2014
- Luyi Xing,Xiaorui Pan,Rui Wang,Kan Yuan,XiaoFeng Wang,Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.
- Jinjin Liang,Jian Jiang,Hai-Xin Duan,Kang Li,Tao Wan,Jianping Wu,When HTTPS Meets CDN: A Case of Authentication in Delegated Service.
- Susan Hohenberger,Steven Myers,Rafael Pass,Abhi Shelat,ANONIZE: A Large-Scale Anonymous Survey System.
- Daniel Fett,Ralf Küsters,Guido Schmitz,An Expressive Model for the Web Infrastructure: Definition and Application to the Browser ID SSO System.
- Shayak Sen,Saikat Guha,Anupam Datta,Sriram K. Rajamani,Janice Y. Tsai,Jeannette M. Wing,Bootstrapping Privacy Compliance in Big Data Systems.
- Adam Everspaugh,Yan Zhai,Robert Jellinek,Thomas Ristenpart,Michael M. Swift,Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG.
- Sadia Afroz,Aylin Caliskan Islam,Ariel Stolerman,Rachel Greenstadt,Damon McCoy,Doppelgänger Finder: Taking Stylometry to the Underground.
- Vasilis Pappas,Fernando Krell,Binh Vo,Vladimir Kolesnikov,Tal Malkin,Seung Geol Choi,Wesley George,Angelos D. Keromytis,Steve Bellovin,Blind Seer: A Scalable Private DBMS.
- Byoungyoung Lee,Long Lu,Tielei Wang,Taesoo Kim,Wenke Lee,From Zygote to Morula: Fortifying Weakened ASLR on Android.
- Erik Bosman,Herbert Bos,Framing Signals - A Return to Portable Shellcode.
- Muhammad Naveed,Manoj Prabhakaran,Carl A. Gunter,Dynamic Searchable Encryption via Blind Storage.
- Fabian Yamaguchi,Nico Golde,Daniel Arp,Konrad Rieck,Modeling and Discovering Vulnerabilities with Code Property Graphs.
- Ralf Küsters,Tomasz Truderung,Andreas Vogt,Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking.
- Michael Rushanan,Aviel D. Rubin,Denis Foo Kune,Colleen M. Swanson,SoK: Security and Privacy in Implantable Medical Devices and Body Area Networks.
- Aseem Rastogi,Matthew A. Hammer,Michael Hicks,Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations.
- Lin-Shung Huang,Alex Rice,Erling Ellingsen,Collin Jackson,Analyzing Forged SSL Certificates in the Wild.
- Zongwei Zhou,Miao Yu,Virgil D. Gligor,Dancing with Giants: Wimpy Kernels for On-Demand Isolated I/O.
- Zhou Li,Sumayah A. Alrwais,XiaoFeng Wang,Eihal Alowaisheq,Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections.
- John Criswell,Nathan Dautenhahn,Vikram S. Adve,KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels.
- Benedikt Schmidt,Ralf Sasse,Cas Cremers,David A. Basin,Automated Verification of Group Key Agreement Protocols.
- Shrirang Mare,Andres Molina-Markham,Cory Cornelius,Ronald A. Peterson,David Kotz,ZEBRA: Zero-Effort Bilateral Recurring Authentication.
- Yuan Tian,Ying Chuan Liu,Amar Bhosale,Lin-Shung Huang,Patrick Tague,Collin Jackson,All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API.
- Per Larsen,Andrei Homescu,Stefan Brunthaler,Michael Franz,SoK: Automated Software Diversity.
- Piotr Mardziel,Mário S. Alvim,Michael W. Hicks,Michael R. Clarkson,Quantifying Information Flow for Dynamic Secrets.
- Nedim Srndic,Pavel Laskov,Practical Evasion of a Learning-Based Classifier: A Case Study.
- Collin Mulliner,William K. Robertson,Engin Kirda,Hidden GEMs: Automated Discovery of Access Control Vulnerabilities in Graphical User Interfaces.
- Jerry Ma,Weining Yang,Min Luo,Ninghui Li,A Study of Probabilistic Password Models.
- Bhushan Jain,Mirza Basim Baig,Dongli Zhang,Donald E. Porter,Radu Sion,SoK: Introspections on Trust and the Semantic Gap.
- Marcin Andrychowicz,Stefan Dziembowski,Daniel Malinowski,Lukasz Mazurek,Secure Multiparty Computations on Bitcoin.
- Steve Kremer,Robert Künnemann,Automated Analysis of Security Protocols with Global State.
- Sangho Lee,Youngsok Kim,Jangwoo Kim,Jong Kim,Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities.
- Chad Brubaker,Suman Jana,Baishakhi Ray,Sarfraz Khurshid,Vitaly Shmatikov,Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations.
- Eli Ben-Sasson,Alessandro Chiesa,Christina Garman,Matthew Green,Ian Miers,Eran Tromer,Madars Virza,Zerocash: Decentralized Anonymous Payments from Bitcoin.
- Chang Liu,Yan Huang,Elaine Shi,Jonathan Katz,Michael W. Hicks,Automating Efficient RAM-Model Secure Computation.
- Mike Bond,Omar Choudary,Steven J. Murdoch,Sergei P. Skorobogatov,Ross J. Anderson,Chip and Skim: Cloning EMV Cards with the Pre-play Attack.
- Aaron Blankstein,Michael J. Freedman,Automating Isolation and Least Privilege in Web Services.
- Jose Lopes,Nuno Neves,Stopping a Rapid Tornado with a Puff.
- Andrea Bittau,Adam Belay,Ali José Mashtizadeh,David Mazières,Dan Boneh,Hacking Blind.
- Enes Göktas,Elias Athanasopoulos,Herbert Bos,Georgios Portokalidis,Out of Control: Overcoming Control-Flow Integrity.
- Xiao-yong Zhou,Yeonjoon Lee,Nan Zhang,Muhammad Naveed,XiaoFeng Wang,The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.
- Andrew Miller,Ari Juels,Elaine Shi,Bryan Parno,Jonathan Katz,Permacoin: Repurposing Bitcoin Work for Data Preservation.
- James Mickens,Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains.
- Karthikeyan Bhargavan,Antoine Delignat-Lavaud,Cédric Fournet,Alfredo Pironti,Pierre-Yves Strub,Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS.
- Sai Teja Peddinti,Aleksandra Korolova,Elie Bursztein,Geetanjali Sampemane,Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity.
2013
- Joel Reardon,David A. Basin,Srdjan Capkun,SoK: Secure Data Deletion.
- Ulrich Rührmair,Marten van Dijk,PUFs in Security Protocols: Attack Models and Security Evaluations.
- Wenbo Shen,Peng Ning,Xiaofan He,Huaiyu Dai,Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
- Catalin Hritcu,Michael Greenberg,Ben Karel,Benjamin C. Pierce,Greg Morrisett,All Your IFCException Are Belong to Us.
- Amir Houmansadr,Chad Brubaker,Vitaly Shmatikov,The Parrot Is Dead: Observing Unobservable Network Communications.
- Kaan Onarlioglu,Collin Mulliner,William K. Robertson,Engin Kirda,PrivExec: Private Execution as an Operating System Service.
- Karthikeyan Bhargavan,Cédric Fournet,Markulf Kohlweiss,Alfredo Pironti,Pierre-Yves Strub,Implementing TLS with Verified Cryptographic Security.
- Toby C. Murray,Daniel Matichuk,Matthew Brassil,Peter Gammie,Timothy Bourke,Sean Seefried,Corey Lewis,Xin Gao,Gerwin Klein,seL4: From General Purpose to a Proof of Information Flow Enforcement.
- Suman Jana,Arvind Narayanan,Vitaly Shmatikov,A Scanner Darkly: Protecting User Privacy from Perceptual Applications.
- Yinglei Wang,Wing-Kei S. Yu,Sarah Q. Xu,Edwin Kan,G. Edward Suh,Hiding Information in Flash Memory.
- Lorenzo Alvisi,Allen Clement,Alessandro Epasto,Silvio Lattanzi,Alessandro Panconesi,SoK: The Evolution of Sybil Defense via Social Networks.
- Ian Miers,Christina Garman,Matthew Green,Aviel D. Rubin,Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
- Kevin Z. Snow,Fabian Monrose,Lucas Davi,Alexandra Dmitrienko,Christopher Liebchen,Ahmad-Reza Sadeghi,Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization.
- Chao Zhang,Tao Wei,Zhaofeng Chen,Lei Duan,Laszlo Szekeres,Stephen McCamant,Dawn Song,Wei Zou,Practical Control Flow Integrity and Randomization for Binary Executables.
- Nadhem J. AlFardan,Kenneth G. Paterson,Lucky Thirteen: Breaking the TLS and DTLS Record Protocols.
- Victor Vu,Srinath T. V. Setty,Andrew J. Blumberg,Michael Walfish,A Hybrid Architecture for Interactive Verifiable Computation.
- Min Suk Kang,Soo Bum Lee,Virgil D. Gligor,The Crossfire Attack.
- Laszlo Szekeres,Mathias Payer,Tao Wei,Dawn Song,SoK: Eternal War in Memory.
- Mihir Bellare,Viet Tung Hoang,Sriram Keelveedhi,Phillip Rogaway,Efficient Garbling from a Fixed-Key Blockcipher.
- Nils Ole Tippenhauer,Luka Malisa,Aanjhan Ranganathan,Srdjan Capkun,On Limitations of Friendly Jamming for Confidentiality.
- Nick Nikiforakis,Alexandros Kapravelos,Wouter Joosen,Christopher Kruegel,Frank Piessens,Giovanni Vigna,Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting.
- Denis Foo Kune,John D. Backes,Shane S. Clark,Daniel B. Kramer,Matthew R. Reynolds,Kevin Fu,Yongdae Kim,Wenyuan Xu,Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors.
- Michael Z. Lee,Alan M. Dunn,Brent Waters,Emmett Witchel,Jonathan Katz,Anon-Pass: Practical Anonymous Subscriptions.
- Jeremy Clark,Paul C. van Oorschot,SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
- Ralf Hund,Carsten Willems,Thorsten Holz,Practical Timing Side Channel Attacks against Kernel Space ASLR.
- Emil Stefanov,Elaine Shi,ObliviStore: High Performance Oblivious Cloud Storage.
- Gurchetan S. Grewal,Mark Dermot Ryan,Sergiu Bursuc,Peter Y. A. Ryan,Caveat Coercitor: Coercion-Evidence in Electronic Voting.
- Amit Vasudevan,Sagar Chaki,Limin Jia,Jonathan M. McCune,James Newsome,Anupam Datta,Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
- Keaton Mowery,Michael Yung Chung Wei,David Kohlbrenner,Hovav Shacham,Steven Swanson,Welcome to the Entropics: Boot-Time Entropy in Embedded Devices.
- Alex Biryukov,Ivan Pustogarov,Ralf-Philipp Weinmann,Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
- Bryan Parno,Jon Howell,Craig Gentry,Mariana Raykova,Pinocchio: Nearly Practical Verifiable Computation.
- Christian Rossow,Dennis Andriesse,Tillmann Werner,Brett Stone-Gross,Daniel Plohmann,Christian J. Dietrich,Herbert Bos,SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets.
- Raluca A. Popa,Frank H. Li,Nickolai Zeldovich,An Ideal-Security Protocol for Order-Preserving Encoding.
- Julien Vanegue,Shuvendu K. Lahiri,Towards Practical Reactive Security Audit Using Extended Static Checkers.
- Samee Zahur,David Evans,Circuit Structures for Improving Efficiency of Security and Privacy Tools.
- Zhou Li,Sumayah A. Alrwais,Yinglian Xie,Fang Yu,XiaoFeng Wang,Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.
- William R. Harris,Somesh Jha,Thomas W. Reps,Jonathan Anderson,Robert N. M. Watson,Declarative, Temporal, and Practical Programming with Capabilities.
- Valeria Nikolaenko,Udi Weinsberg,Stratis Ioannidis,Marc Joye,Dan Boneh,Nina Taft,Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.
