Paul C. van Oorschot (Ed.):
Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA.
USENIX Association 2008, ISBN 978-1-931971-60-7 BibTeX
Web Security
Cryptographic Keys
- J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
Lest We Remember: Cold Boot Attacks on Encryption Keys.
45-60
Electronic Edition (link) BibTeX
- Lucas Ballard, Seny Kamara, Michael K. Reiter:
The Practical Subtleties of Biometric Key Generation.
61-74
Electronic Edition (link) BibTeX
- Ari Juels, Ravikanth Pappu, Bryan Parno:
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
75-90
Electronic Edition (link) BibTeX
Network Defenses
Botnet Detection
- Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
139-154
Electronic Edition (link) BibTeX
- Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang:
Measurement and Classification of Humans and Bots in Internet Chat.
155-170
Electronic Edition (link) BibTeX
- Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield:
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads.
171-184
Electronic Edition (link) BibTeX
Hardware and Security
Systems Security
Privacy
Voting and Trusted Systems
Software Security
Copyright © Sat May 16 23:44:27 2009
by Michael Ley (ley@uni-trier.de)