default search action
NDSS 2012: San Diego, California, USA
- 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012. The Internet Society 2012
Session 1: Networking I
- Kenneth G. Paterson, Nadhem J. AlFardan:
Plaintext-Recovery Attacks Against Datagram TLS. - Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun:
ANDaNA: Anonymous Named Data Networking Application. - Gabi Nakibly, Alex Kirshon, Dima Gonikman, Dan Boneh:
Persistent OSPF Attacks.
Session 2: Social Networks and User Behavior I
- Chaabane Abdelberi, Gergely Ács, Mohamed Ali Kâafar:
You are what you like! Information leakage through users' Interests. - Prateek Mittal, Matthew Caesar, Nikita Borisov:
X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks. - Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary:
Towards Online Spam Filtering in Social Networks.
Session 3: Mobile Networks
- Denis Foo Kune, John Kölndorfer, Nicholas Hopper, Yongdae Kim:
Location leaks over the GSM air interface. - Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux:
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. - Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Zhuoqing Morley Mao, Ming Zhang, Yi-Min Wang:
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks. - Nico Golde, Kevin Redon, Ravishankar Borgaonkar:
Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications.
Session 4: Clouds/Crypto
- Yanbin Lu:
Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud. - Yangyi Chen, Bo Peng, XiaoFeng Wang, Haixu Tang:
Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds. - Srinath T. V. Setty, Richard McPherson, Andrew J. Blumberg, Michael Walfish:
Making argument systems for outsourced computation practical (sometimes). - Emil Stefanov, Elaine Shi, Dawn Xiaodong Song:
Towards Practical Oblivious RAM.
Session 5: Posters
- Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, Heng Yin:
Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation. - Daniel Reynaud, Dawn Xiaodong Song, Thomas R. Magrino, Edward XueJun Wu, Eui Chul Richard Shin:
FreeMarket: Shopping for free in Android applications. - Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. - Rob Jansen, Nicholas Hopper, Paul F. Syverson:
Throttling Tor Bandwidth Parasites. - Max Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim:
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. - Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State:
Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems. - Joseph A. Akinyele, Matthew Green, Aviel D. Rubin:
Charm: A Framework for Rapidly Prototyping Cryptosystems. - Yu-To Chen, Pierre Grinspan, Blake Livingston, Palash Nandy, Brian Palmer:
Abuse Detection and Prevention Systems at a Large Scale Video Sharing Website.
Session 6: Applied Crypto
- Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu:
Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. - Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng:
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability. - Claude Castelluccia, Markus Dürmuth, Daniele Perito:
Adaptive Password-Strength Meters from Markov Models. - Yan Huang, David Evans, Jonathan Katz:
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Session 7: Smartphones
- Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl:
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. - Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi:
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. - Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry:
Towards Taming Privilege-Escalation Attacks on Android. - Michael C. Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang:
Systematic Detection of Capability Leaks in Stock Android Smartphones. - Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang:
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
Session 8: Social Networks and User Behavior II
- Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti:
Insights into User Behavior in Dealing with Internet Attacks. - Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. - Zhuhua Cai, Chris Jermaine:
The Latent Community Model for Detecting Sybils in Social Networks.
Session 9: Privacy and Anonymity
- Man Ho Au, Apu Kapadia, Willy Susilo:
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. - Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable Wiretapping -or- I know they can hear you now. - Rob Jansen, Nicholas Hopper:
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation.
Session 10
- Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu:
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence. - Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou:
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. - Karim Eldefrawy, Gene Tsudik, Aurélien Francillon, Daniele Perito:
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. - Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu:
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Session 11: Web
- Sangho Lee, Jong Kim:
WarningBird: Detecting Suspicious URLs in Twitter Stream. - Hui Xue, Nathan Dautenhahn, Samuel T. King:
Using replicated execution for a more secure and reliable web browser. - Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi:
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. - Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen:
Chrome Extensions: Threat Analysis and Countermeasures.
Session 12: Networking II
- Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Hai-Xin Duan, Jianping Wu:
Ghost Domain Names: Revoked Yet Still Resolvable. - Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague:
ShortMAC: Efficient Data-Plane Fault Localization. - Jignesh Patel, Alex X. Liu, Eric Torng:
Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems. - Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh:
The Case for Prefetching and Prevalidating TLS Server Certificates.
Session 13: Distributed Systems
- Hyojeong Lee, Jeff Seibert, Charles Edwin Killian, Cristina Nita-Rotaru:
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems. - Michael Backes, Matteo Maffei, Kim Pecina:
Automated Synthesis of Secure Distributed Applications.
Session 14: Software
- Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis:
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. - David Dewey, Jonathon T. Giffin:
Static detection of C++ vtable escape vulnerabilities in binary code. - Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, Heng Yin:
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.