ID | Interpret | Skladba | Album | |
61. | Michael Dalton, Hari Kannan, and Christos Kozyrakis, Stanford University | Real-World Buffer Overflow Protection for User and Kernel Space | 17th USENIX Security Symposium Refereed Papers | |
62. | Sebastian Zander, Swinburne University of Technology, Australia; Steven J. Murdoch, Computer Laboratory, University of Cambridge | An Improved Clock-skew Measurement Technique for Revealing Hidden Services | 17th USENIX Security Symposium Refereed Papers | |
63. | Daniel Sandler, Kyle Derr, and Dan S. Wallach, Rice University | VoteBox: A Tamper-evident, Verifiable Electronic Voting System | 17th USENIX Security Symposium Refereed Papers | |
64. | Swaminathan Sundararaman, Gopalan Sivathanu, and Erez Zadok, Stony Brook University | Selective Versioning in a Secure Disk System | 17th USENIX Security Symposium Refereed Papers | |
65. | Jose Nazario, Senior Security Engineer, Arbor Networks | Political DDoS: Estonia and Beyond | 17th USENIX Security Symposium Invited Talks | |
66. | Owen Harrison and John Waldron, Trinity College Dublin | Practical Symmetric Key Cryptography on Modern Graphics Hardware | 17th USENIX Security Symposium Refereed Papers | |
67. | Michael Martin and Monica S. Lam, Stanford University | Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking | 17th USENIX Security Symposium Refereed Papers | |
68. | Ari Juels, RSA Laboratories; Ravikanth Pappu, ThingMagic Inc; Bryan Parno, Carnegie Mellon University | Unidirectional Key Distribution Across Time and Space with Applications to RFID Security | 17th USENIX Security Symposium Refereed Papers | |
69. | Rui Wang and XiaoFeng Wang, Indiana University at Bloomington; Zhuowei Li, Center for Software Excellence, Microsoft | Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software | 17th USENIX Security Symposium Refereed Papers | |
70. | Ben Adida, Harvard University | Helios: Web-based Open-Audit Voting | 17th USENIX Security Symposium Refereed Papers | |
71. | Jerry Chou and Bill Lin, University of California, San Diego; Subhabrata Sen and Oliver Spatscheck, AT&T Labs | Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks | 17th USENIX Security Symposium Refereed Papers | |
72. | Dawson Engler, Stanford University; Ben Chelf, Andy Chou, and Seth Hallem, Coverity | A Few Billion Lines of Code Later: Experiences Commercializing a Static Checking Tool | 17th USENIX Security Symposium Invited Talks | |
73. | Adam Barth, Collin Jackson, and John C. Mitchell, Stanford University | Securing Frame Communication in Browsers | 17th USENIX Security Symposium Refereed Papers | |
74. | Gang Tan and Jason Croft, Boston College | An Empirical Security Study of the Native Code in the JDK | 17th USENIX Security Symposium Refereed Papers | |
75. | Sam Small, Joshua Mason, and Fabian Monrose, Johns Hopkins University; Niels Provos, Google Inc.; Adam Stubblefield, Johns Hopkins University | To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads | 17th USENIX Security Symposium Refereed Papers | |
76. | Lucas Ballard and Seny Kamara, The Johns Hopkins University; Michael K. Reiter, University of North Carolina at Chapel Hill | The Practical Subtleties of Biometric Key Generation | 17th USENIX Security Symposium Refereed Papers | |
77. | Debra Bowen, California Secretary of State | Dr. Strangevote or: How I Learned to Stop Worrying and Love the Paper Ballot | 17th USENIX Security Symposium Invited Talks | |
78. | Karsten Nohl and David Evans, University of Virginia; Starbug and Henryk Plötz, Chaos Computer Club, Berlin | Reverse-Engineering a Cryptographic RFID Tag | 17th USENIX Security Symposium Refereed Papers | |
79. | Byung-Gon Chun, ICSI; Sylvia Ratnasamy, Intel Research Berkeley; Eddie Kohler, University of California, Los Angeles | NetComplex: A Complexity Metric for Networked System Designs | 5th USENIX Symposium on Networked Systems Design and Implementation | |
80. | Xin Liu, Ang Li, and Xiaowei Yang, University of California, Irvine; David Wetherall, Intel Research Seattle and University of Washington | Passport: Secure and Adoptable Source Authentication | 5th USENIX Symposium on Networked Systems Design and Implementation | |
81. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
82. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
83. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
84. | Ed Finkler | Defending Web Applications With PHPSecInfo | 8th Annual CERIAS Information Security Symposium | |
85. | Steve Gibson with Leo Laporte | Security Now 41: Truecrypt - brought to you by Astaro Corp. | Security Now May 2006 | |
86. | Steve Gibson with Leo Laporte | Security Now 40: Listener Q&A 7 - Sponsored by Astaro Corp. | Security Now May 2006 | |
87. | Steve Gibson with Leo Laporte | Security Now 38: Browser Security - sponsored by Astaro Corp. | Security Now May 2006 | |
88. | Steve Gibson with Leo Laporte | Security Now 39: Buffer Overflows - sponsored by Astaro Corp. | Security Now May 2006 | |
89. | Steve Gibson with Leo Laporte | Security Now 64: Your Questions, Steve's Answers - Sponsored by Astaro Corp. | Security Now November 2006 | |
90. | Steve Gibson with Leo Laporte | Security Now 54: Blue Pill - Sponsored by Astaro Corp. | Security Now August 2006 | |