Abstract is missing.
- Security Through PublicityEric Osterweil, Daniel Massey, Batsukh Tsendjav, Beichuan Zhang, Lixia Zhang 0001. [doi]
- Towards Attack-Agnostic DefensesDavid Brumley, Dawn Song. [doi]
- Rethinking Hardware Support for Network Analysis and Intrusion PreventionVern Paxson, Krste Asanovic, Sarang Dharmapurikar, John W. Lockwood, Ruoming Pang, Robin Sommer, Nicholas Weaver. [doi]
- Sensor Network Security: More Interesting Than You ThinkMadhukar Anand, Eric Cronin, Micah Sherr, Zachary G. Ives, Insup Lee. [doi]
- Password Rescue: A New Approach to Phishing PreventionDinei Florêncio, Cormac Herley. [doi]
- Shame on Trust in Distributed SystemsTrent Jaeger, Patrick McDaniel, Luke St. Clair, Ramón Cáceres, Reiner Sailer. [doi]
- Secure Software Updates: Disappointments and New ChallengesAnthony Bellissimo, John Burgess, Kevin Fu. [doi]
- Privacy as an Operating System ServiceSotiris Ioannidis, Stelios Sidiroglou, Angelos D. Keromytis. [doi]
- Exposure Maps: Removing Reliance on Attribution During Scan DetectionDavid Whyte, Paul C. van Oorschot, Evangelos Kranakis. [doi]
- Incentive-Centered Design for Information SecurityRick Wash, Jeffrey K. MacKie-Mason. [doi]
- Johnny Can Obfuscate: Beyond Mother's Maiden NameWilliam R. Cheswick. [doi]