• S
  • SP
  • 2006
  • 2006 IEEE Symposium on Security and Privacy (S&P'06)
Advanced Search 
2006 IEEE Symposium on Security and Privacy (S&P'06)
Berkeley/Oakland, California
May 21-May 24
ISBN: 0-7695-2574-1
Table of Contents
Introduction
Session: Signature Generation
David Brumley, Carnegie Mellon University
James Newsome, Carnegie Mellon University
Dawn Song, Carnegie Mellon University
Hao Wang, University of Wisconsin-Madison
Somesh Jha, University of Wisconsin-Madison
pp. 2-16
Roberto Perdisci, University of Cagliari, 09123 Cagliari, ITALY
David Dagon, Georgia Institute of Technology, Atlanta
Wenke Lee, Georgia Institute of Technology, Atlanta
Prahlad Fogla, Georgia Institute of Technology, Atlanta
Monirul Sharif, Georgia Institute of Technology, Atlanta
pp. 17-31
Zhichun Li, Northwestern University, Evanston, IL
Manan Sanghi, Northwestern University, Evanston, IL
Yan Chen, Northwestern University, Evanston, IL
Ming-Yang Kao, Northwestern University, Evanston, IL
Brian Chavez, Northwestern University, Evanston, IL
pp. 32-47
Session: Detection
Sandeep Bhatkar, Stony Brook University, NY
Abhishek Chaturvedi, Stony Brook University, NY
R. Sekar, Stony Brook University, NY
pp. 48-62
Kevin Borders, University of Michigan, Ann Arbor
Xin Zhao, University of Michigan, Ann Arbor
Atul Prakash, University of Michigan, Ann Arbor
pp. 78-85
Session: Privacy
Lasse Overlier, Gjovik University College
Paul Syverson, Naval Research Laboratory
pp. 100-114
Yingjiu Li, Singapore Management University
Haibing Lu, Singapore Management University
Robert H. Deng, Singapore Management University
pp. 115-120
Session: Formal Methods
Ricardo Corin, University of Twente, The Netherlands
Sandro Etalle, University of Twente, The Netherlands
Ari Saptawijaya, University of Indonesia, Indonesia
pp. 155-168
Dennis Hofheinz, CWI, Cryptology and Information Security Group Amsterdam, The Netherlands
Dominique Unruh, Universitat Karlsruhe, Germany
pp. 169-183
Session: Analyzing and Enforcing Policy
Adam Barth, Stanford University
Anupam Datta, Stanford University
John C. Mitchell, Stanford University
Helen Nissenbaum, New York University
pp. 184-198
Lihua Yuan, University of California, Davis
Jianning Mai, University of California, Davis
Zhendong Su, University of California, Davis
Hao Chen, University of California, Davis
Chen-Nee Chuah, University of California, Davis
Prasant Mohapatra, University of California, Davis
pp. 199-213
Vinod Ganapathy, University of Wisconsin
Trent Jaeger, Pennsylvania State University
Somesh Jha, University of Wisconsin
pp. 214-229
Session: Analyzing Code
Gilles Barthe, INRIA Sophia-Antipolis, Project EVEREST, France
Tamara Rezk, INRIA Sophia-Antipolis, Project EVEREST, France
David Naumann, Stevens Institute of Technology
pp. 230-242
Junfeng Yang, Stanford University
Can Sar, Stanford University
Paul Twohey, Stanford University
Cristian Cadar, Stanford University
Dawson Engler, Stanford University
pp. 243-257
Nenad Jovanovic, Technical University of Vienna
Christopher Kruegel, Technical University of Vienna
Engin Kirda, Technical University of Vienna
pp. 258-263
Session: Authentication
Ari Juels, RSA Laboratories and RavenWhite Inc.
Markus Jakobsson, Indiana University and RavenWhite Inc.
Tom N. Jagatic, Indiana University
pp. 301-305
Nitesh Saxena, University of California, Irvine, USA
Jan-Erik Ekberg, Nokia Research Center, Helsinki, Finland
Kari Kostiainen, Nokia Research Center, Helsinki, Finland
N. Asokan, Nokia Research Center, Helsinki, Finland
pp. 306-313
Session: Attacks
Samuel T. King, University of Michigan
Peter M. Chen, University of Michigan
Yi-Min Wang, Microsoft Research
Chad Verbowski, Microsoft Research
Helen J. Wang, Microsoft Research
Jacob R. Lorch, Microsoft Research
pp. 314-327
Pai Peng, North Carolina State University
Peng Ning, North Carolina State University
Douglas S. Reeves, North Carolina State University
pp. 334-349
Session: Systems
Richard S. Cox, University of Washington
Steven D. Gribble, University of Washington
Henry M. Levy, University of Washington
Jacob Gorm Hansen, University of Copenhagen, Denmark
pp. 350-364
Zvi Gutterman, Safend and The Hebrew University of Jerusalem
Benny Pinkas, University of Haifa
Tzachy Reinman, Hebrew University of Jerusalem
pp. 371-385
Andrea Bittau, University College London
Mark Handley, University College London
Joshua Lackey, Microsoft
pp. 386-400
Author Index
Usage of this product signifies your acceptance of the Terms of Use.