The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
2005 (conf/acsac/2005)


  1. Message from Conference Chair. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:- [Conf]

  2. Copyright. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:- [Conf]

  3. Title Page. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:- [Conf]

  4. Program Committee. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:- [Conf]

  5. Conference Committee. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:- [Conf]

  6. Reviewers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:- [Conf]

  7. Tutorial Committee. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:- [Conf]

  8. Speaker Biographies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:- [Conf]
  9. Brian D. Snow
    We Need Assurance! [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:3-10 [Conf]
  10. Benjamin Schwarz, Hao Chen, David Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West
    Model Checking An Entire Linux Distribution for Security Violations. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:13-22 [Conf]
  11. Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger
    Strengthening Software Self-Checksumming via Self-Modifying Code. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:23-32 [Conf]
  12. David Wheeler
    Countering Trusting Trust through Diverse Double-Compiling. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:33-48 [Conf]
  13. Stig Andersson, Andrew Clark, George M. Mohay, Bradley Schatz, Jacob Zimmermann
    A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:49-58 [Conf]
  14. Robin Sommer, Vern Paxson
    Exploiting Independent State For Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:59-71 [Conf]
  15. Paul Ammann, Joseph Pamula, Julie Street, Ronald W. Ritchey
    A Host-Based Approach to Network Attack Chaining Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:72-84 [Conf]
  16. Norman Feske, Christian Helmuth
    A Nitpicker's guide to a minimal-complexity secure GUI. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:85-94 [Conf]
  17. Wu Yongzheng, Roland H. C. Yap
    A User-level Framework for Auditing and Monitoring. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:95-105 [Conf]
  18. Wesam Lootah, William Enck, Patrick McDaniel
    TARP: Ticket-based Address Resolution Protocol. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:106-116 [Conf]
  19. Jingmin Zhou, Adam J. Carlson, Matt Bishop
    Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:117-126 [Conf]
  20. Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga
    Replay Attack in TCG Specification and Solution. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:127-137 [Conf]
  21. Jan Jürjens
    Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:138-149 [Conf]
  22. Fanglu Guo, Yang Yu, Tzi-cker Chiueh
    Automated and Safe Vulnerability Assessment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:150-159 [Conf]
  23. Steven Noel, Sushil Jajodia
    Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:160-169 [Conf]
  24. Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali
    Intrusion Detection in RBAC-administered Databases. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:170-182 [Conf]

  25. How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI? [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:183- [Conf]
  26. Mary Ellen Zurko
    User-Centered Security: Stepping Up to the Grand Challenge. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:187-202 [Conf]
  27. Corrado Leita, Ken Mermoud, Marc Dacier
    ScriptGen: an automated script generation tool for honeyd. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:203-214 [Conf]
  28. Zhenkai Liang, R. Sekar
    Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:215-224 [Conf]
  29. Hilmi Günes Kayacik, A. Nur Zincir-Heywood, Malcolm I. Heywood
    Evolving Successful Stack Overflow Attacks for Vulnerability Testing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:225-234 [Conf]
  30. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Java for Mobile Devices: A Security Study. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:235-244 [Conf]
  31. John Black, Martin Cochran, Martin Ryan Gardner
    Lessons Learned: A Security Analysis of the Internet Chess Club. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:245-253 [Conf]
  32. Wei Wang, Thomas E. Daniels
    Building Evidence Graphs for Network Forensics Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:254-266 [Conf]
  33. Paul A. Karger
    Multi-Level Security Requirements for Hypervisors. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:267-275 [Conf]
  34. Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn
    Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:276-285 [Conf]
  35. Gaurav S. Kc, Angelos D. Keromytis
    e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:286-302 [Conf]
  36. Vivek Haldar, Deepak Chandra, Michael Franz
    Dynamic Taint Propagation for Java. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:303-311 [Conf]
  37. Ramaswamy Chandramouli, Scott Rose
    An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:312-321 [Conf]
  38. Fareed Zaffar, Gershon Kedem, Ashish Gehani
    Paranoid: A Global Secure File Access Control System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:322-332 [Conf]
  39. Marla Collier
    How to Develop a Career in Information Assurance and How to Advance in this Field. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:333- [Conf]
  40. David Elliott Bell
    Looking Back at the Bell-La Padula Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:337-351 [Conf]
  41. Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
    The Pump: A Decade of Covert Fun. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:352-360 [Conf]
  42. Weidong Cui, Randy H. Katz, Wai-tian Tan
    Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:361-370 [Conf]
  43. David Whyte, Paul C. van Oorschot, Evangelos Kranakis
    Detecting Intra-enterprise Scanning Worms based on Address Resolution. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:371-380 [Conf]
  44. Amit Vasudevan, Ramesh Yerraballi
    Stealth Breakpoints. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:381-392 [Conf]
  45. Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov
    Highlights from the 2005 New Security Paradigms Workshop. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:393-396 [Conf]
  46. Jun Li, Xun Kang
    mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:397-408 [Conf]
  47. John P. Jones, Daniel F. Berger, Chinya V. Ravishankar
    Layering Public Key Distribution Over Secure DNS using Authenticated Delegation. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:409-418 [Conf]
  48. Sara Sinclair, Sean W. Smith
    PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:419-430 [Conf]
  49. Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen
    Uniform Application-level Access Control Enforcement of Organizationwide Policies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:431-440 [Conf]
  50. Sandeep Kumar, Terence Sim, Rajkumar Janakiraman, Sheng Zhang
    Using Continuous Biometric Verification to Protect Interactive Login Sessions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:441-450 [Conf]
  51. Rennie deGraaf, John Aycock, Michael J. Jacobson Jr.
    Improved Port Knocking with Strong Authentication. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:451-462 [Conf]
  52. Xiaoyuan Suo, Ying Zhu, G. Scott Owen
    Graphical Passwords: A Survey. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:463-472 [Conf]
  53. Sundararaman Jeyaraman, Umut Topkara
    Have the cake and eat it too - Infusing usability into text-password based authentication systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:473-482 [Conf]
  54. Jason Waddle, David Wagner
    Fault Attacks on Dual-Rail Encoded Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:483-494 [Conf]
  55. Jennifer Chong, Partha Pratim Pal, Michael Atigethchi, Paul Rubel, Franklin Webber
    Survivability Architecture of a Mission Critical System: The DPASA Example. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:495-504 [Conf]
  56. Paul Rubel, Michael Ihde, Steven Harp, Charles Payne
    Generating Policies for Defense in Depth. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:505-514 [Conf]
  57. Meng Yu, Wanyu Zang, Peng Liu
    Defensive Execution of Transactional Processes against Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:515-526 [Conf]
  58. Anas Abou El Kalam, Yves Deswarte
    Privacy Requirements Implemented with a JavaCard. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:527-536 [Conf]
  59. Dingbang Xu, Peng Ning
    Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:537-546 [Conf]
  60. Yiru Li, Anil Somayaji
    Securing Email Archives through User Modeling. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:547-556 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002