-
2
-
-
0036916125
-
Cryptographic wiretapping at 100 megabits
-
Orlando, FL, April
-
C. J. Antonelli, K. Coffman, J. B. Fields, and P. Honeyman. Cryptographic wiretapping at 100 megabits. In 16th SPIE Annual International Symposium on Aerospace/Defense Sensing, Simulation, and Controls, Orlando, FL, April 2002.
-
(2002)
16th SPIE Annual International Symposium on Aerospace/Defense Sensing, Simulation, and Controls
-
-
Antonelli, C.J.1
Coffman, K.2
Fields, J.B.3
Honeyman, P.4
-
3
-
-
0013417601
-
The packet vault: Secure storage of network data
-
Santa Clara, CA, April
-
C. J. Antonelli, M. Undy, and P. Honeyman. The packet vault: Secure storage of network data. In 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999.
-
(1999)
1st USENIX Workshop on Intrusion Detection and Network Monitoring
-
-
Antonelli, C.J.1
Undy, M.2
Honeyman, P.3
-
4
-
-
21644433634
-
Xen and the art of virtualization
-
Bolton Landing, NY
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), pages 164-177, Bolton Landing, NY, 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
79952272940
-
-
November
-
BBC News. Brown apologises for records loss, November 2007. http://news.bbc.co.uk/1/hi/uk_politics/7104945.stm.
-
(2007)
Brown Apologises for Records Loss
-
-
-
6
-
-
33749561840
-
Virtual machines, virtual security
-
S. M. Bellovin. Virtual machines, virtual security. Communications of the ACM, 49(10), 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.10
-
-
Bellovin, S.M.1
-
8
-
-
0036041421
-
An empirical study of operating system errors
-
Banff, Canada, October
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating system errors. In Proc. of the 18th ACM Symposium on Operating System Principles (SOSP), pages 73-88, Banff, Canada, October 2001.
-
(2001)
Proc. Of the 18th ACM Symposium on Operating System Principles (SOSP)
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
9
-
-
44449130555
-
Finding p2p file-sharing using coarse network behaviors
-
M. P. Collins and M. K. Reiter. Finding p2p file-sharing using coarse network behaviors. In Proceedings of ESORICS, 2006.
-
(2006)
Proceedings of ESORICS
-
-
Collins, M.P.1
Reiter, M.K.2
-
10
-
-
85076886457
-
Playing devil's advocate: Inferring sensitive information from anonymized traces
-
Boston, MA, August
-
S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter. Playing devil's advocate: Inferring sensitive information from anonymized traces. In Proceedings of the USENIX Security Symposium, Boston, MA, August 2007.
-
(2007)
Proceedings of the USENIX Security Symposium
-
-
Coull, S.1
Wright, C.2
Monrose, F.3
Collins, M.4
Reiter, M.5
-
12
-
-
70450078948
-
Secure virtual architecture: A safe execution environment for commodity operating systems
-
Stevenson, WA, Oct
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve. Secure virtual architecture: A safe execution environment for commodity operating systems. In 21st ACM SOSP, Stevenson, WA, Oct 2007.
-
(2007)
21st ACM SOSP
-
-
Criswell, J.1
Lenharth, A.2
Dhurjati, D.3
Adve, V.4
-
13
-
-
70449121907
-
Robust TCP stream reassembly in the presence of adversaries
-
Baltimore, MD, July
-
S. Dharmapurikar and V. Paxson. Robust TCP stream reassembly in the presence of adversaries. In 14th USENIX Security Symposium, Baltimore, MD, July 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Dharmapurikar, S.1
Paxson, V.2
-
14
-
-
78149490661
-
-
M. Dornseif. 0wned by an ipod, 2004. http://md.hudora.de/presentations/firewire/PacSec2004.pdf.
-
(2004)
0wned by an Ipod
-
-
Dornseif, M.1
-
15
-
-
77952205875
-
Charging from sampled network usage
-
San Francisco, CA, November
-
N. Duffield, C. Land, and M. Thorup. Charging from sampled network usage. In Proceedings of Internet Measurement Workshop (IMW), San Francisco, CA, November 2001.
-
(2001)
Proceedings of Internet Measurement Workshop (IMW)
-
-
Duffield, N.1
Land, C.2
Thorup, M.3
-
16
-
-
85076915320
-
-
Electronic Frontier Foundation. RIAA v. Verizon case archive. http://www.eff.org/legal/cases/RIAA_v_Verizon/.
