2015
- Mohan Dhawan,Rishabh Poddar,Kshiteej Mahajan,Vijay Mann,SPHINX: Detecting Security Attacks in Software-Defined Networks.
- Michael Kranch,Joseph Bonneau,Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning.
- Xi Chen,Asia Slowinska,Dennis Andriesse,Herbert Bos,Cristiano Giuffrida,StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
- Aravind Prakash,Xunchao Hu,Heng Yin,vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
- Byoungyoung Lee,Chengyu Song,Yeongjin Jang,Tielei Wang,Taesoo Kim,Long Lu,Wenke Lee,Preventing Use-after-free with Dangling Pointers Nullification.
- Wilson Lian,Hovav Shacham,Stefan Savage,Too LeJIT to Quit: Extending JIT Spraying to ARM.
- Xueqiang Wang,Kun Sun,Yuewu Wang,Jiwu Jing,DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
- Sharon Goldberg,Moni Naor,Dimitrios Papadopoulos,Leonid Reyzin,Sachin Vasant,Asaf Ziv,NSEC5: Provably Preventing DNSSEC Zone Enumeration.
- Lujo Bauer,Shaoying Cai,Limin Jia,Timothy Passaro,Michael Stroucken,Yuan Tian,Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
- Kangjie Lu,Zhichun Li,Vasileios P. Kemerlis,Zhenyu Wu,Long Lu,Cong Zheng,Zhiyun Qian,Wenke Lee,Guofei Jiang,Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
- Pierre-Antoine Vervier,Olivier Thonnard,Marc Dacier,Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.
- Stephen Crane,Andrei Homescu,Stefan Brunthaler,Per Larsen,Michael Franz,Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
- Phillip A. Porras,Steven Cheung,Martin W. Fong,Keith Skinner,Vinod Yegneswaran,Securing the Software Defined Network Control Layer.
- Khaled Yakdan,Sebastian Eschweiler,Elmar Gerhards-Padilla,Matthew Smith,No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
- Michalis Athanasakis,Elias Athanasopoulos,Michalis Polychronakis,Georgios Portokalidis,Sotiris Ioannidis,The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines.
- Timothy Peters,Mark Gondree,Zachary N. J. Peterson,DEFY: A Deniable, Encrypted File System for Log-Structured Storage.
- Yinzhi Cao,Yanick Fratantonio,Antonio Bianchi,Manuel Egele,Christopher Kruegel,Giovanni Vigna,Yan Chen,EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
- Chao Zhang,Chengyu Song,Kevin Zhijie Chen,Zhaofeng Chen,Dawn Song,VTint: Protecting Virtual Function Tables' Integrity.
- Riad S. Wahby,Srinath T. V. Setty,Zuocheng Ren,Andrew J. Blumberg,Michael Walfish,Efficient RAM and control flow in verifiable outsourced computation.
- Simon Eberz,Kasper Bonne Rasmussen,Vincent Lenders,Ivan Martinovic,Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.
- Igor Bilogrevic,Kévin Huguenin,Stefan Mihaila,Reza Shokri,Jean-Pierre Hubaux,Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.
- Vishwath Mohan,Per Larsen,Stefan Brunthaler,Kevin W. Hamlen,Michael Franz,Opaque Control-Flow Integrity.
- Lianying Zhao,Mohammad Mannan,Gracewipe: Secure and Verifiable Deletion under Coercion.
- Jeremiah Blocki,Saranga Komanduri,Lorrie Faith Cranor,Anupam Datta,Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.
- Lucas Davi,Christopher Liebchen,Ahmad-Reza Sadeghi,Kevin Z. Snow,Fabian Monrose,Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
- Sungmin Hong,Lei Xu,Haopei Wang,Guofei Gu,Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.
- Brendan Juba,Christopher Musco,Fan Long,Stelios Sidiroglou-Douskos,Martin C. Rinard,Principled Sampling for Anomaly Detection.
- Shouling Ji,Weiqing Li,Neil Zhenqiang Gong,Prateek Mittal,Raheem A. Beyah,On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
- Chengyu Song,Chao Zhang,Tielei Wang,Wenke Lee,David Melski,Exploiting and Protecting Dynamic Code Generation.
- Yan Shoshitaishvili,Ruoyu Wang,Christophe Hauser,Christopher Kruegel,Giovanni Vigna,Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
- Mohamed El Massad,Siddharth Garg,Mahesh V. Tripunitara,Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes.
- Karthikeyan Bhargavan,Antoine Delignat-Lavaud,Alfredo Pironti,Verified Contributive Channel Bindings for Compound Authentication.
- Michael I. Gordon,Deokhwan Kim,Jeff H. Perkins,Limei Gilham,Nguyen Nguyen,Martin C. Rinard,Information Flow Analysis of Android Applications in DroidSafe.
- Yonghwi Kwon,Fei Peng,Dohyeong Kim,Kyungtae Kim,Xiangyu Zhang,Dongyan Xu,Vinod Yegneswaran,John Qian,P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
- Soteris Demetriou,Xiao-yong Zhou,Muhammad Naveed,Yeonjoon Lee,Kan Yuan,XiaoFeng Wang,Carl A. Gunter,What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
- Pedro Moreno-Sanchez,Aniket Kate,Matteo Maffei,Kim Pecina,Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces.
- Yves Younan,FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers.
- Xiang Pan,Yinzhi Cao,Yan Chen,I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.
- Daniel Demmler,Thomas Schneider,Michael Zohner,ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
- Pieter Agten,Wouter Joosen,Frank Piessens,Nick Nikiforakis,Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.
- Nitesh Mor,Oriana Riva,Suman Nath,John Kubiatowicz,Bloom Cookies: Web Search Personalization without User Tracking.
- Jin Soo Jang,Sunjune Kong,Minsu Kim,Daegyeong Kim,Brent ByungHoon Kang,SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.
- Payas Gupta,Bharath Srinivasan,Vijay Balasubramaniyan,Mustaque Ahamad,Phoneypot: Data-driven Understanding of Telephony Threats.
- Sangho Lee,Hyungsub Kim,Jong Kim,Identifying Cross-origin Resource Status Using Application Cache.
- Yazan Boshmaf,Dionysios Logothetis,Georgos Siganos,Jorge Lería,José Lorenzo,Matei Ripeanu,Konstantin Beznosov,Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.
- Kimberly Tam,Salahuddin J. Khan,Aristide Fattori,Lorenzo Cavallaro,CopperDroid: Automatic Reconstruction of Android Malware Behaviors.
- Birhanu Eshete,Abeer Alhuzali,Maliheh Monshizadeh,Phillip A. Porras,Venkat N. Venkatakrishnan,Vinod Yegneswaran,EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
- Thomas Vissers,Wouter Joosen,Nick Nikiforakis,Parking Sensors: Analyzing and Detecting Parked Domains.
- Benjamin Güldenring,Volker Roth,Lars Ries,Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords.
- Raphael Bost,Raluca Ada Popa,Stephen Tu,Shafi Goldwasser,Machine Learning Classification over Encrypted Data.
2014
- Chiachih Wu,Yajin Zhou,Kunal Patel,Zhenkai Liang,Xuxian Jiang,AirBag: Boosting Smartphone Resistance to Malware Infection.
- Christian Rossow,Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
- Jonas Zaddach,Luca Bruno,Aurélien Francillon,Davide Balzarotti,AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
- David Sounthiraraj,Justin Sahs,Garret Greenwood,Zhiqiang Lin,Latifur Khan,SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps.
- Sebastian Vogl,Jonas Pfoh,Thomas Kittel,Claudia Eckert,Persistent Data-only Malware: Function Hooks without Code.
- Youngsam Park,Jackie Jones,Damon McCoy,Elaine Shi,Markus Jakobsson,Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
- Christina Garman,Matthew Green,Ian Miers,Decentralized Anonymous Credentials.
- 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014.
- Rafael Veras,Christopher Collins,Julie Thorpe,On Semantic Patterns of Passwords and their Security Impact.
