NDSS A*

18 papers

YearTitle / Authors
2006A Crawler-based Study of Spyware in the Web.
Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy
2006Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities.
Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
2006Deploying a New Hash Algorithm.
Steven M. Bellovin, Eric Rescorla
2006Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach.
Ryan M. Gerdes, Thomas E. Daniels, Mani Mina, Steve Russell
2006Enterprise Security: A Community of Interest Based Approach.
Patrick D. McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek
2006Induced Churn as Shelter from Routing-Table Poisoning.
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis
2006Inoculating SSH Against Address Harvesting.
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain
2006Isolating Intrusions by Automatic Experiments.
Stephan Neuhaus, Andreas Zeller
2006Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
Kevin Fu, Seny Kamara, Yoshi Kohno
2006Modeling Botnet Propagation Using Time Zones.
David Dagon, Cliff Changchun Zou, Wenke Lee
2006Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA
2006Protocol-Independent Adaptive Replay of Application Dialog.
Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz
2006Software Self-Healing Using Collaborative Application Communities.
Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis
2006Toward Automated Information-Flow Integrity Verification for Security-Critical Applications.
Umesh Shankar, Trent Jaeger, Reiner Sailer
2006Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm.
Doug Szajda, Michael Pohl, Jason Owen, Barry G. Lawson
2006Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
2006Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
2006Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.
James Newsome, David Brumley, Dawn Xiaodong Song