default search action
27th S&P 2006: Berkeley, California, USA
- 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA. IEEE Computer Society 2006, ISBN 0-7695-2574-1
Introduction
- Message from the Program Chairs.
- Program Committee.
- External Reviewers.
Session: Signature Generation
- David Brumley, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha:
Towards Automatic Generation of Vulnerability-Based Signatures. 2-16 - Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla, Monirul Islam Sharif:
MisleadingWorm Signature Generators Using Deliberate Noise Injection. 17-31 - Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, Brian Chavez:
Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. 32-47
Session: Detection
- Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar:
Dataflow Anomaly Detection. 48-62 - Alvaro A. Cárdenas, John S. Baras, Karl Seamon:
A Framework for the Evaluation of Intrusion Detection Systems. 63-77 - Kevin Borders, Xin Zhao, Atul Prakash:
Siren: Catching Evasive Malware (Short Paper). 78-85
Session: Privacy
- Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach:
Fundamental Limits on the Anonymity Provided by the MIX Technique. 86-99 - Lasse Øverlier, Paul F. Syverson:
Locating Hidden Servers. 100-114 - Yingjiu Li, Haibing Lu, Robert H. Deng:
Practical Inference Control for Data Cubes (Extended Abstract). 115-120 - Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow:
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. 121-131 - John Bethencourt, Dawn Xiaodong Song, Brent Waters:
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). 132-139
Session: Formal Methods
- Bruno Blanchet:
A Computationally Sound Mechanized Prover for Security Protocols. 140-154 - Ricardo Corin, Sandro Etalle, Ari Saptawijaya:
A Logic for Constraint-based Security Protocol Analysis. 155-168 - Dennis Hofheinz, Dominique Unruh:
Simulatable Security and Polynomially Bounded Concurrent Composability. 169-183
Session: Analyzing and Enforcing Policy
- Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications. 184-198 - Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, Chen-Nee Chuah, Prasant Mohapatra:
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. 199-213 - Vinod Ganapathy, Trent Jaeger, Somesh Jha:
Retrofitting Legacy Code for Authorization Policy Enforcement. 214-229
Session: Analyzing Code
- Gilles Barthe, Tamara Rezk, David A. Naumann:
Deriving an Information Flow Checker and Certifying Compiler for Java. 230-242 - Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler:
Automatically Generating Malicious Disks using Symbolic Execution. 243-257 - Nenad Jovanovic, Christopher Krügel, Engin Kirda:
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). 258-263 - Amit Vasudevan, Ramesh Yerraballi:
Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. 264-279
Session: Authentication
- Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava:
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. 280-294 - Daphna Weinshall:
Cognitive Authentication Schemes Safe Against Spyware (Short Paper). 295-300 - Ari Juels, Markus Jakobsson, Tom N. Jagatic:
Cache Cookies for Browser Authentication (Extended Abstract). 301-305 - Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan:
Secure Device Pairing based on a Visual Channel (Short Paper). 306-313
Session: Attacks
- Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch:
SubVirt: Implementing malware with virtual machines. 314-327 - Gerhard P. Hancke:
Practical Attacks on Proximity Identification Systems (Short Paper). 328-333 - Pai Peng, Peng Ning, Douglas S. Reeves:
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. 334-349
Session: Systems
- Richard S. Cox, Steven D. Gribble, Henry M. Levy, Jacob Gorm Hansen:
A Safety-Oriented Platform for Web Applications. 350-364 - David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). 365-370 - Zvi Gutterman, Benny Pinkas, Tzachy Reinman:
Analysis of the Linux Random Number Generator. 371-385 - Andrea Bittau, Mark Handley, Joshua Lackey:
The Final Nail in WEP's Coffin. 386-400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.