The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (2005)
Oakland, California
May 8, 2005 to May 11, 2005
ISSN: 1081-6011
ISBN: 0-7695-2339-0
TABLE OF CONTENTS
Session: Intrusion Detection

Language-Based Generation and Evaluation of NIDS Signatures (Abstract)

Somesh Jha , University of Wisconsin, Madison
Shai Rubin , University of Wisconsin, Madison
Barton P. Miller , University of Wisconsin, Madison
pp. 3-17

Efficient Intrusion Detection using Automaton Inlining (Abstract)

Rajeev Gopalakrishna , Purdue University
Jan Vitek , Purdue University
Eugene H. Spafford , Purdue University
pp. 18-31

Semantics-Aware Malware Detection (Abstract)

Mihai Christodorescu , University of Wisconsin, Madison
Dawn Song , Carnegie Mellon University
Somesh Jha , University of Wisconsin, Madison
Sanjit A. Seshia , Carnegie Mellon University
Randal E. Bryant , Carnegie Mellon University
pp. 32-46
Session: Sensor Networks

Distributed Detection of Node Replication Attacks in Sensor Networks (Abstract)

Adrian Perrig , Carnegie Mellon University
Bryan Parno , Carnegie Mellon University
Virgil Gligor , University of Maryland
pp. 49-63

Detection of Denial-of-Message Attacks on Sensor Network Broadcasts (Abstract)

Jonathan M. McCune , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Michael K. Reiter , Carnegie Mellon University
Elaine Shi , Carnegie Mellon University
pp. 64-78
Session: Access Control and Authentication

Distributed Proving in Access-Control Systems (Abstract)

Michael K. Reiter , CyLab, Carnegie Mellon University
Scott Garriss , Carnegie Mellon University
Lujo Bauer , CyLab, Carnegie Mellon University
pp. 81-95

On Safety in Discretionary Access Control (Abstract)

Ninghui Li , Purdue University, West Lafayette, IN
Mahesh V. Tripunitara , Purdue University, West Lafayette, IN
pp. 96-109

Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication (Abstract)

Michael K. Reiter , Carnegie Mellon University
Jonathan M. McCune , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
pp. 110-124
Session: Integrity

A Generic Attack on Checksumming-Based Software Tamper Resistance (Abstract)

Anil Somayaji , Carleton University, Canada
P.C. van Oorschot , Carleton University, Canada
Glenn Wurster , Carleton University, Canada
pp. 127-138

Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data (Abstract)

Srinivas Devadas , Massachusetts Institute of Technology, Cambridge, MA
Ajay Sudan , Massachusetts Institute of Technology, Cambridge, MA
Dwaine Clarke , Massachusetts Institute of Technology, Cambridge, MA
Blaise Gassend , Massachusetts Institute of Technology, Cambridge, MA
Marten van Dijk , Massachusetts Institute of Technology, Cambridge, MA
G. Edward Suh , Massachusetts Institute of Technology, Cambridge, MA
pp. 139-153

BIND: A Fine-Grained Attestation Service for Secure Distributed Systems (Abstract)

Elaine Shi , Carnegie Mellon University
Leendert Van Doorn , IBM T.J. Watson Research Center
Adrian Perrig , Carnegie Mellon University
pp. 154-168
Session: Cryptography and Protocols

Relating Symbolic and Cryptographic Secrecy (Abstract)

Birgit Pfitzmann , IBM Zurich Research Laboratory, R?schlikon, Switzerland
Michael Backes , IBM Zurich Research Laboratory, R?schlikon, Switzerland
pp. 171-182

Low-Cost Traffic Analysis of Tor (Abstract)

Steven J. Murdoch , University of Cambridge, United Kingdom
George Danezis , University of Cambridge, United Kingdom
pp. 183-195
Session: Worms and Network Forensics

Remote Physical Device Fingerprinting (Abstract)

Andre Broido , UC San Diego
Tadayoshi Kohno , UC San Diego
KC Claffy , UC San Diego
pp. 211-225

Polygraph: Automatically Generating Signatures for Polymorphic Worms (Abstract)

James Newsome , Carnegie Mellon University
Dawn Song , Carnegie Mellon University
Brad Karp , Carnegie Mellon University
pp. 226-241

Worm Origin Identification Using Random Moonwalks (Abstract)

Hui Zhang , Carnegie Mellon University
Michael K. Reiter , Carnegie Mellon University
Yinglian Xie , Carnegie Mellon University
Vyas Sekar , Carnegie Mellon University
David A. Maltz , Carnegie Mellon University
pp. 242-256

Author Index (PDF)

pp. 257
106 ms
(Ver )