| 2013 | 20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly. Richard A. Kemmerer |
| 2013 | 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013 |
| 2013 | A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality. David Irakiza, Md. Enamul Karim, Vir V. Phoha |
| 2013 | A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. Aldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir |
| 2013 | AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations. Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, Jin Song Dong |
| 2013 | An Empirical Evaluation of Relay Selection in Tor. Chris Wacek, Henry Tan, Kevin S. Bauer, Micah Sherr |
| 2013 | Analyzing Unique-Bid Auction Sites for Fun and Profit. Ory Samorodnitzky, Eran Tromer, Avishai Wool |
| 2013 | Assessing software integrity of virtual appliances through software whitelists. Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell |
| 2013 | Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring. Anil Kurmus, Reinhard Tartler, Daniela Dorneanu, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Wolfgang Schröder-Preikschat, Daniel Lohmann, Rüdiger Kapitza |
| 2013 | Automatic Protocol Selection in Secure Two-Party Computations. Florian Kerschbaum, Thomas Schneider, Axel Schröpfer |
| 2013 | Automatically Inferring the Evolution of Malicious Activity on the Internet. Shobha Venkataraman, David Brumley, Subhabrata Sen, Oliver Spatscheck |
| 2013 | Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web. Davide Canali, Davide Balzarotti |
| 2013 | CAMP: Content-Agnostic Malware Protection. Moheeb Abu Rajab, Lucas Ballard, Noe Lutz, Panayiotis Mavrommatis, Niels Provos |
| 2013 | COMPA: Detecting Compromised Accounts on Social Networks. Manuel Egele, Gianluca Stringhini, Christopher Krügel, Giovanni Vigna |
| 2013 | Clear and Present Data: Opaque Traffic and its Security Implications for the Future. Andrew M. White, Srinivas Krishnan, Michael D. Bailey, Fabian Monrose, Phillip A. Porras |
| 2013 | Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel |
| 2013 | Comparing Mobile Privacy Protection through Cross-Platform Applications. Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Robert H. Deng |
| 2013 | Contextual Policy Enforcement in Android Applications with Permission Event Graphs. Kevin Zhijie Chen, Noah M. Johnson, Vijay D'Silva, Shuaifu Dai, Kyle MacNamara, Thomas R. Magrino, Edward XueJun Wu, Martin C. Rinard, Dawn Xiaodong Song |
| 2013 | Detecting Passive Content Leaks and Pollution in Android Applications. Yajin Zhou, Xuxian Jiang |
| 2013 | Detection of Malicious PDF Files Based on Hierarchical Document Structure. Nedim Srndic, Pavel Laskov |
| 2013 | Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk |
| 2013 | FRESCO: Modular Composable Security Services for Software-Defined Networks. Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson |
| 2013 | Fix Me Up: Repairing Access-Control Bugs in Web Applications. Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov |
| 2013 | General Chair's Message. Thomas Hutton |
| 2013 | High Accuracy Attack Provenance via Binary-based Execution Partition. Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu |
| 2013 | How Privacy Leaks From Bluetooth Mouse? Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu |
| 2013 | I can be You: Questioning the use of Keystroke Dynamics as Biometrics. Chee Meng Tey, Payas Gupta, Debin Gao |
| 2013 | I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer |
| 2013 | InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations. Luyi Xing, Yangyi Chen, Xiaofeng Wang, Shuo Chen |
| 2013 | Intention and Origination: An Inside Look at Large-Scale Bot Queries. Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee |
| 2013 | Juice: A Longitudinal Study of an SEO Botnet. David Y. Wang, Stefan Savage, Geoffrey M. Voelker |
| 2013 | KinWrite: Handwriting-Based Authentication Using Kinect. Jing Tian, Chengzhang Qu, Wenyuan Xu, Song Wang |
| 2013 | LIRA: Lightweight Incentivized Routing for Anonymity. Rob Jansen, Aaron Johnson, Paul F. Syverson |
| 2013 | Laying a Secure Foundation for Mobile Devices. Stephen Smalley |
| 2013 | Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? Giuseppe Ateniese, Giuseppe Bianchi, Angelo Capossele, Chiara Petrioli |
| 2013 | Macroeconomic Analysis of Malware. Vaibhav Garg, L. Jean Camp |
| 2013 | Metrics for Automated Network Security Design. Mohammad Ashiqur Rahman, Ehab Al-Shaer |
| 2013 | NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System. Jialong Zhang, Guofei Gu |
| 2013 | OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance. Cong Wang, Zhen Xu, Kui Ren, Janet Meiling Wang |
| 2013 | ObliviStore: High Performance Oblivious Distributed Cloud Data Store. Emil Stefanov, Elaine Shi |
| 2013 | On Implementing Deniable Storage Encryption for Mobile Devices. Adam Skillen, Mohammad Mannan |
| 2013 | One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries. Ryan Henry, Yizhou Huang, Ian Goldberg |
| 2013 | One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky |
| 2013 | Pisces: Anonymous Communication Using Social Networks. Prateek Mittal, Matthew K. Wright, Nikita Borisov |
| 2013 | PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. Robert Templeman, Zahid Rahman, David J. Crandall, Apu Kapadia |
| 2013 | Practical Timing Side Channel Attacks Against Kernel Space ASLR. Ralf Hund, Carsten Willems, Thorsten Holz |
| 2013 | Preserving Link Privacy in Social Network Based Systems. Prateek Mittal, Charalampos Papamanthou, Dawn Xiaodong Song |
| 2013 | Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. Michael Backes, Goran Doychev, Boris Köpf |
| 2013 | Privacy-Enhancing Technologies for Medical Tests Using Genomic Data. Erman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux |
| 2013 | Program Chair's Message. Peng Ning |
| 2013 | Secure Computation on Floating Point Numbers. Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, Aaron Steele |
| 2013 | Security Enhanced (SE) Android: Bringing Flexible MAC to Android. Stephen Smalley, Robert Craig |
| 2013 | Social Turing Tests: Crowdsourcing Sybil Detection. Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao |
| 2013 | Tailing RFID Tags for Clone Detection. Davide Zanetti, Srdjan Capkun, Ari Juels |
| 2013 | Taming Hosted Hypervisors with (Mostly) Deprivileged Execution. Chiachih Wu, Zhi Wang, Xuxian Jiang |
| 2013 | The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee |
| 2013 | The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites. Sooel Son, Vitaly Shmatikov |
| 2013 | Toward Online Verification of Client Behavior in Distributed Applications. Robert A. Cochran, Michael K. Reiter |
| 2013 | TransBlocker: Transforming and Taming Privacy-Breaching Android Applications. Mu Zhang, Heng Yin |
| 2013 | Unobservable Re-authentication for Smartphones. Lingjun Li, Xinxin Zhao, Guoliang Xue |
| 2013 | Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller |
| 2013 | Verito: A Practical System for Transparency and Accountability in Virtual Economies. Raghav Bhaskar, Saikat Guha, Srivatsan Laxman, Prasad Naldurg |
| 2013 | When Firmware Modifications Attack: A Case Study of Embedded Exploitation. Ang Cui, Michael Costello, Salvatore J. Stolfo |
| 2013 | You Can't Do Today's Security With Yesterday's Methods. Joe Sullivan |
| 2013 | rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation. Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas Hopper |