- Travis Mayberry,Erik-Oliver Blass,Agnes Hui Chan,Efficient Private File Retrieval by Combining ORAM and PIR.
- Arik Friedman,Izchak Sharfman,Daniel Keren,Assaf Schuster,Privacy-Preserving Distributed Stream Monitoring.
- Robert Templeman,Mohammed Korayem,David J. Crandall,Apu Kapadia,PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces.
- Yeongjin Jang,Simon P. Chung,Bryan D. Payne,Wenke Lee,Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications.
- David Cash,Joseph Jaeger,Stanislaw Jarecki,Charanjit S. Jutla,Hugo Krawczyk,Marcel-Catalin Rosu,Michael Steiner,Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.
- Chia-Chi Lin,Hongyang Li,Xiao-yong Zhou,XiaoFeng Wang,Screenmilker: How to Milk Your Android Screen for Secrets.
- Zhang Xu,Haining Wang,Zichen Xu,Xiaorui Wang,Power Attack: An Increasing Threat to Data Centers.
- Xavier de Carné de Carnavalet,Mohammad Mannan,From Very Weak to Very Strong: Analyzing Password-Strength Meters.
- Stephen E. McLaughlin,Saman A. Zonouz,Devin J. Pohly,Patrick Drew McDaniel,A Trusted Safety Verifier for Process Controller Code.
- Danny Yuxing Huang,Hitesh Dharmdasani,Sarah Meiklejohn,Vacha Dave,Chris Grier,Damon McCoy,Stefan Savage,Nicholas Weaver,Alex C. Snoeren,Kirill Levchenko,Botcoin: Monetizing Stolen Cycles.
- Rob Jansen,Florian Tschorsch,Aaron Johnson,Björn Scheuermann,The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.
- Alireza Saberi,Yangchun Fu,Zhiqiang Lin,Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.
- Le Guan,Jingqiang Lin,Bo Luo,Jiwu Jing,Copker: Computing with Private Keys without RAM.
- Arnis Parsovs,Practical Issues with TLS Client Certificate Authentication.
- Sanorita Dey,Nirupam Roy,Wenyuan Xu,Romit Roy Choudhury,Srihari Nelakuditi,AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable.
- Qing Zhang,David Y. Wang,Geoffrey M. Voelker,DSpin: Detecting Automatically Spun Content on the Web.
- Sebastian Poeplau,Yanick Fratantonio,Antonio Bianchi,Christopher Kruegel,Giovanni Vigna,Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.
- Luca Invernizzi,Stanislav Miskovic,Ruben Torres,Christopher Kruegel,Sabyasachi Saha,Giovanni Vigna,Sung-Ju Lee,Marco Mellia,Nazca: Detecting Malware Distribution in Large-Scale Networks.
- Antoine Delignat-Lavaud,Martín Abadi,Andrew Birrell,Ilya Mironov,Ted Wobber,Yinglian Xie,Microsoft Research,Web PKI: Closing the Gap between Guidelines and Practices.
- Dongseok Jang,Zachary Tatlock,Sorin Lerner,SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks.
- Matthias Schulz,Adrian Loch,Matthias Hollick,Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
- Daniel Arp,Michael Spreitzenbarth,Malte Hubner,Hugo Gascon,Konrad Rieck,DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.
- Martin Georgiev,Suman Jana,Vitaly Shmatikov,Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.
- Michael Dietz,Dan S. Wallach,Hardening Persona - Improving Federated Web Login.
- Yueqiang Cheng,Zongwei Zhou,Miao Yu,Xuhua Ding,Robert H. Deng,ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks.
- Maliheh Shirvanian,Stanislaw Jarecki,Nitesh Saxena,Naveen Nathan,Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.
- Ajaya Neupane,Nitesh Saxena,Keya Kuruvilla,Michael Georgescu,Rajesh Kana,Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings.
- Lukasz Olejnik,Minh-Dung Tran,Claude Castelluccia,Selling off User Privacy at Auction.
- Mark Dermot Ryan,Enhanced Certificate Transparency and End-to-End Encrypted Mail.
- Arnar Birgisson,Joe Gibbs Politz,Úlfar Erlingsson,Ankur Taly,Michael Vrable,Mark Lentczner,Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud.
- Claudio Marforio,Nikolaos Karapanos,Claudio Soriente,Kari Kostiainen,Srdjan Capkun,Smartphones as Practical and Secure Location Verification Tokens for Payments.
- Mu Zhang,Heng Yin,AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.
- Muhammad Naveed,Xiao-yong Zhou,Soteris Demetriou,XiaoFeng Wang,Carl A. Gunter,Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.
- Kasper Bonne Rasmussen,Marc Roeschlin,Ivan Martinovic,Gene Tsudik,Authentication Using Pulse-Response Biometrics.
- Emil Stefanov,Charalampos Papamanthou,Elaine Shi,Practical Dynamic Searchable Encryption with Small Leakage.
- Siegfried Rasthofer,Steven Arzt,Eric Bodden,A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.
- Antonio Nappa,Zhaoyan Xu,M. Zubair Rafique,Juan Caballero,Guofei Gu,CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
- Giancarlo Pellegrino,Davide Balzarotti,Toward Black-Box Detection of Logic Flaws in Web Applications.
- Myrto Arapinis,Loretta Ilaria Mancini,Eike Ritter,Mark Ryan,Privacy through Pseudonymity in Mobile Telephony Systems.
- Amir Houmansadr,Edmund L. Wong,Vitaly Shmatikov,No Direction Home: The True Cost of Routing Around Decoys.
- Younghwan Go,Eunyoung Jeong,Jongil Won,Yongdae Kim,Denis Foo Kune,KyoungSoo Park,Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission.
- Anupam Das,Joseph Bonneau,Matthew Caesar,Nikita Borisov,XiaoFeng Wang,The Tangled Web of Password Reuse.
- Adam M. Bates,Ryan Leonard,Hannah Pruse,Daniel Lowd,Kevin R. B. Butler,Leveraging USB to Establish Host Identity Using Commodity Devices.
- Fangqi Sun,Liang Xu,Zhendong Su,Detecting Logic Vulnerabilities in E-commerce Applications.
- Jing Zhang,Zakir Durumeric,Michael Bailey,Mingyan Liu,Manish Karir,On the Mismanagement and Maliciousness of Networks.
- Johannes Dahse,Thorsten Holz,Simulation of Built-in PHP Features for Precise Static Code Analysis.
- Bo Chen,Reza Curtmola,Auditable Version Control Systems.
2013
- Gang Wang,Manish Mohanlal,Christo Wilson,Xiao Wang,Miriam J. Metzger,Haitao Zheng,Ben Y. Zhao,Social Turing Tests: Crowdsourcing Sybil Detection.
- David Irakiza,Md E. Karim,Vir V. Phoha,A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality.
- Sooel Son,Kathryn S. McKinley,Vitaly Shmatikov,Fix Me Up: Repairing Access-Control Bugs in Web Applications.
- Charles Lever,Manos Antonakakis,Bradley Reaves,Patrick Traynor,Wenke Lee,The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
- Junjie Zhang,Yinglian Xie,Fang Yu,David Soukal,Wenke Lee,Intention and Origination: An Inside Look at Large-Scale Bot Queries.
- Tibor Jager,Kenneth G. Paterson,Juraj Somorovsky,One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
- Nedim Srndic,Pavel Laskov,Detection of Malicious PDF Files Based on Hierarchical Document Structure.
- Xian Pan,Zhen Ling,Aniket Pingley,Wei Yu,Kui Ren,Nan Zhang,Xinwen Fu,How Privacy Leaks From Bluetooth Mouse?
- Thomas Hutton,General Chair's Message.
- Prateek Mittal,Charalampos Papamanthou,Dawn Xiaodong Song,Preserving Link Privacy in Social Network Based Systems.
- Sooel Son,Vitaly Shmatikov,The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
- Seungwon Shin,Phillip A. Porras,Vinod Yegneswaran,Martin W. Fong,Guofei Gu,Mabry Tyson,FRESCO: Modular Composable Security Services for Software-Defined Networks.
- Chris Wacek,Henry Tan,Kevin S. Bauer,Micah Sherr,An Empirical Evaluation of Relay Selection in Tor.
- Erman Ayday,Jean Louis Raisaro,Jean-Pierre Hubaux,Privacy-Enhancing Technologies for Medical Tests Using Genomic Data.
- Andrew M. White,Srinivas Krishnan,Michael Bailey,Fabian Monrose,Phillip A. Porras,Clear and Present Data: Opaque Traffic and its Security Implications for the Future.
- Luyi Xing,Yangyi Chen,XiaoFeng Wang,Shuo Chen,InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.
- Robert A. Cochran,Michael K. Reiter,Toward Online Verification of Client Behavior in Distributed Applications.
- Michael Backes,Goran Doychev,Boris Köpf,Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
- Qiyan Wang,Zi Lin,Nikita Borisov,Nicholas Hopper,rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.
- Florian Kerschbaum,Thomas Schneider,Axel Schröpfer,Automatic Protocol Selection in Secure Two-Party Computations.
- Ryan Henry,Yizhou Huang,Ian Goldberg,One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries.
- Stephen Smalley,Robert Craig,Security Enhanced (SE) Android: Bringing Flexible MAC to Android.
- Peng Ning,Program Chair's Message.
- Hassan Jameel Asghar,Shujun Li,Ron Steinfeld,Josef Pieprzyk,Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
- Ralf Hund,Carsten Willems,Thorsten Holz,Practical Timing Side Channel Attacks Against Kernel Space ASLR.
- Yajin Zhou,Xuxian Jiang,Detecting Passive Content Leaks and Pollution in Android Applications.
- Jialong Zhang,Guofei Gu,NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.
- Amir Houmansadr,Thomas J. Riedl,Nikita Borisov,Andrew C. Singer,I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
- Mehrdad Aliasgari,Marina Blanton,Yihua Zhang,Aaron Steele,Secure Computation on Floating Point Numbers.
- David Y. Wang,Stefan Savage,Geoffrey M. Voelker,Juice: A Longitudinal Study of an SEO Botnet.
- Jin Han,Qiang Yan,Debin Gao,Jianying Zhou,Robert H. Deng,Comparing Mobile Privacy Protection through Cross-Platform Applications.
- Kyu Hyung Lee,Xiangyu Zhang,Dongyan Xu,High Accuracy Attack Provenance via Binary-based Execution Partition.
- OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance.
- Tobias Lauinger,Martin Szydlowski,Kaan Onarlioglu,Gilbert Wondracek,Engin Kirda,Christopher Krügel,Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting.
- Kevin Zhijie Chen,Noah M. Johnson,Vijay D'Silva,Shuaifu Dai,Kyle MacNamara,Thomas R. Magrino,Edward XueJun Wu,Martin Rinard,Dawn Xiaodong Song,Contextual Policy Enforcement in Android Applications with Permission Event Graphs.
- Aldo Cassola,William K. Robertson,Engin Kirda,Guevara Noubir,A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
- Mu Zhang,Heng Yin,TransBlocker: Transforming and Taming Privacy-Breaching Android Applications.
- Davide Canali,Davide Balzarotti,Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web.
- Rob Jansen,Aaron Johnson,Paul F. Syverson,LIRA: Lightweight Incentivized Routing for Anonymity.
- Jun Ho Huh,Mirko Montanari,Derek Dagit,Rakesh Bobba,Dongwook Kim,Yoonjoo Choi,Roy H. Campbell,Assessing software integrity of virtual appliances through software whitelists.
- Raghav Bhaskar,Saikat Guha,Srivatsan Laxman,Prasad Naldurg,Verito: A Practical System for Transparency and Accountability in Virtual Economies.
- Shobha Venkataraman,David Brumley,Subhabrata Sen,Oliver Spatscheck,Automatically Inferring the Evolution of Malicious Activity on the Internet.
- Guangdong Bai,Jike Lei,Guozhu Meng,Sai Sathyanarayan Venkatraman,Prateek Saxena,Jun Sun,Yang Liu,Jin Song Dong,AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
- Chee Meng Tey,Payas Gupta,Debin Gao,I can be You: Questioning the use of Keystroke Dynamics as Biometrics.
- Emil Stefanov,Elaine Shi,ObliviStore: High Performance Oblivious Distributed Cloud Data Store.
- Moheeb Abu Rajab,Lucas Ballard,Noe Lutz,Panayiotis Mavrommatis,Niels Provos,CAMP: Content-Agnostic Malware Protection.
- Anil Kurmus,Reinhard Tartler,Daniela Dorneanu,Bernhard Heinloth,Valentin Rothberg,Andreas Ruprecht,Wolfgang Schröder-Preikschat,Daniel Lohmann,Rüdiger Kapitza,Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring.
- Vaibhav Garg,L. Jean Camp,Macroeconomic Analysis of Malware.
- Ang Cui,Michael Costello,Salvatore J. Stolfo,When Firmware Modifications Attack: A Case Study of Embedded Exploitation.
- Jing Tian,Chengzhang Qu,Wenyuan Xu,Song Wang,KinWrite: Handwriting-Based Authentication Using Kinect.
- Giuseppe Ateniese,Giuseppe Bianchi,Angelo Capossele,Chiara Petrioli,Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?
- Adam Skillen,Mohammad Mannan,On Implementing Deniable Storage Encryption for Mobile Devices.
- Matthias Wählisch,Fabian Holler,Thomas C. Schmidt,Jochen H. Schiller,Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis.
- Ory Samorodnitzky,Eran Tromer,Avishai Wool,Analyzing Unique-Bid Auction Sites for Fun and Profit.
- Mohammad Ashiqur Rahman,Ehab Al-Shaer,Metrics for Automated Network Security Design.
- Manuel Egele,Gianluca Stringhini,Christopher Krügel,Giovanni Vigna,COMPA: Detecting Compromised Accounts on Social Networks.
- Prateek Mittal,Matthew Wright,Nikita Borisov,Pisces: Anonymous Communication Using Social Networks.
- Davide Zanetti,Srdjan Capkun,Ari Juels,Tailing RFID Tags for Clone Detection.
- Chiachih Wu,Zhi Wang,Xuxian Jiang,Taming Hosted Hypervisors with (Mostly) Deprivileged Execution.
- Robert Templeman,Zahid Rahman,David J. Crandall,Apu Kapadia,PlaceRaider: Virtual Theft in Physical Spaces with Smartphones.
- Lingjun Li,Xinxin Zhao,Guoliang Xue,Unobservable Re-authentication for Smartphones.
2012
- Yanbin Lu,Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud.
- Zhiyun Qian,Zhaoguang Wang,Qiang Xu,Zhuoqing Morley Mao,Ming Zhang,Yi-Min Wang,You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
- Gabi Nakibly,Alex Kirshon,Dima Gonikman,Dan Boneh,Persistent OSPF Attacks.
- Mohammad Saiful Islam,Mehmet Kuzu,Murat Kantarcioglu,Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
- Adam M. Bates,Kevin R. B. Butler,Micah Sherr,Clay Shields,Patrick Traynor,Dan S. Wallach,Accountable Wiretapping -or- I know they can hear you now.
- Nico Golde,Kevin Redon,Ravishankar Borgaonkar,Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications.
- Steve DiBenedetto,Paolo Gasti,Gene Tsudik,Ersin Uzun,ANDaNA: Anonymous Named Data Networking Application.
- Mingwei Zhang,Aravind Prakash,Xiaolei Li,Zhenkai Liang,Heng Yin,Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
- Kenneth G. Paterson,Nadhem J. AlFardan,Plaintext-Recovery Attacks Against Datagram TLS.
- Hongyu Gao,Yan Chen,Kathy Lee,Diana Palsetia,Alok N. Choudhary,Towards Online Spam Filtering in Social Networks.
- Kun Sun,Jiang Wang,Fengwei Zhang,Angelos Stavrou,SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
- Emily Stark,Lin-Shung Huang,Dinesh Israni,Collin Jackson,Dan Boneh,The Case for Prefetching and Prevalidating TLS Server Certificates.
- Yajin Zhou,Zhi Wang,Wu Zhou,Xuxian Jiang,Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
- Claude Castelluccia,Markus Dürmuth,Daniele Perito,Adaptive Password-Strength Meters from Markov Models.
- Donghai Tian,Qiang Zeng,Dinghao Wu,Peng Liu,Changzhen Hu,Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
- Karim Eldefrawy,Gene Tsudik,Aurélien Francillon,Daniele Perito,SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
- Hyojeong Lee,Jeff Seibert,Charles Edwin Killian,Cristina Nita-Rotaru,Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.
- Zhiqiang Lin,Junghwan Rhee,Chao Wu,Xiangyu Zhang,Dongyan Xu,Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
- Srinath T. V. Setty,Richard McPherson,Andrew J. Blumberg,Michael Walfish,Making argument systems for outsourced computation practical (sometimes).
- Chaabane Abdelberi,Gergely Ács,Mohamed Ali Kâafar,You are what you like! Information leakage through users' Interests.
- Hui Xue,Nathan Dautenhahn,Samuel T. King,Using replicated execution for a more secure and reliable web browser.
- Michael Backes,Matteo Maffei,Kim Pecina,Automated Synthesis of Secure Distributed Applications.
- Yangyi Chen,Bo Peng,XiaoFeng Wang,Haixu Tang,Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds.
- Jignesh Patel,Alex X. Liu,Eric Torng,Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems.
- Sebastian Schrittwieser,Peter Frühwirt,Peter Kieseberg,Manuel Leithner,Martin Mulazzani,Markus Huber,Edgar R. Weippl,Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
- Yan Huang,David Evans,Jonathan Katz,Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
- Rob Jansen,Nicholas Hopper,Shadow: Running Tor in a Box for Accurate and Efficient Experimentation.
- Denis Foo Kune,John Kölndorfer,Nicholas Hopper,Yongdae Kim,Location leaks over the GSM air interface.
- David Dewey,Jonathon T. Giffin,Static detection of C++ vtable escape vulnerabilities in binary code.
- Laurent Bindschaedler,Murtuza Jadliwala,Igor Bilogrevic,Imad Aad,Philip Ginzboorg,Valtteri Niemi,Jean-Pierre Hubaux,Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.
- Qiang Yan,Jin Han,Yingjiu Li,Robert H. Deng,On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
- Lucas Davi,Alexandra Dmitrienko,Manuel Egele,Thomas Fischer,Thorsten Holz,Ralf Hund,Stefan Nürnberger,Ahmad-Reza Sadeghi,MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
- Michael C. Grace,Yajin Zhou,Zhi Wang,Xuxian Jiang,Systematic Detection of Capability Leaks in Stock Android Smartphones.
- Jian Jiang,Jinjin Liang,Kang Li,Jun Li,Hai-Xin Duan,Jianping Wu,Ghost Domain Names: Revoked Yet Still Resolvable.
- Prateek Mittal,Matthew Caesar,Nikita Borisov,X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks.
- Kaan Onarlioglu,Utku Ozan Yilmaz,Engin Kirda,Davide Balzarotti,Insights into User Behavior in Dealing with Internet Attacks.
- Ting-Fang Yen,Yinglian Xie,Fang Yu,Roger Peng Yu,Martín Abadi,Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.
- Emil Stefanov,Elaine Shi,Dawn Xiaodong Song,Towards Practical Oblivious RAM.
- Sangho Lee,Jong Kim,WarningBird: Detecting Suspicious URLs in Twitter Stream.
- Zhuhua Cai,Chris Jermaine,The Latent Community Model for Detecting Sybils in Social Networks.
- Xin Zhang,Zongwei Zhou,Hsu-Chun Hsiao,Tiffany Hyun-Jin Kim,Adrian Perrig,Patrick Tague,ShortMAC: Efficient Data-Plane Fault Localization.
- Yinzhi Cao,Vinod Yegneswaran,Phillip A. Porras,Yan Chen,PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
- Kangkook Jee,Georgios Portokalidis,Vasileios P. Kemerlis,Soumyadeep Ghosh,David I. August,Angelos D. Keromytis,A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
- Sven Bugiel,Lucas Davi,Alexandra Dmitrienko,Thomas Fischer,Ahmad-Reza Sadeghi,Bhargava Shastry,Towards Taming Privilege-Escalation Attacks on Android.
- Man Ho Au,Apu Kapadia,Willy Susilo,BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
- Lei Liu,Xinwen Zhang,Guanhua Yan,Songqing Chen,Chrome Extensions: Threat Analysis and Countermeasures.
2011
- Leyla Bilge,Engin Kirda,Christopher Kruegel,Marco Balduzzi,EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
- Scott E. Coull,Fabian Monrose,Michael Bailey,On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
- Abhinav Srivastava,Jonathon T. Giffin,Efficient Monitoring of Untrusted Kernel-Mode Execution.
- Michael Backes,Matteo Maffei,Kim Pecina,A Security API for Distributed Social Networks.
- JongHyup Lee,Thanassis Avgerinos,David Brumley,TIE: Principled Reverse Engineering of Types in Binary Programs.
- Zhichun Li,Yi Tang,Yinzhi Cao,Vaibhav Rastogi,Yan Chen,Bin Liu,Clint Sbisa,WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
- Arvind Narayanan,Narendran Thiagarajan,Mugdha Lakhani,Michael Hamburg,Dan Boneh,Location Privacy via Private Proximity Testing.
- Roman Schlegel,Kehuan Zhang,Xiao-yong Zhou,Mehool Intwala,Apu Kapadia,XiaoFeng Wang,Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
- Eric Chan-Tin,Nicholas Hopper,Accurate and Provably Secure Latency Estimation with Treeple.
- Max Schuchard,Abedelaziz Mohaisen,Denis Foo Kune,Nicholas Hopper,Yongdae Kim,Eugene Y. Vasserman,Losing Control of the Internet: Using the Data Plane to Attack the Control Plane.
- Omid Fatemieh,Ali Farhadi,Ranveer Chandra,Carl A. Gunter,Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.
- Xi Xiong,Donghai Tian,Peng Liu,Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
- Asia Slowinska,Traian Stancescu,Herbert Bos,Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
- Manuel Egele,Christopher Kruegel,Engin Kirda,Giovanni Vigna,PiOS: Detecting Privacy Leaks in iOS Applications.
- Amir Houmansadr,Nikita Borisov,SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
- Xiapu Luo,Peng Zhou,Edmond W. W. Chan,Wenke Lee,Rocky K. C. Chang,Roberto Perdisci,HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
- David Dewey,Patrick Traynor,No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects.
- Elaine Shi,T.-H. Hubert Chan,Eleanor G. Rieffel,Richard Chow,Dawn Song,Privacy-Preserving Aggregation of Time-Series Data.
- Erik-Oliver Blass,Kaoutar Elkhiyaoui,Refik Molva,Tracker: Security and Privacy for RFID-based Supply Chains.
- Zhiqiang Lin,Junghwan Rhee,Xiangyu Zhang,Dongyan Xu,Xuxian Jiang,SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
- Alana Libonati,Jonathan M. McCune,Michael K. Reiter,Usability Testing a Malware-Resistant Input Mechanism.
- Aurélien Francillon,Boris Danev,Srdjan Capkun,Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.
- Liang Cai,Kai Zeng,Hao Chen,Prasant Mohapatra,Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
- Marco Balduzzi,Carmen Torrano Gimenez,Davide Balzarotti,Engin Kirda,Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.
- Thanassis Avgerinos,Sang Kil Cha,Brent Lim Tze Hao,David Brumley,AEG: Automatic Exploit Generation.
- Tobias Distler,Ivan Popov,Wolfgang Schröder-Preikschat,Hans P. Reiser,Rüdiger Kapitza,SPARE: Replicas on Hold.
- Yan Huang,Lior Malka,David Evans,Jonathan Katz,Efficient Privacy-Preserving Biometric Identification.
- Min Gyung Kang,Stephen McCamant,Pongsin Poosankam,Dawn Song,DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.
2010
- Colin Whittaker,Brian Ryner,Marria Nazif,Large-Scale Automatic Classification of Phishing Pages.
- Sushant Sinha,Michael Bailey,Farnam Jahanian,Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.
- Jason Bau,John C. Mitchell,A Security Evaluation of DNSSEC with NSEC3.
- Micah Sherr,Andrew Mao,William R. Marczak,Wenchao Zhou,Boon Thau Loo,Matt Blaze,A3: An Extensible Platform for Application-Aware Anonymity.
- Prateek Saxena,Steve Hanna,Pongsin Poosankam,Dawn Song,FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
- Jiwon Seo,Monica S. Lam,InvisiType: Object-Oriented Security Policies.
- Amir Herzberg,Haya Shulman,Stealth DoS Attacks on Secure Channels.
- Andreas Pitsillidis,Kirill Levchenko,Christian Kreibich,Chris Kanich,Geoffrey M. Voelker,Vern Paxson,Nicholas Weaver,Stefan Savage,Botnet Judo: Fighting Spam with Itself.
- Thomas Ristenpart,Scott Yilek,When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
- Vincent Toubiana,Arvind Narayanan,Dan Boneh,Helen Nissenbaum,Solon Barocas,Adnostic: Privacy Preserving Targeted Advertising.
- Yudong Gao,Ni Pan,Xu Chen,Zhuoqing Morley Mao,On the Safety of Enterprise Policy Deployment.
- William K. Robertson,Federico Maggi,Christopher Kruegel,Giovanni Vigna,Effective Anomaly Detection with Scarce Training Data.
- Edward J. Schwartz,David Brumley,Jonathan M. McCune,Contractual Anonymity.
- Zhiqiang Lin,Xiangyu Zhang,Dongyan Xu,Automatic Reverse Engineering of Data Structures from Binary Execution.
- Matthew Finifter,Joel Weinberger,Adam Barth,Preventing Capability Leaks in Secure JavaScript Subsets.
- Iasonas Polakis,Thanasis Petsas,Evangelos P. Markatos,Spyros Antonatos,A Systematic Characterization of IM Threats using Honeypots.
- Suresh Chari,Shai Halevi,Wietse Venema,Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation.
- Darrell Bethea,Robert A. Cochran,Michael K. Reiter,Server-side Verification of Client Behavior in Online Games.
- Scott Wolchok,Owen S. Hofmann,Nadia Heninger,Edward W. Felten,J. Alex Halderman,Christopher J. Rossbach,Brent Waters,Emmett Witchel,Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
- Davide Balzarotti,Marco Cova,Christoph Karlberger,Engin Kirda,Christopher Kruegel,Giovanni Vigna,Efficient Detection of Split Personalities in Malware.
- Adam Barth,Adrienne Porter Felt,Prateek Saxena,Aaron Boodman,Protecting Browsers from Extension Vulnerabilities.
- Adrian Mettler,David Wagner,Tyler Close,Joe-E: A Security-Oriented Subset of Java.
- Zhiyun Qian,Zhuoqing Morley Mao,Yinglian Xie,Fang Yu,On Network-level Clusters for Spam Detection.
- Juan Caballero,Noah M. Johnson,Stephen McCamant,Dawn Song,Binary Code Extraction and Interface Identification for Security Applications.
2009
- Carrie Gates,Coordinated Scan Detection.
- Hong Chen,Ninghui Li,Ziqing Mao,Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.
- Chris Karlof,J. Doug Tygar,David Wagner,Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication.
- George Danezis,Prateek Mittal,SybilInfer: Detecting Sybil Nodes using Social Networks.
- David Dagon,Manos Antonakakis,Kevin Day,Xiapu Luo,Christopher P. Lee,Wenke Lee,Recursive DNS Architectures and Vulnerability Implications.
- Andrea Lanzi,Monirul I. Sharif,Wenke Lee,K-Tracer: A System for Extracting Kernel Malware Behavior.
- Amir Houmansadr,Negar Kiyavash,Nikita Borisov,RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows.
- R. Sekar,An Efficient Black-box Technique for Defeating Web Application Attacks.
- Nicholas Weaver,Robin Sommer,Vern Paxson,Detecting Forged TCP Reset Packets.
- Ulrich Bayer,Paolo Milani Comparetti,Clemens Hlauschek,Christopher Krügel,Engin Kirda,Scalable, Behavior-Based Malware Clustering.
- Jonathan M. McCune,Adrian Perrig,Michael K. Reiter,Safe Passage for Passwords and Other Sensitive Data.
- Charles V. Wright,Scott E. Coull,Fabian Monrose,Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis.
- Matthew Van Gundy,Hao Chen,Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks.
- Peter Williams,Radu Sion,Dennis Shasha,The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties.
- Michael Backes,Peter Druschel,Andreas Haeberlen,Dominique Unruh,CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable.
- Yingbo Song,Angelos D. Keromytis,Salvatore J. Stolfo,Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic.
- Xin Hu,Matthew Knysz,Kang G. Shin,RB-Seeker: Auto-detection of Redirection Botnets.
- Tielei Wang,Tao Wei,Zhiqiang Lin,Wei Zou,IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
- Yacin Nadji,Prateek Saxena,Dawn Song,Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense.
- Sherman S. M. Chow,Jie-Han Lee,Lakshminarayanan Subramanian,Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.
2008
- Radmilo Racic,Denys Ma,Hao Chen,Xin Liu,Exploiting Opportunistic Scheduling in Cellular Data Networks.
- Juan Caballero,Theocharis Kampouris,Dawn Song,Jia Wang,Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?
- XiaoFeng Wang,Zhuowei Li,Ninghui Li,Jong Youl Choi,PRECIP: Towards Practical and Retrofittable Confidential Information Protection.
- Patrice Godefroid,Michael Y. Levin,David A. Molnar,Automated Whitebox Fuzz Testing.
- Zhiqiang Lin,Xuxian Jiang,Dongyan Xu,Xiangyu Zhang,Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
- Bruno F. Ribeiro,Weifeng Chen,Gerome Miklau,Donald F. Towsley,Analyzing Privacy in Enterprise Packet Trace Anonymization.
- Guofei Gu,Junjie Zhang,Wenke Lee,BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
- Robin Snader,Nikita Borisov,A Tune-up for Tor: Improving Security and Performance in the Tor Network.
- David Dagon,Niels Provos,Christopher P. Lee,Wenke Lee,Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority.
- John Bethencourt,Dawn Song,Brent Waters,Analysis-Resistant Malware.
- Scott E. Coull,Charles V. Wright,Angelos D. Keromytis,Fabian Monrose,Michael K. Reiter,Taming the Devil: Techniques for Evaluating Anonymized Network Data.
- Patrick Traynor,Kevin R. B. Butler,William Enck,Patrick McDaniel,Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
- Sherman S. M. Chow,Joseph K. Liu,Duncan S. Wong,Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
- Peter Williams,Radu Sion,Usable PIR.
- Thorsten Holz,Christian Gorecki,Konrad Rieck,Felix C. Freiling,Measuring and Detecting Fast-Flux Service Networks.
- Shobha Venkataraman,Avrim Blum,Dawn Song,Limits of Learning-based Signature Generation with Adversaries.
- Apu Kapadia,Nikos Triandopoulos,Halo: High-Assurance Locate for Distributed Hash Tables.
- Gilbert Wondracek,Paolo Milani Comparetti,Christopher Krügel,Engin Kirda,Automatic Network Protocol Analysis.
