default search action
NDSS 2010: San Diego, California, USA
- Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010. The Internet Society 2010
Session 1: Distributed Systems and Networks
- Darrell Bethea, Robert A. Cochran, Michael K. Reiter:
Server-side Verification of Client Behavior in Online Games. - Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel:
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. - Amir Herzberg, Haya Schulmann:
Stealth DoS Attacks on Secure Channels.
Session 2: Web Security and Privacy
- Adam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman:
Protecting Browsers from Extension Vulnerabilities. - Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas:
Adnostic: Privacy Preserving Targeted Advertising. - Prateek Saxena, Steve Hanna, Pongsin Poosankam, Dawn Song:
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.
Session 3: Intrusion Detection and Attack Analysis
- William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna:
Effective Anomaly Detection with Scarce Training Data. - Colin Whittaker, Brian Ryner, Marria Nazif:
Large-Scale Automatic Classification of Phishing Pages. - Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos:
A Systematic Characterization of IM Threats using Honeypots.
Session 4: Spam
- Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu:
On Network-level Clusters for Spam Detection. - Sushant Sinha, Michael D. Bailey, Farnam Jahanian:
Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation. - Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage:
Botnet Judo: Fighting Spam with Itself.
Session 5: Anonymity and Cryptographic Systems
- Edward J. Schwartz, David Brumley, Jonathan M. McCune:
Contractual Anonymity. - Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze:
A3: An Extensible Platform for Application-Aware Anonymity. - Thomas Ristenpart, Scott Yilek:
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Session 6: Security Protocols and Policies
- Jiwon Seo, Monica S. Lam:
InvisiType: Object-Oriented Security Policies. - Jason Bau, John C. Mitchell:
A Security Evaluation of DNSSEC with NSEC3. - Yudong Gao, Ni Pan, Xu Chen, Zhuoqing Morley Mao:
On the Safety of Enterprise Policy Deployment.
Session 7: Languages and Systems Security
- Suresh Chari, Shai Halevi, Wietse Z. Venema:
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation. - Adrian Mettler, David A. Wagner, Tyler Close:
Joe-E: A Security-Oriented Subset of Java. - Matthew Finifter, Joel Weinberger, Adam Barth:
Preventing Capability Leaks in Secure JavaScript Subsets.
Session 8: Malware
- Juan Caballero, Noah M. Johnson, Stephen McCamant, Dawn Song:
Binary Code Extraction and Interface Identification for Security Applications. - Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Automatic Reverse Engineering of Data Structures from Binary Execution. - Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna:
Efficient Detection of Split Personalities in Malware.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.