default search action
12th USENIX Security Symposium 2003: Washington, DC, USA
- Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003. USENIX Association 2003
- Peter Broadwell, Matthew Harren, Naveen Sastry:
Scrash: A System for Generating Secure Crash Information. - Jamie Twycross, Matthew M. Williamson:
Implementing and Testing a Virus Throttle. - Rick Kennell, Leah H. Jamieson:
Establishing the Genuinity of Remote Computer Systems. - Niels Provos, Markus Friedl, Peter Honeyman:
Preventing Privilege Escalation. - Eugene Tsyrklevich, Bennet Yee:
Dynamic Detection and Prevention of Race Conditions in File Accesses. - Niels Provos:
Improving Host Security with System Call Policies. - Chris Lesniewski-Laas, M. Frans Kaashoek:
SSL Splitting: Securely Serving Data from Untrusted Caches. - John G. Brainard, Ari Juels, Burt Kaliski, Michael Szydlo:
A New Two-Server Approach for Authentication with Short Secrets. - Diana K. Smetters, Glenn Durfee:
Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC. - Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A. N. Soules, Garth R. Goodson, Gregory R. Ganger:
Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior. - Sunil Soman, Chandra Krintz, Giovanni Vigna:
Detecting Malicious Java Code Using Virtual Machine Auditing. - Mihai Christodorescu, Somesh Jha:
Static Analysis of Executables to Detect Malicious Patterns. - Crispin Cowan, Steve Beattie, John Johansen, Perry Wagle:
PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities. - Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar:
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. - Eric Larson, Todd M. Austin:
High Coverage Detection of Input-Related Security Faults. - Peter Gutmann:
Plug-and-Play PKI: A PKI Your Mother Can Use. - Trent Jaeger, Reiner Sailer, Xiaolan Zhang:
Analyzing Integrity Protection in the SELinux Example Policy. - Eric Rescorla:
Security Holes . . . Who Cares? - David Brumley, Dan Boneh:
Remote Timing Attacks Are Practical. - John Bellardo, Stefan Savage:
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. - Scott A. Crosby, Dan S. Wallach:
Denial of Service via Algorithmic Complexity Attacks.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.