FINAL PROGRAM
2005 IEEE Symposium on Security and Privacy

5-Minute Talks

May 9, 2005, 15:00 - 17:00

Back to main program

AN INFORMATION-THEORETIC MEASURE OF INTRUSION DETECTION CAPABILITY
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric

ANONYMITY IN PEER-TO-PEER SYSTEMS
Nikita Borisov

APPLYING INTERVAL METHODS FOR INTRUSION DETECTION
Chenyi Hu

AUTOMATED WEB PATROL WITH STRIDER HONEYMONKEYS: FINDING WEB SITES THAT
EXPLOIT CLIENT-SIDE BROWSER VULNERABILITIES
Yi-Min Wang and Doug Beck

BACK TO THE FUTURE: A FRAMEWORK FOR EXECUTING MALWARE SAFELY VIA
MONITORING, LOGGING, AND RECOVERY
Hao Chen, Francis Hsu, Thomas Ristenpart, Zhendong Su

BULLETPROOF: SECURING THE WINDOWS MESSAGING SYSTEM A FIRST STEP TOWARDS
SECURE SEPARATION OF PRIVILEGE IN WINDOWS
Jason Li and Hao Chen

DESIGNING SECURITY ARCHITECTURE FOR LARGE SCALE, OPEN, DISTRIBUTED
HETEROGENEOUS SYSTEMS
Syed Naqvi, Michel Riguidel

DISPOSABLE TOKENS FOR PUBLIC WIRELESS NETWORKS
Jeff Shirley and David Evans

IDENTITY DISCLOSURE USING PARALINGUISTIC PATTERNS
Natalie Ardet

INFUSING USABILITY INTO TEXT-PASSWORD BASED AUTHENTICATION SYSTEMS
Umut Topkara, Sundararaman Jeyaraman

KERNELSEC: A GENERAL PURPOSE AUTHENTICATION FRAMEWORK IMPLEMENTED IN
THE OPERATING SYSTEM KERNEL
Manigandan Radhakrishnan and Jon A. Solworth

LOCATION HIDDEN SERVICES
Paul Syverson

MECHANISMS FOR SECURE REPUTATION
Radu Sion Bogdan Carbunar

ON THE CRYPTOGRAPHIC (UN-)SOUNDNESS OF DOLEV-YAO STYLE HASH
FUNCTIONS
Michael Backes, Birgit Pfitzmann, Michael Waidner

PERFORMANCE ANALYSIS OF ELLIPTIC CURVE CRYPTOGRAPHY IN SECURE SOCKET
LAYER & WIRELESS SECURITY
Varun Srivastava , Shashank Sharma

SELF-HEALING WORKFLOW SYSTEMS UNDER ATTACKS
Meng YU, Wanyu Zang and Peng Liu

SELS: A SECURE EMAIL LIST SERVICE
Himanshu Khuarana, Adam Slagell, and Rafael Bonilla

SERAT : SECURE ROLE MAPPING TECHNIQUE FOR DECENTRALIZED SECURE
INTEROPERABILITY
Mohamed Shehab, Elisa Bertino, Arif Ghafoor

THE EFFECTIVENESS OF INSTRUCTION SET RANDOMIZATION
Ana Nora Sovarel and David Evans

TOWARDS VERIFIED SECURITY FOR A FUNCTIONAL MICROKERNEL
Rebekah Leslie and Mark Jones


Back to main program

Last modified: Fri Apr 15 09:18:46 Romance Daylight Time 2005