Abstract is missing.
- IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic ExecutionTielei Wang, Tao Wei, Zhiqiang Lin, Wei Zou. [doi]
- The Blind Stone Tablet: Outsourcing Durability to Untrusted PartiesPeter Williams, Radu Sion, Dennis Shasha. [doi]
- RB-Seeker: Auto-detection of Redirection BotnetsXin Hu, Matthew Knysz, Kang G. Shin. [doi]
- CSAR: A Practical and Provable Technique to Make Randomized Systems AccountableMichael Backes, Peter Druschel, Andreas Haeberlen, Dominique Unruh. [doi]
- An Efficient Black-box Technique for Defeating Web Application AttacksR. Sekar. [doi]
- Traffic Morphing: An Efficient Defense Against Statistical Traffic AnalysisCharles V. Wright, Scott E. Coull, Fabian Monrose. [doi]
- RAINBOW: A Robust And Invisible Non-Blind Watermark for Network FlowsAmir Houmansadr, Negar Kiyavash, Nikita Borisov. [doi]
- Safe Passage for Passwords and Other Sensitive DataJonathan M. McCune, Adrian Perrig, Michael K. Reiter. [doi]
- Analyzing and Comparing the Protection Quality of Security Enhanced Operating SystemsHong Chen, Ninghui Li, Ziqing Mao. [doi]
- Coordinated Scan DetectionCarrie Gates. [doi]
- Recursive DNS Architectures and Vulnerability ImplicationsDavid Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee, Wenke Lee. [doi]
- K-Tracer: A System for Extracting Kernel Malware BehaviorAndrea Lanzi, Monirul I. Sharif, Wenke Lee. [doi]
- Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting AttacksMatthew Van Gundy, Hao Chen. [doi]
- Conditioned-safe Ceremonies and a User Study of an Application to Web AuthenticationChris Karlof, J. Doug Tygar, David Wagner. [doi]
- Detecting Forged TCP Reset PacketsNicholas Weaver, Robin Sommer, Vern Paxson. [doi]
- Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web TrafficYingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo. [doi]
- Scalable, Behavior-Based Malware ClusteringUlrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, Engin Kirda. [doi]
- SybilInfer: Detecting Sybil Nodes using Social NetworksGeorge Danezis, Prateek Mittal. [doi]
- Two-Party Computation Model for Privacy-Preserving Queries over Distributed DatabasesSherman S. M. Chow, Jie-Han Lee, Lakshminarayanan Subramanian. [doi]
- Document Structure Integrity: A Robust Basis for Cross-site Scripting DefenseYacin Nadji, Prateek Saxena, Dawn Song. [doi]