default search action
Search dblp for Publications
export results for "toc:db/conf/ndss/ndss2009.bht:"
@inproceedings{DBLP:conf/ndss/BackesDHU09, author = {Michael Backes and Peter Druschel and Andreas Haeberlen and Dominique Unruh}, title = {{CSAR:} {A} Practical and Provable Technique to Make Randomized Systems Accountable}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/csar-practical-and-provable-technique-make-randomized-systems-accountable/}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BackesDHU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BayerCHKK09, author = {Ulrich Bayer and Paolo Milani Comparetti and Clemens Hlauschek and Christopher Kr{\"{u}}gel and Engin Kirda}, title = {Scalable, Behavior-Based Malware Clustering}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/scalable-behavior-based-malware-clustering/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BayerCHKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenLM09, author = {Hong Chen and Ninghui Li and Ziqing Mao}, title = {Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/analyzing-and-comparing-the-protection-quality-of-security-enhanced-operating-systems/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChenLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChowLS09, author = {Sherman S. M. Chow and Jie{-}Han Lee and Lakshminarayanan Subramanian}, title = {Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/two-party-computation-model-privacy-preserving-queries-over-distributed-databases/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChowLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DagonADLLL09, author = {David Dagon and Manos Antonakakis and Kevin Day and Xiapu Luo and Christopher P. Lee and Wenke Lee}, title = {Recursive {DNS} Architectures and Vulnerability Implications}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/recursive-dns-architectures-and-vulnerability-implications/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DagonADLLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DanezisM09, author = {George Danezis and Prateek Mittal}, title = {SybilInfer: Detecting Sybil Nodes using Social Networks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/sybillnfer-detecting-sybil-nodes-using-social-networks/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DanezisM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Gates09, author = {Carrie Gates}, title = {Coordinated Scan Detection}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/coordinated-scan-detection/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Gates09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GundyC09, author = {Matthew Van Gundy and Hao Chen}, title = {Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/noncespaces-using-randomization-to-enforce-information-flow-tracking-and-thwart-cross-site-scripting-attacks/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GundyC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HoumansadrKB09, author = {Amir Houmansadr and Negar Kiyavash and Nikita Borisov}, title = {{RAINBOW:} {A} Robust And Invisible Non-Blind Watermark for Network Flows}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/rainbow-a-robust-and-invisible-non-blind-watermark-for-network-flows/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HoumansadrKB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HuKS09, author = {Xin Hu and Matthew Knysz and Kang G. Shin}, title = {RB-Seeker: Auto-detection of Redirection Botnets}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/rb-seeker-auto-detection-of-redirection-botnets/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HuKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KarlofTW09, author = {Chris Karlof and J. Doug Tygar and David A. Wagner}, title = {Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/conditioned-safe-ceremonies-and-user-study-application-web-authentication/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/KarlofTW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LanziSL09, author = {Andrea Lanzi and Monirul Islam Sharif and Wenke Lee}, title = {K-Tracer: {A} System for Extracting Kernel Malware Behavior}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/k-tracer-system-extracting-kernel-malware-behavior/}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LanziSL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/McCunePR09, author = {Jonathan M. McCune and Adrian Perrig and Michael K. Reiter}, title = {Safe Passage for Passwords and Other Sensitive Data}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/safe-passage-for-passwords-and-other-sensitive-data/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/McCunePR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NadjiSS09, author = {Yacin Nadji and Prateek Saxena and Dawn Song}, title = {Document Structure Integrity: {A} Robust Basis for Cross-site Scripting Defense}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/document-structure-integrity-a-robust-basis-for-cross-site-scripting-defense/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NadjiSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Sekar09, author = {R. Sekar}, title = {An Efficient Black-box Technique for Defeating Web Application Attacks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/an-efficient-black-box-technique-for-defeating-web-application-attacks/}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Sekar09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SongKS09, author = {Yingbo Song and Angelos D. Keromytis and Salvatore J. Stolfo}, title = {Spectrogram: {A} Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/spectrogram-mixture-markov-chains-model-anomaly-detection-web-traffic/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SongKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangWLZ09, author = {Tielei Wang and Tao Wei and Zhiqiang Lin and Wei Zou}, title = {IntScope: Automatically Detecting Integer Overflow Vulnerability in {X86} Binary Using Symbolic Execution}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/intscope-automatically-detecting-integer-overflow-vulnerability-in-x86-binary-using-symbolic-execution/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangWLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WeaverSP09, author = {Nicholas Weaver and Robin Sommer and Vern Paxson}, title = {Detecting Forged {TCP} Reset Packets}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/detecting-forged-tcp-reset-packets/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WeaverSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WilliamsSS09, author = {Peter Williams and Radu Sion and Dennis E. Shasha}, title = {The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/the-blind-stone-tablet-outsourcing-durability-to-untrusted-parties/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WilliamsSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WrightCM09, author = {Charles V. Wright and Scott E. Coull and Fabian Monrose}, title = {Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/traffic-morphing-efficient-defense-against-statistical-traffic-analysis/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WrightCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ndss/2009, title = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2009, San Diego, California, USA, 8th February - 11th February 2009}, publisher = {The Internet Society}, year = {2009}, url = {https://www.ndss-symposium.org/ndss2009/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.