![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
NDSS 2008: San Diego, California, USA
Session 1: Large Scale Systems
- Ji Sun Shin, Virgil D. Gligor:
A New Privacy-Enhanced Matchmaking Protocol. - David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee:
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. - Robin Snader, Nikita Borisov:
A Tune-up for Tor: Improving Security and Performance in the Tor Network.
Session 2: Collaborative Systems
- Apu Kapadia, Nikos Triandopoulos:
Halo: High-Assurance Locate for Distributed Hash Tables. - Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong:
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. - Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel:
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Session 3: Privacy
- Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Donald F. Towsley:
Analyzing Privacy in Enterprise Packet Trace Anonymization. - Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter:
Taming the Devil: Techniques for Evaluating Anonymized Network Data. - Peter Williams, Radu Sion:
Usable PIR.
Session 4: Software Hardening
- Patrice Godefroid, Michael Y. Levin, David A. Molnar:
Automated Whitebox Fuzz Testing. - Juan Caballero, Theocharis Kampouris, Dawn Song, Jia Wang:
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? - XiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi:
PRECIP: Towards Practical and Retrofittable Confidential Information Protection.
Session 5: Reverse Engineering
- Gilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda:
Automatic Network Protocol Analysis. - Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang:
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. - Heng Yin, Zhenkai Liang, Dawn Song:
HookFinder: Identifying and Understanding Malware Hooking Behaviors.
Session 6: Intrusion Prevention
- Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling:
Measuring and Detecting Fast-Flux Service Networks. - Guofei Gu, Junjie Zhang, Wenke Lee:
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. - Shobha Venkataraman, Avrim Blum, Dawn Song:
Limits of Learning-based Signature Generation with Adversaries.
Session 7: Malware
- Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee:
Impeding Malware Analysis Using Conditional Code Obfuscation. - John Bethencourt, Dawn Song, Brent Waters:
Analysis-Resistant Malware. - Radmilo Racic, Denys Ma, Hao Chen, Xin Liu:
Exploiting Opportunistic Scheduling in Cellular Data Networks.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.