-
RIAA V. Verizon Case Archive
-
-
-
19
-
-
0035360814
-
Deriving traffic demands for operational IP networks: Methodology and experience
-
A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving traffic demands for operational ip networks: methodology and experience. IEEE/ACM Transactions on Networking (TON), 9(3):265-280, 2001.
-
(2001)
IEEE/ACM Transactions on Networking (TON)
, vol.9
, Issue.3
, pp. 265-280
-
-
Feldmann, A.1
Greenberg, A.2
Lund, C.3
Reingold, N.4
Rexford, J.5
True, F.6
-
20
-
-
21644455412
-
TerrA: A virtual machine-based platform for trusted computing
-
Bolton Landing, NY, October
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, October 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
21
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
San Jose, CA, July
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: Cold boot attacks on encryption keys. In Proceedings of the 17th USENIX Security Symposium, San Jose, CA, July 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
23
-
-
77954994394
-
-
IBM. sHype - Secure Hypervisor. http://www.research.ibm.com/secure_systems_department/projects/ hypervis%or/.
-
sHype - Secure Hypervisor
-
-
-
24
-
-
17444410728
-
Prototyping an armored data vault: Rights management on big brother's computer
-
San Francisco, CA, April
-
A. Iliev and S. Smith. Prototyping an armored data vault: Rights management on big brother's computer. In Privacy-Enhancing Technologies, San Francisco, CA, April 2002.
-
(2002)
Privacy-Enhancing Technologies
-
-
Iliev, A.1
Smith, S.2
-
26
-
-
85084162336
-
Secure execution via program shepherding
-
San Francisco, CA, August
-
V. Kiriansky, D. Bruening, and S. P. Amarasinghe. Secure execution via program shepherding. In 11th USENIX Security Symposium, San Francisco, CA, August 2002.
-
(2002)
11th USENIX Security Symposium
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.P.3
-
27
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
Portland, OR, September
-
A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In Proceedings of 2004 Conference on Applications, Technologies, Architectures, and Protocols for computer communications (SIGCOMM), Portland, OR, September 2004.
-
(2004)
Proceedings of 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
28
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
Bolton Landing, NY, October
-
D. Lie, C. Thekkath, and M. Horowitz. Implementing an untrusted operating system on trusted hardware. In 19th ACM SOSP, Bolton Landing, NY, October 2003.
-
(2003)
19th ACM SOSP
-
-
Lie, D.1
Thekkath, C.2
Horowitz, M.3
-
29
-
-
84879848814
-
Application and analysis of the virtual machine approach to information system security and isolation
-
Cambridge, MA
-
S. E. Madnick and J. J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation. In Proc. of the Workshop on Virtual Computer Systems, Cambridge, MA, 1973.
-
(1973)
Proc. Of the Workshop on Virtual Computer Systems
-
-
Madnick, S.E.1
Donovan, J.J.2
-
30
-
-
0032178152
-
An extensible probe architecture for network protocol performance measurement
-
Vancouver, BC, September
-
G. R. Malan and F. Jahanian. An extensible probe architecture for network protocol performance measurement. In Proceedings of the 1998 Conference on Applications, Technologies, Architectures, and Protocols for computer communications (SIGCOMM), Vancouver, BC, September 1998.
-
(1998)
Proceedings of the 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
-
-
Malan, G.R.1
Jahanian, F.2
-
34
-
-
33847256529
-
The devil and packet trace anonymization
-
R. Pang, M. Allman, V. Paxson, and J. Lee. The devil and packet trace anonymization. ACM SIGCOMM Computer Communication Review, 36(1):29-38, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
35
-
-
10444260259
-
A high-level programming environment for packet trace anonymization and transformation
-
Karlsruhe, Germany, August
-
R. Pang and V. Paxson. A high-level programming environment for packet trace anonymization and transformation. In 9th ACM SIGCOMM, Karlsruhe, Germany, August 2003.
-
(2003)
9th ACM SIGCOMM
-
-
Pang, R.1
Paxson, V.2
-
36
-
-
14944369649
-
Characteristics of Internet background radiation
-
Taormina, Italy, October
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet background radiation. In Proc. of IMC), Taormina, Italy, October 2004.
