


default search action
NDSS 2011: San Diego, California, USA
- Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society 2011

Session 1: Secure Emerging Applications: Social Networks and Smartphones
- Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, XiaoFeng Wang:

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. - Michael Backes, Matteo Maffei, Kim Pecina:

A Security API for Distributed Social Networks. - Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh:

Location Privacy via Private Proximity Testing.
Session 2: Wireless Attacks!
- Aurélien Francillon, Boris Danev, Srdjan Capkun:

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars. - Omid Fatemieh, Ali Farhadi, Ranveer Chandra, Carl A. Gunter:

Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks. - Liang Cai, Kai Zeng, Hao Chen, Prasant Mohapatra:

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Session 3: OS Security
- Xi Xiong, Donghai Tian, Peng Liu:

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. - Abhinav Srivastava, Jonathon T. Giffin:

Efficient Monitoring of Untrusted Kernel-Mode Execution. - Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, Xuxian Jiang:

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.
Session 4: Network Malware
- Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, Eugene Y. Vasserman:

Losing Control of the Internet: Using the Data Plane to Attack the Control Plane. - Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi:

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis.
Session 5: Software Security / Code Analysis
- Asia Slowinska, Traian Stancescu, Herbert Bos:

Howard: A Dynamic Excavator for Reverse Engineering Data Structures. - David Dewey, Patrick Traynor:

No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects. - JongHyup Lee, Thanassis Avgerinos, David Brumley:

TIE: Principled Reverse Engineering of Types in Binary Programs. - Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, Dawn Song:

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. - Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, David Brumley:

AEG: Automatic Exploit Generation.
Session 6: Web Security
- Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda:

Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications. - Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, Clint Sbisa:

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications. - Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci

:
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.
Session 7: Network Security
- Eric Chan-Tin, Nicholas Hopper:

Accurate and Provably Secure Latency Estimation with Treeple. - Scott E. Coull, Fabian Monrose, Michael D. Bailey:

On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses. - Amir Houmansadr, Nikita Borisov:

SWIRL: A Scalable Watermark to Detect Correlated Network Flows.
Session 8: Real-World Security: Cloud Computing, Biometrics, and Humans
- Tobias Distler, Ivan Popov, Wolfgang Schröder-Preikschat, Hans P. Reiser, Rüdiger Kapitza:

SPARE: Replicas on Hold. - Yan Huang, Lior Malka, David Evans, Jonathan Katz:

Efficient Privacy-Preserving Biometric Identification. - Alana Libonati, Jonathan M. McCune, Michael K. Reiter:

Usability Testing a Malware-Resistant Input Mechanism.
Session 9: Privacy
- Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:

Tracker: Security and Privacy for RFID-based Supply Chains. - Manuel Egele, Christopher Kruegel, Engin Kirda, Giovanni Vigna:

PiOS: Detecting Privacy Leaks in iOS Applications. - Elaine Shi, T.-H. Hubert Chan, Eleanor Gilbert Rieffel, Richard Chow, Dawn Song:

Privacy-Preserving Aggregation of Time-Series Data.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