2012
- Xin Zhang,Chang Lan,Adrian Perrig,Secure and Scalable Fault Localization under Dynamic Traffic Patterns.
- Moritz Y. Becker,Alessandra Russo,Nik Sultana,Foundations of Logic-Based Trust Management.
- Joseph Bonneau,Cormac Herley,Paul C. van Oorschot,Frank Stajano,The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
- Suman Jana,Vitaly Shmatikov,Memento: Learning Secrets from Process Footprints.
- Mathias Payer,Tobias Hartmann,Thomas R. Gross,Safe Loading - A Foundation for Secure Execution of Untrusted Programs.
- Kevin P. Dyer,Scott E. Coull,Thomas Ristenpart,Thomas Shrimpton,Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.
- Xeno Kovah,Corey Kallenberg,Chris Weathers,Amy Herzog,Matthew Albin,John Butterworth,New Results for Timing-Based Attestation.
- Ralf Küsters,Tomasz Truderung,Andreas Vogt,Clash Attacks on the Verifiability of E-Voting Systems.
- Suman Jana,Vitaly Shmatikov,Abusing File Processing in Malware Detectors for Fun and Profit.
- Yangchun Fu,Zhiqiang Lin,Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
- Arvind Narayanan,Hristo S. Paskov,Neil Zhenqiang Gong,John Bethencourt,Emil Stefanov,Eui Chul Richard Shin,Dawn Song,On the Feasibility of Internet-Scale Author Identification.
- Emiliano De Cristofaro,Claudio Soriente,Gene Tsudik,Andrew Williams,Hummingbird: Privacy at the Time of Twitter.
- Joseph Bonneau,The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords.
- Zongwei Zhou,Virgil D. Gligor,James Newsome,Jonathan M. McCune,Building Verifiable Trusted Path on Commodity x86 Computers.
- Yajin Zhou,Xuxian Jiang,Dissecting Android Malware: Characterization and Evolution.
- Clemens Kolbitsch,Benjamin Livshits,Benjamin G. Zorn,Christian Seifert,Rozzle: De-cloaking Internet Malware.
- Owen Arden,Michael D. George,Jed Liu,K. Vikram,Aslan Askarov,Andrew C. Myers,Sharing Mobile Code Securely with Information Flow Control.
- Michael Carl Tschantz,Anupam Datta,Jeannette M. Wing,Formalizing and Enforcing Purpose Restrictions in Privacy Policies.
- Patrick Gage Kelley,Saranga Komanduri,Michelle L. Mazurek,Richard Shay,Timothy Vidas,Lujo Bauer,Nicolas Christin,Lorrie Faith Cranor,Julio Lopez,Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms.
- Hsu-Chun Hsiao,Tiffany Hyun-Jin Kim,Adrian Perrig,Akira Yamada,Samuel C. Nelson,Marco Gruteser,Wei Meng,LAP: Lightweight Anonymity and Privacy.
- Michael Backes,Aniket Kate,Matteo Maffei,Kim Pecina,ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
- Benedikt Driessen,Ralf Hund,Carsten Willems,Christof Paar,Thorsten Holz,Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards.
- Yan Huang,Jonathan Katz,David Evans,Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution.
- Sadia Afroz,Michael Brennan,Rachel Greenstadt,Detecting Hoaxes, Frauds, and Deception in Writing Style Online.
- Masoud Akhoondi,Curtis Yu,Harsha V. Madhyastha,LASTor: A Low-Latency AS-Aware Tor Client.
- Rui Wang,Shuo Chen,XiaoFeng Wang,Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services.
- Luca Invernizzi,Paolo Milani Comparetti,EvilSeed: A Guided Approach to Finding Malicious Web Pages.
- Ero Balsa,Carmela Troncoso,Claudia Díaz,OB-PWS: Obfuscation-Based Private Web Search.
- Jonathan R. Mayer,John C. Mitchell,Third-Party Web Tracking: Policy and Technology.
- Sang Kil Cha,Thanassis Avgerinos,Alexandre Rebert,David Brumley,Unleashing Mayhem on Binary Code.
- Adele E. Howe,Indrajit Ray,Mark Roberts,Malgorzata Urbanska,Zinta Byrne,The Psychology of Security for the Home Computer User.
- Zhiyun Qian,Zhuoqing Morley Mao,Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security.
- Vasilis Pappas,Michalis Polychronakis,Angelos D. Keromytis,Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization.
- Christian Rossow,Christian J. Dietrich,Chris Grier,Christian Kreibich,Vern Paxson,Norbert Pohlmann,Herbert Bos,Maarten van Steen,Prudent Practices for Designing Malware Experiments: Status Quo and Outlook.
- Yinglei Wang,Wing-Kei S. Yu,Shuo Wu,Greg Malysa,G. Edward Suh,Edwin Kan,Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints.
- Jason Hiser,Anh Nguyen-Tuong,Michele Co,Matthew Hall,Jack W. Davidson,ILR: Where'd My Gadgets Go?
- Cas J. F. Cremers,Kasper Bonne Rasmussen,Benedikt Schmidt,Srdjan Capkun,Distance Hijacking Attacks on Distance Bounding Protocols.
- Jiyong Jang,Abeer Agrawal,David Brumley,ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions.
- Shuaifu Dai,Tao Wei,Chao Zhang,Tielei Wang,Yu Ding,Zhenkai Liang,Wei Zou,A Framework to Eliminate Backdoors from Response-Computable Authentication.
- Franziska Roesner,Tadayoshi Kohno,Alexander Moshchuk,Bryan Parno,Helen J. Wang,Crispin Cowan,User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
2011
- Chris A. Owen,Duncan A. Grove,Tristan Newby,Alex Murray,Chris J. North,Michael Pope,PRISM: Program Replication and Integration for Seamless MILS.
- Cynthia Sturton,Matthew Hicks,David Wagner,Samuel T. King,Defeating UCI: Building Stealthy and Malicious Hardware.
- Michael Becher,Felix C. Freiling,Johannes Hoffmann,Thorsten Holz,Sebastian Uellenbeck,Christopher Wolf,Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.
- Matthew Fredrikson,Benjamin Livshits,RePriv: Re-imagining Content Personalization and In-browser Privacy.
- Elie Bursztein,Mike Hamburg,Jocelyn Lagarenne,Dan Boneh,OpenConflict: Preventing Real Time Map Hacks in Online Games.
- Reza Shokri,George Theodorakopoulos,Jean-Yves Le Boudec,Jean-Pierre Hubaux,Quantifying Location Privacy.
- Adam Waksman,Simha Sethumadhavan,Silencing Hardware Backdoors.
- Frederik Armknecht,Roel Maes,Ahmad-Reza Sadeghi,François-Xavier Standaert,Christian Wachsmann,A Formalization of the Security Features of Physical Functions.
- Aleksandar Nanevski,Anindya Banerjee,Deepak Garg,Verification of Information Flow and Access Control Policies with Dependent Types.
- Kirill Levchenko,Andreas Pitsillidis,Neha Chachra,Brandon Enright,Márk Félegyházi,Chris Grier,Tristan Halvorson,Chris Kanich,Christian Kreibich,He Liu,Damon McCoy,Nicholas Weaver,Vern Paxson,Geoffrey M. Voelker,Stefan Savage,Click Trajectories: End-to-End Analysis of the Spam Value Chain.
- Ankur Taly,Úlfar Erlingsson,John C. Mitchell,Mark S. Miller,Jasvir Nagra,Automated Analysis of Security-Critical JavaScript APIs.
- Ralf Küsters,Tomasz Truderung,Andreas Vogt,Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study.
- Bryan Parno,Jacob R. Lorch,John R. Douceur,James W. Mickens,Jonathan M. McCune,Memoir: Practical State Continuity for Protected Modules.
- David Gullasch,Endre Bangerter,Stephan Krenn,Cache Games - Bringing Access-Based Cache Attacks on AES to Practice.
- Zachary Weinberg,Eric Yawei Chen,Pavithra Ramesh Jayaraman,Collin Jackson,I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks.
- Kurt Thomas,Chris Grier,Justin Ma,Vern Paxson,Dawn Song,Design and Evaluation of a Real-Time URL Spam Filtering Service.
- Noah M. Johnson,Juan Caballero,Kevin Zhijie Chen,Stephen McCamant,Pongsin Poosankam,Daniel Reynaud,Dawn Song,Differential Slicing: Identifying Causal Execution Differences for Security Applications.
- Andrew M. White,Austin R. Matthews,Kevin Z. Snow,Fabian Monrose,Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks.
- Hugh Wimberly,Lorie M. Liebrock,Using Fingerprint Authentication to Reduce System Security: An Empirical Study.
- Jeffrey A. Vaughan,Stephen Chong,Inference of Expressive Declassification Policies.
- Joseph A. Calandrino,Ann Kilzer,Arvind Narayanan,Edward W. Felten,Vitaly Shmatikov,"You Might Also Like: " Privacy Risks of Collaborative Filtering.
- Yinqian Zhang,Ari Juels,Alina Oprea,Michael K. Reiter,HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
- Sebastian Eggert,Ron van der Meyden,Henning Schnoor,Thomas Wilke,The Complexity of Intransitive Noninterference.
- Rui Wang,Shuo Chen,XiaoFeng Wang,Shaz Qadeer,How to Shop for Free Online - Security Analysis of Cashier-as-a-Service Based Web Stores.
- Arjun Guha,Matthew Fredrikson,Benjamin Livshits,Nikhil Swamy,Verified Security for Browser Extensions.
- Thai Duong,Juliano Rizzo,Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET.
- Vineeth Kashyap,Ben Wiedermann,Ben Hardekopf,Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach.
- Suman Jana,Donald E. Porter,Vitaly Shmatikov,TxBox: Building Secure, Efficient Sandboxes with System Transactions.
- Ryan Henry,Ian Goldberg,Formalizing Anonymous Blacklisting Systems.
- Ryan Henry,Ian Goldberg,Extending Nymble-like Systems.
- Elie Bursztein,Romain Beauxis,Hristo S. Paskov,Daniele Perito,Celine Fabry,John C. Mitchell,The Failure of Noise-Based Non-continuous Audio Captchas.
- Xin Zhang,Hsu-Chun Hsiao,Geoffrey Hasker,Haowen Chan,Adrian Perrig,David G. Andersen,SCION: Scalability, Control, and Isolation on Next-Generation Networks.
- Brendan Dolan-Gavitt,Tim Leek,Michael Zhivich,Jonathon T. Giffin,Wenke Lee,Virtuoso: Narrowing the Semantic Gap in Virtual Machine Introspection.
- Philip W. L. Fong,Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems.
2010
- Tielei Wang,Tao Wei,Guofei Gu,Wei Zou,TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
- Haowen Chan,Adrian Perrig,Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes.
- Robin Sommer,Vern Paxson,Outside the Closed World: On Using Machine Learning for Network Intrusion Detection.
- Edward J. Schwartz,Thanassis Avgerinos,David Brumley,All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask).
- Clemens Kolbitsch,Thorsten Holz,Christopher Kruegel,Engin Kirda,Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries.
- Zhi Wang,Xuxian Jiang,HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.
- Margarita Osadchy,Benny Pinkas,Ayman Jarrous,Boaz Moskovich,SCiFI - A System for Secure Face Identification.
- Paolo Milani Comparetti,Guido Salvaneschi,Engin Kirda,Clemens Kolbitsch,Christopher Kruegel,Stefano Zanero,Identifying Dormant Functionality in Malware Programs.
- Yao Liu,Peng Ning,Huaiyu Dai,Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.
- Dominique Devriese,Frank Piessens,Noninterference through Secure Multi-execution.
- Sardaouna Hamadou,Vladimiro Sassone,Catuscia Palamidessi,Reconciling Belief and Vulnerability in Information Flow.
- W. Douglas Maughan,Crossing the "Valley of Death": Transitioning Research into Commercial Products - A Personal Perspective.
- Karl Koscher,Alexei Czeskis,Franziska Roesner,Shwetak Patel,Tadayoshi Kohno,Stephen Checkoway,Damon McCoy,Brian Kantor,Danny Anderson,Hovav Shacham,Stefan Savage,Experimental Security Analysis of a Modern Automobile.
- Leo A. Meyerovich,V. Benjamin Livshits,ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.
- Zhiyun Qian,Zhuoqing Morley Mao,Yinglian Xie,Fang Yu,Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique.
- Matt Fredrikson,Somesh Jha,Mihai Christodorescu,Reiner Sailer,Xifeng Yan,Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.
- Steven J. Murdoch,Saar Drimer,Ross J. Anderson,Mike Bond,Chip and PIN is Broken.
- Kapil Singh,Alexander Moshchuk,Helen J. Wang,Wenke Lee,On the Incoherencies in Web Browser Access Control Policies.
- Elie Bursztein,Steven Bethard,Celine Fabry,John C. Mitchell,Daniel Jurafsky,How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation.
- Peter G. Neumann,Matt Bishop,Sean Peisert,Marv Schaefer,Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy.
- Carl E. Landwehr,History of US Government Investments in Cybersecurity Research: A Personal Perspective.
- Jonathan M. McCune,Yanlin Li,Ning Qu,Zongwei Zhou,Anupam Datta,Virgil D. Gligor,Adrian Perrig,TrustVisor: Efficient TCB Reduction and Attestation.
- Gilbert Wondracek,Thorsten Holz,Engin Kirda,Christopher Kruegel,A Practical Attack to De-anonymize Social Network Users.
- Deepak Garg,Frank Pfenning,A Proof-Carrying File System.
- Matthew Hicks,Murph Finnicum,Samuel T. King,Milo M. K. Martin,Jonathan M. Smith,Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically.
- Adam Waksman,Simha Sethumadhavan,Tamper Evident Microprocessors.
- Allison B. Lewko,Amit Sahai,Brent Waters,Revocation Systems with Very Small Private Keys.
- Shuo Chen,Rui Wang,XiaoFeng Wang,Kehuan Zhang,Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow.
- Prateek Saxena,Devdatta Akhawe,Steve Hanna,Feng Mao,Stephen McCamant,Dawn Song,A Symbolic Execution Framework for JavaScript.
- Bryan Parno,Jonathan M. McCune,Adrian Perrig,Bootstrapping Trust in Commodity Computers.
- Bruno P. S. Rocha,Sruthi Bandhakavi,Jerry den Hartog,William H. Winsborough,Sandro Etalle,Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.
- Jason Bau,Elie Bursztein,Divij Gupta,John C. Mitchell,State of the Art: Automated Black-Box Web Application Vulnerability Testing.
- Sergio Maffeis,John C. Mitchell,Ankur Taly,Object Capabilities and Isolation of Untrusted Web Applications.
- Jason Franklin,Sagar Chaki,Anupam Datta,Arvind Seshadri,Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size.
2009
- Maxwell N. Krohn,Eran Tromer,Noninterference for a Practical DIFC-Based Operating System.
- Martin R. Albrecht,Kenneth G. Paterson,Gaven J. Watson,Plaintext Recovery Attacks against SSH.
- Haifeng Yu,Chenwei Shi,Michael Kaminsky,Phillip B. Gibbons,Feng Xiao,DSybil: Optimal Sybil-Resistance for Recommendation Systems.
- Michael Backes,Boris Köpf,Andrey Rybalchenko,Automatic Discovery and Quantification of Information Leaks.
- Bennet Yee,David Sehr,Gregory Dardyk,J. Bradley Chen,Robert Muth,Tavis Ormandy,Shiki Okasaka,Neha Narula,Nicholas Fullagar,Native Client: A Sandbox for Portable, Untrusted x86 Native Code.
- Flavio D. Garcia,Peter van Rossum,Roel Verdult,Ronny Wichers Schreur,Wirelessly Pickpocketing a Mifare Classic Card.
- Bryan Parno,Jonathan M. McCune,Dan Wendlandt,David G. Andersen,Adrian Perrig,CLAMP: Practical Prevention of Large-Scale Data Leaks.
- Shuo Chen,Ziqing Mao,Yi-Min Wang,Ming Zhang,Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments.
- George Danezis,Ian Goldberg,Sphinx: A Compact and Provably Secure Mix Format.
- Stuart E. Schechter,A. J. Bernheim Brush,Serge Egelman,It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions.
- Ralf Küsters,Tomasz Truderung,An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols.
- Matt Weir,Sudhir Aggarwal,Breno de Medeiros,Bill Glodek,Password Cracking Using Probabilistic Context-Free Grammars.
- William Clarkson,Tim Weyrich,Adam Finkelstein,Nadia Heninger,J. Alex Halderman,Edward W. Felten,Fingerprinting Blank Paper Using Commodity Scanners.
- Kevin Borders,Atul Prakash,Quantifying Information Leaks in Outbound Web Traffic.
- Santiago Zanella Béguelin,Gilles Barthe,Benjamin Grégoire,Federico Olmedo,Formally Certifying the Security of Digital Signature Schemes.
- Bart Coppens,Ingrid Verbauwhede,Koen De Bosschere,Bjorn De Sutter,Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors.
- Michael Backes,Tongbo Chen,Markus Dürmuth,Hendrik P. A. Lensch,Martin Welk,Tempest in a Teapot: Compromising Reflections Revisited.
- Monirul I. Sharif,Andrea Lanzi,Jonathon T. Giffin,Wenke Lee,Automatic Reverse Engineering of Malware Emulators.
- Xiang Cai,Yuwei Gui,Rob Johnson,Exploiting Unix File-System Races via Algorithmic Complexity Attacks.
- Anupam Datta,Jason Franklin,Deepak Garg,Dilsun Kirli Kaynar,A Logic of Secure Systems and its Application to Trusted Computing.
- Mike Ter Louw,V. N. Venkatakrishnan,Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers.
- Arvind Narayanan,Vitaly Shmatikov,De-anonymizing Social Networks.
- Adam Barth,Juan Caballero,Dawn Song,Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves.
- Paolo Milani Comparetti,Gilbert Wondracek,Christopher Krügel,Engin Kirda,Prospex: Protocol Specification Extraction.
- Michael T. Goodrich,The Mastermind Attack on Genomic Data.
- Koen Simoens,Pim Tuyls,Bart Preneel,Privacy Weaknesses in Biometric Sketches.
2008
- Davide Balzarotti,Marco Cova,Giovanni Vigna,ClearShot: Eavesdropping on Keyboard Input from Video.
- Haifeng Yu,Phillip B. Gibbons,Michael Kaminsky,Feng Xiao,SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks.
- Arvind Narayanan,Vitaly Shmatikov,Robust De-anonymization of Large Sparse Datasets.
- Charles V. Wright,Lucas Ballard,Scott E. Coull,Fabian Monrose,Gerald M. Masson,Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations.
- Anindya Banerjee,David A. Naumann,Stan Rosenberg,Expressive Declassification Policies and Modular Static Enforcement.
- Somesh Jha,Louis Kruger,Vitaly Shmatikov,Towards Practical Privacy for Genomic Computation.
- Periklis Akritidis,Cristian Cadar,Costin Raiciu,Manuel Costa,Miguel Castro,Preventing Memory Error Exploits with WIT.
- Michael Backes,Matteo Maffei,Dominique Unruh,Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
- Bryan D. Payne,Martim Carbone,Monirul I. Sharif,Wenke Lee,Lares: An Architecture for Secure Active Monitoring Using Virtualization.
- Parvathinathan Venkitasubramaniam,Lang Tong,Anonymous Networking with Minimum Latency in Multihop Networks.
- Mario Strasser,Christina Pöpper,Srdjan Capkun,Mario Cagalj,Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping.
- Gabriela F. Cretu,Angelos Stavrou,Michael E. Locasto,Salvatore J. Stolfo,Angelos D. Keromytis,Casting out Demons: Sanitizing Training Data for Anomaly Sensors.
- David Brumley,Pongsin Poosankam,Dawn Xiaodong Song,Jiang Zheng,Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications.
- Mudhakar Srivatsa,Ling Liu,Arun Iyengar,Preserving Caller Anonymity in Voice-over-IP Networks.
- Suhabe Bugrara,Alex Aiken,Verifying the Safety of User Pointer Dereferences.
- Daniel Halperin,Thomas S. Heydt-Benjamin,Benjamin Ransford,Shane S. Clark,Benessa Defend,Will Morgan,Kevin Fu,Tadayoshi Kohno,William H. Maisel,Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses.
- Randy Smith,Cristian Estan,Somesh Jha,XFA: Faster Signature Matching with Extended Automata.
- Bruno Blanchet,Avik Chaudhuri,Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage.
- Nikhil Swamy,Brian J. Corcoran,Michael Hicks,Fable: A Language for Enforcing User-defined Security Policies.
- Chris Grier,Shuo Tang,Samuel T. King,Secure Web Browsing with the OP Web Browser.
- Michael Backes,Markus Dürmuth,Dominique Unruh,Compromising Reflections-or-How to Read LCD Monitors around the Corner.
- Ronald William Smith,George Scott Knight,Predictable Design of Network-Based Covert Communication Systems.
- Weiqing Sun,R. Sekar,Gaurav Poothia,Tejas Karandikar,Practical Proactive Integrity Preservation: A Basis for Malware Defense.
- Michael R. Clarkson,Stephen Chong,Andrew C. Myers,Civitas: Toward a Secure Voting System.
- Davide Balzarotti,Marco Cova,Viktoria Felmetsger,Nenad Jovanovic,Engin Kirda,Christopher Kruegel,Giovanni Vigna,Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications.
- Mythili Vutukuru,Hari Balakrishnan,Vern Paxson,Efficient and Robust TCP Stream Normalization.
- Saar Drimer,Steven J. Murdoch,Ross J. Anderson,Thinking Inside the Box: System-Level Failures of Tamper Proofing.
- Francis M. David,Ellick Chan,Jeffrey C. Carlyle,Roy H. Campbell,Cloaker: Hardware Supported Rootkit Concealment.
2007
- Arati Baliga,Pandurang Kamat,Liviu Iftode,Lurking in the Shadows: Identifying Systemic Threats to Kernel Data.
- Jonathan M. McCune,Bryan Parno,Adrian Perrig,Michael K. Reiter,Arvind Seshadri,Minimal TCB Code Execution.
- Jan Camenisch,Anna Lysyanskaya,Mira Meyerovich,Endorsed E-Cash.
- José Meseguer,Ralf Sasse,Helen J. Wang,Yi-Min Wang,A Systematic Approach to Uncover Security Flaws in GUI Logic.
- Philippe Golle,David Wagner,Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract).
- Dakshi Agrawal,Selçuk Baktir,Deniz Karakoyunlu,Pankaj Rohatgi,Berk Sunar,Trojan Detection using IC Fingerprinting.
- Jeffrey A. Vaughan,Steve Zdancewic,A Cryptographic Decentralized Label Model.
- Alexandra Boldyreva,Virendra Kumar,Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos.
- Andreas Moser,Christopher Krügel,Engin Kirda,Exploring Multiple Execution Paths for Malware Analysis.
- Xinyuan Wang,Shiping Chen,Sushil Jajodia,Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems.
- Aslan Askarov,Andrei Sabelfeld,Gradual Release: Unifying Declassification, Encryption and Key Release Policies.
- Jean Paul Degabriele,Kenneth G. Paterson,Attacking the IPsec Standards in Encryption-only Configurations.
- Stuart E. Schechter,Rachna Dhamija,Andy Ozment,Ian Fischer,The Emperor's New Security Indicators.
- Xin Hu,Zhuoqing Morley Mao,Accurate Real-time Identification of IP Prefix Hijacking.
- Kannan Srinathan,N. R. Prasad,C. Pandu Rangan,On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication.
- Di Ma,Gene Tsudik,Extended Abstract: Forward-Secure Sequential Aggregate Authentication.
- John Bethencourt,Amit Sahai,Brent Waters,Ciphertext-Policy Attribute-Based Encryption.
- Michael Backes,Markus Dürmuth,Dominique Unruh,Information Flow in the Peer-Reviewing Process.
- Charles C. Zhang,Marianne Winslett,Carl A. Gunter,On the Safety and Efficiency of Firewall Policy Deployment.
- Ian Goldberg,Improving the Robustness of Private Information Retrieval.
- Weidong Cui,Marcus Peinado,Helen J. Wang,Michael E. Locasto,ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
- Somesh Jha,Stefan Katzenbeisser,Christian Schallhart,Helmut Veith,Stephen Chenney,Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments.
- Elaine Shi,John Bethencourt,Hubert T.-H. Chan,Dawn Xiaodong Song,Adrian Perrig,Multi-Dimensional Range Query over Encrypted Data.
- Wei Yu,Xinwen Fu,Steve Graham,Dong Xuan,Wei Zhao,DSSS-Based Flow Marking Technique for Invisible Traceback.
- Pau-Chen Cheng,Pankaj Rohatgi,Claudia Keser,Paul A. Karger,Grant M. Wagner,Angela Schuett Reninger,Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.
- Ted Huffmire,Brett Brotherton,Gang Wang,Timothy Sherwood,Ryan Kastner,Timothy E. Levin,Thuy D. Nguyen,Cynthia E. Irvine,Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems.
- Stelios Sidiroglou,Oren Laadan,Angelos D. Keromytis,Jason Nieh,Using Rescue Points to Navigate Software Recovery.
- Ninghui Li,Ziqing Mao,Hong Chen,Usable Mandatory Integrity Protection for Operating Systems.
- Marco Pistoia,Anindya Banerjee,David A. Naumann,Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model.
2006
- Sandeep Bhatkar,Abhishek Chaturvedi,R. Sekar,Dataflow Anomaly Detection.
- Andrea Bittau,Mark Handley,Joshua Lackey,The Final Nail in WEP's Coffin.
- Kevin Borders,Xin Zhao,Atul Prakash,Siren: Catching Evasive Malware (Short Paper).
- Ricardo Corin,Sandro Etalle,Ari Saptawijaya,A Logic for Constraint-based Security Protocol Analysis.
- Yingjiu Li,Haibing Lu,Robert H. Deng,Practical Inference Control for Data Cubes (Extended Abstract).
- Dogan Kesdogan,Dakshi Agrawal,Dang Vinh Pham,Dieter Rautenbach,Fundamental Limits on the Anonymity Provided by the MIX Technique.
- Dennis Hofheinz,Dominique Unruh,Simulatable Security and Polynomially Bounded Concurrent Composability.
- David Brumley,James Newsome,Dawn Xiaodong Song,Hao Wang,Somesh Jha,Towards Automatic Generation of Vulnerability-Based Signatures.
- David Molnar,Tadayoshi Kohno,Naveen Sastry,David Wagner,Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
- Lasse Øverlier,Paul F. Syverson,Locating Hidden Servers.
- Gerhard P. Hancke,Practical Attacks on Proximity Identification Systems (Short Paper).
- Adam Barth,Anupam Datta,John C. Mitchell,Helen Nissenbaum,Privacy and Contextual Integrity: Framework and Applications.
- Alvaro A. Cárdenas,John S. Baras,Karl Seamon,A Framework for the Evaluation of Intrusion Detection Systems.
- Mario Cagalj,Jean-Pierre Hubaux,Srdjan Capkun,Ram Kumar Rengaswamy,Ilias Tsigkogiannis,Mani B. Srivastava,Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels.
- Gilles Barthe,Tamara Rezk,David A. Naumann,Deriving an Information Flow Checker and Certifying Compiler for Java.
- Zhichun Li,Manan Sanghi,Yan Chen,Ming-Yang Kao,Brian Chavez,Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience.
- Vinod Ganapathy,Trent Jaeger,Somesh Jha,Retrofitting Legacy Code for Authorization Policy Enforcement.
- Bruno Blanchet,A Computationally Sound Mechanized Prover for Security Protocols.
- Philippe Golle,XiaoFeng Wang,Markus Jakobsson,Alex Tsow,Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks.
- Ari Juels,Markus Jakobsson,Tom N. Jagatic,Cache Cookies for Browser Authentication (Extended Abstract).
- Roberto Perdisci,David Dagon,Wenke Lee,Prahlad Fogla,Monirul I. Sharif,MisleadingWorm Signature Generators Using Deliberate Noise Injection.
- Daphna Weinshall,Cognitive Authentication Schemes Safe Against Spyware (Short Paper).
- Richard S. Cox,Steven D. Gribble,Henry M. Levy,Jacob Gorm Hansen,A Safety-Oriented Platform for Web Applications.
- Samuel T. King,Peter M. Chen,Yi-Min Wang,Chad Verbowski,Helen J. Wang,Jacob R. Lorch,SubVirt: Implementing malware with virtual machines.
- Zvi Gutterman,Benny Pinkas,Tzachy Reinman,Analysis of the Linux Random Number Generator.
- Lihua Yuan,Jianning Mai,Zhendong Su,Hao Chen,Chen-Nee Chuah,Prasant Mohapatra,FIREMAN: A Toolkit for FIREwall Modeling and ANalysis.
- Pai Peng,Peng Ning,Douglas S. Reeves,On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques.
- Nitesh Saxena,Jan-Erik Ekberg,Kari Kostiainen,N. Asokan,Secure Device Pairing based on a Visual Channel (Short Paper).
- Nenad Jovanovic,Christopher Krügel,Engin Kirda,Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper).
- John Bethencourt,Dawn Xiaodong Song,Brent Waters,New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
- Junfeng Yang,Can Sar,Paul Twohey,Cristian Cadar,Dawson R. Engler,Automatically Generating Malicious Disks using Symbolic Execution.
- Amit Vasudevan,Ramesh Yerraballi,Cobra: Fine-grained Malware Analysis using Stealth Localized-executions.
2005
- Mihai Christodorescu,Somesh Jha,Sanjit A. Seshia,Dawn Xiaodong Song,Randal E. Bryant,Semantics-Aware Malware Detection.
- James Newsome,Brad Karp,Dawn Xiaodong Song,Polygraph: Automatically Generating Signatures for Polymorphic Worms.
- Glenn Wurster,Paul C. van Oorschot,Anil Somayaji,A Generic Attack on Checksumming-Based Software Tamper Resistance.
- Bryan Parno,Adrian Perrig,Virgil D. Gligor,Distributed Detection of Node Replication Attacks in Sensor Networks.
- Shai Rubin,Somesh Jha,Barton P. Miller,Language-Based Generation and Evaluation of NIDS Signatures.
- Rajeev Gopalakrishna,Eugene H. Spafford,Jan Vitek,Efficient Intrusion Detection using Automaton Inlining.
- Jonathan M. McCune,Adrian Perrig,Michael K. Reiter,Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication.
- Steven J. Murdoch,George Danezis,Low-Cost Traffic Analysis of Tor.
- Michael T. Goodrich,Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts.
- Jonathan M. McCune,Elaine Shi,Adrian Perrig,Michael K. Reiter,Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
- Tadayoshi Kohno,Andre Broido,Kimberly C. Claffy,Remote Physical Device Fingerprinting.
- Dwaine E. Clarke,G. Edward Suh,Blaise Gassend,Ajay Sudan,Marten van Dijk,Srinivas Devadas,Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data.
- Elaine Shi,Adrian Perrig,Leendert van Doorn,BIND: A Fine-Grained Attestation Service for Secure Distributed Systems.
- Michael Backes,Birgit Pfitzmann,Relating Symbolic and Cryptographic Secrecy.
- Ninghui Li,Mahesh V. Tripunitara,On Safety in Discretionary Access Control.
- Lujo Bauer,Scott Garriss,Michael K. Reiter,Distributed Proving in Access-Control Systems.
- Yinglian Xie,Vyas Sekar,David A. Maltz,Michael K. Reiter,Hui Zhang,Worm Origin Identification Using Random Moonwalks.
2004
- Jun Li,Minho Sung,Jun (Jim) Xu,Li Li,Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation.
- Peeter Laud,Symmetric Encryption in Automatic Analyses for Confidentiality against Active Adversaries.
- Sencun Zhu,Sanjeev Setia,Sushil Jajodia,Peng Ning,An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
- Michael P. Collins,Michael K. Reiter,An Empirical Analysis of Target-Resident DoS Filters.
- Maxwell N. Krohn,Michael J. Freedman,David Mazières,On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution.
- Stephen Tse,Steve Zdancewic,Run-time Principals in Information-flow Type Systems.
- Dmitri Asonov,Rakesh Agrawal,Keyboard Acoustic Emanations.
- Tuomas Aura,Pekka Nikander,Gonzalo Camarillo,Effects of Mobility and Multihoming on Transport-Protocol Security.
- Philip W. L. Fong,Access Control By Tracking Shallow Execution History.
- William H. Winsborough,Ninghui Li,Safety in Automated Trust Negotiation.
- Jaeyeon Jung,Vern Paxson,Arthur W. Berger,Hari Balakrishnan,Fast Portscan Detection Using Sequential Hypothesis Testing.
2003
- Dakshi Agrawal,Dogan Kesdogan,Stefan Penz,Probabilistic Treatment of MIXes to Hamper Traffic Analysis.
- David W. Price,Algis Rudys,Dan S. Wallach,Garbage Collector Memory Accounting in Language-Based Systems.
- Umesh Shankar,Vern Paxson,Active Mapping: Resisting NIDS Evasion without Altering Traffic.
- Doug Szajda,Barry G. Lawson,Jason Owen,Hardening Functions for Large Scale Distributed Computations.
- George Danezis,Roger Dingledine,Nick Mathewson,Mixminion: Design of a Type III Anonymous Remailer Protocol.
- XiaoFeng Wang,Michael K. Reiter,Defending Against Denial-of-Service Attacks with Puzzle Auction.
- Noam Kogan,Yuval Shavitt,Avishai Wool,A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards.
- Ninghui Li,William H. Winsborough,John C. Mitchell,Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management.
- Ting Yu,Marianne Winslett,A Unified Scheme for Resource Protection in Automated Trust Negotiation.
- Dirk Balfanz,Glenn Durfee,Narendar Shankar,Diana K. Smetters,Jessica Staddon,Hao-Chi Wong,Secret Handshakes from Pairing-Based Key Agreements.
- Sudhakar Govindavajhala,Andrew W. Appel,Using Memory Errors to Attack a Virtual Machine.
- Lantian Zheng,Stephen Chong,Andrew C. Myers,Steve Zdancewic,Using Replication and Partitioning to Build Secure Distributed Systems.
- Jonathan S. Shapiro,Vulnerabilities in Synchronous IPC Designs.
2002
- Calvin Ko,Timothy Redmond,Noninterference and Intrusion Detection.
- Jung-Min Park,Edwin K. P. Chong,Howard Jay Siegel,Efficient Multicast Packet Authentication Using Signature Amortization.
- Markus G. Kuhn,Optical Time-Domain Eavesdropping Risks of CRT Displays.
- Bruno Dutertre,Valentin Crettaz,Victoria Stavridou,Intrusion-Tolerant Enclaves.
- Brian Chess,Improving Computer Security Using Extended Static Checking.
- John DeTreville,Binder, a Logic-Based Security Language.
- Patrick Drew McDaniel,Atul Prakash,Methods and Limitations of Security Policy Reconciliation.
- Frédéric Cuppens,Alexandre Miège,Alert Correlation in a Cooperative Intrusion Detection Framework.
- Jessica Staddon,Sara K. Miner,Matthew K. Franklin,Dirk Balfanz,Michael Malkin,Drew Dean,Self-Healing Key Distribution with Revocation.
- Christopher Krügel,Fredrik Valeur,Giovanni Vigna,Richard A. Kemmerer,Stateful Intrusion Detection for High-Speed Networks.
- John F. Canny,Collaborative Filtering with Privacy.
- Rob Sherwood,Bobby Bhattacharjee,Aravind Srinivasan,P5: A Protocol for Scalable Anonymous Communication.
- Ninghui Li,John C. Mitchell,William H. Winsborough,Design of a Role-Based Trust-Management Framework.
- Heiko Mantel,On the Composition of Secure Systems.
- Oleg Sheyner,Joshua W. Haines,Somesh Jha,Richard Lippmann,Jeannette M. Wing,Automated Generation and Analysis of Attack Graphs.
- Qixiang Sun,Daniel R. Simon,Yi-Min Wang,Wilf Russell,Venkata N. Padmanabhan,Lili Qiu,Statistical Identification of Encrypted Web Browsing Traffic.
- Dawn Xiaodong Song,J. D. Tygar,David Zuckerman,Expander Graphs for Digital Stream Authentication and Robust Overlay Networks.
- Ken Ashcraft,Dawson R. Engler,Using Programmer-Written Compiler Extensions to Catch Security Holes.
- Josyula R. Rao,Pankaj Rohatgi,Helmut Scherzer,Stephane Tinguely,Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards.
- Kymie M. C. Tan,Roy A. Maxion,"Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector.
- Olav L. Bandmann,Babak Sadighi Firozabadi,Mads Dam,Constrained Delegation.
2001
- Philip D. MacKenzie,Michael K. Reiter,Networked Cryptographic Devices Resilient to Capture.
- Stephen Weeks,Understanding Trust Management Systems.
- Trevor Jim,SD3: A Trust Management System with Certified Evaluation.
- Joy Algesheimer,Christian Cachin,Jan Camenisch,Günter Karjoth,Cryptographic Security for Mobile Code.
- R. Sekar,M. Bendre,D. Dhurjati,P. Bollineni,A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors.
- Hilary K. Browne,William A. Arbaugh,John McHugh,William L. Fithen,A Trend Analysis of Exploitations.
- Alan Harbitter,Daniel A. Menascé,Performance of Public-Key-Enabled Kerberos Authentication in Large Networks.
- Fabian Monrose,Michael K. Reiter,Qi Li,Susanne Wetzel,Cryptographic Key Generation from Voice.
- Wai W. Fung,Mordecai J. Golin,James W. Gray III,Protection of Keys against Modification Attack.
- Adrian Perrig,Dawn Xiaodong Song,J. D. Tygar,ELK, A New Protocol for Efficient Large-Group Key Distribution.
- David Wagner,Drew Dean,Intrusion Detection via Static Analysis.
- John E. Gaffney Jr.,Jacob W. Ulvila,Evaluation of Intrusion Detectors: A Decision Theory Approach.
- Wenke Lee,Dong Xiang,Information-Theoretic Measures for Anomaly Detection.
- Johan Agat,David Sands,On Confidentiality and Algorithms.
- Matthew G. Schultz,Eleazar Eskin,Erez Zadok,Salvatore J. Stolfo,Data Mining Methods for Detection of New Malicious Executables.
- Heiko Mantel,Preserving Information Flow Properties under Refinement.
- Birgit Pfitzmann,Michael Waidner,A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission.
- Sara K. Miner,Jessica Staddon,Graph-Based Authentication of Digital Streams.
- Xuhui Ao,Naftaly H. Minsky,Victoria Ungureanu,Formal Treatment of Certificate Revocation under Communal Access Control.
2000
- Albert Levi,M. Ufuk Çaglayan,An Efficient, Dynamic and Trust Preserving Public Key Infrastructure.
- Joshua D. Guttman,F. Javier Thayer,Authentication Tests.
- John A. Clark,Jeremy L. Jacob,Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols.
- Amir Herzberg,Yosi Mass,Joris Mihaeli,Dalit Naor,Yiftach Ravid,Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.
- Jonathan S. Shapiro,Sam Weber,Verifying the EROS Confinement Mechanism.
- John R. Hughes,Tuomas Aura,Matt Bishop,Using Conservation of Flow as a Security Mechanism in Network Protocols.
- Úlfar Erlingsson,Fred B. Schneider,IRM Enforcement of Java Stack Inspection.
- David A. Cooper,A More Efficient Use of Delta-CRLs.
- Alain J. Mayer,Avishai Wool,Elisha Ziskind,Fang: A Firewall Analysis Engine.
- Ninghui Li,Benjamin N. Grosof,Joan Feigenbaum,A Practically Implementable and Tractable Delegation Logic.
- Timothy Fraser,LOMAC: Low Water-Mark Integrity Protection for COTS Environments.
- Sanjeev Setia,Samir Koussih,Sushil Jajodia,Eric Harder,Kronos: A Scalable Group Re-Keying Approach for Secure Multicast.
- Calvin Ko,Logic Induction of Valid Behavior Specifications for Intrusion Detection.
- Adrian Perrig,Ran Canetti,J. D. Tygar,Dawn Xiaodong Song,Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
- Jonathan K. Millen,Harald Rueß,Protocol-Independent Secrecy.
- Dirk Balfanz,Drew Dean,Mike Spreitzer,A Security Infrastructure for Distributed Java Applications.
- Dawn Xiaodong Song,David Wagner,Adrian Perrig,Practical Techniques for Searches on Encrypted Data.
- Ronald W. Ritchey,Paul Ammann,Using Model Checking to Analyze Network Vulnerabilities.
1999
- Steven Dawson,Sabrina De Capitani di Vimercati,Pierangela Samarati,Specification and Enforcement of Classification and Inference Constraints.
- Wenke Lee,Salvatore J. Stolfo,Kui W. Mok,A Data Mining Framework for Building Intrusion Detection Models.
- Haruna R. Isa,William R. Shockley,Cynthia E. Irvine,A Multi-Threading Architecture for Multilevel Secure Transaction Processing.
- Catherine Meadows,Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer.
- Thomas P. Jensen,Daniel Le Métayer,Tommy Thorn,Verification of Control Flow based Security Properties.
- Jonathan K. Millen,Local Reconfiguration Policies.
- Timothy Fraser,Lee Badger,Mark Feldman,Hardening COTS Software with Generic Software Wrappers.
- Mary Ellen Zurko,Richard T. Simon,Tom Sanfilippo,A User-Centered, Modular Authorization Service Built on an RBAC Foundation.
- Douglas N. Hoover,B. N. Kausik,Software Smart Cards via Cryptographic Camouflage.
- Martín Abadi,Cédric Fournet,Georges Gonthier,Secure Communications Processing for Distributed Languages.
- Yair Bartal,Alain J. Mayer,Kobbi Nissim,Avishai Wool,Firmato: A Novel Firewall Management Toolkit.
- David Rosenthal,Francis Fung,A Test for Non-Disclosure in Security Level Translations.
- Christina Warrender,Stephanie Forrest,Barak A. Pearlmutter,Detecting Intrusions using System Calls: Alternative Data Models.
- David Evans,Andrew Twyman,Flexible Policy-Directed Code Safety.
- Ulf Lindqvist,Phillip A. Porras,Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST).
1998
- Chris Carroll,Yair Frankel,Yiannis Tsiounis,Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems.
- Jonathan T. Trostle,Timing Attacks Against Trusted Path.
- F. Javier Thayer,Jonathan C. Herzog,Joshua D. Guttman,Strand Spaces: Why is a Security Protocol Correct?
- Dan S. Wallach,Edward W. Felten,Understanding Java Stack Inspection.
- N. Asokan,Victor Shoup,Michael Waidner,Asynchronous Protocols for Optimistic Fair Exchange.
- Premkumar T. Devanbu,Stuart G. Stubblebine,Stack and Queue Integrity on Hostile Platforms.
- Sang Hyuk Son,Craig Chaney,Norris P. Thomlinson,Partial Security Policies to Support Timeliness in Secure Real-Time Databases.
- Andrew C. Myers,Barbara Liskov,Complete, Safe Information Flow with Decentralized Labels.
- Richard Hayton,Jean Bacon,Ken Moody,Access Control in an Open Distributed Environment.
- Wenbo Mao,Necessity and Realization of Universally Verifiable Secret Sharing.
- Kirk A. Bradley,Steven Cheung,Nicholas J. Puketza,Biswanath Mukherjee,Ronald A. Olsson,Detecting Disruptive Routers: A Distributed Network Monitoring Approach.
- Feng Bao,Robert H. Deng,Wenbo Mao,Efficient and Practical Fair Exchange Protocols with Off-Line TTP.
- Heather M. Hinton,Composing Partially-Specified Systems.
- Dahlia Malkhi,Michael K. Reiter,Aviel D. Rubin,Secure Execution of Java Applets using a Remote Playground.
- Timothy Fraser,Lee Badger,Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTE.
- Virgil D. Gligor,Serban I. Gavrila,David F. Ferraiolo,On the Formal Definition of Separation-of-Duty Policies and their Composition.
- Tomas Sander,Christian F. Tschudin,Towards Mobile Cryptography.
- George I. Davida,Yair Frankel,Brian J. Matt,On Enabling Secure Applications Through Off-Line Biometric Identification.
- Anup K. Ghosh,Tom O'Connor,Gary McGraw,An Automated Approach for Identifying Potential Vulnerabilities in Software.
1997
- Laurence Cholvy,Frédéric Cuppens,Analyzing Consistency of Security Policies.
- Adam L. Young,Moti Yung,Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage.
- Joshua D. Guttman,Filtering Postures: Local Enforcement for Global Policies.
- John C. Mitchell,Mark Mitchell,Ulrich Stern,Automated analysis of cryptographic protocols using Mur-phi.
- Aris Zakinthinos,E. Stewart Lee,A General Theory of Security Properties.
- Sarvar Patel,Number Theoretic Attacks on Secure Password Schemes.
- Sushil Jajodia,Pierangela Samarati,V. S. Subrahmanian,A Logical Language for Expressing Authorizations.
- John Hale,Sujeet Shenoi,Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery.
- Calvin Ko,Manfred Ruschitzka,Karl N. Levitt,Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach.
- Paul Ammann,Sushil Jajodia,Catherine D. McCollum,Barbara T. Blaustein,Surviving information warfare attacks on databases.
- Vincent Nicomette,Yves Deswarte,An Authorization Scheme For Distributed Object Systems.
- Paul F. Syverson,David M. Goldschlag,Michael G. Reed,Anonymous Connections and Onion Routing.
- Kelly Djahandari,Daniel F. Sterne,An MBone Proxy for an Application Gateway Firewall.
- William A. Arbaugh,David J. Farber,Jonathan M. Smith,A Secure and Reliable Bootstrap Architecture.
- Christoph L. Schuba,Ivan Krsul,Markus G. Kuhn,Eugene H. Spafford,Aurobindo Sundaram,Diego Zamboni,Analysis of a Denial of Service Attack on TCP.
- Elena Ferrari,Pierangela Samarati,Elisa Bertino,Sushil Jajodia,Providing flexibility in information flow control for object oriented systems.
- Ulf Lindqvist,Erland Jonsson,How to Systematically Classify Computer Security Intrusions.
- Mark Moriconi,Xiaolei Qian,Robert A. Riemenschneider,Li Gong,Secure Software Architectures.
- V. R. Pesati,T. E. Keefe,S. Pal,The Design and Implementation of a Multilevel Secure Log Manager.
- Michael K. Reiter,Stuart G. Stubblebine,Toward Acceptable Metrics of Authentication.
1996
- Todd Fine,Defining Noninterference in the Temporal Logic of Actions.
- Jianying Zhou,Dieter Gollmann,A Fair Non-repudiation Protocol.
- Xiaolei Qian,View-Based Access Control with High Assurance.
- Paul F. Syverson,Limitations on Design Principles for Public Key Protocols.
- Wenbo Mao,On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions.
- Ira S. Moskowitz,Steven J. Greenwald,Myong H. Kang,An Analysis of the Timed Z-channel.
- Simon N. Foley,Li Gong,Xiaolei Qian,A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification.
- Stephanie Forrest,Steven A. Hofmeyr,Anil Somayaji,Thomas A. Longstaff,A Sense of Self for Unix Processes.
- Dieter Gollmann,What do We Mean by Entity Authentication?
- Paul Ammann,Sushil Jajodia,Indrakshi Ray,Ensuring Atomicity of Multilevel Transactions.
- Ross J. Anderson,A Security Policy Model for Clinical Information Systems.
- Cristina Serban,Bruce M. McMillin,Run-Time Security Evaluation (RTSE) for Distributed Applications.
- Martin Röscheisen,Terry Winograd,A Communication Agreement Framework for Access/Action Control.
- Steve Schneider,Security Properties and CSP.
- Matt Blaze,Joan Feigenbaum,Jack Lacy,Decentralized Trust Management.
- Elisa Bertino,Sushil Jajodia,Pierangela Samarati,Supporting Multiple Access Control Policies in Database Systems.
- Patrik D'haeseleer,Stephanie Forrest,Paul Helman,An Immunological Approach to Change Detection: Algorithms, Analysis and Implications.
- Drew Dean,Edward W. Felten,Dan S. Wallach,Java Security: From HotJava to Netscape and Beyond.
- Leendert van Doorn,Martín Abadi,Michael Burrows,Edward Wobber,Secure Network Objects.
- Adam L. Young,Moti Yung,Cryptovirology: Extortion-Based Security Threats and Countermeasures.
1995
- Andrew Warner,Thomas F. Keefe,Version pool management in a multilevel secure multiversion transaction manager.
- Fang Chen,Ravi S. Sandhu,The semantics and expressive power of the MLR data model.
- Myong H. Kang,Ira S. Moskowitz,Daniel C. Lee,A network version of the Pump.
- Olin Sibert,Phillip A. Porras,Robert Lindell,The Intel 80×86 processor architecture: pitfalls for secure systems.
- Rajashekar Kailar,Reasoning about accountability in protocols for electronic commerce.
- Sylvan Pinsky,Absorbing covers and intransitive non-interference.
- Randy Browne,An architecture for covert channel control in realtime networks and multiprocessors.
- David A. Cooper,Kenneth P. Birman,Preserving privacy in a network of mobile computers.
- Balaji R. Venkatraman,Richard E. Newman-Wolfe,Capacity estimation and auditability of network covert channels.
- Cynthia E. Irvine,A multilevel file system for high assurance.
- Ross J. Anderson,S. Johann Bezuidenhoudt,Cryptographic credit control in pre-payment metering systems.
- Robert H. Deng,Shailendra K. Bhonsle,Weiguo Wang,Aurel A. Lazar,Integrating security in CORBA based object architectures.
- Stuart G. Stubblebine,Recent-secure authentication: enforcing revocation in distributed systems.
- Rasikan David,Sang Hyuk Son,Ravi Mukkamala,Supporting security requirements in multilevel real-time databases.
- Stuart Staniford-Chen,Todd L. Heberlein,Holding intruders accountable on the Internet.
- Matthew K. Franklin,Michael K. Reiter,The design and implementation of a secure auction service.
- Mike Seager,David Guaspari,Matthew Stillerman,Carla Marceau,Formal methods in the THETA kernel.
- Jonathan K. Millen,The Interrogator model.
- Lee Badger,Daniel F. Sterne,David L. Sherman,Kenneth M. Walker,Sheila A. Haghighat,Practical Domain and Type Enforcement for UNIX.
- A. W. Roscoe,CSP and determinism in security modelling.
1994
- Li Gong,Xiaolei Qian,The complexity and composability of secure interoperation.
- Mark E. Stickel,Elimination of inference channels by optimal upgrading.
- Xiaolei Qian,Inference channel-free integrity constraints in multilevel relational databases.
- Paul F. Syverson,Paul C. van Oorschot,On unifying some cryptographic protocol logics.
- Steven T. Eckmann,Eliminating formal flows in automated information flow analysis.
- Ravi S. Sandhu,Srinivas Ganta,On the minimality of testing for rights in transformation models.
- Ram Kumar,Ensuring data security in interrelated tabular data.
- Stephanie Forrest,Alan S. Perelson,Lawrence Allen,Rajesh Cherukuri,Self-nonself discrimination in a computer.
- Gregory L. Mayhew,A low cost, high speed encryption system and method.
- Ira S. Moskowitz,Allen R. Miller,Simple timing channels.
- Vijay Varadharajan,Claudio Calvelli,Extending the schematic protection model. I. Conditional tickets and authentication.
- John McLean,A general theory of composition for trace sets closed under selective interleaving functions.
- Elisa Bertino,Luigi V. Mancini,Sushil Jajodia,Collecting garbage in multilevel secure object stores.
- Nevin Heintze,J. Doug Tygar,A model for secure protocols and their compositions.
- Martín Abadi,Roger M. Needham,Prudent engineering practice for cryptographic protocols.
- Michael K. Reiter,A secure group membership protocol.
- Randy Browne,Mode security: an infrastructure for covert channel suppression.
- Ulf Carlsen,Generating formal cryptographic protocol specifications.
- Nora Boulahia-Cuppens,Frédéric Cuppens,Asynchronous composition and required security conditions.
1993
- James W. Gray III,On introducing noise into the bus-contention channel.
- Jonathan T. Trostle,Modelling a fuzzy time system.
- Paul Syverson,Cathernine Meadows,A logical language for specifying cryptographic protocol requirements.
- Michael K. Reiter,Li Gong,Preventing denial and forgery of causal relationships in distributed systems.
- Frédéric Cuppens,A logical analysis of authorized and prohibited information flows.
- Raphael Yahalom,Birgit Klein,Thomas Beth,Trust relationships in secure systems-a distributed authentication perspective.
- Stuart G. Stubblebine,Virgil D. Gligor,Protocol design for integrity protection.
- Refik Molva,Gene Tsudik,Authentication method with impersonal token cards.
- Vijayalakshmi Atluri,Elisa Bertino,Sushil Jajodia,Achieving stricter correctness requirements in multilevel secure databases.
- Koral Ilgun,USTAT: a real-time intrusion detection system for UNIX.
- Barbara T. Blaustein,Sushil Jajodia,Catherine D. McCollum,LouAnna Notargiacomo,A model of atomicity for multilevel transactions.
- Todd Fine,Spencer E. Minear,Assuring Distributed Trusted Mach.
- Jeffrey O. Kephart,Steve R. White,Measuring and modeling computer virus prevalence.
- Xiaolei Qian,Mark E. Stickel,Peter D. Karp,Teresa F. Lunt,Thomas D. Garvey,Detection and elimination of inference channels in multilevel relational database systems.
- Thomas Y. C. Woo,Simon S. Lam,A semantic model for authentication protocols.
- Joseph D. Horton,Robert Harland,Elton Ashby,R. H. Cooper,W. F. Hyslop,Bradford G. Nickerson,W. M. Stewart,O. K. Ward,The cascade vulnerability problem.
- Frank Piessens,Bart De Decker,Phil Janson,Interconnecting domains with heterogeneous key distribution and authentication protocols.
1992
- Catherine Meadows,Using traces based on procedure calls to reason about composability.
- Glenn S. Benson,An optimal solution to the secure reader-writer problem.
- Oliver Costich,John P. McDermott,A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture.
- Jonathan K. Millen,Teresa F. Lunt,Security for object-oriented database systems.
- James W. Gray III,Paul F. Syverson,A logical approach to multilevel security of probabilistic systems.
- Steven M. Bellovin,Michael Merritt,Encrypted key exchange: password-based protocols secure against dictionary attacks.
- Ravi S. Sandhu,Gurpreet S. Suri,Non-monotonic transformation of access rights.
- Clark Weissman,BLACKER: security for the DDN examples of A1 security engineering trades.
- Wei-Ming Hu,Lattice scheduling and covert channels.
- Ira S. Moskowitz,Allen R. Miller,The influence of delay upon an idealized channel's bandwidth.
- Jeremy Epstein,John McHugh,Rita Pascale,C. Martin,D. Rothnie,Hilarie K. Orman,Ann B. Marmor-Squires,M. Branstad,B. Danner,Evolution of a trusted B3 window system prototype.
- Sushil Jajodia,Vajayalakshmi Atluri,Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases.
- Stuart G. Stubblebine,Virgil D. Gligor,On message integrity in cryptographic protocols.
- Paul Ammann,Frank Jaeckle,Sushil Jajodia,A two snapshot algorithm for concurrency control in multi-level secure databases.
- Hervé Debar,Monique Becker,Didier Siboni,A neural network component for an intrusion detection system.
- Einar Snekkenes,Roles in cryptographic protocols.
- Virgil D. Gilgor,Shyh-Wei Luan,Joseph N. Pato,On inter-realm authentication in large distributed systems.
- Thomas Y. C. Woo,Simon S. Lam,Authorization in distributed systems: a formal approach.
- Frédéric Cuppens,Kioumars Yazdanian,A 'natural' decomposition of multi-level relations.
- Michael K. Reiter,Kenneth P. Birman,Li Gong,Integrating security in a group oriented distributed system.
- Ravi S. Sandhu,The typed access matrix model.
- Jonathan K. Millen,A resource allocation model for denial of service.
1991
- Randy Brown,The Turing Test and Non-Information Flow.
- H. S. Javitz,A. Valdes,The SRI IDES Statistical Anomaly Detector.
- Jim Alves-Foss,Karl N. Levitt,Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components.
- Phillip A. Porras,Richard A. Kemmerer,Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
- Daniel F. Sterne,On the Buzzword "Security Policy".
- George T. Duncan,Sumitra Mukherjee,Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query Control.
- Yves Deswarte,Laurent Blain,Jean-Charles Fabre,Intrusion Tolerance in Distributed Computing Systems.
- Jeffrey O. Kephart,Steve R. White,Directed-Graph Epidemiological Models of Computer Viruses.
- Sushil Jajodia,Ravi S. Sandhu,A Novel Decomposition of Multilevel Relations into Single-Level Relations.
- Nancy L. Kelem,Richard J. Feiertag,A Separation Model for Virtual Machine Monitors.
- Simon N. Foley,A Taxonomy for Information Flow Policies and Models.
- Wei-Ming Hu,Reducing Timing Channels with Fuzzy Time.
- C. Fritzner,L. Nilsen,Å. Skomedal,Protecting Security Information in Distributed Systems.
- Simon S. Lam,A. Udaya Shankar,Thomas Y. C. Woo,Applying a Theory of Modules and Interfaces to Security Verification.
- Paul Ammann,Ravi S. Sandhu,Safety Analysis for the Extended Schematic Protection Model.
- Einar Snekkenes,Exploring the BAN Approach to Protocol Analysis.
- John C. Wray,An Analysis of Covert Timing Channels.
- Vijay Varadharajan,Phillip Allen,Stewart Black,An Analysis of the Proxy Problem in Distributed Systems.
- Edward Amoroso,Thu Nguyen,Jonathan Weiss,John Watson,Pete Lapiska,Terry Starr,Toward an Approach to Measuring Software Trust.
- Ira S. Moskowitz,Variable Noise Effects Upon a Simple Timing Channel.
- Shiuh-Pyng Shieh,Virgil D. Gligor,A Pattern-Oriented Intrusion-Detection Model and Its Applications.
- Paul F. Syverson,The Use of Logic in the Analysis of Cryptographic Protocols.
- Udo Kelter,Discretionary Access Controls in a High-Performance Object Management System.
- James W. Gray III,Toward a Mathematical Foundation for Information Flow Security.
- Paul A. Karger,John C. Wray,Storage Channels in Disk Arm Optimization.
- James G. Williams,Modeling Nondisclosure in Terms of the Subject-Instruction Stream.
- Joseph J. Tardo,Kannan Alagappan,SPX: Global Authentication Using Public Key Certificates.
- Catherine Meadows,A System for the Specification and Verification of Key Management Protocols.
1990
- P.-C. Cheng,Virgil D. Gligor,On the Formal Specification and Verification of a Multiparty Session Protocol.
- H. Brix,A. Dietl,Formal Construction of Provably Secure Systems with Cartesiana.
- John McLean,Security Models and Information Flow.
- Henry S. Teng,Kaihu Chen,Stephen C. Y. Lu,Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns.
- Dan Gusfield,A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D Tables.
- Joshua D. Guttman,H.-P. Ko,Verifying a Hardware Security Architecture.
- L. Todd Herberlein,Gihan V. Dias,Karl N. Levitt,Biswanath Mukherjee,Jeff Wood,David Wolber,A Network Security Monitor.
- Shiuh-Pyng Shieh,Virgil D. Gligor,Auditing the Use of Covert Storage Channels in Secure Systems.
- R. Ramaswamy,A Security Architecture and Mechanism for Data Confidentiality in TCP/IP Protocols.
- Li Gong,Roger M. Needham,Raphael Yahalom,Reasoning about Belief in Cryptographic Protocols.
- R. W. Baldwin,Naming and Grouping Privileges to Simplify Security Management in Large Databases.
- Paul A. Karger,Mary Ellen Zurko,Douglas W. Bonin,Andrew H. Mason,Clifford E. Kahn,A VMM Security Kernel for the VAX Architecture.
- K. F. Seiden,J. P. Melanson,The Auditing Facility for a VMM Security Kernel.
- J. Linn,Practical Authentication for Distributed Computing.
- Catherine D. McCollum,J. R. Messing,LouAnna Notargiacomo,Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.
- Sushil Jajodia,Ravi S. Sandhu,Polyinstantiation Integrity in Multilevel Relations.
- Catherine Meadows,Extending the Brewer-Nash Model to a Multilevel Context.
- Michael J. Nash,K. R. Poland,Some Conundrums Concerning Separation of Duty.
- N. A. Waldhart,The Army Secure Operating System.
- W. C. Birnbaum,SP3 Peer Identification.
- Todd Fine,Constructively Using Noninterference to Analyze Systems.
- Phillip J. Windley,A Hierarchical Methodology for Verifying Microprogrammed Microprocessors.
- Benedetto L. DiVito,P. H. Palmquist,E. R. Anderson,M. L. Johnston,Specification and Verification of the ASOS Kernel.
- Thomas F. Keefe,Wei-Tek Tsai,Multiversion Concurrency Control for Multilevel Secure Database Systems.
- Rae K. Burns,Referential Secrecy.
- Rein Turn,Information Privacy Issues for the 1990s.
- Morrie Gasser,E. McDermott,An Architecture for Practical Delegation in a Distributed System.
- Benedetto L. DiVito,Cristi Garvey,D. Kwong,A. Murray,Jane Solomon,Amy Wu,The Deductive Theory Manager: A Knowledge Based System for Formal Verification.
- Sushil Jajodia,Boris Kogan,Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture.
- Sushil Jajodia,Boris Kogan,Integrating an Object-Oriented Data Model with Multilevel Security.
- J. Todd Wittbold,Dale M. Johnson,Information Flow in Nondeterministic Systems.
- James W. Gray III,Probabilistic Interference.
- Gary W. Smith,Modeling Security-Relevant Data Semantics.
- M. Branstad,W. C. Barker,P. Cochrane,The Role of Trust in Protected Mail.
1989
- Ravi S. Sandhu,Transformation of Access Rights.
- Theodore M. P. Lee,Statistical Models of Trust: TCBs vs. People.
- J. C. Williams,George W. Dinolt,Formal Model of a Trusted File Server.
- M. Branstad,Homayoon Tajalli,F. Mayer,D. Dalva,Access Mediation in a Message Passing Kernel.
- J. Wilson,A Security Policy for an A1DBMS (a Trusted Subject).
- Deborah Estrin,Gene Tsudik,Security Issues in Policy Routing.
- Tzong-An Su,JiYoung Chung,Gultekin Özsoyoglu,On the Cell Suppression by Merging Technique in the Lattice Model of Summary Tables.
- J. Jacob,On the Derivation of Secure Components.
- G.-L. Grenier,Richard C. Holt,M. Funkenhauser,Policy vs. Mechanism in the Secure TUNIS Operating System.
- Glenn S. Benson,William F. Appelbe,Ian F. Akyildiz,The Hierarchical Model of Distributed System Security.
- S. Crocker,M. Pozzo,A Proposal for a Verification-Based Virus Filter.
- Phil Terry,Simon R. Wiseman,A "New" Security Policy Model.
- Lein Harn,Thomas Kiesler,Authenticated Group Key Distribution Scheme for a Large Distributed Network.
- Timothy E. Levin,S. J. Padilla,Cynthia E. Irvine,A Formal Model for UNIX Setuid.
- M. Schaefer,Symbol Security Condition Considered Harmful.
- Lee Badger,A Model for Specifying Multi-Granularity Integrity Policies.
- John E. Dobson,John A. McDermid,A Framework for Expressing Models of Security Policy.
- M. R. Cornwell,A Software Engineering Approach to Designing Trustworthy Software.
- H. S. Vaccaro,Gunar E. Liepins,Detection of Anomalous Computer Session Activity.
- Eduardo B. Fernández,Ehud Gudes,Haiyan Song,A Security Model for Object-Oriented Databases.
- O. Sami Saydjari,J. M. Beckman,J. R. Leaman,LOCK Trak: Navigating Uncharted Space.
- George I. Davida,Yvo Desmedt,Brian J. Matt,Defending Systems against Viruses through Cryptographic Authentication.
- Dan M. Nessett,Layering Central Authentication on Existing Distributed System Terminal Services.
- Mark W. Eichin,Jon A. Rochlis,With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988.
- Catherine Meadows,Using Narrowing in the Analysis of Key Management Protocols.
- Li Gong,A Secure Identity-Based Capability System.
- Simon N. Foley,A Model for Secure Information Flow.
- Thomas J. Parenty,The Incorporation of Multi-Level IPC into UNIX.
- M. Schaefer,W. C. Barker,Charles P. Pfleeger,Tea and I: An Allergy.
- Teresa F. Lunt,Aggregation and Inference: Facts and Fallacies.
- Paul A. Karger,New Methods for Immediate Revocation.
- D. F. C. Brewer,Michael J. Nash,The Chinese Wall Security Policy.
- S. T. Walker,Network Security: The Parts of the Sum.
1988
- Stephen D. Crocker,Eve Cohen,Sue Landauer,Hilarie Orman,Reverification of a microprocessor.
- Dorothy E. Denning,Teresa F. Lunt,Roger R. Schell,William R. Shockley,Mark Heckman,The SeaView security model.
- Paul A. Karger,Implementing commercial data integrity with secure capabilities.
- Chii-Ren Tsai,Virgil D. Gligor,A bandwidth computation model for covert storage channels and its applications.
- Stephen T. Vinter,Extended discretionary access controls.
- John McLean,The algebra of security.
- Thomas A. Casey Jr.,Stephen T. Vinter,D. G. Weber,Rammohan Varadarajan,David Rosenthal,A secure distributed operating system.
- Janice I. Glasgow,Glenn H. MacEwen,Reasoning about knowledge in multilevel secure distributed systems.
- Matthew Morgenstern,Controlling logical inference in multilevel database systems.
- P. Venkat Rangan,An axiomatic basis of trust in distributed systems.
- Jackson Wilson,Views as the security objects in a multilevel secure relational database management system.
- Cristi Garvey,Amy Wu,ASDViews [relational databases].
- Mark K. Joseph,Algirdas Avizienis,A fault tolerance approach to computer viruses.
- Che-Fu Yu,Virgil D. Gligor,A formal specification and verification method for the prevention of denial of service.
- David Elliott Bell,Concerning 'modeling' of computer security.
- Thomas H. Hinke,Inference aggregation detection in database management systems.
- Daryl McCullough,Noninterference and the composability of security properties.
- Teresa F. Lunt,R. Jagannathan,A prototype real-time intrusion-detection expert system.
- Jeremy Jacob,Security specifications.
- David Elliott Bell,Security policy modeling for the next-generation packet switch.
- Karen R. Sollins,Cascaded authentication.
- Simon R. Wiseman,Phil Terry,Andrew Wood,Clare Harrold,The trusted path between SMITE and the user.
- Theodore M. P. Lee,Using mandatory integrity to enforce 'commercial' security.
- Teresa F. Lunt,Roger R. Schell,William R. Shockley,Mark Heckman,Dan Warren,A near-term design for the SeaView multilevel database system.
1987
- J. C. Williams,George W. Dinolt,A Graph-Theoretic Formulation of Multilevel Secure Distributed Systems: An Overview.
- Louise E. Moser,Graph Homomorphisms and the Design of Secure Computer Systems.
- Steve H. Weingart,Physical Security for the µABYSS System.
- Glenn H. MacEwen,V. W. W. Poon,Janice I. Glasgow,A Model for Multilevel Security Based on Operator Nets.
- Dorothy E. Denning,Teresa F. Lunt,Roger R. Schell,Mark Heckman,William R. Shockley,A Multilevel Relational Data Model.
- Simon N. Foley,A Universal Theory of Information Flow.
- Steve R. White,Liam Comerford,ABYSS: A Trusted Architecture for Software Protection.
- Tzong-An Su,Gultekin Özsoyoglu,Data Dependencies and Inference Control in Multilevel Relational Database Systems.
- John P. L. Woodward,Exploiting the Dual Nature of Sensitivity Labels.
- D. D. Clark,D. R. Wilson,A Comparison of Commercial and Military Computer Security Policies.
- Jonathan K. Millen,Covert Channel Capacity.
- David P. Anderson,P. Venkat Rangan,A Basis for Secure Communication in Large Distributed Systems.
- Paul A. Karger,Limiting the Damage Potential of Discretionary Trojan Horses.
- Daryl McCullough,Specifications for Multi-Level Security and a Hook-Up Property.
- John McLean,Reasoning About Security Models.
- Richard A. Kemmerer,Using Formal Verification Techniques to Analyze Encryption Protocols.
- Chii-Ren Tsai,Virgil D. Gligor,C. Sekar Chandersekaran,A Formal Method for the Identification of Covert Storage Channels in Source Code.
- Selim G. Akl,Dorothy E. Denning,Checking Classification Constraints for Consistency and Completeness.
- Thomas A. Berson,Teresa F. Lunt,Multilevel Security for Knowledge-Based Systems.
- J. Guttman,Information Flow and Invariance.
- William D. Young,John McHugh,Coding for a Believable Specification to Implementation Mapping.
- William R. Bevier,Warren A. Hunt Jr.,William D. Young,Toward Verified Execution Environments.
- Jeffrey Picciotto,The Design of an Effective Auditing Subsystem.
- Catherine Meadows,The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels.
- Paul T. Cummings,D. A. Fullam,M. J. Goldstein,M. J. Gosselin,Jeffrey Picciotto,John P. L. Woodward,J. Wynn,Compartimented Mode Workstation: Results Through Prototyping.
- Deborah Estrin,Gene Tsudik,Visa Scheme for Inter-Organization Network Security.
1986
- Catherine Meadows,A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party.
- L. S. Chalmers,An Analysis of the Differences Between the Computer Security Practices in the Military and Private Sectors.
- S. A. Rajunas,Norman Hardy,Allen C. Bomberger,William S. Frantz,Charles R. Landau,Security in KeyKOS™.
- J. Daniel Halpern,Sam Owre,Norman Proctor,William F. Wilson,Muse : A Computer Assisted Verification System.
- Ravi S. Sandhu,M. E. Share,Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model.
- Richard Y. Kain,Carl E. Landwehr,On Access Checking in Capability-Based Systems.
- John McHugh,Andrew P. Moore,A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network.
- Wen-Pai Lu,Malur K. Sundareshan,A Hierarchical Key Management Scheme for End-to-End Encryption in Internet Environments.