-
(2004)
Proc. Of IMC)
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
37
-
-
84855520785
-
-
Technical report, SEC Consult Unternehmensberatung GmbH
-
P. Panholzer. Physical security attacks on windows vista. Technical report, SEC Consult Unternehmensberatung GmbH, 2008. http://www.sec-consult.com/fileadmin/Whitepapers/Vista_Physical_Attacks%.pdf.
-
(2008)
Physical Security Attacks on Windows Vista
-
-
Panholzer, P.1
-
38
-
-
0041513496
-
Long-term forecasting of internet backbone traffic: Observations and initial models
-
San Francisco, CA, April
-
K. Papagiannaki, N. Taft, Z.-L. Zhang, and C. Diot. Long-term forecasting of internet backbone traffic: Observations and initial models. In Proc. of INFOCOM, San Francisco, CA, April 2003.
-
(2003)
Proc. Of INFOCOM
-
-
Papagiannaki, K.1
Taft, N.2
Zhang, Z.-L.3
Diot, C.4
-
39
-
-
85084160194
-
Encrypting virtual memory
-
Denver, CO, August
-
N. Provos. Encrypting virtual memory. In 9th USENIX Security Symposium, Denver, CO, August 2000.
-
(2000)
9th USENIX Security Symposium
-
-
Provos, N.1
-
42
-
-
84978370407
-
An analysis of Internet content delivery systems
-
Boston, MA, December
-
S. Saroiu, K. P. Gummadi, R. J. Dunn, S. D. Gribble, and H. M. Levy. An analysis of Internet content delivery systems. In Proc. of the 5th Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA, December 2002.
-
(2002)
Proc. Of the 5th Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Saroiu, S.1
Gummadi, K.P.2
Dunn, R.J.3
Gribble, S.D.4
Levy, H.M.5
-
43
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
-
October
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. SecVisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In 21st ACM SOSP, October 2007.
-
(2007)
21st ACM SOSP
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
44
-
-
21644434531
-
DyaD: A system for using physically secure coprocessors
-
J. D. Tygar and B. Yee. Dyad: A system for using physically secure coprocessors. In IP Workshop Proceedings, 1994.
-
(1994)
IP Workshop Proceedings
-
-
Tygar, J.D.1
Yee, B.2
-
48
-
-
48749111130
-
-
R. Wojtczuk. libNids, 2008. http://libnids.sourceforge.net/.
-
(2008)
libNids
-
-
Wojtczuk, R.1
-
50
-
-
85094661726
-
Organization-based analysis of web-object sharing and caching
-
Boulder, CO, October
-
A. Wolman, G. Voelker, N. Sharma, N. Cardwell, M. Brown, T. Landray, D. Pinnel, A. Karlin, and H. Levy. Organization-based analysis of web-object sharing and caching. In Proceedings of the Second USENIX Symposium on Internet Technologies and Systems (USITS), Boulder, CO, October 1999.
-
(1999)
Proceedings of the Second USENIX Symposium on Internet Technologies and Systems (USITS)
-
-
Wolman, A.1
Voelker, G.2
Sharma, N.3
Cardwell, N.4
Brown, M.5
Landray, T.6
Pinnel, D.7
Karlin, A.8
Levy, H.9
-
52
-
-
1242308060
-
On the design and performance of prefix-preserving IP traffic trace anonymization
-
J. Xu, J. Fan, M. Ammar, and S. B. Moon. On the design and performance of prefix-preserving IP traffic trace anonymization. In 1st ACM SIGCOMM IMW Workshop, 2001.
-
(2001)
1st ACM SIGCOMM IMW Workshop
-
-
Xu, J.1
Fan, J.2
Ammar, M.3
Moon, S.B.4
-
53
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution
-
Oakland, CA, May
-
J. Yang, C. Sar, P. Twohey, C. Cadar, and D. Engler. Automatically generating malicious disks using symbolic execution. In Proceedings of the IEEE Symposium on Security and Privacy, pages 243-257, Oakland, CA, May 2006.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 243-257
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
-
54
-
-
73649104404
-
AOL executive quits after posting of search data
-
August
-
T. Zeller Jr. AOL executive quits after posting of search data. International Herald Tribune, August 2006.
-
(2006)
International Herald Tribune
-
-
Zeller, T.1
|