default search action
NDSS 2011: San Diego, California, USA
- Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society 2011
Session 1: Secure Emerging Applications: Social Networks and Smartphones
- Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, XiaoFeng Wang:
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. - Michael Backes, Matteo Maffei, Kim Pecina:
A Security API for Distributed Social Networks. - Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh:
Location Privacy via Private Proximity Testing.
Session 2: Wireless Attacks!
- Aurélien Francillon, Boris Danev, Srdjan Capkun:
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. - Omid Fatemieh, Ali Farhadi, Ranveer Chandra, Carl A. Gunter:
Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks. - Liang Cai, Kai Zeng, Hao Chen, Prasant Mohapatra:
Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Session 3: OS Security
- Xi Xiong, Donghai Tian, Peng Liu:
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. - Abhinav Srivastava, Jonathon T. Giffin:
Efficient Monitoring of Untrusted Kernel-Mode Execution. - Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang:
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Session 4: Network Malware
- Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman:
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane. - Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi:
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
Session 5: Software Security / Code Analysis
- Asia Slowinska, Traian Stancescu, Herbert Bos:
Howard: A Dynamic Excavator for Reverse Engineering Data Structures. - David Dewey, Patrick Traynor:
No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects. - JongHyup Lee, Thanassis Avgerinos, David Brumley:
TIE: Principled Reverse Engineering of Types in Binary Programs. - Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, Dawn Song:
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. - Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley:
AEG: Automatic Exploit Generation.
Session 6: Web Security
- Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda:
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. - Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa:
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. - Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci:
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Session 7: Network Security
- Eric Chan-Tin, Nicholas Hopper:
Accurate and Provably Secure Latency Estimation with Treeple. - Scott E. Coull, Fabian Monrose, Michael D. Bailey:
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses. - Amir Houmansadr, Nikita Borisov:
SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
Session 8: Real-World Security: Cloud Computing, Biometrics, and Humans
- Tobias Distler, Ivan Popov, Wolfgang Schröder-Preikschat, Hans P. Reiser, Rüdiger Kapitza:
SPARE: Replicas on Hold. - Yan Huang, Lior Malka, David Evans, Jonathan Katz:
Efficient Privacy-Preserving Biometric Identification. - Alana Libonati, Jonathan M. McCune, Michael K. Reiter:
Usability Testing a Malware-Resistant Input Mechanism.
Session 9: Privacy
- Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
Tracker: Security and Privacy for RFID-based Supply Chains. - Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:
PiOS: Detecting Privacy Leaks in iOS Applications. - Elaine Shi, T.-H. Hubert Chan, Eleanor Gilbert Rieffel, Richard Chow, Dawn Song:
Privacy-Preserving Aggregation of Time-Series Data.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.