Publication Cassandra: Flexible Trust Management and its Application to Electronic Health Records Mo Becker October 2005 October 2005
Publication RaceTrack: Efficient Detection of Data Race Conditions via Adaptive Tracking Yuan Yu, Tom Rodeheffer, Wei Chen ACM Symposium on Operating Systems Principles (SOSP 2005) | October 2005 ACM Symposium on Operating Systems Principles (SOSP 2005) 2005
Publication Black Box Leases Jon Howell, John (JD) Douceur MSR-TR-2005-120 | September 2005 Readable version of patent application, filed 2004.12.17.
Publication Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus Andy Gordon, Alan Jeffrey 16th International Conference, CONCUR 2005, San Francisco, CA, USA | August 2005 ISBN: 978-3-540-28309-6 (Print) 978-3-540-31934-4 (Online)
Publication A Joint PHY/MAC Architecture for Low-Radiated Power TH-UWB Wireless Ad-Hoc Networks Ruben Merz, Joerg Widmer, Jean-Yves Le Boudec, Bozidar Radunovic Wireless Communications and Mobile Computing Journal, Special Issue on Ultrawideband (UWB) Communications | August 2005, pp. 567-580
Publication Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev MSR-TR-2005-72 | August 2005
Publication Detecting Phrase-Level Duplication on the World Wide Web Dennis Fetterly, Mark Manasse, Marc Najork 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR) | August 2005 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR)
Publication Non-Control-Data Attacks Are Realistic Threats Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, Ravishankar K. Iyer Proceedings of USENIX Security Symposium | August 2005 Source code of attack programs can be obtained from the attached txt file.
Publication Pebbling and Proofs of Work Cynthia Dwork, Moni Naor, Hoeteck Wee Twenty-Fifth Annual International Cryptology Conference (CRYPTO 05) | August 2005
Publication A Spatiotemporal Event Correlation Approach to Computer Security Yinglian Xie August 2005 PhD Thesis: Carnegie Mellon University | August 2005