ACM SIGSAC Hilton Alexandria Mark 
ACM CCS 2005

Accepted Papers

  1. CPOL: High-Performance Policy Evaluation by Kevin Borders, Xin Zhao, and Atul Prakash

  2. Understanding and developing role-based administrative models by Jason Crampton

  3. Modeling Insider Attacks on Group Key-Exchange Protocols by Jonathan Katz and Ji Sun Shin

  4. An architecture for robust pseudo-random generation and Applications to /dev/random by Boaz Barak and Shai Halevi

  5. Securing Publish-Subscribe Overlay Services with EventGuard by Mudhakar Srivatsa and Ling Liu

  6. Applications of Secure Electronic Voting to Automated Privacy-Preserving Troubleshooting by Qiang Huang, David Jao, and Helen Wang

  7. New Approaches for Deniable Authentication by Mario Di Raimondo and Rosario Gennaro

  8. On the Cost-Ineffectiveness of Redundancy in Commercial P2P Computing by Matthew Yurkewych, Brian N. Levine, and Arnold L. Rosenberg

  9. Proxy Re-Signatures: New Definitions, Algorithms, and Applications by Giuseppe Ateniese and Susan Hohenberger

  10. A Framework for Concrete Reputation-Systems with Applications to History-Based Access Control by Karl Krukow, Mogens Nielsen and Vladimiro Sassone

  11. Automated Trust Negotiation Using Cryptographic Credentials by Jiangtao Li, Ninghui Li, and William H. Winsborough

  12. Anomaly Detection as a Reputation System for Online Auctioning by Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon Giffin, Nicholas Kidd, Louis Kruger, and Hao Wang

  13. Dynamic and Efficient Key Management for Access Hierarchies by Mikhail Atallah, Keith Frikken, and Marina Blanton

  14. Secure Collaboration in Mediator-Free Environments by Mohamed Shehab, Elisa Bertino, and Arif Ghafoor

  15. A Modular Correctness Proof of IEEE 802.11i and TLS by Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, and John C. Mitchell

  16. Exploiting Open Functionality in SMS-Capable Cellular Networks by Patrick Traynor, William Enck, Tom La Porta, and Patrick McDaniel

  17. Automatic Placement of Authorization Hooks in the Linux Security Modules Framework by Vinod Ganapathy, Trent Jaeger and Somesh Jha

  18. Control-Flow Integrity: Principles, Implementations, and Applications by Martin Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti

  19. On authenticated computing and RSA-based authentication by Jean-Pierre Seifert

  20. Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet by Xinyuan Wang, Shiping Chen, and Sushil Jajodia

  21. Password Authenticated Key Exchange Using Hidden Smooth Subgroups by Craig Gentry, Philip MacKenzie, and Zulfikar Ramzan

  22. PeerAccess: A Logic for Distributed Authorization by Marianne Winslett, Charles Zhang, and Piero Andrea Bonatti

  23. Preventing Format-String Attacks via Automatic and Efficient Dynamic Checking by Michael F. Ringenburg and Dan Grossman

  24. Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse by Rob Sherwood, Bobby Bhattacharjee, and Ryan Braud

  25. Countering DoS Attacks With Stateless Multipath Overlays by Angelos Stavrou and Angelos D. Keromytis

  26. Untraceable RFID Tags via Insubvertible Encryption by Giuseppe Ateniese, Jan Camenisch, and Breno de Medeiros

  27. Keyboard Acoustic Emanations Revisited by Li Zhuang, Feng Zhou and J. D. Tygar

  28. Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations by Onur AciiÇmez, Werner Schindler, and Çetin Kaya KoÇ

  29. Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Serversby Zhenkai Liang and R. Sekar

  30. Prevent Attribute Information Leakage in Automated Trust Negotiation by Keith Irwin and Ting Yu

  31. Deciding security of protocols against off-line guessing attacks by Mathieu Baudet

  32. Direct Chosen Ciphertext Security from Identity-Based Techniques by Xavier Boyen, Qixiang Mei and Brent Waters

  33. Fast Dictionary Attacks on Human-Memorable Passwords Using Time-Space Tradeoff by Arvind Narayanan and Vitaly Shmatikov

  34. Obfuscated Databases and Group Privacy by Arvind Narayanan and Vitaly Shmatikov

  35. Aggregated Path Authentication for Efficient BGP Security by Meiyuan Zhao, Sean Smith, and David Nicol

  36. Secrecy Types for a Simulatable Cryptographic Library by Peeter Laud

  37. Automatic Diagnosis and Response to Memory Corruption Vulnerabilities by Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, and Chris Bookholt

  38. On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits by Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, and Frederic T. Chong