:facetid:toc:\"db/conf/sp/sp2006.bht\"OK:facetid:toc:db/conf/sp/sp2006.bhtAdam BarthAnupam DattaJohn C. MitchellHelen NissenbaumPrivacy and Contextual Integrity: Framework and Applications.S&P184-1982006Conference and Workshop Papersclosedconf/sp/BarthDMN0610.1109/SP.2006.32https://doi.org/10.1109/SP.2006.32https://dblp.org/rec/conf/sp/BarthDMN06URL#5790203Gilles BartheTamara RezkDavid A. NaumannDeriving an Information Flow Checker and Certifying Compiler for Java.S&P230-2422006Conference and Workshop Papersclosedconf/sp/BartheRN0610.1109/SP.2006.13https://doi.org/10.1109/SP.2006.13https://dblp.org/rec/conf/sp/BartheRN06URL#5790204John BethencourtDawn Xiaodong SongBrent WatersNew Constructions and Practical Applications for Private Stream Searching (Extended Abstract).S&P132-1392006Conference and Workshop Papersclosedconf/sp/BethencourtSW0610.1109/SP.2006.27https://doi.org/10.1109/SP.2006.27https://dblp.org/rec/conf/sp/BethencourtSW06URL#5790205Sandeep BhatkarAbhishek ChaturvediR. Sekar 0001Dataflow Anomaly Detection.S&P48-622006Conference and Workshop Papersclosedconf/sp/BhatkarCS0610.1109/SP.2006.12https://doi.org/10.1109/SP.2006.12https://dblp.org/rec/conf/sp/BhatkarCS06URL#5790206Andrea BittauMark HandleyJoshua LackeyThe Final Nail in WEP's Coffin.S&P386-4002006Conference and Workshop Papersclosedconf/sp/BittauHL0610.1109/SP.2006.40https://doi.org/10.1109/SP.2006.40https://dblp.org/rec/conf/sp/BittauHL06URL#5790207Bruno BlanchetA Computationally Sound Mechanized Prover for Security Protocols.S&P140-1542006Conference and Workshop Papersclosedconf/sp/Blanchet0610.1109/SP.2006.1https://doi.org/10.1109/SP.2006.1https://dblp.org/rec/conf/sp/Blanchet06URL#5790208Kevin BordersXin Zhao 0016Atul Prakash 0001Siren: Catching Evasive Malware (Short Paper).S&P78-852006Conference and Workshop Papersclosedconf/sp/BordersZP0610.1109/SP.2006.37https://doi.org/10.1109/SP.2006.37https://dblp.org/rec/conf/sp/BordersZP06URL#5790209David BrumleyJames NewsomeDawn Xiaodong SongHao WangSomesh JhaTowards Automatic Generation of Vulnerability-Based Signatures.S&P2-162006Conference and Workshop Papersclosedconf/sp/BrumleyNSWJ0610.1109/SP.2006.41https://doi.org/10.1109/SP.2006.41https://dblp.org/rec/conf/sp/BrumleyNSWJ06URL#5790210Mario CagaljJean-Pierre HubauxSrdjan CapkunRam Kumar RengaswamyIlias TsigkogiannisMani B. SrivastavaIntegrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels.S&P280-2942006Conference and Workshop Papersclosedconf/sp/CagaljHCRTS0610.1109/SP.2006.23https://doi.org/10.1109/SP.2006.23https://dblp.org/rec/conf/sp/CagaljHCRTS06URL#5790211Alvaro A. CárdenasJohn S. BarasKarl SeamonA Framework for the Evaluation of Intrusion Detection Systems.S&P63-772006Conference and Workshop Papersclosedconf/sp/CardenasBS0610.1109/SP.2006.2https://doi.org/10.1109/SP.2006.2https://dblp.org/rec/conf/sp/CardenasBS06URL#5790212Ricardo CorinSandro EtalleAri SaptawijayaA Logic for Constraint-based Security Protocol Analysis.S&P155-1682006Conference and Workshop Papersclosedconf/sp/CorinES0610.1109/SP.2006.3https://doi.org/10.1109/SP.2006.3https://dblp.org/rec/conf/sp/CorinES06URL#5790213Richard S. CoxSteven D. GribbleHenry M. LevyJacob Gorm HansenA Safety-Oriented Platform for Web Applications.S&P350-3642006Conference and Workshop Papersclosedconf/sp/CoxGLH0610.1109/SP.2006.4https://doi.org/10.1109/SP.2006.4https://dblp.org/rec/conf/sp/CoxGLH06URL#5790214Vinod GanapathyTrent JaegerSomesh JhaRetrofitting Legacy Code for Authorization Policy Enforcement.S&P214-2292006Conference and Workshop Papersclosedconf/sp/GanapathyJJ0610.1109/SP.2006.34https://doi.org/10.1109/SP.2006.34https://dblp.org/rec/conf/sp/GanapathyJJ06URL#5790215Philippe GolleXiaoFeng Wang 0001Markus JakobssonAlex TsowDeterring Voluntary Trace Disclosure in Re-encryption Mix Networks.S&P121-1312006Conference and Workshop Papersclosedconf/sp/GolleWJT0610.1109/SP.2006.14https://doi.org/10.1109/SP.2006.14https://dblp.org/rec/conf/sp/GolleWJT06URL#5790216Zvi GuttermanBenny PinkasTzachy ReinmanAnalysis of the Linux Random Number Generator.S&P371-3852006Conference and Workshop Papersclosedconf/sp/GuttermanPR0610.1109/SP.2006.5https://doi.org/10.1109/SP.2006.5https://dblp.org/rec/conf/sp/GuttermanPR06URL#5790217Gerhard