Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing
Ying Zhang, Zhuoqing Mao and J. Wang
Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized Network Traces
Scott Coull, C. Wright, Fabian Monrose, Michael Collins and Michael K. Reiter
Fig: Automatic Fingerprint Generation
Juan Caballero, S. Venkataraman, Pongsin Poosankam, Min Gyung Kang and Dawn Song
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Philipp Vogt, Engin Kirda, Christopher Kruegel and Giovanni Vigna
A Quantitative Study of Forum Spamming Using Context-based Analysis
Yuan Niu, Hao Chen, Francis Hsu and Yi-Min Wang
Phinding Phish: An Evaluation of Anti-Phishing Toolbars
Lorrie Cranor, Serge Egelman, Jason Hong and Yue Zhang
Army of Botnets
Ryan Vogt, John Aycock and Michael Jacobson
Shedding Light on the Configuration of Dark Addresses
Sushant Sinha, Michael Bailey and Farnam Jahanian
Consumable Credentials in Linear-Logic-Based Access-Control Systems
Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning and Michael K. Reiter
Secret Handshakes with Dynamic and Fuzzy Matching
Giuseppe Ateniese, Jonathan Kirsch and Marina Blanton
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
Apu Kapadia, Patrick Tsang and Sean Smith
File System Design with Assured Delete
Radia Perlman
Cryptographic Methods for Storing Ballots on a Voting Machine
J. Bethencourt, Dan Boneh and Brent Waters
On the Practicality of Private Information Retrieval
R. Sion and Bogdan Carbunar
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
David Brumley, Dawn Song, Tzi-cker Chiueh, Rob Johnson and Huija Lin
Generic Application-Level Protocol Analyzer and its Language
Nikita Borisov, David Brumley, Helen Wang, John Dunagan, Pallavi Joshi and Chuanxiong Guo
OPTWALL: A Hierarchical Traffic-Aware Firewall
Subrata Acharya, Bryan Mills, Mehmud Abliz, Taieb Znati, J. Wang, Zihui Ge and Albert Greenberg