Abstract is missing.
- Storage-based Intrusion Detection: Watching Storage Activity for Suspicious BehaviorAdam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A. N. Soules, Garth R. Goodson, Gregory R. Ganger. [doi]
- PointGuardâ„¢: Protecting Pointers from Buffer Overflow VulnerabilitiesCrispin Cowan, Steve Beattie, John Johansen, Perry Wagle. [doi]
- Establishing the Genuinity of Remote Computer SystemsRick Kennell, Leah H. Jamieson. [doi]
- Scrash: A System for Generating Secure Crash InformationPeter Broadwell, Matthew Harren, Naveen Sastry. [doi]
- Remote Timing Attacks Are PracticalDavid Brumley, Dan Boneh. [doi]
- Dynamic Detection and Prevention of Race Conditions in File AccessesEugene Tsyrklevich, Bennet Yee. [doi]
- 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical SolutionsJohn Bellardo, Stefan Savage. [doi]
- SSL Splitting: Securely Serving Data from Untrusted CachesChris Lesniewski-Laas, M. Frans Kaashoek. [doi]
- A New Two-Server Approach for Authentication with Short SecretsJohn G. Brainard, Ari Juels, Burt Kaliski, Michael Szydlo. [doi]
- Implementing and Testing a Virus ThrottleJamie Twycross, Matthew M. Williamson. [doi]
- High Coverage Detection of Input-Related Security FaultsEric Larson, Todd M. Austin. [doi]
- Analyzing Integrity Protection in the SELinux Example PolicyTrent Jaeger, Reiner Sailer, Xiaolan Zhang. [doi]
- Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error ExploitsSandeep Bhatkar, Daniel C. DuVarney, R. Sekar. [doi]
- Security Holes . . . Who Cares?Eric Rescorla. [doi]
- Static Analysis of Executables to Detect Malicious PatternsMihai Christodorescu, Somesh Jha. [doi]
- Denial of Service via Algorithmic Complexity AttacksScott A. Crosby, Dan S. Wallach. [doi]
- Plug-and-Play PKI: A PKI Your Mother Can UsePeter Gutmann. [doi]
- Detecting Malicious Java Code Using Virtual Machine AuditingSunil Soman, Chandra Krintz, Giovanni Vigna. [doi]
- Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSECDiana K. Smetters, Glenn Durfee. [doi]
- Preventing Privilege EscalationNiels Provos, Markus Friedl, Peter Honeyman. [doi]
- Improving Host Security with System Call PoliciesNiels Provos. [doi]