [doi]
- SSARES: Secure Searchable Automated Remote Email StorageAdam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis. 129-139 [doi]
- The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo Kermes, Wayne Liu, Shahank Sahai, Zhenghui Zhu. 141-150 [doi]
- Efficiency Issues of Rete-Based Expert Systems for Misuse DetectionMichael Meier, Ulrich Flegel, Sebastian Schmerl. 151-160 [doi]
- Tracking Darkports for Network DefenseDavid Whyte, Paul C. van Oorschot, Evangelos Kranakis. 161-171 [doi]
- Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information NetworksDaniel J. Weitzner. 173-175 [doi]
- Distributed Secure Systems: Then and NowBrian Randell, John M. Rushby. 177-199 [doi]
- Extensible Pre-authentication KerberosPhillip L. Hellewell, Kent E. Seamons. 201-210 [doi]
- Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAPManigandan Radhakrishnan, Jon A. Solworth. 211-220 [doi]
- Retrofitting the IBM POWER Hypervisor to Support Mandatory Access ControlEnriquillo Valdez, Reiner Sailer, Ronald Perez. 221-231 [doi]
- Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile DevicesIulia Ion, Boris Dragovic, Bruno Crispo. 233-242 [doi]
- Countering False Accusations and Collusion in the Detection of In-Band WormholesDaniel Sterne, Geoffrey Lawler, Richard Gopaul, Brian Rivera, Kelvin Marcus, Peter Kruus. 243-256 [doi]
- Efficient Distributed Detection of Node Replication Attacks in Sensor NetworksBo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy. 257-267 [doi]
- Security Usability Principles for Vulnerability Analysis and Risk AssessmentAudun Jøsang, Bander AlFayyadh, Tyrone Grandison, Mohammed Al Zomai, Judith McNamara. 269-278 [doi]
- Breaking Visual CAPTCHAs with Naive Pattern Recognition AlgorithmsJeff Yan, Ahmad Salah El Ahmad. 279-291 [doi]
- Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control PoliciesPaolina Centonze, Robert J. Flynn, Marco Pistoia. 292-303 [doi]
- Routing in the Dark: Pitch BlackNathan S. Evans, Chris GauthierDickey, Christian Grothoff. 305-314 [doi]
- Centralized Security Labels in Decentralized P2P NetworksNathalie Tsybulnik, Kevin W. Hamlen, Bhavani M. Thuraisingham. 315-324 [doi]
- A Taxonomy of Botnet StructuresDavid Dagon, Guofei Gu, Christopher P. Lee, Wenke Lee. 325-339 [doi]
- An Overview of the Annex SystemDuncan A. Grove, Toby C. Murray, C. A. Owen, Chris J. North, J. A. Jones, M. R. Beaumont, B. D. Hopkins. 341-352 [doi]
- Efficient Detection of Delay-Constrained Relay NodesBaris Coskun, Nasir D. Memon. 353-362 [doi]
- Bonsai: Balanced Lineage AuthenticationAshish Gehani, Ulf Lindqvist. 363-373 [doi]
- Secure Input for Web ApplicationsMartin Szydlowski, Christopher Kruegel, Engin Kirda. 375-384 [doi]
- Secure and Flexible Monitoring of Virtual MachinesBryan D. Payne, Wenke Lee. 385-397 [doi]
- Automated Format String Attack Prevention for Win32/X86 BinariesWei Li, Tzi-cker Chiueh. 398-409 [doi]
- MetaAware: Identifying Metamorphic MalwareQinghua Zhang, Douglas S. Reeves. 411-420 [doi]
- Limits of Static Analysis for Malware DetectionAndreas Moser, Christopher Kruegel, Engin Kirda. 421-430 [doi]
- OmniUnpack: Fast, Generic, and Safe Unpacking of MalwareLorenzo Martignoni, Mihai Christodorescu, Somesh Jha. 431-441 [doi]
- Channels: Runtime System Infrastructure for Security-Typed LanguagesBoniface Hicks, Tim Misiak, Patrick McDaniel. 443-452 [doi]
- Automated Security Debugging Using Program Structural ConstraintsChongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang. 453-462 [doi]
- Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual MachineDeepak Chandra, Michael Franz. 463-475 [doi]
- Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input CraftingSherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Changchun Zou. 477-486 [doi]
- The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or StackAsia Slowinska, Herbert Bos. 487-500 [doi]
- Spector: Automatically Analyzing Shell CodeKevin Borders, Atul Prakash, Mark Zielinski. 501-514 [doi]