NDSS A*

55 papers

YearTitle / Authors
201219th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012
2012A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.
Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis
2012ANDaNA: Anonymous Named Data Networking Application.
Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun
2012Abuse Detection and Prevention Systems at a Large Scale Video Sharing Website.
Yu-To Chen, Pierre Grinspan, Blake Livingston, Palash Nandy, Brian Palmer
2012Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.
Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu
2012Accountable Wiretapping -or- I know they can hear you now.
Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach
2012Adaptive Password-Strength Meters from Markov Models.
Claude Castelluccia, Markus Dürmuth, Daniele Perito
2012Automated Synthesis of Secure Distributed Applications.
Michael Backes, Matteo Maffei, Kim Pecina
2012BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
Man Ho Au, Apu Kapadia, Willy Susilo
2012Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems.
Jignesh M. Patel, Alex X. Liu, Eric Torng
2012Charm: A Framework for Rapidly Prototyping Cryptosystems.
Joseph A. Akinyele, Matthew Green, Aviel D. Rubin
2012Chrome Extensions: Threat Analysis and Countermeasures.
Lei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen
2012Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.
Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu
2012Distance Hijacking Attacks on Distance Bounding Protocols.
Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun
2012FreeMarket: Shopping for free in Android applications.
Daniel Reynaud, Dawn Xiaodong Song, Thomas R. Magrino, Edward XueJun Wu, Eui Chul Richard Shin
2012Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.
Hyojeong Lee, Jeff Seibert, Charles Killian, Cristina Nita-Rotaru
2012Ghost Domain Names: Revoked Yet Still Resolvable.
Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Hai-Xin Duan, Jianping Wu
2012Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.
Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl
2012Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang
2012Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.
Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi
2012Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation.
Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, Heng Yin
2012Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.
Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, Heng Yin
2012Insights into User Behavior in Dealing with Internet Attacks.
Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti
2012Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu, Changzhen Hu
2012Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds.
Yangyi Chen, Bo Peng, Xiaofeng Wang, Haixu Tang
2012Location leaks over the GSM air interface.
Denis Foo Kune, John Kölndorfer, Nicholas Hopper, Yongdae Kim
2012Making argument systems for outsourced computation practical (sometimes).
Srinath T. V. Setty, Richard McPherson, Andrew J. Blumberg, Michael Walfish
2012MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi
2012Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems.
Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State
2012On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.
Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng
2012PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.
Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen
2012Persistent OSPF Attacks.
Gabi Nakibly, Alex Kirshon, Dima Gonikman, Dan Boneh
2012Plaintext-Recovery Attacks Against Datagram TLS.
Kenneth G. Paterson, Nadhem J. AlFardan
2012Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud.
Yanbin Lu
2012Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Yan Huang, David Evans, Jonathan Katz
2012SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
Karim Eldefrawy, Gene Tsudik, Aurélien Francillon, Daniele Perito
2012SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Kun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou
2012Shadow: Running Tor in a Box for Accurate and Efficient Experimentation.
Rob Jansen, Nicholas Hopper
2012ShortMAC: Efficient Data-Plane Fault Localization.
Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague
2012Static detection of C++ vtable escape vulnerabilities in binary code.
David Dewey, Jonathon T. Giffin
2012Systematic Detection of Capability Leaks in Stock Android Smartphones.
Michael C. Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang
2012Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.
Max Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim
2012The Case for Prefetching and Prevalidating TLS Server Certificates.
Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh
2012The Latent Community Model for Detecting Sybils in Social Networks.
Zhuhua Cai, Chris Jermaine
2012Throttling Tor Bandwidth Parasites.
Rob Jansen, Nicholas Hopper, Paul F. Syverson
2012Towards Online Spam Filtering in Social Networks.
Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary
2012Towards Practical Oblivious RAM.
Emil Stefanov, Elaine Shi, Dawn Xiaodong Song
2012Towards Taming Privilege-Escalation Attacks on Android.
Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry
2012Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.
Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux
2012Using replicated execution for a more secure and reliable web browser.
Hui Xue, Nathan Dautenhahn, Samuel T. King
2012WarningBird: Detecting Suspicious URLs in Twitter Stream.
Sangho Lee, Jong Kim
2012Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications.
Nico Golde, Kevin Redon, Ravishankar Borgaonkar
2012X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks.
Prateek Mittal, Matthew Caesar, Nikita Borisov
2012You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.
Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Zhuoqing Morley Mao, Ming Zhang, Yi-Min Wang
2012You are what you like! Information leakage through users' Interests.
Chaabane Abdelberi, Gergely Ács, Mohamed Ali Kâafar