Default Cover Image

2006 IEEE Symposium on Security and Privacy (S&P'06)

May 21 2006 to May 24 2006

Berkeley/Oakland, California

ISSN: 1081-6011

ISBN: 0-7695-2574-1

Table of Contents

Introduction
Message from the Program ChairsFreely available from IEEE.pp. viii
Introduction
External reviewersFreely available from IEEE.pp. x
Introduction
Program CommitteeFreely available from IEEE.pp. ix
Session: Signature Generation
Towards Automatic Generation of Vulnerability-Based SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 2-16
Session: Signature Generation
MisleadingWorm Signature Generators Using Deliberate Noise InjectionFull-text access may be available. Sign in or learn about subscription options.pp. 17-31
Session: Signature Generation
Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack ResilienceFull-text access may be available. Sign in or learn about subscription options.pp. 32-47
Session: Detection
Dataflow Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 48-62
Session: Detection
A Framework for the Evaluation of Intrusion Detection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 63-77
Session: Detection
Siren: Catching Evasive Malware (Short Paper)Full-text access may be available. Sign in or learn about subscription options.pp. 78-85
Session: Privacy
Fundamental Limits on the Anonymity Provided by the MIX TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 86-99
Session: Privacy
Locating Hidden ServersFull-text access may be available. Sign in or learn about subscription options.pp. 100-114
Session: Privacy
Practical Inference Control for Data Cubes (Extended Abstract)Full-text access may be available. Sign in or learn about subscription options.pp. 115-120
Cobra: fine-grained malware analysis using stealth localized-executionsFull-text access may be available. Sign in or learn about subscription options.pp. 15 pp.-279
Session: Privacy
Deterring Voluntary Trace Disclosure in Re-encryption Mix NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 121-131
Session: Privacy
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)Full-text access may be available. Sign in or learn about subscription options.pp. 132-139
Session: Formal Methods
A Computationally Sound Mechanized Prover for Security ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 140-154
Session: Formal Methods
A Logic for Constraint-based Security Protocol AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 155-168
Session: Formal Methods
Simulatable Security and Polynomially Bounded Concurrent ComposabilityFull-text access may be available. Sign in or learn about subscription options.pp. 169-183
Session: Analyzing and Enforcing Policy
Privacy and Contextual Integrity: Framework and ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 184-198
Session: Analyzing and Enforcing Policy
FIREMAN: A Toolkit for FIREwall Modeling and ANalysisFull-text access may be available. Sign in or learn about subscription options.pp. 199-213
Session: Analyzing and Enforcing Policy
Retrofitting Legacy Code for Authorization Policy EnforcementFull-text access may be available. Sign in or learn about subscription options.pp. 214-229
Session: Analyzing Code
Deriving an Information Flow Checker and Certifying Compiler for JavaFull-text access may be available. Sign in or learn about subscription options.pp. 230-242
Session: Analyzing Code
Automatically Generating Malicious Disks using Symbolic ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 243-257
Session: Analyzing Code
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)Full-text access may be available. Sign in or learn about subscription options.pp. 258-263
Session: Analyzing Code
Cobra: Fine-grained Malware Analysis using Stealth Localized-executionsFull-text access may be available. Sign in or learn about subscription options.pp. 264-279
Session: Authentication
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 280-294
Session: Authentication
Cognitive Authentication Schemes Safe Against Spyware (Short Paper)Full-text access may be available. Sign in or learn about subscription options.pp. 295-300
Session: Authentication
Cache Cookies for Browser Authentication (Extended Abstract)Full-text access may be available. Sign in or learn about subscription options.pp. 301-305
Session: Authentication
Secure Device Pairing based on a Visual Channel (Short Paper)Full-text access may be available. Sign in or learn about subscription options.pp. 306-313
Session: Attacks
SubVirt: Implementing malware with virtual machinesFull-text access may be available. Sign in or learn about subscription options.pp. 314-327
Session: Attacks
Practical Attacks on Proximity Identification Systems (Short Paper)Full-text access may be available. Sign in or learn about subscription options.pp. 328-333
Session: Attacks
On the Secrecy of Timing-Based Active Watermarking Trace-Back TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 334-349
Session: Systems
A Safety-Oriented Platform for Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 350-364
Session: Systems
Analysis of the Linux Random Number GeneratorFull-text access may be available. Sign in or learn about subscription options.pp. 371-385
Session: Systems
The Final Nail in WEP?s CoffinFull-text access may be available. Sign in or learn about subscription options.pp. 386-400
Author Index
Author IndexFreely available from IEEE.pp. 401
Showing 37 out of 37