NDSS A*

51 papers

YearTitle / Authors
201522nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015
2015ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.
Daniel Demmler, Thomas Schneider, Michael Zohner
2015Bloom Cookies: Web Search Personalization without User Tracking.
Nitesh Mor, Oriana Riva, Suman Nath, John Kubiatowicz
2015Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.
Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang
2015CopperDroid: Automatic Reconstruction of Android Malware Behaviors.
Kimberly Tam, Salahuddin J. Khan, Aristide Fattori, Lorenzo Cavallaro
2015DEFY: A Deniable, Encrypted File System for Log-Structured Storage.
Timothy Peters, Mark A. Gondree, Zachary N. J. Peterson
2015DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Xueqiang Wang, Kun Sun, Yuewu Wang, Jiwu Jing
2015EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran
2015EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.
Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen
2015Efficient RAM and control flow in verifiable outsourced computation.
Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish
2015Exploiting and Protecting Dynamic Code Generation.
Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski
2015Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna
2015FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers.
Yves Younan
2015Gracewipe: Secure and Verifiable Deletion under Coercion.
Lianying Zhao, Mohammad Mannan
2015I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.
Xiang Pan, Yinzhi Cao, Yan Chen
2015Identifying Cross-origin Resource Status Using Application Cache.
Sangho Lee, Hyungsub Kim, Jong Kim
2015Information Flow Analysis of Android Applications in DroidSafe.
Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, Limei Gilham, Nguyen Nguyen, Martin C. Rinard
2015Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes.
Mohamed El Massad, Siddharth Garg, Mahesh V. Tripunitara
2015Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.
Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov
2015Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.
Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose
2015Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords.
Benjamin Güldenring, Volker Roth, Lars Ries
2015Machine Learning Classification over Encrypted Data.
Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser
2015Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.
Pierre-Antoine Vervier, Olivier Thonnard, Marc Dacier
2015NSEC5: Provably Preventing DNSSEC Zone Enumeration.
Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv
2015No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith
2015On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah
2015Opaque Control-Flow Integrity.
Vishwath Mohan, Per Larsen, Stefan Brunthaler, Kevin W. Hamlen, Michael Franz
2015P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.
Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian
2015Parking Sensors: Analyzing and Detecting Parked Domains.
Thomas Vissers, Wouter Joosen, Nick Nikiforakis
2015Phoneypot: Data-driven Understanding of Telephony Threats.
Payas Gupta, Bharat Srinivasan, Vijay Balasubramaniyan, Mustaque Ahamad
2015Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.
Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu
2015Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.
Igor Bilogrevic, Kévin Huguenin, Stefan Mihaila, Reza Shokri, Jean-Pierre Hubaux
2015Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.
Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic
2015Preventing Use-after-free with Dangling Pointers Nullification.
Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee
2015Principled Sampling for Anomaly Detection.
Brendan Juba, Christopher Musco, Fan Long, Stelios Sidiroglou-Douskos, Martin C. Rinard
2015Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces.
Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina
2015Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian
2015SPHINX: Detecting Security Attacks in Software-Defined Networks.
Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann
2015SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.
Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, Brent ByungHoon Kang
2015Securing the Software Defined Network Control Layer.
Phillip A. Porras, Steven Cheung, Martin W. Fong, Keith Skinner, Vinod Yegneswaran
2015Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.
Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis
2015Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.
Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta
2015StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.
Xi Chen, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida
2015The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines.
Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, Sotiris Ioannidis
2015Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
Stephen Crane, Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz
2015Too LeJIT to Quit: Extending JIT Spraying to ARM.
Wilson Lian, Hovav Shacham, Stefan Savage
2015Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning.
Michael J. Kranch, Joseph Bonneau
2015VTint: Protecting Virtual Function Tables' Integrity.
Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song
2015Verified Contributive Channel Bindings for Compound Authentication.
Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti
2015What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, Xiaofeng Wang, Carl A. Gunter
2015vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.
Aravind Prakash, Xunchao Hu, Heng Yin