- Ji Sun Shin,Virgil D. Gligor,A New Privacy-Enhanced Matchmaking Protocol.
- Monirul I. Sharif,Andrea Lanzi,Jonathon T. Giffin,Wenke Lee,Impeding Malware Analysis Using Conditional Code Obfuscation.
- Heng Yin,Zhenkai Liang,Dawn Song,HookFinder: Identifying and Understanding Malware Hooking Behaviors.
2007
- Ryan Vogt,John Aycock,Michael J. Jacobson Jr.,Army of Botnets.
- Philipp Vogt,Florian Nentwich,Nenad Jovanovic,Engin Kirda,Christopher Krügel,Giovanni Vigna,Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.
- Sushant Sinha,Michael Bailey,Farnam Jahanian,Shedding Light on the Configuration of Dark Addresses.
- Radia J. Perlman,File System Design with Assured Delete.
- Nikita Borisov,David Brumley,Helen J. Wang,John Dunagan,Pallavi Joshi,Chuanxiong Guo,Generic Application-Level Protocol Analyzer and its Language.
- John Bethencourt,Dan Boneh,Brent Waters,Cryptographic Methods for Storing Ballots on a Voting Machine.
- Yuan Niu,Hao Chen,Francis Hsu,Yi-Min Wang,Ming Ma,A Quantitative Study of Forum Spamming Using Context-based Analysis.
- Subrata Acharya,Bryan N. Mills,Mehmud Abliz,Taieb Znati,Jia Wang,Zihui Ge,Albert G. Greenberg,OPTWALL: A Hierarchical Traffic-Aware Firewall.
- Lorrie Faith Cranor,Serge Egelman,Jason I. Hong,Yue Zhang,Phinding Phish: An Evaluation of Anti-Phishing Toolbars.
- Radu Sion,Bogdan Carbunar,On the Practicality of Private Information Retrieval.
- Kevin D. Bowers,Lujo Bauer,Deepak Garg,Frank Pfenning,Michael K. Reiter,Consumable Credentials in Linear-Logic-Based Access-Control Systems.
- Scott E. Coull,Charles V. Wright,Fabian Monrose,Michael P. Collins,Michael K. Reiter,Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces.
- Giuseppe Ateniese,Jonathan Kirsch,Marina Blanton,Secret Handshakes with Dynamic and Fuzzy Matching.
- Apu Kapadia,Patrick P. Tsang,Sean W. Smith,Attribute-Based Publishing with Hidden Credentials and Hidden Policies.
- Shobha Venkataraman,Juan Caballero,Pongsin Poosankam,Min Gyung Kang,Dawn Xiaodong Song,Fig: Automatic Fingerprint Generation.
- David Brumley,Dawn Xiaodong Song,Tzi-cker Chiueh,Rob Johnson,Huijia Lin,RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
- Ying Zhang,Zhuoqing Morley Mao,Jia Wang,Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing.
2006
- Alexander Moshchuk,Tanya Bragin,Steven D. Gribble,Henry M. Levy,A Crawler-based Study of Spyware in the Web.
- Ryan M. Gerdes,Thomas E. Daniels,Mani Mina,Steve Russell,Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach.
- Tyson Condie,Varun Kacholia,Sriram Sank,Joseph M. Hellerstein,Petros Maniatis,Induced Churn as Shelter from Routing-Table Poisoning.
- Yi-Min Wang,Doug Beck,Xuxian Jiang,Roussi Roussev,Chad Verbowski,Shuo Chen,Samuel T. King,Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
- Stuart E. Schechter,Jaeyeon Jung,Will Stockwell,Cynthia D. McLain,Inoculating SSH Against Address Harvesting.
- Umesh Shankar,Trent Jaeger,Reiner Sailer,Toward Automated Information-Flow Integrity Verification for Security-Critical Applications.
- David Dagon,Cliff Changchun Zou,Wenke Lee,Modeling Botnet Propagation Using Time Zones.
- William K. Robertson,Giovanni Vigna,Christopher Krügel,Richard A. Kemmerer,Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
- Keith B. Frikken,Jiangtao Li,Mikhail J. Atallah,Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.
- Stephan Neuhaus,Andreas Zeller,Isolating Intrusions by Automatic Experiments.
- Kevin Fu,Seny Kamara,Yoshi Kohno,Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
- James Newsome,David Brumley,Dawn Xiaodong Song,Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
- Weidong Cui,Vern Paxson,Nicholas Weaver,Randy H. Katz,Protocol-Independent Adaptive Replay of Application Dialog.
- Doug Szajda,Michael Pohl,Jason Owen,Barry G. Lawson,Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm.
- Steven M. Bellovin,Eric Rescorla,Deploying a New Hash Algorithm.
- Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA.
- Michael E. Locasto,Stelios Sidiroglou,Angelos D. Keromytis,Software Self-Healing Using Collaborative Application Communities.
- Patrick Drew McDaniel,Subhabrata Sen,Oliver Spatscheck,Jacobus E. van der Merwe,William Aiello,Charles R. Kalmanek,Enterprise Security: A Community of Interest Based Approach.
2005
- Shuo Chen,John Dunagan,Chad Verbowski,Yi-Min Wang,A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities.
- Sandeep S. Kulkarni,Bezawada Bruhadeshwar,Rekeying and Storage Cost for Multiple User Revocation.
- Michael Bailey,Evan Cooke,Farnam Jahanian,Jose Nazario,The Internet Motion Sensor - A Distributed Blackhole Monitoring System.
- Alina Oprea,Michael K. Reiter,Space-Efficient Block Storage Integrity.
- James Newsome,Dawn Xiaodong Song,Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
- David Whyte,Evangelos Kranakis,Paul C. van Oorschot,DNS-based Detection of Scanning Worms in an Enterprise Network.
- Qiang Huang,Helen J. Wang,Nikita Borisov,Privacy-Preserving Friends Troubleshooting Network.
- Changhua He,John C. Mitchell,Security Analysis and Improvements for IEEE 802.11i.
- Samuel T. King,Zhuoqing Morley Mao,Dominic G. Lucchetti,Peter M. Chen,Enriching Intrusion Alerts Through Multi-Host Causality.
- Angelos Stavrou,Angelos D. Keromytis,Jason Nieh,Vishal Misra,Dan Rubenstein,MOVE: An End-to-End Solution to Network Denial of Service.
- Giuseppe Ateniese,Kevin Fu,Matthew Green,Susan Hohenberger,Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
- Tao Wan,Evangelos Kranakis,Paul C. van Oorschot,Pretty Secure BGP, psBGP.
- Weiqing Sun,Zhenkai Liang,V. N. Venkatakrishnan,R. Sekar,One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments.
- Shobha Venkataraman,Dawn Xiaodong Song,Phillip B. Gibbons,Avrim Blum,New Streaming Algorithms for Fast Detection of Superspreaders.
- Xiapu Luo,Rocky K. C. Chang,On a New Class of Pulsing Denial-of-Service Attacks and the Defense.
- Alexey Smirnov,Tzi-cker Chiueh,DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks.
2004
- Lingxuan Hu,David Evans,Using Directional Antennas to Prevent Wormhole Attacks.
- Jiang Wu,Sarma Vangala,Lixin Gao,Kevin A. Kwiat,An Effective Architecture and Algorithm for Detecting Worms with Various Scan.
- Jonathon T. Giffin,Somesh Jha,Barton P. Miller,Efficient Context-Sensitive Intrusion Detection.
- Einar Mykletun,Maithili Narasimha,Gene Tsudik,Authentication and Integrity in Outsourced Databases.
- Chris Karlof,Naveen Sastry,Yaping Li,Adrian Perrig,J. D. Tygar,Distillation Codes and Applications to DoS Resistant Multicast Authentication.
- Peng Ning,Dingbang Xu,Christopher G. Healey,Robert St. Amant,Building Attack Scenarios through Integration of Complementary Alert Correlation Method.
- Olatunji Ruwase,Monica S. Lam,A Practical Dynamic Buffer Overflow Detector.
