• A
  • ACSAC
  • 2005
  • 21st Annual Computer Security Applications Conference (ACSAC'05)
Advanced Search 
21st Annual Computer Security Applications Conference (ACSAC'05)
Tucson, Arizona
December 05-December 09
ISBN: 0-7695-2461-3
Table of Contents
Cover
Introduction
Distinguished Practitioner
We Need Assurance! (Abstract)
Brian Snow, U. S. National Security Agency
pp. 3-10
Track A: Software Security
Benjamin Schwarz, University of California, Berkeley
Hao Chen, University of California, Berkeley
David Wagner, University of California, Berkeley
Jeremy Lin, University of California, Berkeley
Wei Tu, University of California, Berkeley
Geoff Morrison, University of California, Berkeley
Jacob West, University of California, Berkeley
pp. 13-22
Track B: Network Intrusion Detection
Stig Andersson, Queensland University of Technology, Australia
Andrew Clark, Queensland University of Technology, Australia
George Mohay, Queensland University of Technology, Australia
Bradley Schatz, Queensland University of Technology, Australia
Jacob Zimmermann, Queensland University of Technology, Australia
pp. 49-58
Paul Ammann, ISE Department George Mason University
Joseph Pamula, Center for Secure Information Systems George Mason University
Julie Street, ISE Department George Mason University
Ronald Ritchey, Booz Allen & Hamilton
pp. 72-84
Track A: Security Designs
Wu Yongzheng, National University of Singapore
Roland H. C. Yap, National University of Singapore
pp. 95-105
Wesam Lootah, Pennsylvania State University
William Enck, Pennsylvania State University
Patrick McDaniel, Pennsylvania State University
pp. 106-116
Track B: Protocol Analysis
Jingmin Zhou, University of California, Davis
Adam J. Carlson, University of California, Davis
Matt Bishop, University of California, Davis
pp. 117-126
Danilo Bruschi, Universita degli Studi di Milano
Lorenzo Cavallaro, Universita degli Studi di Milano
Andrea Lanzi, Universita degli Studi di Milano
Mattia Monga, Universita degli Studi di Milano
pp. 127-137
Track A: Vulnerability Assessment
Fanglu Guo, Stony Brook University, NY
Yang Yu, Stony Brook University, NY
Tzi-cker Chiueh, Stony Brook University, NY
pp. 150-159
Elisa Bertino, Purdue University
Ashish Kamra, Purdue University
Evimaria Terzi, University of Helsinki
Athena Vakali, Aristotle University
pp. 170-182
Track B: Hot Topics I
Invited Essayist
Track A: Automation
Corrado Leita, Institut Eurecom Sophia Antipolis, France
Ken Mermoud, Institut Eurecom Sophia Antipolis, France
Marc Dacier, Institut Eurecom Sophia Antipolis, France
pp. 203-214
H. Gunes Kayacyk, Dalhousie University, Halifax, Nova Scotia
A. Nur Zincir-Heywood, Dalhousie University, Halifax, Nova Scotia
Malcolm Heywood, Dalhousie University, Halifax, Nova Scotia
pp. 225-234
Track B: Security Analysis
Mourad debbabi, Concordia University, Montreal, Canada
Mohamed Saleh, Concordia University, Montreal, Canada
Chamseddine Talhi, Concordia University, Montreal, Canada
Sami Zhioua, Concordia University, Montreal, Canada
pp. 235-244
Track A: Operating System Security Mechanisms
Reiner Sailer, IBM T. J. Watson Research Center, Hawthorne, NY
Trent Jaeger, IBM T. J. Watson Research Center, Hawthorne, NY
Enriquillo Valdez, IBM T. J. Watson Research Center, Hawthorne, NY
Ramon Caceres, IBM T. J. Watson Research Center, Hawthorne, NY
Ronald Perez, IBM T. J. Watson Research Center, Hawthorne, NY
Stefan Berger, IBM T. J. Watson Research Center, Hawthorne, NY
