ID | Interpret | Skladba | Album | |
61. | Negar Kiyavash, Amir Houmansadr, and Nikita Borisov, University of Illinois at Urbana-Champaign | Multi-flow Attacks Against Network Flow Watermarking Schemes | 17th USENIX Security Symposium Refereed Papers | |
62. | Sam Small, Joshua Mason, and Fabian Monrose, Johns Hopkins University; Niels Provos, Google Inc.; Adam Stubblefield, Johns Hopkins University | To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | 17th USENIX Security Symposium Refereed Papers | |
63. | Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University | Securing Frame Communication in Browsers | 17th USENIX Security Symposium Refereed Papers | |
64. | Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | 17th USENIX Security Symposium Refereed Papers | |
65. | Michael Martin and Monica S. Lam, Stanford University | Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking | 17th USENIX Security Symposium Refereed Papers | |
66. | Thomas Ristenpart, University of California, San Diego; Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno, University of Washington | Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs | 17th USENIX Security Symposium Refereed Papers | |
67. | Ben Adida, Harvard University | Helios: Web-based Open-Audit Voting | 17th USENIX Security Symposium Refereed Papers | |
68. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
69. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
70. | J. Alex Halderman, Princeton University; Seth D. Schoen, Electronic Frontier Foundation; Nadia Heninger and William Clarkson, Princeton University; William Paul, Wind River Systems; Joseph A. Calandri | Lest We Remember: Cold Boot Attacks on Encryption Keys | 17th USENIX Security Symposium Refereed Papers | |
71. | Lucas Ballard and Seny Kamara, The Johns Hopkins University; Michael K. Reiter, University of North Carolina at Chapel Hill | The Practical Subtleties of Biometric Key Generation | 17th USENIX Security Symposium Refereed Papers | |
72. | Gang Tan and Jason Croft, Boston College | An Empirical Security Study of the Native Code in the JDK | 17th USENIX Security Symposium Refereed Papers | |
73. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
74. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
75. | Jeannie Albrecht | Remote Control: Distributed Application Configuration, Management, & Visualization with Plush | 21st Large Installation System Administration Conference Refereed Papers | |
76. | Elliot Jaffe | Everlab: A Production Platform for Research in Network Experimentation & Computation | 21st Large Installation System Administration Conference Refereed Papers | |
77. | Gautam Singaraju | RepuScore: Collaborative Reputation Management Framework for Email Infrastructure | 21st Large Installation System Administration Conference Refereed Papers | |
78. | Gautam Singaraju | RepuScore: Collaborative Reputation Management Framework for Email Infrastructure | 21st Large Installation System Administration Conference Refereed Papers | |
79. | Hai Huang | PDA: A Tool for Automated Problem Determination | 21st Large Installation System Administration Conference Refereed Papers | |
80. | Hai Huang | PDA: A Tool for Automated Problem Determination | 21st Large Installation System Administration Conference Refereed Papers | |
81. | Alok Tongaonkar | Inferring Higher Level Policies from Firewall Rules | 21st Large Installation System Administration Conference Refereed Papers | |
82. | Damiano Bolzoni | ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Sytems | 21st Large Installation System Administration Conference Refereed Papers | |
83. | Robert Marmorstein | Assisted Firewall Policy Repair Using Examples & History | 21st Large Installation System Administration Conference Refereed Papers | |
84. | Chris McEniry | Moobi: A Thin Server Management System Using BitTorrent | 21st Large Installation System Administration Conference Refereed Papers | |
85. | Chris McEniry | Moobi: A Thin Server Management System Using BitTorrent | 21st Large Installation System Administration Conference Refereed Papers | |
86. | Mark Burgess | Master Education Programmes in Network & System Administration | 21st Large Installation System Administration Conference Refereed Papers | |
87. | Mark Burgess | Network Patterns in Cfengine & Scalable Data Aggregation | 21st Large Installation System Administration Conference Refereed Papers | |
88. | Mark Burgess | Network Patterns in Cfengine & Scalable Data Aggregation | 21st Large Installation System Administration Conference Refereed Papers | |
89. | Mark Burgess | Master Education Programmes in Network & System Administration | 21st Large Installation System Administration Conference Refereed Papers | |
90. | Mark Gabel | CAMP: A Common API for Measuring Performance | 21st Large Installation System Administration Conference Refereed Papers | |