default search action
13th USENIX Security Symposium 2004: San Diego, California, USA
- Matt Blaze:
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA. USENIX 2004
Opening Remarks, Awards, and Keynote
- William Earl Boebert:
Keynote Address: Back to the Future. USENIX Security Symposium 2004
Refereed Papers
Attack Containment
- Niels Provos:
A Virtual Honeypot Framework. 1-14 - Xuxian Jiang, Dongyan Xu:
Collapsar: A VM-Based Architecture for Network Attack Detention Center. 15-28 - Nicholas Weaver, Stuart Staniford, Vern Paxson:
Very Fast Containment of Scanning Worms. 29-44
Panel: Capture the Flag
Protecting Software I
- Kumar Avijit, Prateek Gupta, Deepak Gupta:
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection. 45-56 - David Brumley, Dawn Xiaodong Song:
Privtrans: Automatically Partitioning Programs for Privilege Separation. 57-72 - Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok:
Avfs: An On-Access Anti-Virus File System. 73-88
Protecting Software II
- Umesh Shankar, Monica Chew, J. D. Tygar:
Side Effects Are Not Sufficient to Authenticate Software. 89-102 - Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
On Gray-Box Program Tracking for Anomaly Detection. 103-118 - Robert Johnson, David A. Wagner:
Finding User/Kernel Pointer Bugs with Type Inference. 119-134
The Human Interface
- Julie Thorpe, Paul C. van Oorschot:
Graphical Dictionaries and the Memorable Space of Graphical Passwords. 135-150 - Darren Davis, Fabian Monrose, Michael K. Reiter:
On User Choice in Graphical Password Schemes. 151-164 - Jonathan S. Shapiro, John Vanderburgh, Eric Northup, David Chizmadia:
Design of the EROS Trusted Window System. 165-178
Panel: Patch Management
Security Engineering
- Nick L. Petroni Jr., Timothy Fraser, Jesus Molina, William A. Arbaugh:
Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor. 179-194 - Drew Dean, Alan J. Hu:
Fixing Races for Fun and Profit: How to Use access(2). 195-206 - Dirk Balfanz, Glenn Durfee, Rebecca E. Grinter, Diana K. Smetters, Paul Stewart:
Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. 207-222 - Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
Design and Implementation of a TCG-based Integrity Measurement Architecture. 223-238
Forensics and Response
- Patrick Lincoln, Phillip A. Porras, Vitaly Shmatikov:
Privacy-Preserving Sharing and Correlation of Security Alerts. 239-254 - Christopher Krügel, William K. Robertson, Fredrik Valeur, Giovanni Vigna:
Static Disassembly of Obfuscated Binaries. 255-270 - Hyang-Ah Kim, Brad Karp:
Autograph: Toward Automated, Distributed Worm Signature Detection. 271-286
Data Privacy
- Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella:
Fairplay - Secure Two-Party Computation System. 287-302 - Roger Dingledine, Nick Mathewson, Paul F. Syverson:
Tor: The Second-Generation Onion Router. 303-320 - Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, Mendel Rosenblum:
Understanding Data Lifetime via Whole System Simulation (Awarded Best Paper!). 321-336
Invited Talks
- Ari Juels:
RFID: Security and Privacy for Five-Cent Computers. - Peter Szor:
Fighting Computer Virus Attacks. - Cindy Cohn:
I Voted? How the Law Increasingly Restricts Independent Security Research. - Daniel E. Geer Jr.:
Metrics, Economics, and Shared Risk at the National Scale. - Gary McGraw:
Exploiting Software. - Stuart Staniford:
Military Strategy in CyberSpace. - David Evans:
What Biology Can (and Can't) Teach Us About Security. - Steven M. Bellovin:
Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography. - Bill Cheswick:
My Dad's Computer, Microsoft, and the Future of Internet Security.
Work-in-Progress Reports (WiPs) & Closing Remarks
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.