Conference Proceedings

Defending Against Network Attacks

Fighting Spam by Encapsulating Policy in Email Addresses [PDF]

John Ioannidis

Moderately Hard, Memory-Bound Functions [PDF]

Martin Abadi, Michael Burrows, Ted Wobber

Secure IP Telephony using Multi-layered Protection [PDF]

Brennen Reynolds, Dipak Ghosal

Mobility and Secure Routing

Efficient Security Mechanisms for Routing Protocols [PDF]

Yih-Chun Hu, Adrian Perrig, David Johnson

Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing [PDF]

Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick McDaniel, Aviel Rubin

Integrating Security, Mobility and Multi-Homing in a HIP Way [PDF]

Pekka Nikander, Yukka Ylitalo, Jorma Wall

Access Control and Penetration Resistance

Access Control Based on Execution History [PDF]

Martin Abadi, Cedric Fournet

Testing C Programs for Buffer Overflow Vulnerabilities [PDF]

Eric Haugh, Matthew Bishop

SiRiUS: Securing Remote Untrusted Storage [PDF]

Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh

Network Monitoring and Intrusion Detection

A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention   [PDF]

John Wilander, Mariam Kamkar

Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools [PDF]

Tal Garfinkel

Detecting Service Violations and DoS Attacks [PDF]

Ashan Habib, Mohamed Hefeeda, Bharat Bhargava

A Virtual Machine Introspection Based Architecture for Intrusion Detection[PDF]

Tal Garfinkel, Mendel Rosenblum

Cryptographic Protocols and Constructs

Proxy Cryptography Revisited [PDF]

Anca Ivan, Yevgeniy Dodis

Proactive Two-Party Signatures for User Authentication   [PDF]

Antonio Nicolosi, Maxwell Krohn, Yevgeniy Dodis, David Mazieres

Security in Multicast Protocols

Efficient Multicast Packet Authentication [PDF]

Alain Pannetrat, Refik Molva

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks [PDF]