- Carl A. Gunter,Sanjeev Khanna,Kaijun Tan,Santosh S. Venkatesh,DoS Protection for Reliably Authenticated Broadcast.
- Brent R. Waters,Dirk Balfanz,Glenn Durfee,Diana K. Smetters,Building an Encrypted and Searchable Audit Log.
- Nagendra Modadugu,Eric Rescorla,The Design and Implementation of Datagram TLS.
- Tal Garfinkel,Ben Pfaff,Mendel Rosenblum,Ostia: A Delegating Architecture for Secure System Call Interposition.
- Hao Chen,Drew Dean,David Wagner,Model Checking One Million Lines of C Code.
- Neil Chou,Robert Ledesma,Yuka Teraguchi,John C. Mitchell,Client-Side Defense Against Web-Based Identity Theft.
- Vipul Gupta,Douglas Stebila,Stephen Fung,Sheueling Chang Shantz,Nils Gura,Hans Eberle,Speeding up Secure Web Transactions Using Elliptic Curve Cryptography.
- Tom Yu,Sam Hartman,Kenneth Raeburn,The Perils of Unauthenticated Encryption: Kerberos Version 4.
- Vinod Yegneswaran,Paul Barford,Somesh Jha,Global Intrusion Detection in the DOMINO Overlay System.
2003
- Ahsan Habib,Mohamed Hefeeda,Bharat K. Bhargava,Detecting Service Violations and DoS Attacks.
- Alain Pannetrat,Refik Molva,Efficient Multicast Packet Authentication.
- Brennen Reynolds,Dipak Ghosal,Secure IP Telephony using Multi-layered Protection.
- Martín Abadi,Cédric Fournet,Access Control Based on Execution History.
- Tal Garfinkel,Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools.
- Geoffrey Goodell,William Aiello,Timothy Griffin,John Ioannidis,Patrick Drew McDaniel,Aviel D. Rubin,Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing.
- Anca-Andreea Ivan,Yevgeniy Dodis,Proxy Cryptography Revisited.
- Martín Abadi,Michael Burrows,Ted Wobber,Moderately Hard, Memory-Bound Functions.
- John Ioannidis,Fighting Spam by Encapsulating Policy in Email Addresses.
- Pekka Nikander,Jukka Ylitalo,Jorma Wall,Integrating Security, Mobility and Multi-Homing in a HIP Way.
- Eric Haugh,Matt Bishop,Testing C Programs for Buffer Overflow Vulnerabilities.
- Tal Garfinkel,Mendel Rosenblum,A Virtual Machine Introspection Based Architecture for Intrusion Detection.
- Antonio Nicolosi,Maxwell N. Krohn,Yevgeniy Dodis,David Mazières,Proactive Two-Party Signatures for User Authentication.
- Eu-Jin Goh,Hovav Shacham,Nagendra Modadugu,Dan Boneh,SiRiUS: Securing Remote Untrusted Storage.
- John Wilander,Mariam Kamkar,A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention.
- Yih-Chun Hu,Adrian Perrig,David B. Johnson,Efficient Security Mechanisms for Routing Protocolsa.
- Donggang Liu,Peng Ning,Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks.
2002
- Xuhua Ding,Daniele Mazzocchi,Gene Tsudik,Experimenting with Server-Aided Signatures.
- Peter Hesse,David Lemire,Managing Interoperability in Non-Hierarchical Public Key Infrastructures.
- Nikita Borisov,Eric A. Brewer,Active Certificates: A Framework for Delegation.
- Niels Provos,Peter Honeyman,Detecting Steganographic Content on the Internet.
- Dirk Balfanz,Diana K. Smetters,Paul Stewart,H. Chi Wong,Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
- Zoltán Nochta,Peter Ebinger,Sebastian Abeck,PAMINA: A Certificate Based Privilege Management System.
- Matthew Wright,Micah Adler,Brian Neil Levine,Clay Shields,An Analysis of the Degradation of Anonymous Protocols.
- John Ioannidis,Steven M. Bellovin,Implementing Pushback: Router-Based Defense Against DDoS Attacks.
- Hovav Shacham,Dan Boneh,Fast-Track Session Establishment for TLS.
- Christopher Krügel,Thomas Toth,Distributed Pattern Detection for Intrusion Detection.
- Adam Stubblefield,John Ioannidis,Aviel D. Rubin,Using the Fluhrer, Mantin, and Shamir Attack to Break WEP.
- Suresh Chari,Pau-Chen Cheng,BlueBox: A Policy-Driven, Host-Based Intrusion Detection System.
- Gabriel Montenegro,Claude Castelluccia,Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses.
- Cristian Coarfa,Peter Druschel,Dan S. Wallach,Performance Analysis of TLS Web Servers.
- Adam Hess,Jared Jacobson,Hyrum Mills,Ryan Wamsley,Kent E. Seamons,Bryan Smith,Advanced Client/Server Authentication in TLS.
2001
- Giuseppe Ateniese,Breno de Medeiros,Michael T. Goodrich,TRICERT: A Distributed Certified E-Mail Scheme.
- Carlos Ribeiro,Andre Zuquete,Paulo Ferreira,Paulo Guedes,SPL: An Access Control Language for Security Policies and Complex Constraints.
- Taekyoung Kwon,Authentication and Key Agreement Via Memorable Passwords.
- Yassir Elley,Anne H. Anderson,Steve Hanna,Sean Mullan,Radia J. Perlman,Seth Proctor,Building Certifications Paths: Forward vs. Reverse.
- Matt Blaze,John Ioannidis,Angelos D. Keromytis,Trust Management for IPsec.
- Alfred Menezes,Wireless Security - Is It Real?
- Philippe Golle,Nagendra Modadugu,Authenticating Streamed Data in the Presence of Random Packet Loss.
- Hugh Harney,Andrea Colgrove,Patrick Drew McDaniel,Principles of Policy in Secure Groups.
- Adrian Perrig,Ran Canetti,Dawn Xiaodong Song,J. D. Tygar,Efficient and Secure Source Authentication for Multicast.
- Gregory T. Byrd,Nathan Hillery,Jim Symon,Practical Experiences with ATM Encryption.
- Jonathan T. Trostle,Irina Kosinovsky,Michael M. Swift,Implementation of Crossrealm Referral Handling in the MIT Kerberos Client.
- Algis Rudys,John Clements,Dan S. Wallach,Termination in Language-based Systems.
- Tom Berson,Drew Dean,Matthew K. Franklin,Diana K. Smetters,Mike Spreitzer,Cryptology As a Network Service.
- Drew Dean,Matthew K. Franklin,Adam Stubblefield,An Algebraic Approach to IP Traceback.
- Steven M. Bellovin,Security Risks Of Peer-To-Peer Networking.
- Pasi Eronen,Pekka Nikander,Decentralized Jini Security.
- Kent E. Seamons,Marianne Winslett,Ting Yu,Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
- Tim Gibson,An Architecture for Flexible, High Assurance, Multi-Security Domain Networks.
2000
- Hugo Krawczyk,Tal Rabin,Chameleon Signatures.
- Adrian Perrig,Dawn Xiaodong Song,A First Step Towards the Automatic Generation of Security Protocols.
- Yki Kortesniemi,Tero Hasu,Jonna Särs,A Revocation, Validation and Authentication Protocol for SPKI Based Delegation Systems.
- Vitaly Shmatikov,John C. Mitchell,Analysis of a Fair Exchange Protocol.
- Joseph P. Loyall,Partha Pratim Pal,Richard E. Schantz,Franklin Webber,Building Adaptive and Agile Applications Using Intrusion Detection and Response.
- Ohad Rodeh,Kenneth P. Birman,Danny Dolev,Optimized Rekey for Group Communication Systems.
- Deborah Shands,Richard Yee,Jay Jacobs,E. John Sebes,Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies.
- Magnus Almgren,Hervé Debar,Marc Dacier,A Lightweight Tool for Detecting Web Server Attacks.
