default search action
10th USENIX Security Symposium 2001: Washington, D.C., USA
- Dan S. Wallach:
10th USENIX Security Symposium, August 13-17, 2001, Washington, D.C., USA. USENIX 2001
Denial of Service
- Drew Dean, Adam Stubblefield:
Using Client Puzzles to Protect TLS. - David Moore, Geoffrey M. Voelker, Stefan Savage:
Inferring Internet Denial-of-Service Activity. - Thomer M. Gil, Massimiliano Poletto:
MULTOPS: A Data-Structure for Bandwidth Attack Detection.
Hardware
- Peter Gutmann:
Data Remanence in Semiconductor Devices. - Michael Frantzen, Michael Shuey:
StackGhost: Hardware Facilitated Stack Protection. - Mark Lindemann, Sean W. Smith:
Improving DES Coprocessor Throughput for Short Operations.
Firewalls/Intrusion Detection
- Avishai Wool:
Architecting the Lumeta Firewall Analyzer. - Peter M. Gleitz, Steven M. Bellovin:
Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host. - Mark Handley, Vern Paxson, Christian Kreibich:
Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics.
SDMI/DMCA
- Scott Craver, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten:
Reading Between the Lines: Lessons from the SDMI Challenge.
Operating Systems
- Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats.
- Steven J. Bauer, Nissanka Bodhi Priyantha:
Secure Data Deletion for Linux File Systems. - Crispin Cowan, Steve Beattie, Chris Wright, Greg Kroah-Hartman:
RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities.
Managing Code
- David Larochelle, David Evans:
Statically Detecting Likely Buffer Overflow Vulnerabilities. - Crispin Cowan, Matt Barringer, Steve Beattie, Greg Kroah-Hartman, Michael Frantzen, Jamie Lokier:
FormatGuard: Automatic Protection From printf Format String Vulnerabilities. - Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David A. Wagner:
Detecting Format String Vulnerabilities with Type Qualifiers.
Authorization
- Jude T. Regan, Christian Damsgaard Jensen:
Capability File Names: Separating Authorisation From User Management in an Internet File System. - Olga Kornievskaia, Peter Honeyman, Bill Doster, Kevin Coffman:
Kerberized Credential Translation: A Solution to Web Access Control. - Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster:
The Dos and Don'ts of Client Authentication on the Web.
Key Management
- Naomaru Itoi:
SC-CFS: Smartcard Secured Cryptographic File System. - Lukasz Opyrchal, Atul Prakash:
Secure Distribution of Events in Content-Based Publish Subscribe Systems. - Dan Boneh, Xuhua Ding, Gene Tsudik, Chi-Ming Wong:
A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
Math Attacks!
- Charlie Kaufman, Radia J. Perlman:
PDM: A New Strong Password-Based Protocol. - Niels Provos:
Defending Against Statistical Steganalysis. - Dawn Xiaodong Song, David A. Wagner, Xuqing Tian:
Timing Analysis of Keystrokes and Timing Attacks on SSH.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.