John Linwood Griffin, IBM T. J. Watson Research Center, Hawthorne, NY
Leendert van Doorn, IBM T. J. Watson Research Center, Hawthorne, NY
pp. 276-285
Track B: Data Integrity
Vivek Haldar, University of California, Irvine, CA
Deepak Chandra, University of California, Irvine, CA
Michael Franz, University of California, Irvine, CA
pp. 303-311
Track C: Hot Topics II
Classic Papers
Myong H. Kang, Naval Research Laboratory Washington, DC
Ira S. Moskowitz, Naval Research Laboratory Washington, DC
Stanley Chincheck, Naval Research Laboratory Washington, DC
pp. 352-360
Track A: Malware
Weidong Cui, University of California, Berkeley and Hewlett-Packard Laboratories
Randy H. Katz, University of California, Berkeley and Hewlett-Packard Laboratories
Wai-tian Tan, University of California, Berkeley and Hewlett-Packard Laboratories
pp. 361-370
David Whyte, Carleton University, Ottawa, Canada
Paul C. van Oorschot, Carleton University, Ottawa, Canada
Evangelos Kranakis, Carleton University, Ottawa, Canada
pp. 371-380
Stealth Breakpoints (Abstract)
Amit Vasudevan, University of Texas at Arlington
Ramesh Yerraballi, University of Texas at Arlington
pp. 381-392
Track B: Panel
Simon Simon Foley, University College Cork
Abe Singer, University of California at San Diego
Michael E. Locasto, Columbia University
Stelios Sidiroglou, Columbia University
Angelos D. Keromytis, Columbia University
John McDermott, Naval Research Laboratory
Julie Thorpe, Carleton University
Paul van Oorschot, Carleton University
Anil Somayaji, Carleton University
Richard Ford, Florida Institute of Technology
Mark Bush, Florida Institute of Technology
Alex Boulatov, Florida Institute of Technology
pp. 393-396
Track A: Distributed System Security
John P. Jones, University of California, Riverside
Daniel F. Berger, University of California, Riverside
Chinya V. Ravishankar, University of California, Riverside
pp. 409-418
Track B: Access Control
Tine Verhanneman, Katholieke Universiteit Leuven
Frank Piessens, Katholieke Universiteit Leuven
Bart De Win, Katholieke Universiteit Leuven
Wouter Joosen, Katholieke Universiteit Leuven
pp. 431-440
Sandeep Kumar, National University of Singapore
Terence Sim, National University of Singapore
Rajkumar Janakiraman, National University of Singapore
Sheng Zhang, National University of Singapore
pp. 441-450
Rennie deGraaf, University of Calgary
John Aycock, University of Calgary
Michael Jr. Jacobson, University of Calgary
pp. 451-462
Track A: Passwords and Applied Crypto
Xiaoyuan Suo, Georgia State University
Ying Zhu, Georgia State University
G. Scott. Owen, Georgia State University
pp. 463-472
Jason Waddle, University of California, Berkeley
David Wagner, University of California, Berkeley
pp. 483-494
Track B: Defense in Depth/Database Security
Jennifer Chong, BBN Technologies, Cambridge, MA
Partha Pal, BBN Technologies, Cambridge, MA
Michael Atigetchi, BBN Technologies, Cambridge, MA
Paul Rubel, BBN Technologies, Cambridge, MA
Franklin Webber, BBN Technologies, Cambridge, MA
pp. 495-504
Paul Rubel, BBN Technologies, Cambridge, MA
Michael Ihde, University of Illinois at Urbana-Champaign
Steven Harp, Adventium Labs, Minneapolis, MN
Charles Payne, Adventium Labs, Minneapolis, MN
pp. 505-514
Meng Yu, Monmouth University
Wanyu Zang, Monmouth University
Peng Liu, Pennsylvania State University
pp. 515-526
Track C: Privacy
Author Index
Usage of this product signifies your acceptance of the Terms of Use.