10th CCS 2003: Washington, DC, USA
- Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger:
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003. ACM 2003, ISBN 1-58113-738-9
Keynote
DOS protection
- William G. Morein, Angelos Stavrou, Debra L. Cook, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein:
Using graphic turing tests to counter automated DDoS attacks against web servers. 8-19 - Xinyuan Wang, Douglas S. Reeves:
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. 20-29 - Cheng Jin, Haining Wang, Kang G. Shin:
Hop-count filtering: an effective defense against spoofed DDoS traffic. 30-41
Sensor networks
- Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney:
A pairwise key pre-distribution scheme for wireless sensor networks. 42-51 - Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP: efficient security mechanisms for large-scale distributed sensor networks. 62-72
- Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada:
XML access control using static analysis. 73-84 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Balancing confidentiality and efficiency in untrusted relational DBMSs. 93-102
Privacy/anonymity
- Ari Juels, Ronald L. Rivest, Michael Szydlo:
The blocker tag: selective blocking of RFID tags for consumer privacy. 103-111 - Brent R. Waters, Edward W. Felten, Amit Sahai:
Receiver anonymity via incomparable public keys. 112-121
Authentication and signature schemes
- Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel:
On the performance, feasibility, and use of forward-secure signatures. 131-144 - Baoshi Zhu, Jiankang Wu, Mohan S. Kankanhalli:
Print signatures for document authentication. 145-154 - Jonathan Katz, Nan Wang:
Efficiency improvements for signature schemes with tight security reductions. 155-164 - William Aiello, John Ioannidis, Patrick D. McDaniel:
Origin authentication in interdomain routing. 165-178
Information warfare
- Peng Liu, Wanyu Zang:
Incentive-based modeling and inference of attacker intent, objectives, and strategies. 179-189 - Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald F. Towsley:
Monitoring and early warning for internet worms. 190-199
Cryptographic protocols/ network security
- Philip D. MacKenzie, Alina Oprea, Michael K. Reiter:
Automatic generation of two-party computations. 210-219 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
A composable cryptographic library with nested operations. 220-230 - Donggang Liu, Peng Ning, Kun Sun:
Efficient self-healing group key distribution with revocation capability. 231-240 - Emmanuel Bresson, Olivier Chevassut, David Pointcheval:
Security proofs for an efficient password-based key exchange. 241-250
Intrusion detection
- Robin Sommer, Vern Paxson:
Enhancing byte-level network intrusion detection signatures with context. 262-271 - Gaurav S. Kc, Angelos D. Keromytis, Vassilis Prevelakis:
Countering code-injection attacks with instruction-set randomization. 272-280 - Elena Gabriela Barrantes, David H. Ackley, Trek S. Palmer, Darko Stefanovic, Dino Dai Zovi:
Randomized instruction set emulation to disrupt binary code injection attacks. 281-289
Emerging applications
- Cullen Linn, Saumya K. Debray:
Obfuscation of executable code to improve resistance to static disassembly. 290-299 - Johannes Blömer, Martin Otto, Jean-Pierre Seifert:
A new CRT-RSA algorithm secure against bellcore attacks. 311-320
Analysis and verification
- Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. Engler:
MECA: an extensible, expressive system and language for statically checking security properties. 321-334 - David A. Basin, Sebastian Mödersheim, Luca Viganò:
CDiff: a new reduction technique for constraint-based analysis of security protocols. 335-344 - Vinod Ganapathy, Somesh Jha, David Chandler, David Melski, David Vitek:
Buffer overrun detection using linear programming and static analysis. 345-354