- Kirsten Hildrum,Security of Encrypted rlogin Connections Created With Kerberos IV.
- Peter Buhler,Thomas Eirich,Michael Waidner,Michael Steiner,Secure Password-Based Cipher Suite for TLS.
- K. Jain,R. Sekar,User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement.
- Stephen T. Kent,Charles Lynn,Joanne Mikkelson,Karen Seo,Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues.
- Marty Humphrey,Frederick Knabe,Adam Ferrari,Andrew S. Grimshaw,Accountability and Control of Process Creation in Metasystems.
- Ran Canetti,Pau-Chen Cheng,Frederique Giraud,Dimitrios E. Pendarakis,Josyula R. Rao,Pankaj Rohatgi,Debanjan Saha,An IPSec-based Host Architecture for Secure Internet Multicast.
- David Wagner,Jeffrey S. Foster,Eric A. Brewer,Alexander Aiken,A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
1999
- Fabian Monrose,Peter Wyckoff,Aviel D. Rubin,Distributed Execution with Remote Audit.
- Sabrina De Capitani di Vimercati,Patrick Lincoln,Livio Ricciulli,Pierangela Samarati,PGRIP: PNNI Global Routing Infrastructure Protection.
- Mike Just,Paul C. van Oorschot,Addressing the Problem of Undetected Signature Key Compromise.
- Audun Jøsang,An Algebra for Assessing Trust in Certification Chains.
- Pekka Nikander,Jonna Partanen,Distributed Policy Management for JDK 1.2.
- Radia J. Perlman,Charlie Kaufman,Secure Password-Based Protocol for Downloading a Private Key.
- Andreu Riera,Joan Borrell,Practical Approach to Anonymity in Large Scale Electronic Voting Schemes.
- Ari Juels,John G. Brainard,Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
- Thomas D. Wu,A Real-World Analysis of Kerberos Password Security.
- Christian Gilmore,David P. Kormann,Aviel D. Rubin,Secure Remote Access to an Internal Web Server.
- Michael Malkin,Thomas D. Wu,Dan Boneh,Experimenting with Shared Generation of RSA Keys.
1998
- Kan Zhang,Efficient Protocols for Signing Routing Messages.
- Muriel Médard,Douglas Marquis,Stephen R. Chinn,Attack Detection Methods for All-Optical Networks.
- David W. Chadwick,Andrew J. Young,Enabling the Internet White Pages Service - the Directory Guardian.
- Thomas D. Wu,The Secure Remote Password Protocol.
- Dan M. Nessett,Polar Humenn,The Multilayer Firewall.
- Ruth Bergman,Muriel Médard,Serena Chan,Distributed Algorithms for Attack Localization in All-Optical Networks.
- Howard M. Gittleson,Lucent's Entry Into Network Security.
- Uwe G. Wilhelm,Sebastian Staamann,Levente Buttyán,On the Problem of Trust in Mobile Agent Systems.
- William A. Arbaugh,Angelos D. Keromytis,David J. Farber,Jonathan M. Smith,Automated Recovery in a Secure Bootstrap Process.
- Detlef Hühnlein,Credential Management and Secure Single Login for SPKM.
- Phillip A. Porras,Alfonso Valdes,Live Traffic Analysis of TCP/IP Gateways.
- Li Gong,Roland Schemers,Implementing Protection Domains in the JavaTM Development Kit 1.2.
- Mike Just,Some Timestamping Protocol Failures.
1997
- Nick Ogurtsov,Hilarie K. Orman,Richard Schroeppel,Sean W. O'Malley,Oliver Spatscheck,Experimental Results of Covert Channel Limitation in One-Way Communication Systems.
- Karen E. Sirois,Stephen T. Kent,Securing the Nimrod Routing Architecture.
- David M. Martin Jr.,Sivaramakrishnan Rajagopalan,Aviel D. Rubin,Blocking Java Applets at the Firewall.
- Bradley R. Smith,Shree Murthy,J. J. Garcia-Luna-Aceves,Securing Distance-Vector Routing Protocols.
- Steven M. Bellovin,Probable Plaintext Cryptanalysis of the IP Security Protocols.
- Brian C. Schimpf,Securing Web Access with DCE.
- Andrew J. Young,Nada Kapidzic Cicovic,David W. Chadwick,Trust Models in ICE-TEL.
- Abdelaziz Mounji,Baudouin Le Charlier,Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration Analysis.
- Marvin A. Sirbu,John C.-I. Chuang,Distributed Authentication in Kerberos Using Public Key Cryptography.
- Lourdes López Santidrián,Justo Carracedo Gallardo,Hierarchical Organization of Certification Authorities for Secure Environments.
- Bryn Dole,Steven W. Lodin,Eugene H. Spafford,Misplaced Trust: Kerberos 4 Session Keys.
- Ralf C. Hauser,Tony Przygienda,Gene Tsudik,Reducing the Cost of Security in Link-State Routing.
- Stephen H. Brackin,An Interface Specification Language for Automatically Analyzing Cryptographic Protocols.
1996
- David A. Wagner,Steven M. Bellovin,A "bump in the stack" encryptor for MS-DOS systems.
- Sandra L. Murphy,Madelyn R. Badger,Digital signature protection of the OSPF routing protocol.
- Nicholas Yialelis,Morris Sloman,A Security Framework Supporting Domain Based Access Control in Distributed Systems.
- Trent Jaeger,Aviel D. Rubin,Preserving Integrity in Remote File Location and Retrieval.
- Michael B. Greenwald,Sandeep K. Singhal,Jonathan Stone,David R. Cheriton,Designing an Academic Firewall: Policy, Practice, and Experience with SURF.
- Carlisle Adams,IDUP and SPKM: Developing Public-Key-Based APIs and Mechanisms for Communication Security Services.
- Kazuhiko Yamamoto,An integration of PGP and MIME.
- Jonathan T. Trostle,B. Clifford Neuman,A flexible distributed authorization protocol.
- Iskender Agi,Li Gong,An Empirical Study of Secure MPEG Video Transmissions.
- Takahiro Kiuchi,Shigekoto Kaihara,C-HTTP - The Development of a Secure, Closed HTTP-based Network on the Internet.
- Shaw-Cheng Chuang,Michael Roe,A Case Study of Secure ATM Switch Booting.
- Erich M. Nahum,David J. Yates,Sean W. O'Malley,Hilarie K. Orman,Richard Schroeppel,Parallelized Network Security Protocols.
- Hugo Krawczyk,SKEME: a versatile secure key exchange mechanism for Internet.
- Ceki Gülcü,Gene Tsudik,Mixing Email with Babel.
1995
- P. V. McMahon,SESAME V2 public key and authorisation extensions to Kerberos.
- Jim Alves-Foss,An overview of SNIF: a tool for Surveying Network Information Flow.
- Abdelaziz Mounji,Baudouin Le Charlier,D. Zampuniéris,Naji Habra,Distributed audit trail analysis.
- Stefan Brands,Electronic cash on the Internet.
- Tony Ballardie,Jon Crowcroft,Multicast-specific security threats and counter-measures.
- Daniel S. Stevenson,Nathan Hillery,Gregory T. Byrd,Fengmin Gong,Dan Winkelstein,Design of a key agile cryptographic system for OC-12c rate ATM.
- Steffen Stempel,IpAccess-an Internet service access system for firewall installations.
- Nada Kapidzic,Alan Davidson,A Certificate Management System: structure, functions and protocols.
- Suzan Mendes,Christian Huitema,A new approach to the X.509 framework: allowing a global authentication infrastructure without a global trust model.
- Ravi Ganesan,Yaksha: augmenting Kerberos with public key cryptography.
- Alireza Bahreman,PEMToolKit: building a top-down certification hierarchy for PEM from the bottom up.
- David G. Simmons,Ronald Wilkins,NERD: Network Event Recording Device: an automated system for network anomaly detection and notification.
- Barry Jaspan,GSS-API security for ONC RPC.