NDSS 2012:San Diego, California, USA

19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012. The Internet Society 【DBLP Link

Paper Num: 54 || Session Num: 14

Session 1: Networking I 3

1. Plaintext-Recovery Attacks Against Datagram TLS.

Paper Link】 【Pages】:

【Authors】: Kenneth G. Paterson ; Nadhem J. AlFardan

【Abstract】:

【Keywords】:

2. ANDaNA: Anonymous Named Data Networking Application.

Paper Link】 【Pages】:

【Authors】: Steve DiBenedetto ; Paolo Gasti ; Gene Tsudik ; Ersin Uzun

【Abstract】:

【Keywords】:

3. Persistent OSPF Attacks.

Paper Link】 【Pages】:

【Authors】: Gabi Nakibly ; Alex Kirshon ; Dima Gonikman ; Dan Boneh

【Abstract】:

【Keywords】:

Session 2: Social Networks and User Behavior I 3

4. You are what you like! Information leakage through users' Interests.

Paper Link】 【Pages】:

【Authors】: Chaabane Abdelberi ; Gergely Ács ; Mohamed Ali Kâafar

【Abstract】:

【Keywords】:

5. X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks.

Paper Link】 【Pages】:

【Authors】: Prateek Mittal ; Matthew Caesar ; Nikita Borisov

【Abstract】:

【Keywords】:

6. Towards Online Spam Filtering in Social Networks.

Paper Link】 【Pages】:

【Authors】: Hongyu Gao ; Yan Chen ; Kathy Lee ; Diana Palsetia ; Alok N. Choudhary

【Abstract】:

【Keywords】:

Session 3: Mobile Networks 4

7. Location leaks over the GSM air interface.

Paper Link】 【Pages】:

【Authors】: Denis Foo Kune ; John Kölndorfer ; Nicholas Hopper ; Yongdae Kim

【Abstract】:

【Keywords】:

8. Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.

Paper Link】 【Pages】:

【Authors】: Laurent Bindschaedler ; Murtuza Jadliwala ; Igor Bilogrevic ; Imad Aad ; Philip Ginzboorg ; Valtteri Niemi ; Jean-Pierre Hubaux

【Abstract】:

【Keywords】:

9. You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks.

Paper Link】 【Pages】:

【Authors】: Zhiyun Qian ; Zhaoguang Wang ; Qiang Xu ; Zhuoqing Morley Mao ; Ming Zhang ; Yi-Min Wang

【Abstract】:

【Keywords】:

10. Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications.

Paper Link】 【Pages】:

【Authors】: Nico Golde ; Kevin Redon ; Ravishankar Borgaonkar

【Abstract】:

【Keywords】:

Session 4: Clouds/Crypto 4

Paper Link】 【Pages】:

【Authors】: Yanbin Lu

【Abstract】:

【Keywords】:

12. Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds.

Paper Link】 【Pages】:

【Authors】: Yangyi Chen ; Bo Peng ; XiaoFeng Wang ; Haixu Tang

【Abstract】:

【Keywords】:

13. Making argument systems for outsourced computation practical (sometimes).

Paper Link】 【Pages】:

【Authors】: Srinath T. V. Setty ; Richard McPherson ; Andrew J. Blumberg ; Michael Walfish

【Abstract】:

【Keywords】:

14. Towards Practical Oblivious RAM.

Paper Link】 【Pages】:

【Authors】: Emil Stefanov ; Elaine Shi ; Dawn Xiaodong Song

【Abstract】:

【Keywords】:

Session 5: Posters 8

15. Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation.

Paper Link】 【Pages】:

【Authors】: Lok-Kwong Yan ; Manjukumar Jayachandra ; Mu Zhang ; Heng Yin

【Abstract】:

【Keywords】:

16. FreeMarket: Shopping for free in Android applications.

Paper Link】 【Pages】:

【Authors】: Daniel Reynaud ; Dawn Xiaodong Song ; Thomas R. Magrino ; Edward XueJun Wu ; Eui Chul Richard Shin

【Abstract】:

【Keywords】:

17. Distance Hijacking Attacks on Distance Bounding Protocols.

Paper Link】 【Pages】:

【Authors】: Cas J. F. Cremers ; Kasper Bonne Rasmussen ; Srdjan Capkun

【Abstract】:

【Keywords】:

18. Throttling Tor Bandwidth Parasites.

Paper Link】 【Pages】:

【Authors】: Rob Jansen ; Nicholas Hopper ; Paul F. Syverson

【Abstract】:

【Keywords】:

19. Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.

Paper Link】 【Pages】:

【Authors】: Max Schuchard ; Christopher Thompson ; Nicholas Hopper ; Yongdae Kim

【Abstract】:

【Keywords】:

20. Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems.

Paper Link】 【Pages】:

【Authors】: Jeff Seibert ; Sheila Becker ; Cristina Nita-Rotaru ; Radu State

【Abstract】:

【Keywords】:

21. Charm: A Framework for Rapidly Prototyping Cryptosystems.

Paper Link】 【Pages】:

【Authors】: Joseph A. Akinyele ; Matthew Green ; Aviel D. Rubin

【Abstract】:

【Keywords】:

22. Abuse Detection and Prevention Systems at a Large Scale Video Sharing Website.

Paper Link】 【Pages】:

【Authors】: Yu-To Chen ; Pierre Grinspan ; Blake Livingston ; Palash Nandy ; Brian Palmer

【Abstract】:

【Keywords】:

Session 6: Applied Crypto 4

23. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation.

Paper Link】 【Pages】:

【Authors】: Mohammad Saiful Islam ; Mehmet Kuzu ; Murat Kantarcioglu

【Abstract】:

【Keywords】:

24. On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability.

Paper Link】 【Pages】:

【Authors】: Qiang Yan ; Jin Han ; Yingjiu Li ; Robert H. Deng

【Abstract】:

【Keywords】:

25. Adaptive Password-Strength Meters from Markov Models.

Paper Link】 【Pages】:

【Authors】: Claude Castelluccia ; Markus Dürmuth ; Daniele Perito

【Abstract】:

【Keywords】:

26. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?

Paper Link】 【Pages】:

【Authors】: Yan Huang ; David Evans ; Jonathan Katz

【Abstract】:

【Keywords】:

Session 7: Smartphones 5

27. Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications.

Paper Link】 【Pages】:

【Authors】: Sebastian Schrittwieser ; Peter Frühwirt ; Peter Kieseberg ; Manuel Leithner ; Martin Mulazzani ; Markus Huber ; Edgar R. Weippl

【Abstract】:

【Keywords】:

28. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones.

Paper Link】 【Pages】:

【Authors】: Lucas Davi ; Alexandra Dmitrienko ; Manuel Egele ; Thomas Fischer ; Thorsten Holz ; Ralf Hund ; Stefan Nürnberger ; Ahmad-Reza Sadeghi

【Abstract】:

【Keywords】:

29. Towards Taming Privilege-Escalation Attacks on Android.

Paper Link】 【Pages】:

【Authors】: Sven Bugiel ; Lucas Davi ; Alexandra Dmitrienko ; Thomas Fischer ; Ahmad-Reza Sadeghi ; Bhargava Shastry

【Abstract】:

【Keywords】:

30. Systematic Detection of Capability Leaks in Stock Android Smartphones.

Paper Link】 【Pages】:

【Authors】: Michael C. Grace ; Yajin Zhou ; Zhi Wang ; Xuxian Jiang

【Abstract】:

【Keywords】:

31. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.

Paper Link】 【Pages】:

【Authors】: Yajin Zhou ; Zhi Wang ; Wu Zhou ; Xuxian Jiang

【Abstract】:

【Keywords】:

Session 8: Social Networks and User Behavior II 3

32. Insights into User Behavior in Dealing with Internet Attacks.

Paper Link】 【Pages】:

【Authors】: Kaan Onarlioglu ; Utku Ozan Yilmaz ; Engin Kirda ; Davide Balzarotti

【Abstract】:

【Keywords】:

33. PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks.

Paper Link】 【Pages】:

【Authors】: Yinzhi Cao ; Vinod Yegneswaran ; Phillip A. Porras ; Yan Chen

【Abstract】:

【Keywords】:

34. The Latent Community Model for Detecting Sybils in Social Networks.

Paper Link】 【Pages】:

【Authors】: Zhuhua Cai ; Chris Jermaine

【Abstract】:

【Keywords】:

Session 9: Privacy and Anonymity 3

35. BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.

Paper Link】 【Pages】:

【Authors】: Man Ho Au ; Apu Kapadia ; Willy Susilo

【Abstract】:

【Keywords】:

36. Accountable Wiretapping -or- I know they can hear you now.

Paper Link】 【Pages】:

【Authors】: Adam M. Bates ; Kevin R. B. Butler ; Micah Sherr ; Clay Shields ; Patrick Traynor ; Dan S. Wallach

【Abstract】:

【Keywords】:

37. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation.

