NDSS 2010:San Diego, California, USA

Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010. The Internet Society 【DBLP Link

Paper Num: 24 || Session Num: 8

Session 1: Distributed Systems and Networks 3

1. Server-side Verification of Client Behavior in Online Games.

Paper Link】 【Pages】:

【Authors】: Darrell Bethea ; Robert A. Cochran ; Michael K. Reiter

【Abstract】:

【Keywords】:

2. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.

Paper Link】 【Pages】:

【Authors】: Scott Wolchok ; Owen S. Hofmann ; Nadia Heninger ; Edward W. Felten ; J. Alex Halderman ; Christopher J. Rossbach ; Brent Waters ; Emmett Witchel

【Abstract】:

【Keywords】:

3. Stealth DoS Attacks on Secure Channels.

Paper Link】 【Pages】:

【Authors】: Amir Herzberg ; Haya Shulman

【Abstract】:

【Keywords】:

Session 2: Web Security and Privacy 3

4. Protecting Browsers from Extension Vulnerabilities.

Paper Link】 【Pages】:

【Authors】: Adam Barth ; Adrienne Porter Felt ; Prateek Saxena ; Aaron Boodman

【Abstract】:

【Keywords】:

5. Adnostic: Privacy Preserving Targeted Advertising.

Paper Link】 【Pages】:

【Authors】: Vincent Toubiana ; Arvind Narayanan ; Dan Boneh ; Helen Nissenbaum ; Solon Barocas

【Abstract】:

【Keywords】:

6. FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.

Paper Link】 【Pages】:

【Authors】: Prateek Saxena ; Steve Hanna ; Pongsin Poosankam ; Dawn Song

【Abstract】:

【Keywords】:

Session 3: Intrusion Detection and Attack Analysis 3

7. Effective Anomaly Detection with Scarce Training Data.

Paper Link】 【Pages】:

【Authors】: William K. Robertson ; Federico Maggi ; Christopher Kruegel ; Giovanni Vigna

【Abstract】:

【Keywords】:

8. Large-Scale Automatic Classification of Phishing Pages.

Paper Link】 【Pages】:

【Authors】: Colin Whittaker ; Brian Ryner ; Marria Nazif

【Abstract】:

【Keywords】:

9. A Systematic Characterization of IM Threats using Honeypots.

Paper Link】 【Pages】:

【Authors】: Iasonas Polakis ; Thanasis Petsas ; Evangelos P. Markatos ; Spyros Antonatos

【Abstract】:

【Keywords】:

Session 4: Spam 3

10. On Network-level Clusters for Spam Detection.

Paper Link】 【Pages】:

【Authors】: Zhiyun Qian ; Zhuoqing Morley Mao ; Yinglian Xie ; Fang Yu

【Abstract】:

【Keywords】:

11. Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.

Paper Link】 【Pages】:

【Authors】: Sushant Sinha ; Michael Bailey ; Farnam Jahanian

【Abstract】:

【Keywords】:

12. Botnet Judo: Fighting Spam with Itself.

Paper Link】 【Pages】:

【Authors】: Andreas Pitsillidis ; Kirill Levchenko ; Christian Kreibich ; Chris Kanich ; Geoffrey M. Voelker ; Vern Paxson ; Nicholas Weaver ; Stefan Savage

【Abstract】:

【Keywords】:

Session 5: Anonymity and Cryptographic Systems 3

13. Contractual Anonymity.

Paper Link】 【Pages】:

【Authors】: Edward J. Schwartz ; David Brumley ; Jonathan M. McCune

【Abstract】:

【Keywords】:

14. A3: An Extensible Platform for Application-Aware Anonymity.

Paper Link】 【Pages】:

【Authors】: Micah Sherr ; Andrew Mao ; William R. Marczak ; Wenchao Zhou ; Boon Thau Loo ; Matt Blaze

【Abstract】:

【Keywords】:

15. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.

Paper Link】 【Pages】:

【Authors】: Thomas Ristenpart ; Scott Yilek

【Abstract】:

【Keywords】:

Session 6: Security Protocols and Policies 3

16. InvisiType: Object-Oriented Security Policies.

Paper Link】 【Pages】:

【Authors】: Jiwon Seo ; Monica S. Lam

【Abstract】:

【Keywords】:

17. A Security Evaluation of DNSSEC with NSEC3.

Paper Link】 【Pages】:

【Authors】: Jason Bau ; John C. Mitchell

【Abstract】:

【Keywords】:

18. On the Safety of Enterprise Policy Deployment.

Paper Link】 【Pages】:

【Authors】: Yudong Gao ; Ni Pan ; Xu Chen ; Zhuoqing Morley Mao

【Abstract】:

【Keywords】:

Session 7: Languages and Systems Security 3

19. Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation.

Paper Link】 【Pages】:

【Authors】: Suresh Chari ; Shai Halevi ; Wietse Venema

【Abstract】:

【Keywords】:

20. Joe-E: A Security-Oriented Subset of Java.

Paper Link】 【Pages】:

【Authors】: Adrian Mettler ; David Wagner ; Tyler Close

【Abstract】:

【Keywords】:

21. Preventing Capability Leaks in Secure JavaScript Subsets.

Paper Link】 【Pages】:

【Authors】: Matthew Finifter ; Joel Weinberger ; Adam Barth

【Abstract】:

【Keywords】:

Session 8: Malware 3

22. Binary Code Extraction and Interface Identification for Security Applications.

Paper Link】 【Pages】:

【Authors】: Juan Caballero ; Noah M. Johnson ; Stephen McCamant ; Dawn Song

【Abstract】:

【Keywords】:

23. Automatic Reverse Engineering of Data Structures from Binary Execution.

Paper Link】 【Pages】:

【Authors】: Zhiqiang Lin ; Xiangyu Zhang ; Dongyan Xu

【Abstract】:

【Keywords】:

24. Efficient Detection of Split Personalities in Malware.

Paper Link】 【Pages】:

【Authors】: Davide Balzarotti ; Marco Cova ; Christoph Karlberger ; Engin Kirda ; Christopher Kruegel ; Giovanni Vigna

【Abstract】:

【Keywords】: