NDSS A*

25 papers

YearTitle / Authors
2010A Security Evaluation of DNSSEC with NSEC3.
Jason Bau, John C. Mitchell
2010A Systematic Characterization of IM Threats using Honeypots.
Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos
2010A3: An Extensible Platform for Application-Aware Anonymity.
Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze
2010Adnostic: Privacy Preserving Targeted Advertising.
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas
2010Automatic Reverse Engineering of Data Structures from Binary Execution.
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
2010Binary Code Extraction and Interface Identification for Security Applications.
Juan Caballero, Noah M. Johnson, Stephen McCamant, Dawn Song
2010Botnet Judo: Fighting Spam with Itself.
Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage
2010Contractual Anonymity.
Edward J. Schwartz, David Brumley, Jonathan M. McCune
2010Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel
2010Effective Anomaly Detection with Scarce Training Data.
William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna
2010Efficient Detection of Split Personalities in Malware.
Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna
2010FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Prateek Saxena, Steve Hanna, Pongsin Poosankam, Dawn Song
2010Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.
Sushant Sinha, Michael D. Bailey, Farnam Jahanian
2010InvisiType: Object-Oriented Security Policies.
Jiwon Seo, Monica S. Lam
2010Joe-E: A Security-Oriented Subset of Java.
Adrian Mettler, David A. Wagner, Tyler Close
2010Large-Scale Automatic Classification of Phishing Pages.
Colin Whittaker, Brian Ryner, Marria Nazif
2010On Network-level Clusters for Spam Detection.
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu
2010On the Safety of Enterprise Policy Deployment.
Yudong Gao, Ni Pan, Xu Chen, Zhuoqing Morley Mao
2010Preventing Capability Leaks in Secure JavaScript Subsets.
Matthew Finifter, Joel Weinberger, Adam Barth
2010Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010
2010Protecting Browsers from Extension Vulnerabilities.
Adam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman
2010Server-side Verification of Client Behavior in Online Games.
Darrell Bethea, Robert A. Cochran, Michael K. Reiter
2010Stealth DoS Attacks on Secure Channels.
Amir Herzberg, Haya Schulmann
2010When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Thomas Ristenpart, Scott Yilek
2010Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation.
Suresh Chari, Shai Halevi, Wietse Z. Venema