


default search action
27th S&P 2006: Berkeley, California, USA
- 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA. IEEE Computer Society 2006, ISBN 0-7695-2574-1

Introduction
- Message from the Program Chairs.

- Program Committee.

- External Reviewers.

Session: Signature Generation
- David Brumley

, James Newsome, Dawn Xiaodong Song, Hao Wang, Somesh Jha:
Towards Automatic Generation of Vulnerability-Based Signatures. 2-16 - Roberto Perdisci

, David Dagon, Wenke Lee, Prahlad Fogla, Monirul Islam Sharif:
MisleadingWorm Signature Generators Using Deliberate Noise Injection. 17-31 - Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao, Brian Chavez:

Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. 32-47
Session: Detection
- Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar:

Dataflow Anomaly Detection. 48-62 - Alvaro A. Cárdenas, John S. Baras, Karl Seamon:

A Framework for the Evaluation of Intrusion Detection Systems. 63-77 - Kevin Borders, Xin Zhao, Atul Prakash

:
Siren: Catching Evasive Malware (Short Paper). 78-85
Session: Privacy
- Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Dieter Rautenbach:

Fundamental Limits on the Anonymity Provided by the MIX Technique. 86-99 - Lasse Øverlier, Paul F. Syverson:

Locating Hidden Servers. 100-114 - Yingjiu Li, Haibing Lu, Robert H. Deng

:
Practical Inference Control for Data Cubes (Extended Abstract). 115-120 - Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow:

Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. 121-131 - John Bethencourt, Dawn Xiaodong Song, Brent Waters:

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). 132-139
Session: Formal Methods
- Bruno Blanchet:

A Computationally Sound Mechanized Prover for Security Protocols. 140-154 - Ricardo Corin, Sandro Etalle, Ari Saptawijaya

:
A Logic for Constraint-based Security Protocol Analysis. 155-168 - Dennis Hofheinz, Dominique Unruh

:
Simulatable Security and Polynomially Bounded Concurrent Composability. 169-183
Session: Analyzing and Enforcing Policy
- Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum:

Privacy and Contextual Integrity: Framework and Applications. 184-198 - Lihua Yuan, Jianning Mai, Zhendong Su

, Hao Chen
, Chen-Nee Chuah
, Prasant Mohapatra:
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. 199-213 - Vinod Ganapathy, Trent Jaeger, Somesh Jha:

Retrofitting Legacy Code for Authorization Policy Enforcement. 214-229
Session: Analyzing Code
- Gilles Barthe

, Tamara Rezk, David A. Naumann
:
Deriving an Information Flow Checker and Certifying Compiler for Java. 230-242 - Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson R. Engler:

Automatically Generating Malicious Disks using Symbolic Execution. 243-257 - Nenad Jovanovic, Christopher Krügel, Engin Kirda:

Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper). 258-263 - Amit Vasudevan, Ramesh Yerraballi:

Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. 264-279
Session: Authentication
- Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, Ram Kumar Rengaswamy, Ilias Tsigkogiannis, Mani B. Srivastava:

Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. 280-294 - Daphna Weinshall:

Cognitive Authentication Schemes Safe Against Spyware (Short Paper). 295-300 - Ari Juels, Markus Jakobsson, Tom N. Jagatic:

Cache Cookies for Browser Authentication (Extended Abstract). 301-305 - Nitesh Saxena, Jan-Erik Ekberg, Kari Kostiainen, N. Asokan

:
Secure Device Pairing based on a Visual Channel (Short Paper). 306-313
Session: Attacks
- Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch:

SubVirt: Implementing malware with virtual machines. 314-327 - Gerhard P. Hancke

:
Practical Attacks on Proximity Identification Systems (Short Paper). 328-333 - Pai Peng, Peng Ning, Douglas S. Reeves:

On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. 334-349
Session: Systems
- Richard S. Cox, Steven D. Gribble

, Henry M. Levy, Jacob Gorm Hansen:
A Safety-Oriented Platform for Web Applications. 350-364 - David Molnar, Tadayoshi Kohno, Naveen Sastry, David A. Wagner:

Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract). 365-370 - Zvi Gutterman, Benny Pinkas, Tzachy Reinman:

Analysis of the Linux Random Number Generator. 371-385 - Andrea Bittau, Mark Handley, Joshua Lackey:

The Final Nail in WEP's Coffin. 386-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














