The Community for Technology Leaders
2006 IEEE Symposium on Security and Privacy (S&P'06) (2006)
Berkeley/Oakland, CA
May 21, 2006 to May 24, 2006
ISSN: 1081-6011
ISBN: 0-7695-2574-1
TABLE OF CONTENTS

Towards automatic generation of vulnerability-based signatures (Abstract)

D. Brumley , Carnegie Mellon Univ., Pittsburgh, PA, USA
J. Newsome , Carnegie Mellon Univ., Pittsburgh, PA, USA
D. Song , Carnegie Mellon Univ., Pittsburgh, PA, USA
pp. 15 pp.-16

Misleading worm signature generators using deliberate noise injection (Abstract)

R. Perdisci , Georgia Inst. of Technol., Atlanta, GA, USA
D. Dagon , Georgia Inst. of Technol., Atlanta, GA, USA
Wenke Lee , Georgia Inst. of Technol., Atlanta, GA, USA
P. Fogla , Georgia Inst. of Technol., Atlanta, GA, USA
M. Sharif , Georgia Inst. of Technol., Atlanta, GA, USA
pp. 15 pp.-31

Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience (Abstract)

Zhichun Li , Northwestern Univ., Evanston, IL, USA
Manan Sanghi , Northwestern Univ., Evanston, IL, USA
Yan Chen , Northwestern Univ., Evanston, IL, USA
Ming-Yang Kao , Northwestern Univ., Evanston, IL, USA
B. Chavez , Northwestern Univ., Evanston, IL, USA
pp. 15 pp.-47

Dataflow anomaly detection (Abstract)

S. Bhatkar , Dept. of Comput. Sci., Stony Brook Univ., NY, USA
A. Chaturvedi , Dept. of Comput. Sci., Stony Brook Univ., NY, USA
R. Sekar , Dept. of Comput. Sci., Stony Brook Univ., NY, USA
pp. 15 pp.-62

A framework for the evaluation of intrusion detection systems (Abstract)

A.A. Cardenas , Dept. of Electr. & Comput. Eng., Maryland Univ., College Park, MD, USA
J.S. Baras , Dept. of Electr. & Comput. Eng., Maryland Univ., College Park, MD, USA
K. Seamon , Dept. of Electr. & Comput. Eng., Maryland Univ., College Park, MD, USA
pp. 15 pp.-77

Siren: catching evasive malware (Abstract)

K. Borders , Dept. of Electr. Eng. & Comput. Sci., Michigan Univ., Ann Arbor, MI, USA
Xin Zhao , Dept. of Electr. Eng. & Comput. Sci., Michigan Univ., Ann Arbor, MI, USA
A. Prakash , Dept. of Electr. Eng. & Comput. Sci., Michigan Univ., Ann Arbor, MI, USA
pp. 6 pp.-85

Fundamental limits on the anonymity provided by the MIX technique (Abstract)

D. Kesdogan , Rheinisch-Westfalische Technische Hochschule, Aachen, Germany
pp. 14 pp.-99

Locating hidden servers (Abstract)

L. Overlier , Norwegian Defence Res. Establ., Norway
pp. 15 pp.-114

Practical inference control for data cubes (Abstract)

Yingjiu Li , Sch. of Inf. Syst., Singapore Manage. Univ., Singapore
Haibing Lu , Sch. of Inf. Syst., Singapore Manage. Univ., Singapore
R.H. Deng , Sch. of Inf. Syst., Singapore Manage. Univ., Singapore
pp. 6 pp.-120

Deterring voluntary trace disclosure in re-encryption mix networks (Abstract)

P. Golle , Palo Alto Res. Center, CA, USA
XiaoFeng Wang , Palo Alto Res. Center, CA, USA
M. Jakobsson , Palo Alto Res. Center, CA, USA
A. Tsow , Palo Alto Res. Center, CA, USA
pp. 11 pp.-131

New constructions and practical applications for private stream searching (Abstract)

J. Bethencourt , Carnegie Mellon Univ., Pittsburgh, PA, USA
D. Song , Carnegie Mellon Univ., Pittsburgh, PA, USA
pp. 6 pp.-139

A computationally sound mechanized prover for security protocols (Abstract)

B. Blanchet , CNRS, Ecole Normale Superieure, Paris, France
pp. 15 pp.-154

A logic for constraint-based security protocol analysis (Abstract)

R. Corin , Twente Univ., Netherlands
pp. 14 pp.-168

Simulatable security and polynomially bounded concurrent composability (Abstract)

D. Hofheinz , Centrum voor Wiskunde en Informatica, Amsterdam, Netherlands
pp. 14 pp.-183

Privacy and contextual integrity: framework and applications (Abstract)

A. Barth , Dept. of Comput. Sci., Stanford Univ., CA, USA
A. Datta , Dept. of Comput. Sci., Stanford Univ., CA, USA
J.C. Mitchell , Dept. of Comput. Sci., Stanford Univ., CA, USA
pp. 15 pp.-198

FIREMAN: a toolkit for firewall modeling and analysis (Abstract)

Lihua Yuan , California Univ., Davis, CA, USA
Hao Chen , California Univ., Davis, CA, USA
Jianning Mai , California Univ., Davis, CA, USA
Chen-Nee Chuah , California Univ., Davis, CA, USA
Zhendong Su , California Univ., Davis, CA, USA
P. Mohapatra , California Univ., Davis, CA, USA
pp. 15 pp.-213

Retrofitting legacy code for authorization policy enforcement (Abstract)

V. Ganapathy , Dept. of Comput. Sci., Wisconsin Univ., Madison, WI, USA
pp. 15 pp.-229

Automatically generating malicious disks using symbolic execution (Abstract)

Junfeng Yang , Comput. Syst. Lab., Stanford Univ., CA, USA
Can Sar , Comput. Syst. Lab., Stanford Univ., CA, USA
P. Twohey , Comput. Syst. Lab., Stanford Univ., CA, USA
C. Cadar , Comput. Syst. Lab., Stanford Univ., CA, USA
D. Engler , Comput. Syst. Lab., Stanford Univ., CA, USA
pp. 15 pp.-257

Pixy: a static analysis tool for detecting Web application vulnerabilities (Abstract)

N. Jovanovic , Secure Syst. Lab., Tech. Univ. of Vienna, Austria
C. Kruegel , Secure Syst. Lab., Tech. Univ. of Vienna, Austria
E. Kirda , Secure Syst. Lab., Tech. Univ. of Vienna, Austria
pp. 6 pp.-263

Cobra: fine-grained malware analysis using stealth localized-executions (Abstract)

A. Vasudevan , Dept. of Comput. Sci. & Eng., Texas Univ., Arlington, TX, USA
R. Yerraballi , Dept. of Comput. Sci. & Eng., Texas Univ., Arlington, TX, USA
pp. 15 pp.-279

Cognitive authentication schemes safe against spyware (Abstract)

D. Weinshall , Sch. of Comput. Sci. & Eng., Hebrew Univ. of Jerusalem, Israel
pp. 6 pp.-300

Secure device pairing based on a visual channel (Abstract)

N. Saxena , California Univ., Irvine, CA, USA
pp. 6 pp.-313

SubVirt: implementing malware with virtual machines (Abstract)

S.T. King , Michigan Univ., USA
P.M. Chen , Michigan Univ., USA
pp. 14 pp.-327

Practical attacks on proximity identification systems (Abstract)

G.P. Hancke , Comput. Lab., Cambridge Univ., UK
pp. 6 pp.-333

On the secrecy of timing-based active watermarking trace-back techniques (Abstract)

Pai Peng , Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA
Peng Ning , Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA
D.S. Reeves , Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA
pp. 15 pp.-349

A safety-oriented platform for Web applications (Abstract)

R.S. Cox , Dept. of Comput. Sci. & Eng., Washington Univ., USA
pp. 15 pp.-364

The final nail in WEP's coffin (Abstract)

A. Bittau , Univ. Coll. London, UK
M. Handley , Univ. Coll. London, UK
pp. 15 pp.-400

Author index (PDF)

pp. 401
90 ms
(Ver 3.3 (11022016))