NDSS 2013:San Diego, California, USA

20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013. The Internet Society 【DBLP Link

Paper Num: 64 || Session Num: 16

Opening Remarks 2

1. General Chair's Message.

Paper Link】 【Pages】:

【Authors】: Thomas Hutton

【Abstract】:

【Keywords】:

2. Program Chair's Message.

Paper Link】 【Pages】:

【Authors】: Peng Ning

【Abstract】:

【Keywords】:

Keynote 1

3. 20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly.

Paper Link】 【Pages】:

【Authors】: Richard A. Kemmerer

【Abstract】:

【Keywords】:

Session 1: Authentication 2

4. I can be You: Questioning the use of Keystroke Dynamics as Biometrics.

Paper Link】 【Pages】:

【Authors】: Chee Meng Tey ; Payas Gupta ; Debin Gao

【Abstract】:

【Keywords】:

5. A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.

Paper Link】 【Pages】:

【Authors】: Aldo Cassola ; William K. Robertson ; Engin Kirda ; Guevara Noubir

【Abstract】:

【Keywords】:

Session 2: Mobile Security 5

6. Unobservable Re-authentication for Smartphones.

Paper Link】 【Pages】:

【Authors】: Lingjun Li ; Xinxin Zhao ; Guoliang Xue

【Abstract】:

【Keywords】:

7. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones.

Paper Link】 【Pages】:

【Authors】: Robert Templeman ; Zahid Rahman ; David J. Crandall ; Apu Kapadia

【Abstract】:

【Keywords】:

8. Detecting Passive Content Leaks and Pollution in Android Applications.

Paper Link】 【Pages】:

【Authors】: Yajin Zhou ; Xuxian Jiang

【Abstract】:

【Keywords】:

9. Security Enhanced (SE) Android: Bringing Flexible MAC to Android.

Paper Link】 【Pages】:

【Authors】: Stephen Smalley ; Robert Craig

【Abstract】:

【Keywords】:

10. The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.

Paper Link】 【Pages】:

【Authors】: Charles Lever ; Manos Antonakakis ; Bradley Reaves ; Patrick Traynor ; Wenke Lee

【Abstract】:

【Keywords】:

Session 3: Systems and Software Security 5

11. High Accuracy Attack Provenance via Binary-based Execution Partition.

Paper Link】 【Pages】:

【Authors】: Kyu Hyung Lee ; Xiangyu Zhang ; Dongyan Xu

【Abstract】:

【Keywords】:

12. Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring.

Paper Link】 【Pages】:

【Authors】: Anil Kurmus ; Reinhard Tartler ; Daniela Dorneanu ; Bernhard Heinloth ; Valentin Rothberg ; Andreas Ruprecht ; Wolfgang Schröder-Preikschat ; Daniel Lohmann ; Rüdiger Kapitza

【Abstract】:

【Keywords】:

13. Taming Hosted Hypervisors with (Mostly) Deprivileged Execution.

Paper Link】 【Pages】:

【Authors】: Chiachih Wu ; Zhi Wang ; Xuxian Jiang

【Abstract】:

【Keywords】:

14. When Firmware Modifications Attack: A Case Study of Embedded Exploitation.

Paper Link】 【Pages】:

【Authors】: Ang Cui ; Michael Costello ; Salvatore J. Stolfo

【Abstract】:

【Keywords】:

15. CAMP: Content-Agnostic Malware Protection.

Paper Link】 【Pages】:

【Authors】: Moheeb Abu Rajab ; Lucas Ballard ; Noe Lutz ; Panayiotis Mavrommatis ; Niels Provos

【Abstract】:

【Keywords】:

Session 4: Web Security 5

16. InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.

Paper Link】 【Pages】:

【Authors】: Luyi Xing ; Yangyi Chen ; XiaoFeng Wang ; Shuo Chen

【Abstract】:

【Keywords】:

17. Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.

Paper Link】 【Pages】:

【Authors】: Michael Backes ; Goran Doychev ; Boris Köpf

【Abstract】:

【Keywords】:

18. NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System.

Paper Link】 【Pages】:

【Authors】: Jialong Zhang ; Guofei Gu

【Abstract】:

【Keywords】:

19. AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.

Paper Link】 【Pages】:

【Authors】: Guangdong Bai ; Jike Lei ; Guozhu Meng ; Sai Sathyanarayan Venkatraman ; Prateek Saxena ; Jun Sun ; Yang Liu ; Jin Song Dong

【Abstract】:

【Keywords】:

20. The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.

Paper Link】 【Pages】:

【Authors】: Sooel Son ; Vitaly Shmatikov

【Abstract】:

【Keywords】:

Keynote 1

21. Laying a Secure Foundation for Mobile Devices.

Paper Link】 【Pages】:

【Authors】: Stephen Smalley

【Abstract】:

【Keywords】:

Session 5: Social Networks and Application Security 3

22. Pisces: Anonymous Communication Using Social Networks.

Paper Link】 【Pages】:

【Authors】: Prateek Mittal ; Matthew K. Wright ; Nikita Borisov

【Abstract】:

【Keywords】:

Paper Link】 【Pages】:

【Authors】: Prateek Mittal ; Charalampos Papamanthou ; Dawn Xiaodong Song

【Abstract】:

【Keywords】:

24. COMPA: Detecting Compromised Accounts on Social Networks.

Paper Link】 【Pages】:

【Authors】: Manuel Egele ; Gianluca Stringhini ; Christopher Krügel ; Giovanni Vigna

【Abstract】:

【Keywords】:

Session 6: Mobile and Wireless Security and Privacy 5

25. Social Turing Tests: Crowdsourcing Sybil Detection.

Paper Link】 【Pages】:

【Authors】: Gang Wang ; Manish Mohanlal ; Christo Wilson ; Xiao Wang ; Miriam J. Metzger ; Haitao Zheng ; Ben Y. Zhao

【Abstract】:

【Keywords】:

26. Comparing Mobile Privacy Protection through Cross-Platform Applications.

Paper Link】 【Pages】:

【Authors】: Jin Han ; Qiang Yan ; Debin Gao ; Jianying Zhou ; Robert H. Deng

【Abstract】:

【Keywords】:

27. On Implementing Deniable Storage Encryption for Mobile Devices.

Paper Link】 【Pages】:

【Authors】: Adam Skillen ; Mohammad Mannan

【Abstract】:

【Keywords】:

28. Contextual Policy Enforcement in Android Applications with Permission Event Graphs.

Paper Link】 【Pages】:

【Authors】: Kevin Zhijie Chen ; Noah M. Johnson ; Vijay D'Silva ; Shuaifu Dai ; Kyle MacNamara ; Thomas R. Magrino ; Edward XueJun Wu ; Martin Rinard ; Dawn Xiaodong Song

【Abstract】:

【Keywords】:

29. Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?

Paper Link】 【Pages】:

【Authors】: Giuseppe Ateniese ; Giuseppe Bianchi ; Angelo Capossele ; Chiara Petrioli

【Abstract】:

【Keywords】:

Session 7: Network Security I 5

30. Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting.

Paper Link】 【Pages】:

【Authors】: Tobias Lauinger ; Martin Szydlowski ; Kaan Onarlioglu ; Gilbert Wondracek ; Engin Kirda ; Christopher Krügel

【Abstract】:

【Keywords】:

31. FRESCO: Modular Composable Security Services for Software-Defined Networks.

Paper Link】 【Pages】:

【Authors】: Seungwon Shin ; Phillip A. Porras ; Vinod Yegneswaran ; Martin W. Fong ; Guofei Gu ; Mabry Tyson

【Abstract】:

【Keywords】:

32. Intention and Origination: An Inside Look at Large-Scale Bot Queries.

Paper Link】 【Pages】:

【Authors】: Junjie Zhang ; Yinglian Xie ; Fang Yu ; David Soukal ; Wenke Lee

【Abstract】:

【Keywords】:

33. Juice: A Longitudinal Study of an SEO Botnet.

Paper Link】 【Pages】:

【Authors】: David Y. Wang ; Stefan Savage ; Geoffrey M. Voelker

【Abstract】:

【Keywords】:

34. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.

Paper Link】 【Pages】:

【Authors】: Amir Houmansadr ; Thomas J. Riedl ; Nikita Borisov ; Andrew C. Singer

【Abstract】:

【Keywords】:

Session 8: Short Talks 12

35. OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance.

Paper Link】 【Pages】:

【Authors】:

【Abstract】:

【Keywords】:

36. How Privacy Leaks From Bluetooth Mouse?

Paper Link】 【Pages】:

【Authors】: Xian Pan ; Zhen Ling ; Aniket Pingley ; Wei Yu ; Kui Ren ; Nan Zhang ; Xinwen Fu

【Abstract】:

【Keywords】:

37. Practical Timing Side Channel Attacks Against Kernel Space ASLR.

Paper Link】 【Pages】:

【Authors】: Ralf Hund ; Carsten Willems ; Thorsten Holz

【Abstract】:

【Keywords】:

38. Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis.

Paper Link】 【Pages】:

【Authors】: Matthias Wählisch ; Fabian Holler ; Thomas C. Schmidt ; Jochen H. Schiller

【Abstract】:

【Keywords】:

39. Metrics for Automated Network Security Design.

Paper Link】 【Pages】:

【Authors】: Mohammad Ashiqur Rahman ; Ehab Al-Shaer

【Abstract】:

【Keywords】:

40. Automatic Protocol Selection in Secure Two-Party Computations.

Paper Link】 【Pages】:

【Authors】: Florian Kerschbaum ; Thomas Schneider ; Axel Schröpfer

【Abstract】:

【Keywords】:

41. Assessing software integrity of virtual appliances through software whitelists.

Paper Link】 【Pages】:

【Authors】: Jun Ho Huh ; Mirko Montanari ; Derek Dagit ; Rakesh Bobba ; Dongwook Kim ; Yoonjoo Choi ; Roy H. Campbell

【Abstract】:

【Keywords】:

42. Privacy-Enhancing Technologies for Medical Tests Using Genomic Data.

Paper Link】 【Pages】:

