Abstract is missing.
- DIRA: Automatic Detection, Identification and Repair of Control-Hijacking AttacksAlexey Smirnov, Tzi-cker Chiueh. [doi]
- Privacy-Preserving Friends Troubleshooting NetworkQiang Huang, Helen J. Wang, Nikita Borisov. [doi]
- Space-Efficient Block Storage IntegrityAlina Oprea, Michael K. Reiter. [doi]
- DNS-based Detection of Scanning Worms in an Enterprise NetworkDavid Whyte, Evangelos Kranakis, Paul C. van Oorschot. [doi]
- Pretty Secure BGP, psBGPTao Wan, Evangelos Kranakis, Paul C. van Oorschot. [doi]
- One-Way Isolation: An Effective Approach for Realizing Safe Execution EnvironmentsWeiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar. [doi]
- Enriching Intrusion Alerts Through Multi-Host CausalitySamuel T. King, Zhuoqing Morley Mao, Dominic G. Lucchetti, Peter M. Chen. [doi]
- Security Analysis and Improvements for IEEE 802.11iChanghua He, John C. Mitchell. [doi]
- Rekeying and Storage Cost for Multiple User RevocationSandeep S. Kulkarni, Bezawada Bruhadeshwar. [doi]
- MOVE: An End-to-End Solution to Network Denial of ServiceAngelos Stavrou, Angelos D. Keromytis, Jason Nieh, Vishal Misra, Dan Rubenstein. [doi]
- New Streaming Algorithms for Fast Detection of SuperspreadersShobha Venkataraman, Dawn Xiaodong Song, Phillip B. Gibbons, Avrim Blum. [doi]
- The Internet Motion Sensor - A Distributed Blackhole Monitoring SystemMichael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario. [doi]
- Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity SoftwareJames Newsome, Dawn Xiaodong Song. [doi]
- On a New Class of Pulsing Denial-of-Service Attacks and the DefenseXiapu Luo, Rocky K. C. Chang. [doi]
- A Black-Box Tracing Technique to Identify Causes of Least-Privilege IncompatibilitiesShuo Chen, John Dunagan, Chad Verbowski, Yi-Min Wang. [doi]
- Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed StorageGiuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger. [doi]