文件名称:IEEE Symposium on Security & Privacy 2006
文件大小:9.15MB
文件格式:RAR
更新时间:2014-02-10 04:25:52
IEEE Symposium on Security &
IEEE Symposium on Security & Privacy 2006
【文件预览】:
IEEE Symposium on Security & Privacy 2006
----Towards automatic generation of vulnerability-based signatures.pdf(463KB)
----SubVirt Implementing malware with virtual machines.pdf(396KB)
----Hamsa fast signature generation for zero-day polymorphic worms with provable attack resilience.pdf(586KB)
----A logic for constraint-based security protocol analysis.pdf(396KB)
----01623995.pdf(25KB)
----Simulatable security and polynomially bounded concurrent composability.pdf(425KB)
----Deriving an information flow checker and certifying compiler for Java.pdf(417KB)
----Integrity (I) codes message integrity protection and authentication over insecure channels.pdf(448KB)
----01623992.pdf(46KB)
----Siren catching evasive malware.pdf(200KB)
----Cobra fine-grained malware analysis using stealth localized-executions.pdf(382KB)
----Secure Device Pairing based on a Visual Channel (Short Paper).pdf(222KB)
----Dataflow anomaly detection.pdf(327KB)
----01623991.pdf(39KB)
----01623994.pdf(25KB)
----New constructions and practical applications for private stream searching.pdf(274KB)
----Practical inference control for data cubes.pdf(247KB)
----Fundamental limits on the anonymity provided by the MIX technique.pdf(452KB)
----On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques.pdf(502KB)
----Cache cookies for browser authentication.pdf(199KB)
----Practical Attacks on Proximity Identification Systems (Short Paper).pdf(312KB)
----Analysis of the Linux Random Number Generator.pdf(415KB)
----01623993.pdf(28KB)
----Retrofitting legacy code for authorization policy enforcement.pdf(445KB)
----A Safety-Oriented Platform for Web Applications.pdf(765KB)
----A framework for the evaluation of intrusion detection systems.pdf(405KB)
----Automatically generating malicious disks using symbolic execution.pdf(479KB)
----FIREMAN a toolkit for firewall modeling and analysis.pdf(420KB)
----Deterring voluntary trace disclosure in re-encryption mix networks.pdf(334KB)
----The Final Nail in WEP’s Coffin.pdf(365KB)
----A computationally sound mechanized prover for security protocols.pdf(494KB)
----Tamper-evident, history-independent, subliminal-free data structures on PROM storage -or- how to store ballots on a voting machine.pdf(218KB)
----Misleading worm signature generators using deliberate noise injection.pdf(413KB)
----01624029.pdf(33KB)
----01623990.pdf(31KB)
----Pixy a static analysis tool for detecting Web application vulnerabilities.pdf(242KB)
----01623996.pdf(30KB)
----Locating hidden servers.pdf(500KB)
----Privacy and contextual integrity framework and applications.pdf(211KB)
----Cognitive authentication schemes safe against spyware.pdf(771KB)
----01623989.pdf(822KB)