22. ACSAC 2006:
Miami Beach,
Florida,
USA
22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA.
IEEE Computer Society 2006, ISBN 0-7695-2716-7
Distinguished Practitioner
- Dixie B. Baker:
Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety.
3-22
Applied Distributed Collaboration
- Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer:
Shamon: A System for Distributed Mandatory Access Control.
23-32
- George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson:
A Framework for a Collaborative DDoS Defense.
33-42
- Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia:
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System.
43-56
Client Access in Untrusted Environments
Network Intrusion Detection
Network Security
Security in Systems
Invited Essayist
- Brian Witten:
Engineering Sufficiently Secure Computing.
187-202
Applied Sandboxing
Malware
- Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao:
On Detecting Camouflaging Worm.
235-244
- Guanhua Yan, Stephan Eidenbenz:
Bluetooth Worms: Models, Dynamics, and Defense Implications.
245-256
- Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su:
Back to the Future: A Framework for Automatic Malware Removal and System Repair.
257-268
Applied Detection Technologies
- Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna:
Static Detection of Vulnerabilities in x86 Executables.
269-278
- Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh:
Foreign Code Detection on the Windows/X86 Platform.
279-288
- Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee:
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware.
289-300
Classic Papers
- Jeremy Epstein:
Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing.
301-320
- Peter G. Neumann:
Risks of Untrustworthiness.
321-328
Applied Randomization
Intrusion Detection
Messaging Security
Countermeasures
Information Flow and Leakage
Copyright © Sun Mar 14 22:54:39 2010
by Michael Ley (ley@uni-trier.de)