NDSS 2011:San Diego, California, USA

Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society 【DBLP Link

Paper Num: 28 || Session Num: 9

Session 1: Secure Emerging Applications: Social Networks and Smartphones 3

1. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.

Paper Link】 【Pages】:

【Authors】: Roman Schlegel ; Kehuan Zhang ; Xiao-yong Zhou ; Mehool Intwala ; Apu Kapadia ; XiaoFeng Wang

【Abstract】:

【Keywords】:

2. A Security API for Distributed Social Networks.

Paper Link】 【Pages】:

【Authors】: Michael Backes ; Matteo Maffei ; Kim Pecina

【Abstract】:

【Keywords】:

3. Location Privacy via Private Proximity Testing.

Paper Link】 【Pages】:

【Authors】: Arvind Narayanan ; Narendran Thiagarajan ; Mugdha Lakhani ; Michael Hamburg ; Dan Boneh

【Abstract】:

【Keywords】:

Session 2: Wireless Attacks! 3

4. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars.

Paper Link】 【Pages】:

【Authors】: Aurélien Francillon ; Boris Danev ; Srdjan Capkun

【Abstract】:

【Keywords】:

5. Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.

Paper Link】 【Pages】:

【Authors】: Omid Fatemieh ; Ali Farhadi ; Ranveer Chandra ; Carl A. Gunter

【Abstract】:

【Keywords】:

6. Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.

Paper Link】 【Pages】:

【Authors】: Liang Cai ; Kai Zeng ; Hao Chen ; Prasant Mohapatra

【Abstract】:

【Keywords】:

Session 3: OS Security 3

7. Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.

Paper Link】 【Pages】:

【Authors】: Xi Xiong ; Donghai Tian ; Peng Liu

【Abstract】:

【Keywords】:

8. Efficient Monitoring of Untrusted Kernel-Mode Execution.

Paper Link】 【Pages】:

【Authors】: Abhinav Srivastava ; Jonathon T. Giffin

【Abstract】:

【Keywords】:

9. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.

Paper Link】 【Pages】:

【Authors】: Zhiqiang Lin ; Junghwan Rhee ; Xiangyu Zhang ; Dongyan Xu ; Xuxian Jiang

【Abstract】:

【Keywords】:

Session 4: Network Malware 2

10. Losing Control of the Internet: Using the Data Plane to Attack the Control Plane.

Paper Link】 【Pages】:

【Authors】: Max Schuchard ; Abedelaziz Mohaisen ; Denis Foo Kune ; Nicholas Hopper ; Yongdae Kim ; Eugene Y. Vasserman

【Abstract】:

【Keywords】:

11. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.

Paper Link】 【Pages】:

【Authors】: Leyla Bilge ; Engin Kirda ; Christopher Kruegel ; Marco Balduzzi

【Abstract】:

【Keywords】:

Session 5: Software Security / Code Analysis 5

12. Howard: A Dynamic Excavator for Reverse Engineering Data Structures.

Paper Link】 【Pages】:

【Authors】: Asia Slowinska ; Traian Stancescu ; Herbert Bos

【Abstract】:

【Keywords】:

13. No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects.

Paper Link】 【Pages】:

【Authors】: David Dewey ; Patrick Traynor

【Abstract】:

【Keywords】:

14. TIE: Principled Reverse Engineering of Types in Binary Programs.

Paper Link】 【Pages】:

【Authors】: JongHyup Lee ; Thanassis Avgerinos ; David Brumley

【Abstract】:

【Keywords】:

15. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation.

Paper Link】 【Pages】:

【Authors】: Min Gyung Kang ; Stephen McCamant ; Pongsin Poosankam ; Dawn Song

【Abstract】:

【Keywords】:

16. AEG: Automatic Exploit Generation.

Paper Link】 【Pages】:

【Authors】: Thanassis Avgerinos ; Sang Kil Cha ; Brent Lim Tze Hao ; David Brumley

【Abstract】:

【Keywords】:

Session 6: Web Security 3

17. Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.

Paper Link】 【Pages】:

【Authors】: Marco Balduzzi ; Carmen Torrano Gimenez ; Davide Balzarotti ; Engin Kirda

【Abstract】:

【Keywords】:

18. WebShield: Enabling Various Web Defense Techniques without Client Side Modifications.

Paper Link】 【Pages】:

【Authors】: Zhichun Li ; Yi Tang ; Yinzhi Cao ; Vaibhav Rastogi ; Yan Chen ; Bin Liu ; Clint Sbisa

【Abstract】:

【Keywords】:

19. HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.

Paper Link】 【Pages】:

【Authors】: Xiapu Luo ; Peng Zhou ; Edmond W. W. Chan ; Wenke Lee ; Rocky K. C. Chang ; Roberto Perdisci

【Abstract】:

【Keywords】:

Session 7: Network Security 3

20. Accurate and Provably Secure Latency Estimation with Treeple.

Paper Link】 【Pages】:

【Authors】: Eric Chan-Tin ; Nicholas Hopper

【Abstract】:

【Keywords】:

21. On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses.

Paper Link】 【Pages】:

【Authors】: Scott E. Coull ; Fabian Monrose ; Michael Bailey

【Abstract】:

【Keywords】:

22. SWIRL: A Scalable Watermark to Detect Correlated Network Flows.

Paper Link】 【Pages】:

【Authors】: Amir Houmansadr ; Nikita Borisov

【Abstract】:

【Keywords】:

Session 8: Real-World Security: Cloud Computing, Biometrics, and Humans 3

23. SPARE: Replicas on Hold.

Paper Link】 【Pages】:

【Authors】: Tobias Distler ; Ivan Popov ; Wolfgang Schröder-Preikschat ; Hans P. Reiser ; Rüdiger Kapitza

【Abstract】:

【Keywords】:

24. Efficient Privacy-Preserving Biometric Identification.

Paper Link】 【Pages】:

【Authors】: Yan Huang ; Lior Malka ; David Evans ; Jonathan Katz

【Abstract】:

【Keywords】:

25. Usability Testing a Malware-Resistant Input Mechanism.

Paper Link】 【Pages】:

【Authors】: Alana Libonati ; Jonathan M. McCune ; Michael K. Reiter

【Abstract】:

【Keywords】:

Session 9: Privacy 3

26. Tracker: Security and Privacy for RFID-based Supply Chains.

Paper Link】 【Pages】:

【Authors】: Erik-Oliver Blass ; Kaoutar Elkhiyaoui ; Refik Molva

【Abstract】:

【Keywords】:

27. PiOS: Detecting Privacy Leaks in iOS Applications.

Paper Link】 【Pages】:

【Authors】: Manuel Egele ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna

【Abstract】:

【Keywords】:

28. Privacy-Preserving Aggregation of Time-Series Data.

Paper Link】 【Pages】:

【Authors】: Elaine Shi ; T.-H. Hubert Chan ; Eleanor G. Rieffel ; Richard Chow ; Dawn Song

【Abstract】:

【Keywords】: