![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
12th USENIX Security Symposium 2003: Washington, DC, USA
- Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003. USENIX Association 2003
- Peter Broadwell, Matthew Harren, Naveen Sastry:
Scrash: A System for Generating Secure Crash Information. - Jamie Twycross, Matthew M. Williamson:
Implementing and Testing a Virus Throttle. - Rick Kennell, Leah H. Jamieson:
Establishing the Genuinity of Remote Computer Systems. - Niels Provos, Markus Friedl, Peter Honeyman:
Preventing Privilege Escalation. - Eugene Tsyrklevich, Bennet Yee:
Dynamic Detection and Prevention of Race Conditions in File Accesses. - Niels Provos:
Improving Host Security with System Call Policies. - Chris Lesniewski-Laas, M. Frans Kaashoek:
SSL Splitting: Securely Serving Data from Untrusted Caches. - John G. Brainard, Ari Juels, Burt Kaliski, Michael Szydlo:
A New Two-Server Approach for Authentication with Short Secrets. - Diana K. Smetters, Glenn Durfee:
Domain-Based Administration of Identity-Based Cryptosystems for Secure Email and IPSEC. - Adam G. Pennington, John D. Strunk, John Linwood Griffin, Craig A. N. Soules, Garth R. Goodson, Gregory R. Ganger:
Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior. - Sunil Soman, Chandra Krintz, Giovanni Vigna:
Detecting Malicious Java Code Using Virtual Machine Auditing. - Mihai Christodorescu, Somesh Jha:
Static Analysis of Executables to Detect Malicious Patterns. - Crispin Cowan, Steve Beattie, John Johansen, Perry Wagle:
PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities. - Sandeep Bhatkar, Daniel C. DuVarney, R. Sekar:
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. - Eric Larson, Todd M. Austin:
High Coverage Detection of Input-Related Security Faults. - Peter Gutmann:
Plug-and-Play PKI: A PKI Your Mother Can Use. - Trent Jaeger, Reiner Sailer, Xiaolan Zhang:
Analyzing Integrity Protection in the SELinux Example Policy. - Eric Rescorla:
Security Holes . . . Who Cares? - David Brumley, Dan Boneh:
Remote Timing Attacks Are Practical. - John Bellardo, Stefan Savage:
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. - Scott A. Crosby, Dan S. Wallach:
Denial of Service via Algorithmic Complexity Attacks.
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.