NDSS A*

22 papers

YearTitle / Authors
2008A New Privacy-Enhanced Matchmaking Protocol.
Ji Sun Shin, Virgil D. Gligor
2008A Tune-up for Tor: Improving Security and Performance in the Tor Network.
Robin Snader, Nikita Borisov
2008Analysis-Resistant Malware.
John Bethencourt, Dawn Song, Brent Waters
2008Analyzing Privacy in Enterprise Packet Trace Anonymization.
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Donald F. Towsley
2008Automated Whitebox Fuzz Testing.
Patrice Godefroid, Michael Y. Levin, David A. Molnar
2008Automatic Network Protocol Analysis.
Gilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda
2008Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution.
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang
2008BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
Guofei Gu, Junjie Zhang, Wenke Lee
2008Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority.
David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee
2008Exploiting Opportunistic Scheduling in Cellular Data Networks.
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu
2008Halo: High-Assurance Locate for Distributed Hash Tables.
Apu Kapadia, Nikos Triandopoulos
2008HookFinder: Identifying and Understanding Malware Hooking Behaviors.
Heng Yin, Zhenkai Liang, Dawn Song
2008Impeding Malware Analysis Using Conditional Code Obfuscation.
Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee
2008Limits of Learning-based Signature Generation with Adversaries.
Shobha Venkataraman, Avrim Blum, Dawn Song
2008Measuring and Detecting Fast-Flux Service Networks.
Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling
2008PRECIP: Towards Practical and Retrofittable Confidential Information Protection.
Xiaofeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi
2008Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th February - 13th February 2008
2008Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel
2008Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong
2008Taming the Devil: Techniques for Evaluating Anonymized Network Data.
Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter
2008Usable PIR.
Peter Williams, Radu Sion
2008Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?
Juan Caballero, Theocharis Kampouris, Dawn Song, Jia Wang