


default search action
NDSS 2015: San Diego, California, USA
- 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015. The Internet Society 2015

Session 1: Web Security
- Sangho Lee, Hyungsub Kim, Jong Kim:

Identifying Cross-origin Resource Status Using Application Cache. - Thomas Vissers, Wouter Joosen, Nick Nikiforakis:

Parking Sensors: Analyzing and Detecting Parked Domains. - Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis:

Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. - Michael J. Kranch, Joseph Bonneau:

Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning. - Xiang Pan, Yinzhi Cao, Yan Chen:

I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.
Session 2: Mobile Security
- Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, Limei Gilham, Nguyen Nguyen, Martin C. Rinard:

Information Flow Analysis of Android Applications in DroidSafe. - Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl A. Gunter:

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. - Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. - Kimberly Tam, Salahuddin J. Khan, Aristide Fattori, Lorenzo Cavallaro:

CopperDroid: Automatic Reconstruction of Android Malware Behaviors. - Xueqiang Wang, Kun Sun, Yuewu Wang, Jiwu Jing:

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Session 3: Detection, Analysis, Prevention & Response - Part I
- Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song:

VTint: Protecting Virtual Function Tables' Integrity. - Payas Gupta, Bharat Srinivasan, Vijay Balasubramaniyan, Mustaque Ahamad:

Phoneypot: Data-driven Understanding of Telephony Threats. - Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, Brent ByungHoon Kang:

SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment. - Yves Younan:

FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers. - Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran:

EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
Session 4: Privacy - Part I
- Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser:

Machine Learning Classification over Encrypted Data. - Lianying Zhao, Mohammad Mannan:

Gracewipe: Secure and Verifiable Deletion under Coercion. - Pedro Moreno-Sanchez

, Aniket Kate, Matteo Maffei, Kim Pecina:
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces. - Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang:

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. - Timothy Peters, Mark A. Gondree, Zachary N. J. Peterson:

DEFY: A Deniable, Encrypted File System for Log-Structured Storage.
Session 5: Detection, Analysis, Prevention & Response - Part II
- Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:

Preventing Use-after-free with Dangling Pointers Nullification. - Xi Chen, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:

StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. - Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose:

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. - Stephen Crane, Andrei Homescu, Stefan Brunthaler

, Per Larsen, Michael Franz:
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
Session 6a: Detection, Analysis, Prevention & Response - Part III
- Brendan Juba, Christopher Musco

, Fan Long, Stelios Sidiroglou-Douskos, Martin C. Rinard:
Principled Sampling for Anomaly Detection. - Mohamed El Massad, Siddharth Garg, Mahesh V. Tripunitara:

Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes. - Vishwath Mohan, Per Larsen, Stefan Brunthaler

, Kevin W. Hamlen, Michael Franz:
Opaque Control-Flow Integrity.
Session 6b: Privacy - Part II
- Nitesh Mor, Oriana Riva, Suman Nath, John Kubiatowicz:

Bloom Cookies: Web Search Personalization without User Tracking. - Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv:

NSEC5: Provably Preventing DNSSEC Zone Enumeration.
Session 7: Social Networks and Cloud Services
- Igor Bilogrevic, Kévin Huguenin

, Stefan Mihaila, Reza Shokri
, Jean-Pierre Hubaux:
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms. - Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah:

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. - Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish:

Efficient RAM and control flow in verifiable outsourced computation. - Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov:

Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.
Session 8: Authentication
- Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta:

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. - Daniel Demmler, Thomas Schneider, Michael Zohner:

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. - Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:

Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. - Benjamin Güldenring, Volker Roth, Lars Ries:

Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords. - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti:

Verified Contributive Channel Bindings for Compound Authentication.
Session 9: Web Security
- Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, Sotiris Ioannidis:

The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. - Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski:

Exploiting and Protecting Dynamic Code Generation. - Wilson Lian, Hovav Shacham, Stefan Savage:

Too LeJIT to Quit: Extending JIT Spraying to ARM. - Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian:

Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Session 10: Network Security
- Pierre-Antoine Vervier, Olivier Thonnard, Marc Dacier:

Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. - Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann:

SPHINX: Detecting Security Attacks in Software-Defined Networks. - Phillip A. Porras, Steven Cheung, Martin W. Fong, Keith Skinner, Vinod Yegneswaran:

Securing the Software Defined Network Control Layer. - Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu:

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.
Session 11: Detection, Analysis, Prevention & Response - Part IV
- Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna:

Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. - Aravind Prakash, Xunchao Hu, Heng Yin:

vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. - Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian:

P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. - Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith:

No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














