Originating from over 25 different countries, the 47 submissions were included in a blind review process that involved 25 reviewers (composed of PC members and their delegates) from many different institutions. The reviewers did an outstanding job and the whole process generated more than 150 reviews --- each paper was reviewed by at least 3 reviewers. Based on the reviewers' reports and the general ACM SAC guidelines for evaluation of submissions, only 9 papers were accepted, a rate of approximately 20\%. Contents cover various aspects of applied computer security, ranging from malicious code to network issues.
The 2006 Security Track is divided into 2 sessions.
Session 1 - is chaired by Bella.
Colon et al advance a practical study of next-generation worms. Kirda et al describe a novel solution to resist security breaches induced by web applications. Belsis et al describe an expert system to filter spam. Valeur et al design an innovative network layout to secure web accesses. Creese et al face the problem of establishing security within heterogeneous groups of users over ad-hoc networks.
Session 2 - is chaired by Ryan.
Xu and Chapin describe and improved scheme to randomise the network address space. Huang and Roscoe extend important non-interference properties to a timed setting. Stutsman et al describe a simple steganographic technique to hide information in natural language text. Heather and Schneider effectively deal with infiniteness when analysing security protocols formally.