The Community for Technology Leaders
RSS Icon
Subscribe
2006 22nd Computer Security Applications Conference (2006)
Miami Beach, FL
Dec. 11, 2006 to Dec. 15, 2006
ISBN: 0-7695-2716-7
TABLE OF CONTENTS
Reviewers (PDF)
pp.
Introduction
Preface (PDF)
pp. ix
Reviewers (PDF)
pp. xi-xii
pp. xiii
Sponsors (PDF)
pp. xiv
Distinguished Practitioner
Session: Applied Distributed Collaboration
Jonathan M. McCune , Carnegie Mellon University, USA
Trent Jaeger , Pennsylvania State University, USA
Stefan Berger , IBM T.J. Watson Research Center, USA
Ramon Caceres , IBM T.J. Watson Research Center, USA
Reiner Sailer , IBM T.J. Watson Research Center, USA
pp. 23-32
George Oikonomou , University of Delaware, USA
Jelena Mirkovic , University of Delaware, USA
Peter Reiher , UCLA, USA
Max Robinson , Aerospace Corporation
pp. 33-42
Shiping Chen , George Mason University, USA; Sybase Inc., USA
Dongyu Liu , George Mason University, USA
Songqing Chen , George Mason University, USA
Sushil Jajodia , George Mason University, USA
pp. 43-56
Session: Client Access in Untrusted Environments
Ravi Chandra Jammalamadaka , University of California, Irvine, USA
Timothy W. van der Horst , Brigham Young University, USA
Sharad Mehrotra , University of California, Irvine, USA
Kent E. Seamons , Brigham Young University, USA
Nalini Venkasubramanian , University of California, Irvine, USA
pp. 57-66
Dinei Florencio , Microsoft Research, USA
Cormac Herley , Microsoft Research, USA
pp. 67-76
Collin Mulliner , University of California, Santa Barbara, USA
Giovanni Vigna , University of California, Santa Barbara, USA
pp. 77-88
Session: Network Intrusion Detection
Randy Smith , University of Wisconsin-Madison, USA
Cristian Estan , University of Wisconsin-Madison, USA
Somesh Jha , University of Wisconsin-Madison, USA
pp. 89-98
Hao Wang , University of Wisconsin-Madison, USA
Somesh Jha , University of Wisconsin-Madison, USA
Vinod Ganapathy , University of Wisconsin-Madison, USA
pp. 99-108
Jeffrey Horton , University of Wollongong, Australia
Rei Safavi-Naini , University of Wollongong, Australia
pp. 109-120
Session: Network Security
Kyle Ingols , MIT Lincoln Laboratory, USA
Richard Lippmann , MIT Lincoln Laboratory, USA
Keith Piwowarski , MIT Lincoln Laboratory, USA
pp. 121-130
Kun Sun , Intelligent Automation, Inc.
Pai Peng , Opsware Inc.
Peng Ning , NC State University, USA
Cliff Wang , Army Research Office
pp. 131-140
Rupinder Gill , Queensland University of Technology, Australia
Jason Smith , Queensland University of Technology, Australia
Andrew Clark , Queensland University of Technology, Australia
pp. 141-152
Session: Security in Systems
Boniface Hicks , Pennsylvania State University, USA
Kiyan Ahmadizadeh , Pennsylvania State University, USA
Patrick McDaniel , Pennsylvania State University, USA
pp. 153-164
Aggelos Kiayias , University of Connecticut, USA
Michael Korman , University of Connecticut, USA
David Walluck , University of Connecticut, USA
pp. 165-174
Lillian Rostad , Norwegian University of Science and Technology (NTNU), Norway
Ole Edsberg , Norwegian University of Science and Technology (NTNU), Norway
pp. 175-186
Invited Essayist
Brian Witten , Symantec Research Labs
pp. 187-202
Session: Applied Sandboxing
Philip W.L. Fong , University of Regina, Canada
Simon A. Orr , University of Regina, Canada
pp. 203-212
Wei Li , Stony Brook University
Lap-chung Lam , Stony Brook University
Tzi-cker Chiueh , Stony Brook University
pp. 213-222
Tejas Khatiwala , University of Illinois, Chicago, USA
Raj Swaminathan , University of Illinois, Chicago, USA
V.N. Venkatakrishnan , University of Illinois, Chicago, USA
pp. 223-234
Session: Malware
Wei Yu , Texas A&M University, USA
Xun Wang , The Ohio State University, USA
Prasad Calyam , The Ohio State University, USA
Dong Xuan , The Ohio State University, USA
Wei Zhao , Texas A&M University, USA
pp. 235-244
Guanhua Yan , Los Alamos National Laboratory
Stephan Eidenbenz , Los Alamos National Laboratory
pp. 245-256
Francis Hsu , University of California, Davis, USA
Hao Chen , University of California, Davis, USA
Thomas Ristenpart , University of California, Davis, USA; University of California, San Diego, USA
Jason Li , University of California, Davis, USA; Microsoft Corporation
Zhendong Su , University of California, Davis, USA
pp. 257-268
Session: Applied Detection Technologies
Marco Cova , University of California, Santa Barbara, USA
Viktoria Felmetsger , University of California, Santa Barbara, USA
Greg Banks , University of California, Santa Barbara, USA
Giovanni Vigna , University of California, Santa Barbara, USA
pp. 269-278
Susanta Nanda , SUNY at Stony Brook, USA
Wei Li , SUNY at Stony Brook, USA
Lap-Chung Lam , SUNY at Stony Brook, USA
Tzi-cker Chiueh , SUNY at Stony Brook, USA
pp. 279-288
Paul Royal , Georgia Institute of Technology, USA
Mitch Halpin , Georgia Institute of Technology, USA
David Dagon , Georgia Institute of Technology, USA
Robert Edmonds , Georgia Institute of Technology, USA
Wenke Lee , Georgia Institute of Technology, USA
pp. 289-300
Classic Papers
Peter G. Neumann , SRI International, USA
pp. 321-328
Session: Applied Randomization
Lixin Li , Global InfoTek, Inc., USA
James E. Just , Global InfoTek, Inc., USA
R. Sekar , Stony Brook University, USA
pp. 329-338
Chongkyung Kil , North Carolina State University, USA
Jinsuk Jun , North Carolina State University, USA
Christopher Bookholt , North Carolina State University, USA
Jun Xu , Google, Inc.
Peng Ning , North Carolina State University, USA
pp. 339-348
Yoav Weiss , Discretix Technologies Ltd., Israel
Elena Gabriela Barrantes , Universidad de Costa Rica, Costa Rica
pp. 349-360
Session: Intrusion Detection
Frederic Massicotte , Canada Communication Research Center, Canada
Francois Gagnon , Carleton University, Canada
Yvan Labiche , Carleton University, Canada
Lionel Briand , Carleton University, Canada
Mathieu Couture , Carleton University, Canada
pp. 361-370
Nigel Jacob , Tufts University, USA
Carla Brodley , Tufts University, USA
pp. 371-380
Ying Pan , Singapore Management University, Singapore
Xuhua Ding , Singapore Management University, Singapore
pp. 381-392
Session: Messaging Security
David Whyte , Carleton University, Canada
P.C. van Oorschot , Carleton University, Canada
Evangelos Kranakis , Carleton University, Canada
pp. 393-402
Rakesh Bobba , University of Illinios Urbana-Champaign, USA
Omid Fatemieh , University of Illinois Urbana-Champaign, USA
Fariba Khan , University of Illinois Urbana-Champaign, USA
Carl A. Gunter , University of Illinois Urbana-Champaign, USA
Himanshu Khurana , University of Illinois Urbana-Champaign, USA
pp. 403-413
Jeff Yan , Newcastle University, UK
Pook Leong Cho , Newcastle University, UK
pp. 414-428
Session: Countermeasures
Yves Younan , Katholieke Universiteit Leuven, Belgium
Davide Pozza , Politecnico di Torino, Italy
Frank Piessens , Katholieke Universiteit Leuven, Belgium
Wouter Joosen , Katholieke Universiteit Leuven, Belgium
pp. 429-438
Ashish Gehani , University of Notre Dame
Surendar Chandra , University of Notre Dame
pp. 439-448
Kun Bai , The Pennsylvania State University, USA
Peng Liu , The Pennsylvania State University, USA
pp. 449-462
Session: Information Flow and Leakage
Lap Chung Lam , Rether Networks, Inc., USA
Tzi-cker Chiueh , Rether Networks, Inc., USA
pp. 463-472
Zhenghong Wang , Princeton University
Ruby B. Lee , Princeton University
pp. 473-482
Yinglian Xie , Carnegie Mellon University, USA
Michael K. Reiter , Carnegie Mellon University, USA
David O'Hallaron , Carnegie Mellon University, USA
pp. 493-504
Author Index
Author Index (PDF)
pp. 505-506
425 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool