Abstract is missing.
- Data Space RandomizationSandeep Bhatkar, R. Sekar. 1-22 [doi]
- XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting AttacksPrithvi Bisht, V. N. Venkatakrishnan. 23-43 [doi]
- VeriKey: A Dynamic Certificate Verification System for Public Key ExchangesBrett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel. 44-63 [doi]
- Dynamic Binary Instrumentation-Based Framework for Malware DefenseNajwa Aaraj, Anand Raghunathan, Niraj K. Jha. 64-87 [doi]
- Embedded Malware Detection Using Markov n-GramsM. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq. 88-107 [doi]
- Learning and Classification of Malware BehaviorKonrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov. 108-125 [doi]
- On Race Vulnerabilities in Web ApplicationsRoberto Paleari, Davide Marrone, Danilo Bruschi, Mattia Monga. 126-142 [doi]
- On the Limits of Information Flow Techniques for Malware Analysis and ContainmentLorenzo Cavallaro, Prateek Saxena, R. Sekar. 143-163 [doi]
- Expanding Malware Defense by Securing Software InstallationsWeiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkatakrishnan. 164-185 [doi]
- FluXOR: Detecting and Monitoring Fast-Flux Service NetworksEmanuele Passerini, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi. 186-206 [doi]
- Traffic Aggregation for Malware DetectionTing-Fang Yen, Michael K. Reiter. 207-227 [doi]
- The Contact Surface: A Technique for Exploring Internet Scale Emergent BehaviorsCarrie Gates, John McHugh. 228-246 [doi]
- The Quest for Multi-headed WormsVan-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary. 247-266 [doi]
- A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection SystemsLeo Juan, Christian Kreibich, Chih-Hung Lin, Vern Paxson. 267-278 [doi]