• A
  • ACSAC
  • 2006
  • 22nd Annual Computer Security Applications Conference (ACSAC'06)
Advanced Search 
22nd Annual Computer Security Applications Conference (ACSAC'06)
Miami Beach, Florida, USA
December 11-December 15
ISBN: 0-7695-2716-7
Table of Contents
Introduction
Reviewers (PDF)
pp. xi-xii
Distinguished Practitioner
Session: Applied Distributed Collaboration
Jonathan M. McCune, Carnegie Mellon University, USA
Trent Jaeger, Pennsylvania State University, USA
Stefan Berger, IBM T.J. Watson Research Center, USA
Ramon Caceres, IBM T.J. Watson Research Center, USA
Reiner Sailer, IBM T.J. Watson Research Center, USA
pp. 23-32
George Oikonomou, University of Delaware, USA
Jelena Mirkovic, University of Delaware, USA
Peter Reiher, UCLA, USA
Max Robinson, Aerospace Corporation
pp. 33-42
Shiping Chen, George Mason University, USA; Sybase Inc., USA
Dongyu Liu, George Mason University, USA
Songqing Chen, George Mason University, USA
Sushil Jajodia, George Mason University, USA
pp. 43-56
Session: Client Access in Untrusted Environments
Ravi Chandra Jammalamadaka, University of California, Irvine, USA
Timothy W. van der Horst, Brigham Young University, USA
Sharad Mehrotra, University of California, Irvine, USA
Kent E. Seamons, Brigham Young University, USA
Nalini Venkasubramanian, University of California, Irvine, USA
pp. 57-66
Collin Mulliner, University of California, Santa Barbara, USA
Giovanni Vigna, University of California, Santa Barbara, USA
pp. 77-88
Session: Network Intrusion Detection
Randy Smith, University of Wisconsin-Madison, USA
Cristian Estan, University of Wisconsin-Madison, USA
Somesh Jha, University of Wisconsin-Madison, USA
pp. 89-98
Hao Wang, University of Wisconsin-Madison, USA
Somesh Jha, University of Wisconsin-Madison, USA
Vinod Ganapathy, University of Wisconsin-Madison, USA
pp. 99-108
Jeffrey Horton, University of Wollongong, Australia
Rei Safavi-Naini, University of Wollongong, Australia
pp. 109-120
Session: Network Security
Kyle Ingols, MIT Lincoln Laboratory, USA
Richard Lippmann, MIT Lincoln Laboratory, USA
Keith Piwowarski, MIT Lincoln Laboratory, USA
pp. 121-130
Kun Sun, Intelligent Automation, Inc.
Pai Peng, Opsware Inc.
Peng Ning, NC State University, USA
Cliff Wang, Army Research Office
pp. 131-140
Rupinder Gill, Queensland University of Technology, Australia
Jason Smith, Queensland University of Technology, Australia
Andrew Clark, Queensland University of Technology, Australia
pp. 141-152
Session: Security in Systems
Boniface Hicks, Pennsylvania State University, USA
Kiyan Ahmadizadeh, Pennsylvania State University, USA
Patrick McDaniel, Pennsylvania State University, USA
pp. 153-164
Aggelos Kiayias, University of Connecticut, USA
Michael Korman, University of Connecticut, USA
David Walluck, University of Connecticut, USA
pp. 165-174
Lillian Rostad, Norwegian University of Science and Technology (NTNU), Norway
Ole Edsberg, Norwegian University of Science and Technology (NTNU), Norway
pp. 175-186
Invited Essayist
Session: Applied Sandboxing
Wei Li, Stony Brook University
Lap-chung Lam, Stony Brook University
Tzi-cker Chiueh, Stony Brook University
pp. 213-222
Tejas Khatiwala, University of Illinois, Chicago, USA
Raj Swaminathan, University of Illinois, Chicago, USA
V.N. Venkatakrishnan, University of Illinois, Chicago, USA
pp. 223-234
Session: Malware
Wei Yu, Texas A&M University, USA
Xun Wang, The Ohio State University, USA
Prasad Calyam, The Ohio State University, USA
Dong Xuan, The Ohio State University, USA
Wei Zhao, Texas A&M University, USA
pp. 235-244
Francis Hsu, University of California, Davis, USA
Hao Chen, University of California, Davis, USA
Thomas Ristenpart, University of California, Davis, USA; University of California, San Diego, USA
Jason Li, University of California, Davis, USA; Microsoft Corporation
Zhendong Su, University of California, Davis, USA
pp. 257-268
Session: Applied Detection Technologies
Marco Cova, University of California, Santa Barbara, USA
Viktoria Felmetsger, University of California, Santa Barbara, USA
Greg Banks, University of California, Santa Barbara, USA
Giovanni Vigna, University of California, Santa Barbara, USA
pp. 269-278
Susanta Nanda, SUNY at Stony Brook, USA
Wei Li, SUNY at Stony Brook, USA
Lap-Chung Lam, SUNY at Stony Brook, USA
Tzi-cker Chiueh, SUNY at Stony Brook, USA
pp. 279-288
Paul Royal, Georgia Institute of Technology, USA
Mitch Halpin, Georgia Institute of Technology, USA
David Dagon, Georgia Institute of Technology, USA
Robert Edmonds, Georgia Institute of Technology, USA
Wenke Lee, Georgia Institute of Technology, USA
pp. 289-300
Classic Papers
Session: Applied Randomization
Lixin Li, Global InfoTek, Inc., USA
James E. Just, Global InfoTek, Inc., USA
R. Sekar, Stony Brook University, USA
pp. 329-338
Chongkyung Kil, North Carolina State University, USA
Jinsuk Jun, North Carolina State University, USA
Christopher Bookholt, North Carolina State University, USA
Jun Xu, Google, Inc.
Peng Ning, North Carolina State University, USA
pp. 339-348
Session: Intrusion Detection
Frederic Massicotte, Canada Communication Research Center, Canada
Francois Gagnon, Carleton University, Canada
Yvan Labiche, Carleton University, Canada
Lionel Briand, Carleton University, Canada
Mathieu Couture, Carleton University, Canada
pp. 361-370
Ying Pan, Singapore Management University, Singapore
Xuhua Ding, Singapore Management University, Singapore
pp. 381-392
Session: Messaging Security
David Whyte, Carleton University, Canada
P.C. van Oorschot, Carleton University, Canada
Evangelos Kranakis, Carleton University, Canada
pp. 393-402
Rakesh Bobba, University of Illinios Urbana-Champaign, USA
Omid Fatemieh, University of Illinois Urbana-Champaign, USA
Fariba Khan, University of Illinois Urbana-Champaign, USA
Carl A. Gunter, University of Illinois Urbana-Champaign, USA
Himanshu Khurana, University of Illinois Urbana-Champaign, USA
pp. 403-413
Session: Countermeasures
Yves Younan, Katholieke Universiteit Leuven, Belgium
Davide Pozza, Politecnico di Torino, Italy
Frank Piessens, Katholieke Universiteit Leuven, Belgium
Wouter Joosen, Katholieke Universiteit Leuven, Belgium
pp. 429-438
Kun Bai, The Pennsylvania State University, USA
Peng Liu, The Pennsylvania State University, USA
pp. 449-462
Session: Information Flow and Leakage
Yinglian Xie, Carnegie Mellon University, USA
Michael K. Reiter, Carnegie Mellon University, USA
David O'Hallaron, Carnegie Mellon University, USA
pp. 493-504
Author Index
Author Index (PDF)
pp. 505-506
Usage of this product signifies your acceptance of the Terms of Use.