Publication A comparative evaluation of two algorithms for Windows Registry anomaly detection Salvatore Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, Krysta M. Svore, Krysta M. Svore Journal of Computer Security | October 2005, Vol 13(4): pp. 659-693
Publication Cassandra: Flexible Trust Management and its Application to Electronic Health Records Mo Becker October 2005 October 2005
Publication RaceTrack: Efficient Detection of Data Race Conditions via Adaptive Tracking Yuan Yu, Tom Rodeheffer, Wei Chen ACM Symposium on Operating Systems Principles (SOSP 2005) | October 2005 ACM Symposium on Operating Systems Principles (SOSP 2005) 2005
Publication Black Box Leases Jon Howell, John (JD) Douceur MSR-TR-2005-120 | September 2005 Readable version of patent application, filed 2004.12.17.
Publication Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus Andy Gordon, Alan Jeffrey 16th International Conference, CONCUR 2005, San Francisco, CA, USA | August 2005 ISBN: 978-3-540-28309-6 (Print) 978-3-540-31934-4 (Online)
Publication A Joint PHY/MAC Architecture for Low-Radiated Power TH-UWB Wireless Ad-Hoc Networks Ruben Merz, Joerg Widmer, Jean-Yves Le Boudec, Bozidar Radunovic Wireless Communications and Mobile Computing Journal, Special Issue on Ultrawideband (UWB) Communications | August 2005, pp. 567-580
Publication Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev MSR-TR-2005-72 | August 2005
Publication Detecting Phrase-Level Duplication on the World Wide Web Dennis Fetterly, Mark Manasse, Marc Najork 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR) | August 2005 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR)
Publication Non-Control-Data Attacks Are Realistic Threats Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, Ravishankar K. Iyer Proceedings of USENIX Security Symposium | August 2005 Source code of attack programs can be obtained from the attached txt file.
Publication Pebbling and Proofs of Work Cynthia Dwork, Moni Naor, Hoeteck Wee Twenty-Fifth Annual International Cryptology Conference (CRYPTO 05) | August 2005