Paper Link】 【Pages】:

【Authors】: Rob Jansen ; Nicholas Hopper

【Abstract】:

【Keywords】:

Session 10 4

38. Discovering Semantic Data of Interest from Un-mappable Memory with Confidence.

Paper Link】 【Pages】:

【Authors】: Zhiqiang Lin ; Junghwan Rhee ; Chao Wu ; Xiangyu Zhang ; Dongyan Xu

【Abstract】:

【Keywords】:

39. SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.

Paper Link】 【Pages】:

【Authors】: Kun Sun ; Jiang Wang ; Fengwei Zhang ; Angelos Stavrou

【Abstract】:

【Keywords】:

40. SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.

Paper Link】 【Pages】:

【Authors】: Karim Eldefrawy ; Gene Tsudik ; Aurélien Francillon ; Daniele Perito

【Abstract】:

【Keywords】:

41. Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.

Paper Link】 【Pages】:

【Authors】: Donghai Tian ; Qiang Zeng ; Dinghao Wu ; Peng Liu ; Changzhen Hu

【Abstract】:

【Keywords】:

Session 11: Web 4

42. WarningBird: Detecting Suspicious URLs in Twitter Stream.

Paper Link】 【Pages】:

【Authors】: Sangho Lee ; Jong Kim

【Abstract】:

【Keywords】:

43. Using replicated execution for a more secure and reliable web browser.

Paper Link】 【Pages】:

【Authors】: Hui Xue ; Nathan Dautenhahn ; Samuel T. King

【Abstract】:

【Keywords】:

44. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications.

Paper Link】 【Pages】:

【Authors】: Ting-Fang Yen ; Yinglian Xie ; Fang Yu ; Roger Peng Yu ; Martín Abadi

【Abstract】:

【Keywords】:

45. Chrome Extensions: Threat Analysis and Countermeasures.

Paper Link】 【Pages】:

【Authors】: Lei Liu ; Xinwen Zhang ; Guanhua Yan ; Songqing Chen

【Abstract】:

【Keywords】:

Session 12: Networking II 4

46. Ghost Domain Names: Revoked Yet Still Resolvable.

Paper Link】 【Pages】:

【Authors】: Jian Jiang ; Jinjin Liang ; Kang Li ; Jun Li ; Hai-Xin Duan ; Jianping Wu

【Abstract】:

【Keywords】:

47. ShortMAC: Efficient Data-Plane Fault Localization.

Paper Link】 【Pages】:

【Authors】: Xin Zhang ; Zongwei Zhou ; Hsu-Chun Hsiao ; Tiffany Hyun-Jin Kim ; Adrian Perrig ; Patrick Tague

【Abstract】:

【Keywords】:

48. Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems.

Paper Link】 【Pages】:

【Authors】: Jignesh Patel ; Alex X. Liu ; Eric Torng

【Abstract】:

【Keywords】:

49. The Case for Prefetching and Prevalidating TLS Server Certificates.

Paper Link】 【Pages】:

【Authors】: Emily Stark ; Lin-Shung Huang ; Dinesh Israni ; Collin Jackson ; Dan Boneh

【Abstract】:

【Keywords】:

Session 13: Distributed Systems 2

50. Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems.

Paper Link】 【Pages】:

【Authors】: Hyojeong Lee ; Jeff Seibert ; Charles Edwin Killian ; Cristina Nita-Rotaru

【Abstract】:

【Keywords】:

51. Automated Synthesis of Secure Distributed Applications.

Paper Link】 【Pages】:

【Authors】: Michael Backes ; Matteo Maffei ; Kim Pecina

【Abstract】:

【Keywords】:

Session 14: Software 3

52. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware.

Paper Link】 【Pages】:

【Authors】: Kangkook Jee ; Georgios Portokalidis ; Vasileios P. Kemerlis ; Soumyadeep Ghosh ; David I. August ; Angelos D. Keromytis

【Abstract】:

【Keywords】:

53. Static detection of C++ vtable escape vulnerabilities in binary code.

Paper Link】 【Pages】:

【Authors】: David Dewey ; Jonathon T. Giffin

【Abstract】:

【Keywords】:

54. Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis.

Paper Link】 【Pages】:

【Authors】: Mingwei Zhang ; Aravind Prakash ; Xiaolei Li ; Zhenkai Liang ; Heng Yin

【Abstract】:

【Keywords】: