|
Conferences in DBLP
External Reviewers. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:- [Conf]
Program Committee. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:- [Conf]
Message from the Program Chairs. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:- [Conf]
- David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha
Towards Automatic Generation of Vulnerability-Based Signatures. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:2-16 [Conf]
- Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul I. Sharif
MisleadingWorm Signature Generators Using Deliberate Noise Injection. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:17-31 [Conf]
- Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, Brian Chavez
Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:32-47 [Conf]
- Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar
Dataflow Anomaly Detection. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:48-62 [Conf]
- Alvaro A. Cárdenas, John S. Baras, Karl Seamon
A Framework for the Evaluation of Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:63-77 [Conf]
- Kevin Borders, Xin Zhao, Atul Prakash
Siren: Catching Evasive Malware (Short Paper). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:78-85 [Conf]
- Dogan Kesdogan, Dakshi Agrawal, Vinh Pham, Dieter Rautenbach
Fundamental Limits on the Anonymity Provided by the MIX Technique. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:86-99 [Conf]
- Lasse Øverlier, Paul Syverson
Locating Hidden Servers. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:100-114 [Conf]
- Yingjiu Li, Haibing Lu, Robert H. Deng
Practical Inference Control for Data Cubes (Extended Abstract). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:115-120 [Conf]
- Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:121-131 [Conf]
- John Bethencourt, Dawn Xiaodong Song, Brent Waters
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:132-139 [Conf]
- Bruno Blanchet
A Computationally Sound Mechanized Prover for Security Protocols. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:140-154 [Conf]
- Ricardo Corin, Sandro Etalle, Ari Saptawijaya
A Logic for Constraint-based Security Protocol Analysis. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:155-168 [Conf]
- Dennis Hofheinz, Dominique Unruh
Simulatable Security and Polynomially Bounded Concurrent Composability. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:169-183 [Conf]
- Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum
Privacy and Contextual Integrity: Framework and Applications. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:184-198 [Conf]
- Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:199-213 [Conf]
- Vinod Ganapathy, Trent Jaeger, Somesh Jha
Retrofitting Legacy Code for Authorization Policy Enforcement. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:214-229 [Conf]
- Gilles Barthe, Tamara Rezk, David A. Naumann
Deriving an Information Flow Checker and Certifying Compiler for Java. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:230-242 [Conf]
- Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler
Automatically Generating Malicious Disks using Symbolic Execution. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:243-257 [Conf]
- Nenad Jovanovic, Christopher Krügel, Engin Kirda
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:258-263 [Conf]
- Amit Vasudevan, Ramesh Yerraballi
Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:264-279 [Conf]
- Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:280-294 [Conf]
- Daphna Weinshall
Cognitive Authentication Schemes Safe Against Spyware (Short Paper). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:295-300 [Conf]
- Ari Juels, Markus Jakobsson, Tom N. Jagatic
Cache Cookies for Browser Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:301-305 [Conf]
- Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan
Secure Device Pairing based on a Visual Channel (Short Paper). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:306-313 [Conf]
- Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch
SubVirt: Implementing malware with virtual machines. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:314-327 [Conf]
- Gerhard P. Hancke
Practical Attacks on Proximity Identification Systems (Short Paper). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:328-333 [Conf]
- Pai Peng, Peng Ning, Douglas S. Reeves
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:334-349 [Conf]
- Richard S. Cox, Steven D. Gribble, Henry M. Levy, Jacob Gorm Hansen
A Safety-Oriented Platform for Web Applications. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:350-364 [Conf]
- David Molnar, Tadayoshi Kohno, Naveen Sastry, David Wagner
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:365-370 [Conf]
- Zvi Gutterman, Benny Pinkas, Tzachy Reinman
Analysis of the Linux Random Number Generator. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:371-385 [Conf]
- Andrea Bittau, Mark Handley, Joshua Lackey
The Final Nail in WEP's Coffin. [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:386-400 [Conf]
|