NDSS A*

29 papers

YearTitle / Authors
2011A Security API for Distributed Social Networks.
Michael Backes, Matteo Maffei, Kim Pecina
2011AEG: Automatic Exploit Generation.
Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley
2011Accurate and Provably Secure Latency Estimation with Treeple.
Eric Chan-Tin, Nicholas Hopper
2011Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.
Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda
2011DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.
Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, Dawn Song
2011EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi
2011Efficient Monitoring of Untrusted Kernel-Mode Execution.
Abhinav Srivastava, Jonathon T. Giffin
2011Efficient Privacy-Preserving Biometric Identification.
Yan Huang, Lior Malka, David Evans, Jonathan Katz
2011Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Liang Cai, Kai Zeng, Hao Chen, Prasant Mohapatra
2011HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci
2011Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
Asia Slowinska, Traian Stancescu, Herbert Bos
2011Location Privacy via Private Proximity Testing.
Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh
2011Losing Control of the Internet: Using the Data Plane to Attack the Control Plane.
Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman
2011No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects.
David Dewey, Patrick Traynor
2011On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.
Scott E. Coull, Fabian Monrose, Michael D. Bailey
2011PiOS: Detecting Privacy Leaks in iOS Applications.
Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna
2011Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Xi Xiong, Donghai Tian, Peng Liu
2011Privacy-Preserving Aggregation of Time-Series Data.
Elaine Shi, T.-H. Hubert Chan, Eleanor Gilbert Rieffel, Richard Chow, Dawn Song
2011Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011
2011Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.
Aurélien Francillon, Boris Danev, Srdjan Capkun
2011SPARE: Replicas on Hold.
Tobias Distler, Ivan Popov, Wolfgang Schröder-Preikschat, Hans P. Reiser, Rüdiger Kapitza
2011SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
Amir Houmansadr, Nikita Borisov
2011SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang
2011Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, Xiaofeng Wang
2011TIE: Principled Reverse Engineering of Types in Binary Programs.
Jonghyup Lee, Thanassis Avgerinos, David Brumley
2011Tracker: Security and Privacy for RFID-based Supply Chains.
Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
2011Usability Testing a Malware-Resistant Input Mechanism.
Alana Libonati, Jonathan M. McCune, Michael K. Reiter
2011Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.
Omid Fatemieh, Ali Farhadi, Ranveer Chandra, Carl A. Gunter
2011WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.
Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa