Conferences in DBLP
Message from Conference Chair. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:- [Conf ] Copyright. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:- [Conf ] Title Page. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:- [Conf ] Program Committee. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:- [Conf ] Conference Committee. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:- [Conf ] Reviewers. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:- [Conf ] Tutorial Committee. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:- [Conf ] Speaker Biographies. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:- [Conf ] Brian D. Snow We Need Assurance! [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:3-10 [Conf ] Benjamin Schwarz , Hao Chen , David Wagner , Jeremy Lin , Wei Tu , Geoff Morrison , Jacob West Model Checking An Entire Linux Distribution for Security Violations. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:13-22 [Conf ] Jonathon T. Giffin , Mihai Christodorescu , Louis Kruger Strengthening Software Self-Checksumming via Self-Modifying Code. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:23-32 [Conf ] David Wheeler Countering Trusting Trust through Diverse Double-Compiling. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:33-48 [Conf ] Stig Andersson , Andrew Clark , George M. Mohay , Bradley Schatz , Jacob Zimmermann A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:49-58 [Conf ] Robin Sommer , Vern Paxson Exploiting Independent State For Network Intrusion Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:59-71 [Conf ] Paul Ammann , Joseph Pamula , Julie Street , Ronald W. Ritchey A Host-Based Approach to Network Attack Chaining Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:72-84 [Conf ] Norman Feske , Christian Helmuth A Nitpicker's guide to a minimal-complexity secure GUI. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:85-94 [Conf ] Wu Yongzheng , Roland H. C. Yap A User-level Framework for Auditing and Monitoring. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:95-105 [Conf ] Wesam Lootah , William Enck , Patrick McDaniel TARP: Ticket-based Address Resolution Protocol. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:106-116 [Conf ] Jingmin Zhou , Adam J. Carlson , Matt Bishop Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:117-126 [Conf ] Danilo Bruschi , Lorenzo Cavallaro , Andrea Lanzi , Mattia Monga Replay Attack in TCG Specification and Solution. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:127-137 [Conf ] Jan Jürjens Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:138-149 [Conf ] Fanglu Guo , Yang Yu , Tzi-cker Chiueh Automated and Safe Vulnerability Assessment. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:150-159 [Conf ] Steven Noel , Sushil Jajodia Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:160-169 [Conf ] Elisa Bertino , Ashish Kamra , Evimaria Terzi , Athena Vakali Intrusion Detection in RBAC-administered Databases. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:170-182 [Conf ] How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI? [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:183- [Conf ] Mary Ellen Zurko User-Centered Security: Stepping Up to the Grand Challenge. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:187-202 [Conf ] Corrado Leita , Ken Mermoud , Marc Dacier ScriptGen: an automated script generation tool for honeyd. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:203-214 [Conf ] Zhenkai Liang , R. Sekar Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:215-224 [Conf ] Hilmi Günes Kayacik , A. Nur Zincir-Heywood , Malcolm I. Heywood Evolving Successful Stack Overflow Attacks for Vulnerability Testing. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:225-234 [Conf ] Mourad Debbabi , Mohamed Saleh , Chamseddine Talhi , Sami Zhioua Java for Mobile Devices: A Security Study. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:235-244 [Conf ] John Black , Martin Cochran , Martin Ryan Gardner Lessons Learned: A Security Analysis of the Internet Chess Club. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:245-253 [Conf ] Wei Wang , Thomas E. Daniels Building Evidence Graphs for Network Forensics Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:254-266 [Conf ] Paul A. Karger Multi-Level Security Requirements for Hypervisors. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:267-275 [Conf ] Reiner Sailer , Trent Jaeger , Enriquillo Valdez , Ramón Cáceres , Ronald Perez , Stefan Berger , John Linwood Griffin , Leendert van Doorn Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:276-285 [Conf ] Gaurav S. Kc , Angelos D. Keromytis e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:286-302 [Conf ] Vivek Haldar , Deepak Chandra , Michael Franz Dynamic Taint Propagation for Java. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:303-311 [Conf ] Ramaswamy Chandramouli , Scott Rose An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:312-321 [Conf ] Fareed Zaffar , Gershon Kedem , Ashish Gehani Paranoid: A Global Secure File Access Control System. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:322-332 [Conf ] Marla Collier How to Develop a Career in Information Assurance and How to Advance in this Field. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:333- [Conf ] David Elliott Bell Looking Back at the Bell-La Padula Model. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:337-351 [Conf ] Myong H. Kang , Ira S. Moskowitz , Stanley Chincheck The Pump: A Decade of Covert Fun. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:352-360 [Conf ] Weidong Cui , Randy H. Katz , Wai-tian Tan Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:361-370 [Conf ] David Whyte , Paul C. van Oorschot , Evangelos Kranakis Detecting Intra-enterprise Scanning Worms based on Address Resolution. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:371-380 [Conf ] Amit Vasudevan , Ramesh Yerraballi Stealth Breakpoints. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:381-392 [Conf ] Simon N. Foley , Abe Singer , Michael E. Locasto , Stelios Sidiroglou , Angelos D. Keromytis , John McDermott , Julie Thorpe , Paul C. van Oorschot , Anil Somayaji , Richard Ford , Mark Bush , Alex Boulatov Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:393-396 [Conf ] Jun Li , Xun Kang mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:397-408 [Conf ] John P. Jones , Daniel F. Berger , Chinya V. Ravishankar Layering Public Key Distribution Over Secure DNS using Authenticated Delegation. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:409-418 [Conf ] Sara Sinclair , Sean W. Smith PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:419-430 [Conf ] Tine Verhanneman , Frank Piessens , Bart De Win , Wouter Joosen Uniform Application-level Access Control Enforcement of Organizationwide Policies. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:431-440 [Conf ] Sandeep Kumar , Terence Sim , Rajkumar Janakiraman , Sheng Zhang Using Continuous Biometric Verification to Protect Interactive Login Sessions. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:441-450 [Conf ] Rennie deGraaf , John Aycock , Michael J. Jacobson Jr. Improved Port Knocking with Strong Authentication. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:451-462 [Conf ] Xiaoyuan Suo , Ying Zhu , G. Scott Owen Graphical Passwords: A Survey. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:463-472 [Conf ] Sundararaman Jeyaraman , Umut Topkara Have the cake and eat it too - Infusing usability into text-password based authentication systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:473-482 [Conf ] Jason Waddle , David Wagner Fault Attacks on Dual-Rail Encoded Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:483-494 [Conf ] Jennifer Chong , Partha Pratim Pal , Michael Atigethchi , Paul Rubel , Franklin Webber Survivability Architecture of a Mission Critical System: The DPASA Example. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:495-504 [Conf ] Paul Rubel , Michael Ihde , Steven Harp , Charles Payne Generating Policies for Defense in Depth. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:505-514 [Conf ] Meng Yu , Wanyu Zang , Peng Liu Defensive Execution of Transactional Processes against Attacks. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:515-526 [Conf ] Anas Abou El Kalam , Yves Deswarte Privacy Requirements Implemented with a JavaCard. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:527-536 [Conf ] Dingbang Xu , Peng Ning Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:537-546 [Conf ] Yiru Li , Anil Somayaji Securing Email Archives through User Modeling. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:547-556 [Conf ]