P. Hancke 0002Practical Attacks on Proximity Identification Systems (Short Paper).S&P328-3332006Conference and Workshop Papersclosedconf/sp/Hancke0610.1109/SP.2006.30https://doi.org/10.1109/SP.2006.30https://dblp.org/rec/conf/sp/Hancke06URL#5790218Dennis HofheinzDominique UnruhSimulatable Security and Polynomially Bounded Concurrent Composability.S&P169-1832006Conference and Workshop Papersclosedconf/sp/HofheinzU0610.1109/SP.2006.36https://doi.org/10.1109/SP.2006.36https://dblp.org/rec/conf/sp/HofheinzU06URL#5790219Nenad JovanovicChristopher KrügelEngin KirdaPixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper).S&P258-2632006Conference and Workshop Papersclosedconf/sp/JovanovicKK0610.1109/SP.2006.29https://doi.org/10.1109/SP.2006.29https://dblp.org/rec/conf/sp/JovanovicKK06URL#5790220Ari JuelsMarkus JakobssonTom N. JagaticCache Cookies for Browser Authentication (Extended Abstract).S&P301-3052006Conference and Workshop Papersclosedconf/sp/JuelsJJ0610.1109/SP.2006.8https://doi.org/10.1109/SP.2006.8https://dblp.org/rec/conf/sp/JuelsJJ06URL#5790221Dogan KesdoganDakshi AgrawalDang Vinh PhamDieter RautenbachFundamental Limits on the Anonymity Provided by the MIX Technique.S&P86-992006Conference and Workshop Papersclosedconf/sp/KesdoganAPR0610.1109/SP.2006.17https://doi.org/10.1109/SP.2006.17https://dblp.org/rec/conf/sp/KesdoganAPR06URL#5790222Samuel T. KingPeter M. ChenYi-Min WangChad VerbowskiHelen J. WangJacob R. LorchSubVirt: Implementing malware with virtual machines.S&P314-3272006Conference and Workshop Papersclosedconf/sp/KingCWVWL0610.1109/SP.2006.38https://doi.org/10.1109/SP.2006.38https://dblp.org/rec/conf/sp/KingCWVWL06URL#5790223Yingjiu LiHaibing LuRobert H. DengPractical Inference Control for Data Cubes (Extended Abstract).S&P115-1202006Conference and Workshop Papersclosedconf/sp/LiLD0610.1109/SP.2006.31https://doi.org/10.1109/SP.2006.31https://dblp.org/rec/conf/sp/LiLD06URL#5790224Zhichun LiManan SanghiYan Chen 0004Ming-Yang KaoBrian ChavezHamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience.S&P32-472006Conference and Workshop Papersclosedconf/sp/LiSCKC0610.1109/SP.2006.18https://doi.org/10.1109/SP.2006.18https://dblp.org/rec/conf/sp/LiSCKC06URL#5790225David MolnarTadayoshi KohnoNaveen SastryDavid A. Wagner 0001Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).S&P365-3702006Conference and Workshop Papersclosedconf/sp/MolnarKSW0610.1109/SP.2006.39https://doi.org/10.1109/SP.2006.39https://dblp.org/rec/conf/sp/MolnarKSW06URL#5790226Lasse ØverlierPaul F. SyversonLocating Hidden Servers.S&P100-1142006Conference and Workshop Papersclosedconf/sp/OverlierS0610.1109/SP.2006.24https://doi.org/10.1109/SP.2006.24https://dblp.org/rec/conf/sp/OverlierS06URL#5790227Pai PengPeng NingDouglas S. ReevesOn the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques.S&P334-3492006Conference and Workshop Papersclosedconf/sp/PengNR0610.1109/SP.2006.28https://doi.org/10.1109/SP.2006.28https://dblp.org/rec/conf/sp/PengNR06URL#5790228Roberto PerdisciDavid DagonWenke LeePrahlad FoglaMonirul Islam SharifMisleadingWorm Signature Generators Using Deliberate Noise Injection.S&P17-312006Conference and Workshop Papersclosedconf/sp/PerdisciDLFS0610.1109/SP.2006.26https://doi.org/10.1109/SP.2006.26https://dblp.org/rec/conf/sp/PerdisciDLFS06URL#5790229Nitesh SaxenaJan-Erik EkbergKari KostiainenN. AsokanSecure Device Pairing based on a Visual Channel (Short Paper).S&P306-3132006Conference and Workshop Papersclosedconf/sp/SaxenaEKA0610.1109/SP.2006.35https://doi.org/10.1109/SP.2006.35https://dblp.org/rec/conf/sp/SaxenaEKA06URL#5790230Amit VasudevanRamesh YerraballiCobra: Fine-grained Malware Analysis using Stealth Localized-executions.S&P264-2792006Conference and Workshop Papersclosedconf/sp/VasudevanY0610.1109/SP.2006.9https://doi.org/10.1109/SP.2006.9https://dblp.org/rec/conf/sp/VasudevanY06URL#5790231Daphna WeinshallCognitive Authentication Schemes Safe Against Spyware (Short Paper).S&P295-3002006Conference and Workshop Papersclosedconf/sp/Weinshall0610.1109/SP.2006.10https://doi.org/10.1109/SP.2006.10https://dblp.org/rec/conf/sp/Weinshall06URL#5790232