


default search action
26th S&P 2005: Oakland, California, USA
- 2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA. IEEE Computer Society 2005, ISBN 0-7695-2339-0

- Message from the Program Chairs.

- Conference Organizers.

- Program Committee.

Session: Intrusion Detection
- Shai Rubin, Somesh Jha, Barton P. Miller:

Language-Based Generation and Evaluation of NIDS Signatures. 3-17 - Rajeev Gopalakrishna, Eugene H. Spafford

, Jan Vitek:
Efficient Intrusion Detection using Automaton Inlining. 18-31 - Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant:

Semantics-Aware Malware Detection. 32-46
Session: Sensor Networks
- Bryan Parno, Adrian Perrig, Virgil D. Gligor:

Distributed Detection of Node Replication Attacks in Sensor Networks. 49-63 - Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter:

Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. 64-78
Session: Access Control and Authentication
- Lujo Bauer

, Scott Garriss, Michael K. Reiter:
Distributed Proving in Access-Control Systems. 81-95 - Ninghui Li, Mahesh V. Tripunitara:

On Safety in Discretionary Access Control. 96-109 - Jonathan M. McCune, Adrian Perrig, Michael K. Reiter:

Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication. 110-124
Session: Integrity
- Glenn Wurster, Paul C. van Oorschot

, Anil Somayaji:
A Generic Attack on Checksumming-Based Software Tamper Resistance. 127-138 - Dwaine E. Clarke

, G. Edward Suh, Blaise Gassend, Ajay Sudan, Marten van Dijk
, Srinivas Devadas:
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data. 139-153 - Elaine Shi, Adrian Perrig, Leendert van Doorn:

BIND: A Fine-Grained Attestation Service for Secure Distributed Systems. 154-168
Session: Cryptography and Protocols
- Michael Backes, Birgit Pfitzmann:

Relating Symbolic and Cryptographic Secrecy. 171-182 - Steven J. Murdoch

, George Danezis:
Low-Cost Traffic Analysis of Tor. 183-195 - Michael T. Goodrich

:
Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts. 196-207
Session: Worms and Network Forensics
- Tadayoshi Kohno, Andre Broido, Kimberly C. Claffy

:
Remote Physical Device Fingerprinting. 211-225 - James Newsome, Brad Karp, Dawn Xiaodong Song:

Polygraph: Automatically Generating Signatures for Polymorphic Worms. 226-241 - Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang:

Worm Origin Identification Using Random Moonwalks. 242-256

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














