AN INFORMATION-THEORETIC MEASURE OF INTRUSION DETECTION CAPABILITY
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
ANONYMITY IN PEER-TO-PEER SYSTEMS
Nikita Borisov
APPLYING INTERVAL METHODS FOR INTRUSION DETECTION
Chenyi Hu
AUTOMATED WEB PATROL WITH STRIDER HONEYMONKEYS: FINDING WEB SITES THAT
EXPLOIT CLIENT-SIDE BROWSER VULNERABILITIES
Yi-Min Wang and Doug Beck
BACK TO THE FUTURE: A FRAMEWORK FOR EXECUTING MALWARE SAFELY VIA
MONITORING, LOGGING, AND RECOVERY
Hao Chen, Francis Hsu, Thomas Ristenpart, Zhendong Su
BULLETPROOF: SECURING THE WINDOWS MESSAGING SYSTEM A FIRST STEP TOWARDS
SECURE SEPARATION OF PRIVILEGE IN WINDOWS
Jason Li and Hao Chen
DESIGNING SECURITY ARCHITECTURE FOR LARGE SCALE, OPEN, DISTRIBUTED
HETEROGENEOUS SYSTEMS
Syed Naqvi, Michel Riguidel
DISPOSABLE TOKENS FOR PUBLIC WIRELESS NETWORKS
Jeff Shirley and David Evans
IDENTITY DISCLOSURE USING PARALINGUISTIC PATTERNS
Natalie Ardet
INFUSING USABILITY INTO TEXT-PASSWORD BASED AUTHENTICATION SYSTEMS
Umut Topkara, Sundararaman Jeyaraman
KERNELSEC: A GENERAL PURPOSE AUTHENTICATION FRAMEWORK IMPLEMENTED IN
THE OPERATING SYSTEM KERNEL
Manigandan Radhakrishnan and Jon A. Solworth
LOCATION HIDDEN SERVICES
Paul Syverson
MECHANISMS FOR SECURE REPUTATION
Radu Sion Bogdan Carbunar
ON THE CRYPTOGRAPHIC (UN-)SOUNDNESS OF DOLEV-YAO STYLE HASH
FUNCTIONS
Michael Backes, Birgit Pfitzmann, Michael Waidner
PERFORMANCE ANALYSIS OF ELLIPTIC CURVE CRYPTOGRAPHY IN SECURE SOCKET
LAYER & WIRELESS SECURITY
Varun Srivastava , Shashank Sharma
SELF-HEALING WORKFLOW SYSTEMS UNDER ATTACKS
Meng YU, Wanyu Zang and Peng Liu
SELS: A SECURE EMAIL LIST SERVICE
Himanshu Khuarana, Adam Slagell, and Rafael Bonilla
SERAT : SECURE ROLE MAPPING TECHNIQUE FOR DECENTRALIZED SECURE
INTEROPERABILITY
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
THE EFFECTIVENESS OF INSTRUCTION SET RANDOMIZATION
Ana Nora Sovarel and David Evans
TOWARDS VERIFIED SECURITY FOR A FUNCTIONAL MICROKERNEL
Rebekah Leslie and Mark Jones