2006 IEEE Symposium on Security and Privacy (PDF)
IEEE Symposium on Security and Privacy - Title (PDF)
IEEE Symposium on Security and Privacy - Copyright (PDF)
IEEE Symposium on Security and Privacy - Table of contents (PDF)
Message from the Program Chairs (PDF)
Conference organizers (PDF)
Program Committee (PDF)
External reviewers (PDF)
Towards automatic generation of vulnerability-based signatures (Abstract)
Misleading worm signature generators using deliberate noise injection (Abstract)
Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience (Abstract)
Dataflow anomaly detection (Abstract)
A framework for the evaluation of intrusion detection systems (Abstract)
Siren: catching evasive malware (Abstract)
Fundamental limits on the anonymity provided by the MIX technique (Abstract)
Locating hidden servers (Abstract)
Practical inference control for data cubes (Abstract)
Deterring voluntary trace disclosure in re-encryption mix networks (Abstract)
New constructions and practical applications for private stream searching (Abstract)
A computationally sound mechanized prover for security protocols (Abstract)
A logic for constraint-based security protocol analysis (Abstract)
Simulatable security and polynomially bounded concurrent composability (Abstract)
Privacy and contextual integrity: framework and applications (Abstract)
FIREMAN: a toolkit for firewall modeling and analysis (Abstract)
Retrofitting legacy code for authorization policy enforcement (Abstract)
Deriving an information flow checker and certifying compiler for Java (Abstract)
Automatically generating malicious disks using symbolic execution (Abstract)
Pixy: a static analysis tool for detecting Web application vulnerabilities (Abstract)
Cobra: fine-grained malware analysis using stealth localized-executions (Abstract)
Integrity (I) codes: message integrity protection and authentication over insecure channels (Abstract)
Cognitive authentication schemes safe against spyware (Abstract)
Cache cookies for browser authentication (Abstract)
Secure device pairing based on a visual channel (Abstract)
SubVirt: implementing malware with virtual machines (Abstract)
Practical attacks on proximity identification systems (Abstract)
On the secrecy of timing-based active watermarking trace-back techniques (Abstract)
A safety-oriented platform for Web applications (Abstract)
Analysis of the Linux random number generator (Abstract)
The final nail in WEP's coffin (Abstract)
Author index (PDF)