Abstract is missing.
- Keynote Address: Back to the FutureWilliam Earl Boebert.
- Fighting Computer Virus AttacksPeter Szor. [doi]
- RFID: Security and Privacy for Five-Cent ComputersAri Juels. [doi]
- What Biology Can (and Can t) Teach Us About SecurityDavid Evans. [doi]
- Metrics, Economics, and Shared Risk at the National ScaleDaniel E. Geer Jr.. [doi]
- I Voted? How the Law Increasingly Restricts Independent Security ResearchCindy Cohn. [doi]
- Nuclear Weapons, Permissive Action Links, and the History of Public Key CryptographySteven M. Bellovin. [doi]
- My Dad s Computer, Microsoft, and the Future of Internet SecurityBill Cheswick. [doi]
- Military Strategy in CyberSpaceStuart Staniford. [doi]
- Exploiting SoftwareGary McGraw. [doi]
- A Virtual Honeypot FrameworkNiels Provos. 1-14 [doi]
- Collapsar: A VM-Based Architecture for Network Attack Detention CenterXuxian Jiang, Dongyan Xu. 15-28 [doi]
- Very Fast Containment of Scanning WormsNicholas Weaver, Stuart Staniford, Vern Paxson. 29-44 [doi]
- TIED, LibsafePlus: Tools for Runtime Buffer Overflow ProtectionKumar Avijit, Prateek Gupta, Deepak Gupta. 45-56 [doi]
- Privtrans: Automatically Partitioning Programs for Privilege SeparationDavid Brumley, Dawn Xiaodong Song. 57-72 [doi]
- Avfs: An On-Access Anti-Virus File SystemYevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok. 73-88 [doi]
- Side Effects Are Not Sufficient to Authenticate SoftwareUmesh Shankar, Monica Chew, J. D. Tygar. 89-102 [doi]
- On Gray-Box Program Tracking for Anomaly DetectionDebin Gao, Michael K. Reiter, Dawn Xiaodong Song. 103-118 [doi]
- Finding User/Kernel Pointer Bugs with Type InferenceRobert Johnson, David Wagner. 119-134 [doi]
- Graphical Dictionaries and the Memorable Space of Graphical PasswordsJulie Thorpe, Paul C. van Oorschot. 135-150 [doi]
- On User Choice in Graphical Password SchemesDarren Davis, Fabian Monrose, Michael K. Reiter. 151-164 [doi]
- Design of the EROS Trusted Window SystemJonathan S. Shapiro, John Vanderburgh, Eric Northup, David Chizmadia. 165-178 [doi]
- Copilot - a Coprocessor-based Kernel Runtime Integrity MonitorNick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh. 179-194 [doi]
- Fixing Races for Fun and Profit: How to Use access(2)Drew Dean, Alan J. Hu. 195-206 [doi]
- Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a MinuteDirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart. 207-222 [doi]
- Design and Implementation of a TCG-based Integrity Measurement ArchitectureReiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn. 223-238 [doi]
- Privacy-Preserving Sharing and Correlation of Security AlertsPatrick Lincoln, Phillip A. Porras, Vitaly Shmatikov. 239-254 [doi]
- Static Disassembly of Obfuscated BinariesChristopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna. 255-270 [doi]
- Autograph: Toward Automated, Distributed Worm Signature DetectionHyang-Ah Kim, Brad Karp. 271-286 [doi]
- Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!)Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella. 287-302 [doi]
- Tor: The Second-Generation Onion RouterRoger Dingledine, Nick Mathewson, Paul F. Syverson. 303-320 [doi]
- Understanding Data Lifetime via Whole System Simulation (Awarded Best Paper!)Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum. 321-336 [doi]