【Authors】: Erman Ayday ; Jean Louis Raisaro ; Jean-Pierre Hubaux

【Abstract】:

【Keywords】:

43. ObliviStore: High Performance Oblivious Distributed Cloud Data Store.

Paper Link】 【Pages】:

【Authors】: Emil Stefanov ; Elaine Shi

【Abstract】:

【Keywords】:

44. A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality.

Paper Link】 【Pages】:

【Authors】: David Irakiza ; Md E. Karim ; Vir V. Phoha

【Abstract】:

【Keywords】:

45. Macroeconomic Analysis of Malware.

Paper Link】 【Pages】:

【Authors】: Vaibhav Garg ; L. Jean Camp

【Abstract】:

【Keywords】:

46. TransBlocker: Transforming and Taming Privacy-Breaching Android Applications.

Paper Link】 【Pages】:

【Authors】: Mu Zhang ; Heng Yin

【Abstract】:

【Keywords】:

Keynote 1

47. You Can't Do Today's Security With Yesterday's Methods.

Paper Link】 【Pages】:

【Authors】: Joe Sullivan

【Abstract】:

【Keywords】:

Session 9: Privacy and Anonymity 3

48. One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries.

Paper Link】 【Pages】:

【Authors】: Ryan Henry ; Yizhou Huang ; Ian Goldberg

【Abstract】:

【Keywords】:

49. rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.

Paper Link】 【Pages】:

【Authors】: Qiyan Wang ; Zi Lin ; Nikita Borisov ; Nicholas Hopper

【Abstract】:

【Keywords】:

50. An Empirical Evaluation of Relay Selection in Tor.

Paper Link】 【Pages】:

【Authors】: Chris Wacek ; Henry Tan ; Kevin S. Bauer ; Micah Sherr

【Abstract】:

【Keywords】:

Session 10: Anonymity, Authentication and Attacks 5

51. LIRA: Lightweight Incentivized Routing for Anonymity.

Paper Link】 【Pages】:

【Authors】: Rob Jansen ; Aaron Johnson ; Paul F. Syverson

【Abstract】:

【Keywords】:

52. KinWrite: Handwriting-Based Authentication Using Kinect.

Paper Link】 【Pages】:

【Authors】: Jing Tian ; Chengzhang Qu ; Wenyuan Xu ; Song Wang

【Abstract】:

【Keywords】:

53. Tailing RFID Tags for Clone Detection.

Paper Link】 【Pages】:

【Authors】: Davide Zanetti ; Srdjan Capkun ; Ari Juels

【Abstract】:

【Keywords】:

54. One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography.

Paper Link】 【Pages】:

【Authors】: Tibor Jager ; Kenneth G. Paterson ; Juraj Somorovsky

【Abstract】:

【Keywords】:

55. Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.

Paper Link】 【Pages】:

【Authors】: Hassan Jameel Asghar ; Shujun Li ; Ron Steinfeld ; Josef Pieprzyk

【Abstract】:

【Keywords】:

Session 11: Distributed Systems Security 5

56. Toward Online Verification of Client Behavior in Distributed Applications.

Paper Link】 【Pages】:

【Authors】: Robert A. Cochran ; Michael K. Reiter

【Abstract】:

【Keywords】:

57. Clear and Present Data: Opaque Traffic and its Security Implications for the Future.

Paper Link】 【Pages】:

【Authors】: Andrew M. White ; Srinivas Krishnan ; Michael Bailey ; Fabian Monrose ; Phillip A. Porras

【Abstract】:

【Keywords】:

58. Verito: A Practical System for Transparency and Accountability in Virtual Economies.

Paper Link】 【Pages】:

【Authors】: Raghav Bhaskar ; Saikat Guha ; Srivatsan Laxman ; Prasad Naldurg

【Abstract】:

【Keywords】:

59. Secure Computation on Floating Point Numbers.

Paper Link】 【Pages】:

【Authors】: Mehrdad Aliasgari ; Marina Blanton ; Yihua Zhang ; Aaron Steele

【Abstract】:

【Keywords】:

60. Analyzing Unique-Bid Auction Sites for Fun and Profit.

Paper Link】 【Pages】:

【Authors】: Ory Samorodnitzky ; Eran Tromer ; Avishai Wool

【Abstract】:

【Keywords】:

Session 12: Network Security II 4

61. Fix Me Up: Repairing Access-Control Bugs in Web Applications.

Paper Link】 【Pages】:

【Authors】: Sooel Son ; Kathryn S. McKinley ; Vitaly Shmatikov

【Abstract】:

【Keywords】:

62. Automatically Inferring the Evolution of Malicious Activity on the Internet.

Paper Link】 【Pages】:

【Authors】: Shobha Venkataraman ; David Brumley ; Subhabrata Sen ; Oliver Spatscheck

【Abstract】:

【Keywords】:

63. Detection of Malicious PDF Files Based on Hierarchical Document Structure.

Paper Link】 【Pages】:

【Authors】: Nedim Srndic ; Pavel Laskov

【Abstract】:

【Keywords】:

64. Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web.

Paper Link】 【Pages】:

【Authors】: Davide Canali ; Davide Balzarotti

【Abstract】:

【Keywords】: