Abstract is missing.
- A Usability Study and Critique of Two Password ManagersSonia Chiasson, Paul C. van Oorschot, Robert Biddle. [doi]
- Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionHolger Dreger, Anja Feldmann. [doi]
- On the Release of CRLs in Public Key InfrastructureChengyu Ma, Nan Hu, Yingjiu Li. [doi]
- PHAS: A Prefix Hijack Alert SystemMohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang 0001. [doi]
- Behavior-based Spyware DetectionEngin Kirda, Christopher Kruegel. [doi]
- Passive Data Link Layer 802.11 Wireless Device Driver FingerprintingJason Franklin, Damon McCoy. [doi]
- How to Build a Low-Cost, Extended-Range RFID SkimmerIlan Kirschenbaum, Avishai Wool. [doi]
- Lessons from the Sony CD DRM EpisodeJ. Alex Halderman, Edward W. Felten. [doi]
- Evaluating SFI for a CISC ArchitectureStephen McCamant, Greg Morrisett. [doi]
- Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's ClothingLucas Ballard, Fabian Monrose, Daniel P. Lopresti. [doi]
- An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic DataNick L. Petroni Jr., Timothy Fraser, Aaron Walters, William A. Arbaugh. [doi]
- Polymorphic Blending AttacksPrahlad Fogla, Monirul I. Sharif, Roberto Perdisci, Oleg M. Kolesnikov, Wenke Lee. [doi]
- Designing Voting Machines for VerificationNaveen Sastry. [doi]
- vTPM: Virtualizing the Trusted Platform ModuleStefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn. [doi]
- SANE: A Protection Architecture for Enterprise NetworksMartin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown. [doi]
- N-Variant Systems: A Secretless Framework for Security through DiversityBenjamin Cox, David Evans. [doi]
- Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of AttacksWei Xu, Sandeep Bhatkar, R. Sekar. [doi]
- Static Detection of Security Vulnerabilities in Scripting LanguagesYichen Xie, Alex Aiken. [doi]
- Rule-Based Static Analysis of Network Protocol ImplementationsOctavian Udrea, Cristian Lumezanu. [doi]
- Milk or Wine: Does Software Security Improve with Age?Andy Ozment, Stuart E. Schechter. [doi]
- SigFree: A Signature-free Buffer Overflow Attack BlockerXinran Wang, Chi-Chun Pan. [doi]
- Keyboards and Covert ChannelsGaurav Shah, Andrés Molina. [doi]