NDSS A*

65 papers

YearTitle / Authors
201320 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly.
Richard A. Kemmerer
201320th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013
2013A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality.
David Irakiza, Md. Enamul Karim, Vir V. Phoha
2013A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
Aldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir
2013AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, Jin Song Dong
2013An Empirical Evaluation of Relay Selection in Tor.
Chris Wacek, Henry Tan, Kevin S. Bauer, Micah Sherr
2013Analyzing Unique-Bid Auction Sites for Fun and Profit.
Ory Samorodnitzky, Eran Tromer, Avishai Wool
2013Assessing software integrity of virtual appliances through software whitelists.
Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell
2013Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring.
Anil Kurmus, Reinhard Tartler, Daniela Dorneanu, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Wolfgang Schröder-Preikschat, Daniel Lohmann, Rüdiger Kapitza
2013Automatic Protocol Selection in Secure Two-Party Computations.
Florian Kerschbaum, Thomas Schneider, Axel Schröpfer
2013Automatically Inferring the Evolution of Malicious Activity on the Internet.
Shobha Venkataraman, David Brumley, Subhabrata Sen, Oliver Spatscheck
2013Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web.
Davide Canali, Davide Balzarotti
2013CAMP: Content-Agnostic Malware Protection.
Moheeb Abu Rajab, Lucas Ballard, Noe Lutz, Panayiotis Mavrommatis, Niels Provos
2013COMPA: Detecting Compromised Accounts on Social Networks.
Manuel Egele, Gianluca Stringhini, Christopher Krügel, Giovanni Vigna
2013Clear and Present Data: Opaque Traffic and its Security Implications for the Future.
Andrew M. White, Srinivas Krishnan, Michael D. Bailey, Fabian Monrose, Phillip A. Porras
2013Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting.
Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel
2013Comparing Mobile Privacy Protection through Cross-Platform Applications.
Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Robert H. Deng
2013Contextual Policy Enforcement in Android Applications with Permission Event Graphs.
Kevin Zhijie Chen, Noah M. Johnson, Vijay D'Silva, Shuaifu Dai, Kyle MacNamara, Thomas R. Magrino, Edward XueJun Wu, Martin C. Rinard, Dawn Xiaodong Song
2013Detecting Passive Content Leaks and Pollution in Android Applications.
Yajin Zhou, Xuxian Jiang
2013Detection of Malicious PDF Files Based on Hierarchical Document Structure.
Nedim Srndic, Pavel Laskov
2013Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk
2013FRESCO: Modular Composable Security Services for Software-Defined Networks.
Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson
2013Fix Me Up: Repairing Access-Control Bugs in Web Applications.
Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov
2013General Chair's Message.
Thomas Hutton
2013High Accuracy Attack Provenance via Binary-based Execution Partition.
Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu
2013How Privacy Leaks From Bluetooth Mouse?
Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu
2013I can be You: Questioning the use of Keystroke Dynamics as Biometrics.
Chee Meng Tey, Payas Gupta, Debin Gao
2013I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer
2013InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.
Luyi Xing, Yangyi Chen, Xiaofeng Wang, Shuo Chen
2013Intention and Origination: An Inside Look at Large-Scale Bot Queries.
Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee
2013Juice: A Longitudinal Study of an SEO Botnet.
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
2013KinWrite: Handwriting-Based Authentication Using Kinect.
Jing Tian, Chengzhang Qu, Wenyuan Xu, Song Wang
2013LIRA: Lightweight Incentivized Routing for Anonymity.
Rob Jansen, Aaron Johnson, Paul F. Syverson
2013Laying a Secure Foundation for Mobile Devices.
Stephen Smalley
2013Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?
Giuseppe Ateniese, Giuseppe Bianchi, Angelo Capossele, Chiara Petrioli
2013Macroeconomic Analysis of Malware.
Vaibhav Garg, L. Jean Camp
2013Metrics for Automated Network Security Design.
Mohammad Ashiqur Rahman, Ehab Al-Shaer
2013NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.
Jialong Zhang, Guofei Gu
2013OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance.
Cong Wang, Zhen Xu, Kui Ren, Janet Meiling Wang
2013ObliviStore: High Performance Oblivious Distributed Cloud Data Store.
Emil Stefanov, Elaine Shi
2013On Implementing Deniable Storage Encryption for Mobile Devices.
Adam Skillen, Mohammad Mannan
2013One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries.
Ryan Henry, Yizhou Huang, Ian Goldberg
2013One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.
Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky
2013Pisces: Anonymous Communication Using Social Networks.
Prateek Mittal, Matthew K. Wright, Nikita Borisov
2013PlaceRaider: Virtual Theft in Physical Spaces with Smartphones.
Robert Templeman, Zahid Rahman, David J. Crandall, Apu Kapadia
2013Practical Timing Side Channel Attacks Against Kernel Space ASLR.
Ralf Hund, Carsten Willems, Thorsten Holz
2013Preserving Link Privacy in Social Network Based Systems.
Prateek Mittal, Charalampos Papamanthou, Dawn Xiaodong Song
2013Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
Michael Backes, Goran Doychev, Boris Köpf
2013Privacy-Enhancing Technologies for Medical Tests Using Genomic Data.
Erman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux
2013Program Chair's Message.
Peng Ning
2013Secure Computation on Floating Point Numbers.
Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele
2013Security Enhanced (SE) Android: Bringing Flexible MAC to Android.
Stephen Smalley, Robert Craig
2013Social Turing Tests: Crowdsourcing Sybil Detection.
Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao
2013Tailing RFID Tags for Clone Detection.
Davide Zanetti, Srdjan Capkun, Ari Juels
2013Taming Hosted Hypervisors with (Mostly) Deprivileged Execution.
Chiachih Wu, Zhi Wang, Xuxian Jiang
2013The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee
2013The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
Sooel Son, Vitaly Shmatikov
2013Toward Online Verification of Client Behavior in Distributed Applications.
Robert A. Cochran, Michael K. Reiter
2013TransBlocker: Transforming and Taming Privacy-Breaching Android Applications.
Mu Zhang, Heng Yin
2013Unobservable Re-authentication for Smartphones.
Lingjun Li, Xinxin Zhao, Guoliang Xue
2013Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis
Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller
2013Verito: A Practical System for Transparency and Accountability in Virtual Economies.
Raghav Bhaskar, Saikat Guha, Srivatsan Laxman, Prasad Naldurg
2013When Firmware Modifications Attack: A Case Study of Embedded Exploitation.
Ang Cui, Michael Costello, Salvatore J. Stolfo
2013You Can't Do Today's Security With Yesterday's Methods.
Joe Sullivan
2013rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.
Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas Hopper