The Community for Technology Leaders
RSS Icon
Subscribe
2012 IEEE Symposium on Security and Privacy (2006)
Berkeley/Oakland, California
May 21, 2006 to May 24, 2006
ISBN: 0-7695-2574-1
TABLE OF CONTENTS
Introduction
Session: Signature Generation
David Brumley , Carnegie Mellon University
James Newsome , Carnegie Mellon University
Dawn Song , Carnegie Mellon University
Hao Wang , University of Wisconsin-Madison
Somesh Jha , University of Wisconsin-Madison
pp. 2-16
Roberto Perdisci , University of Cagliari, 09123 Cagliari, ITALY
David Dagon , Georgia Institute of Technology, Atlanta
Wenke Lee , Georgia Institute of Technology, Atlanta
Prahlad Fogla , Georgia Institute of Technology, Atlanta
Monirul Sharif , Georgia Institute of Technology, Atlanta
pp. 17-31
Zhichun Li , Northwestern University, Evanston, IL
Manan Sanghi , Northwestern University, Evanston, IL
Yan Chen , Northwestern University, Evanston, IL
Ming-Yang Kao , Northwestern University, Evanston, IL
Brian Chavez , Northwestern University, Evanston, IL
pp. 32-47
Session: Detection
Sandeep Bhatkar , Stony Brook University, NY
Abhishek Chaturvedi , Stony Brook University, NY
R. Sekar , Stony Brook University, NY
pp. 48-62
Alvaro A. C?ardenas , University of Maryland
John S. Baras , University of Maryland
Karl Seamon , University of Maryland
pp. 63-77
Kevin Borders , University of Michigan, Ann Arbor
Xin Zhao , University of Michigan, Ann Arbor
Atul Prakash , University of Michigan, Ann Arbor
pp. 78-85
Session: Privacy
Dogan Kesdogan , RWTH Aachen
Dakshi Agrawal , IBM Watson Res. Ctr.
Vinh Pham , RWTH Aachen
Dieter Rautenbach , University of Bonn
pp. 86-99
Lasse Overlier , Gjovik University College
Paul Syverson , Naval Research Laboratory
pp. 100-114
Yingjiu Li , Singapore Management University
Haibing Lu , Singapore Management University
Robert H. Deng , Singapore Management University
pp. 115-120
XiaoFeng Wang , Indiana University
Markus Jakobsson , Indiana University
Alex Tsow , Indiana University
pp. 121-131
John Bethencourt , Carnegie Mellon University
Dawn Song , Carnegie Mellon University
Brent Waters , SRI International
pp. 132-139
Session: Formal Methods
Bruno Blanchet , CNRS, Ecole Normale Superieure, Paris
pp. 140-154
Ricardo Corin , University of Twente, The Netherlands
Sandro Etalle , University of Twente, The Netherlands
Ari Saptawijaya , University of Indonesia, Indonesia
pp. 155-168
Dennis Hofheinz , CWI, Cryptology and Information Security Group Amsterdam, The Netherlands
Dominique Unruh , Universitat Karlsruhe, Germany
pp. 169-183
Session: Analyzing and Enforcing Policy
Adam Barth , Stanford University
Anupam Datta , Stanford University
John C. Mitchell , Stanford University
Helen Nissenbaum , New York University
pp. 184-198
Lihua Yuan , University of California, Davis
Jianning Mai , University of California, Davis
Zhendong Su , University of California, Davis
Hao Chen , University of California, Davis
Chen-Nee Chuah , University of California, Davis
Prasant Mohapatra , University of California, Davis
pp. 199-213
Vinod Ganapathy , University of Wisconsin
Trent Jaeger , Pennsylvania State University
Somesh Jha , University of Wisconsin
pp. 214-229
Session: Analyzing Code
Gilles Barthe , INRIA Sophia-Antipolis, Project EVEREST, France
Tamara Rezk , INRIA Sophia-Antipolis, Project EVEREST, France
David Naumann , Stevens Institute of Technology
pp. 230-242
Junfeng Yang , Stanford University
Can Sar , Stanford University
Paul Twohey , Stanford University
Cristian Cadar , Stanford University
Dawson Engler , Stanford University
pp. 243-257
Nenad Jovanovic , Technical University of Vienna
Christopher Kruegel , Technical University of Vienna
Engin Kirda , Technical University of Vienna
pp. 258-263
Amit Vasudevan , University of Texas at Arlington
Ramesh Yerraballi , University of Texas at Arlington
pp. 264-279
Session: Authentication
Mario Cagalj , I&C-LCA EPFL
Jean-Pierre Hubaux , I&C-LCA EPFL
Srdjan Capkun , Technical University of Denmark
Ramkumar Rengaswamy , EE-NESL, UCLA
Ilias Tsigkogiannis , EE-NESL, UCLA
Mani Srivastava , EE-NESL, UCLA
pp. 280-294
Daphna Weinshall , Hebrew University of Jerusalem, Jerusalem Israel
pp. 295-300
Ari Juels , RSA Laboratories and RavenWhite Inc.
Markus Jakobsson , Indiana University and RavenWhite Inc.
Tom N. Jagatic , Indiana University
pp. 301-305
Nitesh Saxena , University of California, Irvine, USA
Jan-Erik Ekberg , Nokia Research Center, Helsinki, Finland
Kari Kostiainen , Nokia Research Center, Helsinki, Finland
N. Asokan , Nokia Research Center, Helsinki, Finland
pp. 306-313
Session: Attacks
Samuel T. King , University of Michigan
Peter M. Chen , University of Michigan
Yi-Min Wang , Microsoft Research
Chad Verbowski , Microsoft Research
Helen J. Wang , Microsoft Research
Jacob R. Lorch , Microsoft Research
pp. 314-327
Pai Peng , North Carolina State University
Peng Ning , North Carolina State University
Douglas S. Reeves , North Carolina State University
pp. 334-349
Session: Systems
Richard S. Cox , University of Washington
Steven D. Gribble , University of Washington
Henry M. Levy , University of Washington
Jacob Gorm Hansen , University of Copenhagen, Denmark
pp. 350-364
Zvi Gutterman , Safend and The Hebrew University of Jerusalem
Benny Pinkas , University of Haifa
Tzachy Reinman , Hebrew University of Jerusalem
pp. 371-385
Andrea Bittau , University College London
Mark Handley , University College London
Joshua Lackey , Microsoft
pp. 386-400
Author Index
Author Index (PDF)
pp. 401
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool