ID | Interpret | Skladba | Album | |
1. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
2. | Byung-Gon Chun, ICSI; Sylvia Ratnasamy, Intel Research Berkeley; Eddie Kohler, University of California, Los Angeles | NetComplex: A Complexity Metric for Networked System Designs | 5th USENIX Symposium on Networked Systems Design and Implementation | |
3. | Benjamin Cox | N-Variant Systems: A Secretless Framework for Security through Diversity | USENIX Security Symposium 2006 | |
4. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | USENIX Security Symposium 2006 | |
5. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
6. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
7. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
8. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
9. | Gaurav Shah | Keyboards and Covert Channels | USENIX Security Symposium 2006 | |
10. | Parisa Tabriz and Damon McCoy | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting - Q&A | USENIX Security Symposium 2006 | |
11. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
12. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
13. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages | USENIX Security Symposium 2006 | |
14. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
15. | Alex Aiken | Static Detection of Security Vulnerabilities in Scripting Languages - Q&A | USENIX Security Symposium 2006 | |
16. | David Brumley | Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint GenerationTRCK | 16th USENIX Security Symposium | |
17. | Gaurav Shah | Keyboards and Covert Channels - Q&A | USENIX Security Symposium 2006 | |
18. | Ed Felten | Invited Talk - DRM Wars: The Next Generation | USENIX Security Symposium 2006 | |
19. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
20. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
21. | John Schwartz | Covering Computer Security in The New York Times | 16th USENIX Security Symposium | |
22. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
23. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
24. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
25. | Ben Shneiderman | Human-Computer Interaction | USENIX 14th Security Symposium | |
26. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |
27. | USENIX Association | Opening Remarks and Awards | 16th USENIX Security Symposium | |
28. | David Wagner | Report of the California Voting Systems Review | 16th USENIX Security Symposium | |
29. | Gary McGraw | Exploiting Online Games | 16th USENIX Security Symposium | |
30. | Douglas Maughan | Homeland Security | 14th USENIX Security Symposium | |