- Virgil D. Gligor,E. L. Burch,C. Sekar Chandersekaran,Robert S. Chapman,Leslie J. Dotterer,Matthew S. Hecht,Wen-Der Jiang,Gary L. Luckenbaugh,N. Vasudevan,On the Design and the Implementation of Secure Xenix Workstations.
- J. Thomas Haigh,Richard A. Kemmerer,John McHugh,William D. Young,An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
- J.-M. Fray,Yves Deswarte,David Powell,Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering.
- Norman S. Matloff,Another Look at the Use of Noise Addition for Database Security.
- John E. Dobson,Brian Randell,Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
- Simon R. Wiseman,A Secure Capability Computer System.
- Andrew Birrell,Butler W. Lampson,Roger M. Needham,Michael D. Schroeder,A Global Authentication Service without Global Trust.
- Neal R. Wagner,Paul Putter,Marianne R. Cain,Encrypted Database Design: Specialized Approaches.
- R. A. Carlson,Teresa F. Lunt,The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications.
- Dorothy E. Denning,Selim G. Akl,Matthew Morgenstern,Peter G. Neumann,Roger R. Schell,Mark Heckman,Views for Multilevel Database Security.
- Jeannette M. Wing,Mark R. Nixon,Extending Ina Jo with Temporal Logic.
- Dan M. Nessett,Factors Affecting Distributed System Security.
- Virgil D. Gligor,C. Sekar Chandersekaran,W. Cheng,Wen-Der Jiang,Abhai Johri,Gary L. Luckenbaugh,L. Edward Reich,A New Security Testing Method and Its Application to the Secure Xenix Kernel.
- Dorothy E. Denning,An Intrusion-Detection Model.
1985
- W. E. Boebert,R. Y. Kaln,William D. Young,S. A. Hansohn,Secure Ada Target: Issues, System Design, and Verification.
- Douglas M. Gage,Security Considerations for Autonomous Robots.
- Ben G. Matley,Computer Privacy in America: Conflicting Practices and Policy Choices.
- Terry C. Vickers Benzel,Deborah A. Tavilla,Trusted Software Verification: A Case Study.
- Burton H. Patkau,David L. Tennenhouse,The Implementation of Secure Entity-Relationship Databases.
- Gustavus J. Simmons,How to (Selectively) Broadcast A Secret.
- Stephen T. Walker,Network Security Overview.
- Raymond Wong,Thomas A. Berson,Richard J. Feiertag,Polonium: An Identity Authentication System.
- Richard D. Graubart,Kevin J. Duffy,Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS.
- Deborah Downs,Jerzy R. Rub,Kenneth C. Kung,Carole S. Jordan,Issues in Discretionary Access Control.
- G. R. Blakley,Catherine Meadows,A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
- James P. Anderson,A Unification of Computer and Network Security Concepts.
- Tatsuski Okamoto,Akira Shibaishi,A Fast Signature Scheme Based on Quadratic Inequalities.
- Deborah Estrin,Non-Discretionary Controls for Inter-Organization Networks.
- Richard B. Neely,James W. Freeman,Structuring Systems for Formal Verification.
- Norman Proctor,The Restricted Access Processor An Example of Formal Verification.
- E. R. Anderson,Ada's Suitability for Trusted Computer Systems.
- Ravinderpal Singh Sandhu,Analysis of Acyclic Attenuating Systems for the SSR Protection Model.
- Kishore S. Swaminathan,Negotiated Access Control.
- Robert W. Baldwin,Wayne Gramlich,Cryptographic Protocol for Trustable Match Making.
- Virgil D. Gligor,Analysis of the Hardware Verification of the Honeywell SCOMP.
- Gultekin Özsoyoglu,Tzong-An Su,Rounding and Inference Controlin Conceptual Models for Statistical Databases.
- Dorothy E. Denning,Commutative Filters for Reducing Inference Threats in Multilevel Database Systems.
1984
- Carl E. Landwehr,John M. Carroll,Hardware Requirements for Secure Computer Systems: A Framework.
- T. Taylor,Comparison Paper between the Bell and LaPadula Model and the SRI Model.
- Glenn H. MacEwen,B. Burwell,Z.-J. Lu,Multi-Level Security Based on Physical Distribution.
- Deepinder P. Sidhu,Executable Logic Specifications: A New Approach to Computer Security.
- Barry D. Gold,R. R. Linde,P. F. Cudney,KVM/37O in Retrospect.
- M. Schaefer,Roger R. Schell,Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products.
- Neal R. Wagner,Searching for Public-Key Cryptosystems.
- Dan Craigen,Ottawa Euclid and EVES: A Status Report.
- J. O. Neilson,F. E. Wuebker,Design Experiences from the Multilevel Secure MCF Operating System.
- S. Kramer,Linus IV : An Experiment in Computer Security.
- Tanya Korelsky,David Sutherland,Formal Specification of a Multi-Level Secure Operating System.
- Paul A. Karger,A. J. Herbert,An Augmented Capability Architecture to Support Lattice Security and Traceability of Access.
- B. A. Hartman,A Gypsy-Based Kernel.
- Dorothy E. Denning,Cryptographic Checksums for Multilevel Database Security.
- Richard Platek,The Use of Ada as an Implementation Language in Formally Specified Systems.
- David Chaum,A New Paradigm for Individuals in the Information Age.
- John D. McLean,Carl E. Landwehr,Constance L. Heitmeyer,A Formal Statement of the MMS Security Model.
- Richard D. Graubart,The Integrity-Lock Approach to Secure Database Management.
- D. E. Britton,Formal Verification of a Secure Network with End-to-End Encryption.
- Jonathan K. Millen,The Interrogator: A Tool for Cryptographic Protocol Security.
- Joseph A. Goguen,José Meseguer,Unwinding and Inference Control.
- Terry Benzel,Analysis of a Kernel Verification.
- D. Bailey,Attacks on Computers: Congressional Hearings and Pending Legislation.
1983
- K. A. Omar,David L. Wells,Modified Architecture for the Sub-Keys Model.
- Derek Barnes,The Provision of Security for User Data on Packet Switched Networks.
- Robert R. Jueneman,Stephen M. Matyas,Carl H. Meyer,Message Authentication with Manipulation Detection Code.
- Bahaa W. Fam,Jonathan K. Millen,The Channel Assignment Problem.
- Dorothy E. Denning,The Many-Time Pad: Theme and Variations.
- Billy G. Claybrook,Using Views in a Multilevel Secure Database Management System.
- Stephen J. MacKinnon,Selim G. Akl,New Key Generation Algorithms for Multilevel Security.
- Virgil D. Gligor,A Note on the Denial-of-Service Problem.
- Brian Marick,The VERUS Design Verification System.
- Neal R. Wagner,Fingerprinting.
- Subhash C. Kak,Joint Encryption and Error-Correction Coding.
- Paul Woodie,Security Enhancement through Product Evaluation.
- John M. Rushby,Brian Randell,A Distributed Secure System.
- Gustavus J. Simmons,Verification of Treaty Compliance Revisited.
- Roger R. Schell,Evaluating Security Properties of Computer Systems.
- Marvin C. Wunderlich,Recent Advances in the Design and Implementation of Large Integer Factorization Algorithms.
- James P. Anderson,An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk Environments.
- Thomas H. Hinke,Jose Althouse,Richard A. Kemmerer,SDC Secure Release Terminal Project.
1982
- Steven B. Lipner,Non-Discretionery Controls for Commercial Applications.
- Deepinder P. Sidhu,Morrie Gasser,A Multilevel Secure Local Area Network.
- Klaus R. Dittrich,Karlheinz Hug,Peter Kammerer,Dieter Lienert,Hans Mau,Klaus Wachsmuth,Protection in the OSKAR Opereting System: Goals, Concepts, Conseqeuences.
- Richard D. Graubart,John P. L. Woodward,A Preliminary Neval Surveillance OBMS Sacurity.
- Jonathan K. Millen,Kernel Isolation for the PDP-11/70.
- Rein Turn,Privacy Protection in the 1980s.
- Gary Grossman,A Practical Executive for Secure Communications.
- Jane Solomon,Specification-to-Code Correlation.
- George I. Davida,Yi-Shiung Yeh,Cryptographic Relational Algebra.
- Selim G. Akl,Digital Signitures with Blindfolded Arbitrators Who Cannot Form Alliances.
- Christopher Landauer,Stephen Crocker,Precise Information Flow Analysis by Program Verification.
- Neal R. Wagner,Shared Database Access using Composed Encryption Functions.
- Joseph A. Goguen,José Meseguer,Security Policies and Security Models.
- Richard A. Kemmerer,A Practical Approach to Identifying Storage and Timing Channels.
- Dorothy E. Denning,Jan Schlörer,Elisabeth Wehrle,Memoryless Inference Controls for Statistical Databases.
- James P. Anderson,Accelerating Computer Security Innovation.
- George B. Purdy,Gustavus J. Simmons,James Studier,A Software Protection Scheme.
- Gustavus J. Simmons,Diane B. Holdridge,Forward Search as a Cryptanalytic Tool Against a Public Key.
1981
- David A. Bonyun,The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security.
- Naftaly H. Minsky,On the Transport of Privileges.
- G. R. Blakley,Laif Swanson,Security Proofs for Information Protection Systems.
- Margaret S. Wu,Hierarchical Protection Systems.
- Lawrence J. Shirley,Roger R. Schell,Mechanism Sufficiency Validation by Assignment.
- Lyle A. Cox Jr.,Roger R. Schell,The Structure of a Security Kernel for the Z8000 Multiprocessor.
- Allen Stoughton,Access Flow: A Protection Model which Integrates Access Control and Information Flow.
- Dorothy E. Denning,Restriciting Queries that Might Lead to Compromise.
- Luke C. Dion,A Complete Protection Model.
- Charles Cresson Wood,Future Applications of Cryptography.
- Carl H. Meyer,Stephen M. Matyas,Richard E. Lennon,Required Cryptographic Authentication Criteria for Electronic Funds Transfer Systems.
- James S. Miller,Robert G. Resnick,Military Message Systems: Applying a Security Model.
- Daniel J. Solomon,Processing Multilevel Secure Objects.
- George I. Davida,Jon Livesey,The Design of Secure CPU-Multiplexed Computer Systems: The Master/Slave Architecture.
- Gustavus J. Simmons,Half a Loaf is Better than None: Some Novel Message Integrity Problems.
- Jonathan K. Millen,Information Flow Analysis of Formal Specifications.
1980
- George I. Davida,Richard A. DeMillo,Richard J. Lipton,A System Architecture to Support a Verifiably Secure Multilevel Security System.
- Stanley R. Ames Jr.,James G. Keeton-Williams,Demonstrating Security for Trusted Applications on a Security Kernel Base.
- Theodore D. Friedman,Lance J. Hoffman,Towards a Fail-Safe Approach to Secure Databases.
- Steven P. Reiss,Practical Data-Swapping: The First Steps.
- David A. Bonyun,The Secure Relational Database Management System Kernel: Three Years After.
- S. M. Miranda,Aspects of Data Security in General-Purpose Data Base Management Systems.
- Gustavus J. Simmons,Secure Communications in the Presence of Pervasive Deceit.
- P. Barbarino,Multi-Tiered Approach to System Security.
- Adi Shamir,The Cryptographic Security of Compact Knapsacks (Preliminary Report).
- Gerald Kreissig,A Model to Describe Protection Problems.
- L. Liu,On Security Flow Analysis in Computer Systems (Preliminary Report).
- G. R. Blakley,One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist.
- Rein Turn,An Overview of Transborder Data Flow Issues.
- Ralph C. Merkle,Protocols for Public Key Cryptosystems.
- P. Tucker Withington,The Trusted Function in Secure Decentralized Processing.
- Reind P. van de Riet,Martin L. Kersten,Anthony I. Wasserman,A Module Definition Facility for Access Control in Distributed Data Base Systems.
- Dorothy E. Denning,Fred B. Schneider,The Master Key Problem.