Abstract is missing.
- Program Committee [doi]
- Message from the Program Chairs [doi]
- External Reviewers [doi]
- Towards Automatic Generation of Vulnerability-Based SignaturesDavid Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha. 2-16 [doi]
- MisleadingWorm Signature Generators Using Deliberate Noise Injection17-31 [doi]
- Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack ResilienceZhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, Brian Chavez. 32-47 [doi]
- Dataflow Anomaly DetectionSandeep Bhatkar, Abhishek Chaturvedi, R. Sekar. 48-62 [doi]
- A Framework for the Evaluation of Intrusion Detection SystemsAlvaro A. Cárdenas, John S. Baras, Karl Seamon. 63-77 [doi]
- Siren: Catching Evasive Malware (Short Paper)Kevin Borders, Xin Zhao, Atul Prakash. 78-85 [doi]
- Fundamental Limits on the Anonymity Provided by the MIX TechniqueDogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach. 86-99 [doi]
- Locating Hidden ServersLasse Øverlier, Paul F. Syverson. 100-114 [doi]
- Practical Inference Control for Data Cubes (Extended Abstract)Yingjiu Li, Haibing Lu, Robert H. Deng. 115-120 [doi]
- Deterring Voluntary Trace Disclosure in Re-encryption Mix NetworksPhilippe Golle, Xiaofeng Wang, Markus Jakobsson, Alex Tsow. 121-131 [doi]
- New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)John Bethencourt, Dawn Xiaodong Song, Brent Waters. 132-139 [doi]
- A Computationally Sound Mechanized Prover for Security ProtocolsBruno Blanchet. 140-154 [doi]
- A Logic for Constraint-based Security Protocol AnalysisRicardo Corin, Sandro Etalle, Ari Saptawijaya. 155-168 [doi]
- Simulatable Security and Polynomially Bounded Concurrent ComposabilityDennis Hofheinz, Dominique Unruh. 169-183 [doi]
- Privacy and Contextual Integrity: Framework and ApplicationsAdam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum. 184-198 [doi]
- FIREMAN: A Toolkit for FIREwall Modeling and ANalysisLihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra. 199-213 [doi]
- Retrofitting Legacy Code for Authorization Policy EnforcementVinod Ganapathy, Trent Jaeger, Somesh Jha. 214-229 [doi]
- Deriving an Information Flow Checker and Certifying Compiler for JavaGilles Barthe, Tamara Rezk, David A. Naumann. 230-242 [doi]
- Automatically Generating Malicious Disks using Symbolic ExecutionJunfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler. 243-257 [doi]
- Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)Nenad Jovanovic, Christopher Krügel, Engin Kirda. 258-263 [doi]
- Cobra: Fine-grained Malware Analysis using Stealth Localized-executionsAmit Vasudevan, Ramesh Yerraballi. 264-279 [doi]
- Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure ChannelsMario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava. 280-294 [doi]
- Cognitive Authentication Schemes Safe Against Spyware (Short Paper)Daphna Weinshall. 295-300 [doi]
- Cache Cookies for Browser Authentication (Extended Abstract)Ari Juels, Markus Jakobsson, Tom N. Jagatic. 301-305 [doi]
- Secure Device Pairing based on a Visual Channel (Short Paper)Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan. 306-313 [doi]
- SubVirt: Implementing malware with virtual machinesSamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch. 314-327 [doi]
- Practical Attacks on Proximity Identification Systems (Short Paper)Gerhard P. Hancke. 328-333 [doi]
- On the Secrecy of Timing-Based Active Watermarking Trace-Back TechniquesPai Peng, Peng Ning, Douglas S. Reeves. 334-349 [doi]
- A Safety-Oriented Platform for Web ApplicationsRichard S. Cox, Steven D. Gribble, Henry M. Levy, Jacob Gorm Hansen. 350-364 [doi]
- Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract)David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner. 365-370 [doi]
- Analysis of the Linux Random Number GeneratorZvi Gutterman, Benny Pinkas, Tzachy Reinman. 371-385 [doi]
- The Final Nail in WEP s CoffinAndrea Bittau, Mark Handley, Joshua Lackey. 386-400 [doi]