default search action
21. ACSAC 2005: Tucson, Arizona, USA
- 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA. IEEE Computer Society 2005, ISBN 0-7695-2461-3
Cover
- Title Page.
- Copyright.
Introduction
- Message from Conference Chair.
- Conference Committee.
- Program Committee.
- Tutorial Committee.
- Reviewers.
- Speaker Biographies.
Distinguished Practitioner
- Brian D. Snow:
We Need Assurance! 3-10
Track A: Software Security
- Benjamin Schwarz, Hao Chen, David A. Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West:
Model Checking An Entire Linux Distribution for Security Violations. 13-22 - Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger:
Strengthening Software Self-Checksumming via Self-Modifying Code. 23-32 - David A. Wheeler:
Countering Trusting Trust through Diverse Double-Compiling. 33-48
Track B: Network Intrusion Detection
- Stig Andersson, Andrew J. Clark, George M. Mohay, Bradley L. Schatz, Jacob Zimmermann:
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. 49-58 - Robin Sommer, Vern Paxson:
Exploiting Independent State For Network Intrusion Detection. 59-71 - Paul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey:
A Host-Based Approach to Network Attack Chaining Analysis. 72-84
Track A: Security Designs
- Norman Feske, Christian Helmuth:
A Nitpicker's guide to a minimal-complexity secure GUI. 85-94 - Yongzheng Wu, Roland H. C. Yap:
A User-level Framework for Auditing and Monitoring. 95-105 - Wesam Lootah, William Enck, Patrick D. McDaniel:
TARP: Ticket-based Address Resolution Protocol. 106-116
Track B: Protocol Analysis
- Jingmin Zhou, Adam J. Carlson, Matt Bishop:
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. 117-126 - Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga:
Replay Attack in TCG Specification and Solution. 127-137 - Jan Jürjens:
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. 138-149
Track A: Vulnerability Assessment
- Fanglu Guo, Yang Yu, Tzi-cker Chiueh:
Automated and Safe Vulnerability Assessment. 150-159 - Steven Noel, Sushil Jajodia:
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. 160-169 - Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali:
Intrusion Detection in RBAC-administered Databases. 170-182
Track B: Hot Topics I
- How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI? 183
Invited Essayist
- Mary Ellen Zurko:
User-Centered Security: Stepping Up to the Grand Challenge. 187-202
Track A: Automation
- Corrado Leita, Ken Mermoud, Marc Dacier:
ScriptGen: an automated script generation tool for honeyd. 203-214 - Zhenkai Liang, R. Sekar:
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. 215-224 - Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood:
Evolving Successful Stack Overflow Attacks for Vulnerability Testing. 225-234
Track B: Security Analysis
- Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua:
Java for Mobile Devices: A Security Study. 235-244 - John Black, Martin Cochran, Ryan W. Gardner:
Lessons Learned: A Security Analysis of the Internet Chess Club. 245-253 - Wei Wang, Thomas E. Daniels:
Building Evidence Graphs for Network Forensics Analysis. 254-266
Track A: Operating System Security Mechanisms
- Paul A. Karger:
Multi-Level Security Requirements for Hypervisors. 267-275 - Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn:
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. 276-285 - Gaurav S. Kc, Angelos D. Keromytis:
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. 286-302
Track B: Data Integrity
- Vivek Haldar, Deepak Chandra, Michael Franz:
Dynamic Taint Propagation for Java. 303-311 - Ramaswamy Chandramouli, Scott Rose:
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis. 312-321 - Fareed Zaffar, Gershon Kedem, Ashish Gehani:
Paranoid: A Global Secure File Access Control System. 322-332
Track C: Hot Topics II
- Marla Collier:
How to Develop a Career in Information Assurance and How to Advance in this Field. 333
Classic Papers
- David Elliott Bell:
Looking Back at the Bell-La Padula Model. 337-351 - Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck:
The Pump: A Decade of Covert Fun. 352-360
Track A: Malware
- Weidong Cui, Randy H. Katz, Wai-tian Tan:
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. 361-370 - David Whyte, Paul C. van Oorschot, Evangelos Kranakis:
Detecting Intra-enterprise Scanning Worms based on Address Resolution. 371-380 - Amit Vasudevan, Ramesh Yerraballi:
Stealth Breakpoints. 381-392
Track B: Panel
- Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov:
Highlights from the 2005 New Security Paradigms Workshop. 393-396
Track A: Distributed System Security
- Jun Li, Xun Kang:
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. 397-408 - John P. Jones, Daniel F. Berger, Chinya V. Ravishankar:
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation. 409-418 - Sara Sinclair, Sean W. Smith:
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. 419-430
Track B: Access Control
- Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:
Uniform Application-level Access Control Enforcement of Organizationwide Policies. 431-440 - Sandeep Kumar, Terence Sim, Rajkumar Janakiraman, Sheng Zhang:
Using Continuous Biometric Verification to Protect Interactive Login Sessions. 441-450 - Rennie deGraaf, John Aycock, Michael J. Jacobson Jr.:
Improved Port Knocking with Strong Authentication. 451-462
Track A: Passwords and Applied Crypto
- Xiaoyuan Suo, Ying Zhu, G. Scott Owen:
Graphical Passwords: A Survey. 463-472 - Sundararaman Jeyaraman, Umut Topkara:
Have the cake and eat it too - Infusing usability into text-password based authentication systems. 473-482 - Jason Waddle, David A. Wagner:
Fault Attacks on Dual-Rail Encoded Systems. 483-494
Track B: Defense in Depth/Database Security
- Jennifer Chong, Partha P. Pal, Michael Atighetchi, Paul Rubel, Franklin Webber:
Survivability Architecture of a Mission Critical System: The DPASA Example. 495-504 - Paul Rubel, Michael Ihde, Steven A. Harp, Charles N. Payne:
Generating Policies for Defense in Depth. 505-514 - Meng Yu, Wanyu Zang, Peng Liu:
Defensive Execution of Transactional Processes against Attacks. 515-526
Track C: Privacy
- Anas Abou El Kalam, Yves Deswarte:
Privacy Requirements Implemented with a JavaCard. 527-536 - Dingbang Xu, Peng Ning:
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. 537-546 - Yiru Li, Anil Somayaji:
Securing Email Archives through User Modeling. 547-556
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.