Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/uss/uss2005.bht:"
@inproceedings{DBLP:conf/uss/AltekarBBS05, author = {Gautam Altekar and Ilya Bagrak and Paul Burstein and Andrew Schultz}, editor = {Patrick D. McDaniel}, title = {{OPUS:} Online Patches and Updates for Security}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/opus-online-patches-and-updates-security}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/AltekarBBS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AnagnostakisSAXMK05, author = {Kostas G. Anagnostakis and Stelios Sidiroglou and Periklis Akritidis and Konstantinos Xinidis and Evangelos P. Markatos and Angelos D. Keromytis}, editor = {Patrick D. McDaniel}, title = {Detecting Targeted Attacks Using Shadow Honeypots}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/detecting-targeted-attacks-using-shadow-honeypots}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/AnagnostakisSAXMK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BethencourtFV05, author = {John Bethencourt and Jason Franklin and Mary K. Vernon}, editor = {Patrick D. McDaniel}, title = {Mapping Internet Sensors with Probe Response Attacks}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/mapping-internet-sensors-probe-response-attacks}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BethencourtFV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BhatkarD05, author = {Sandeep Bhatkar and Daniel C. DuVarney}, editor = {Patrick D. McDaniel}, title = {Efficient Techniques for Comprehensive Protection from Memory Error Exploits}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/efficient-techniques-comprehensive-protection-memory-error}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BhatkarD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Bono0SJRS05, author = {Steve Bono and Matthew Green and Adam Stubblefield and Ari Juels and Aviel D. Rubin and Michael Szydlo}, editor = {Patrick D. McDaniel}, title = {Security Analysis of a Cryptographically-Enabled {RFID} Device}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/security-analysis-cryptographically-enabled-rfid-device}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Bono0SJRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BorisovJ05, author = {Nikita Borisov and Robert Johnson}, editor = {Patrick D. McDaniel}, title = {Fixing Races for Fun and Profit: How to Abuse atime}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/fixing-races-fun-and-profit-how-abuse-atime}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BorisovJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Chen0S05, author = {Shuo Chen and Jun Xu and Emre Can Sezer}, editor = {Patrick D. McDaniel}, title = {Non-Control-Data Attacks Are Realistic Threats}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/non-control-data-attacks-are-realistic-threats}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Chen0S05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChowPGR05, author = {Jim Chow and Ben Pfaff and Tal Garfinkel and Mendel Rosenblum}, editor = {Patrick D. McDaniel}, title = {Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/shredding-your-garbage-reducing-data-lifetime-through}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChowPGR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DharmapurikarP05, author = {Sarang Dharmapurikar and Vern Paxson}, editor = {Patrick D. McDaniel}, title = {Robust {TCP} Stream Reassembly in the Presence of Adversaries}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/robust-tcp-stream-reassembly-presence-adversaries}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DharmapurikarP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KarlofSW05, author = {Chris Karlof and Naveen Sastry and David A. Wagner}, editor = {Patrick D. McDaniel}, title = {Cryptographic Voting Protocols: {A} Systems Perspective}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/cryptographic-voting-protocols-systems-perspective}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KarlofSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KruegelKMRV05, author = {Christopher Kruegel and Engin Kirda and Darren Mutz and William K. Robertson and Giovanni Vigna}, editor = {Patrick D. McDaniel}, title = {Automating Mimicry Attacks Using Static Binary Analysis}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/automating-mimicry-attacks-using-static-binary-analysis}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KruegelKMRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LinnRBCDH05, author = {Cullen Linn and Mohan Rajagopalan and Scott Baker and Christian S. Collberg and Saumya K. Debray and John H. Hartman}, editor = {Patrick D. McDaniel}, title = {Protecting Against Unexpected System Calls}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/protecting-against-unexpected-system-calls}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LinnRBCDH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LivshitsL05, author = {V. Benjamin Livshits and Monica S. Lam}, editor = {Patrick D. McDaniel}, title = {Finding Security Vulnerabilities in Java Applications with Static Analysis}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/finding-security-vulnerabilities-java-applications-static}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LivshitsL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OuGA05, author = {Xinming Ou and Sudhakar Govindavajhala and Andrew W. Appel}, editor = {Patrick D. McDaniel}, title = {MulVAL: {A} Logic-based Network Security Analyzer}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/mulval-logic-based-network-security-analyzer}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/OuGA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RajabMT05, author = {Moheeb Abu Rajab and Fabian Monrose and Andreas Terzis}, editor = {Patrick D. McDaniel}, title = {On the Effectiveness of Distributed Worm Monitoring}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/effectiveness-distributed-worm-monitoring}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RajabMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RossJMBM05, author = {Blake Ross and Collin Jackson and Nick Miyake and Dan Boneh and John C. Mitchell}, editor = {Patrick D. McDaniel}, title = {Stronger Password Authentication Using Browser Extensions}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/stronger-password-authentication-using-browser-extensions}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/RossJMBM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShinodaII05, author = {Yoichi Shinoda and Ko Ikai and Motomu Itoh}, editor = {Patrick D. McDaniel}, title = {Vulnerabilities of Passive Internet Threat Monitors}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/vulnerabilities-passive-internet-threat-monitors}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ShinodaII05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SovarelEP05, author = {Ana Nora Sovarel and David Evans and Nathanael Paul}, editor = {Patrick D. McDaniel}, title = {Where's the FEEB? The Effectiveness of Instruction Set Randomization}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/wheres-feeb-effectiveness-instruction-set-randomization}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SovarelEP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SrivatsaL05, author = {Mudhakar Srivatsa and Ling Liu}, editor = {Patrick D. McDaniel}, title = {Countering Targeted File Attacks Using LocationGuard}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/countering-targeted-file-attacks-using-locationguard}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SrivatsaL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangLC05, author = {Ju Wang and Xin Liu and Andrew A. Chien}, editor = {Patrick D. McDaniel}, title = {Empirical Study of Tolerating Denial-of-Service Attacks with a Proxy Network}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/empirical-study-tolerating-denial-service-attacks-proxy}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangLC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YegneswaranGBJ05, author = {Vinod Yegneswaran and Jonathon T. Giffin and Paul Barford and Somesh Jha}, editor = {Patrick D. McDaniel}, title = {An Architecture for Generating Semantic Aware Signatures}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/architecture-generating-semantic-aware-signatures}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/YegneswaranGBJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YinW05, author = {Heng Yin and Haining Wang}, editor = {Patrick D. McDaniel}, title = {Building an Application-aware IPsec Policy System}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/building-application-aware-ipsec-policy-system}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/YinW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/uss/2005, editor = {Patrick D. McDaniel}, title = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/legacy/publications/library/proceedings/sec05/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.