


default search action
NDSS 2013: San Diego, California, USA
- 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013. The Internet Society 2013
Opening Remarks
- Thomas Hutton:
General Chair's Message. - Peng Ning:
Program Chair's Message.
Keynote
- Richard A. Kemmerer:
20 Years of Network and Distributed Systems Security: The Good, the Bad, and the Ugly.
Session 1: Authentication
- Chee Meng Tey, Payas Gupta, Debin Gao:
I can be You: Questioning the use of Keystroke Dynamics as Biometrics. - Aldo Cassola, William K. Robertson, Engin Kirda, Guevara Noubir:
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
Session 2: Mobile Security
- Lingjun Li, Xinxin Zhao, Guoliang Xue:
Unobservable Re-authentication for Smartphones. - Robert Templeman, Zahid Rahman, David J. Crandall, Apu Kapadia:
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones. - Yajin Zhou, Xuxian Jiang:
Detecting Passive Content Leaks and Pollution in Android Applications. - Stephen Smalley, Robert Craig:
Security Enhanced (SE) Android: Bringing Flexible MAC to Android. - Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee:
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers.
Session 3: Systems and Software Security
- Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu:
High Accuracy Attack Provenance via Binary-based Execution Partition. - Anil Kurmus, Reinhard Tartler, Daniela Dorneanu, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Wolfgang Schröder-Preikschat, Daniel Lohmann, Rüdiger Kapitza:
Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring. - Chiachih Wu, Zhi Wang, Xuxian Jiang:
Taming Hosted Hypervisors with (Mostly) Deprivileged Execution. - Ang Cui, Michael Costello, Salvatore J. Stolfo:
When Firmware Modifications Attack: A Case Study of Embedded Exploitation. - Moheeb Abu Rajab, Lucas Ballard, Noe Lutz, Panayiotis Mavrommatis, Niels Provos:
CAMP: Content-Agnostic Malware Protection.
Session 4: Web Security
- Luyi Xing, Yangyi Chen, XiaoFeng Wang, Shuo Chen:
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations. - Michael Backes, Goran Doychev, Boris Köpf:
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. - Jialong Zhang, Guofei Gu:
NEIGHBORWATCHER: A Content-Agnostic Comment Spam Inference System. - Guangdong Bai, Jike Lei, Guozhu Meng, Sai Sathyanarayan Venkatraman, Prateek Saxena, Jun Sun, Yang Liu, Jin Song Dong:
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations. - Sooel Son, Vitaly Shmatikov:
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
Keynote
- Stephen Smalley:
Laying a Secure Foundation for Mobile Devices.
Session 5: Social Networks and Application Security
- Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. 1-18 - Prateek Mittal, Charalampos Papamanthou, Dawn Xiaodong Song:
Preserving Link Privacy in Social Network Based Systems. - Manuel Egele, Gianluca Stringhini, Christopher Krügel, Giovanni Vigna:
COMPA: Detecting Compromised Accounts on Social Networks.
Session 6: Mobile and Wireless Security and Privacy
- Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang, Miriam J. Metzger, Haitao Zheng, Ben Y. Zhao:
Social Turing Tests: Crowdsourcing Sybil Detection. - Jin Han, Qiang Yan, Debin Gao, Jianying Zhou, Robert H. Deng:
Comparing Mobile Privacy Protection through Cross-Platform Applications. - Adam Skillen, Mohammad Mannan:
On Implementing Deniable Storage Encryption for Mobile Devices. - Kevin Zhijie Chen, Noah M. Johnson, Vijay D'Silva, Shuaifu Dai, Kyle MacNamara, Thomas R. Magrino, Edward XueJun Wu, Martin C. Rinard, Dawn Xiaodong Song:
Contextual Policy Enforcement in Android Applications with Permission Event Graphs. - Giuseppe Ateniese, Giuseppe Bianchi, Angelo Capossele, Chiara Petrioli:
Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?
Session 7: Network Security I
- Tobias Lauinger, Martin Szydlowski, Kaan Onarlioglu, Gilbert Wondracek, Engin Kirda, Christopher Krügel:
Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting. - Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong, Guofei Gu, Mabry Tyson:
FRESCO: Modular Composable Security Services for Software-Defined Networks. - Junjie Zhang, Yinglian Xie, Fang Yu, David Soukal, Wenke Lee:
Intention and Origination: An Inside Look at Large-Scale Bot Queries. - David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Juice: A Longitudinal Study of an SEO Botnet. - Amir Houmansadr, Thomas J. Riedl, Nikita Borisov, Andrew C. Singer:
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
Session 8: Short Talks
- Cong Wang, Zhen Xu, Kui Ren, Janet Meiling Wang:
OIRS: Outsourced Image Recovery Service From Comprehensive Sensing With Privacy Assurance. - Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Kui Ren, Nan Zhang, Xinwen Fu:
How Privacy Leaks From Bluetooth Mouse? - Ralf Hund, Carsten Willems, Thorsten Holz:
Practical Timing Side Channel Attacks Against Kernel Space ASLR. - Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller:
Updates from the Internet Backbone: An RPKI/RTR Router Implementation, Measurements, and Analysis. - Mohammad Ashiqur Rahman, Ehab Al-Shaer:
Metrics for Automated Network Security Design. - Florian Kerschbaum, Thomas Schneider, Axel Schröpfer:
Automatic Protocol Selection in Secure Two-Party Computations. - Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba
, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell:
Assessing software integrity of virtual appliances through software whitelists. - Erman Ayday, Jean Louis Raisaro, Jean-Pierre Hubaux:
Privacy-Enhancing Technologies for Medical Tests Using Genomic Data. - Emil Stefanov, Elaine Shi:
ObliviStore: High Performance Oblivious Distributed Cloud Data Store. - David Irakiza, Md. Enamul Karim, Vir V. Phoha:
A Non-interactive Dual-channel Authentication Protocol for Assuring Pseudo-confidentiality. - Vaibhav Garg, L. Jean Camp:
Macroeconomic Analysis of Malware. - Mu Zhang, Heng Yin:
TransBlocker: Transforming and Taming Privacy-Breaching Android Applications.
Keynote
- Joe Sullivan:
You Can't Do Today's Security With Yesterday's Methods.
Session 9: Privacy and Anonymity
- Ryan Henry, Yizhou Huang, Ian Goldberg:
One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries. - Qiyan Wang, Zi Lin, Nikita Borisov, Nicholas Hopper:
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation. - Chris Wacek, Henry Tan, Kevin S. Bauer, Micah Sherr:
An Empirical Evaluation of Relay Selection in Tor.
Session 10: Anonymity, Authentication and Attacks
- Rob Jansen, Aaron Johnson, Paul F. Syverson:
LIRA: Lightweight Incentivized Routing for Anonymity. - Jing Tian, Chengzhang Qu, Wenyuan Xu, Song Wang:
KinWrite: Handwriting-Based Authentication Using Kinect. - Davide Zanetti, Srdjan Capkun, Ari Juels:
Tailing RFID Tags for Clone Detection. - Tibor Jager, Kenneth G. Paterson, Juraj Somorovsky:
One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography. - Hassan Jameel Asghar, Shujun Li, Ron Steinfeld, Josef Pieprzyk:
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
Session 11: Distributed Systems Security
- Robert A. Cochran, Michael K. Reiter:
Toward Online Verification of Client Behavior in Distributed Applications. - Andrew M. White, Srinivas Krishnan, Michael D. Bailey, Fabian Monrose, Phillip A. Porras:
Clear and Present Data: Opaque Traffic and its Security Implications for the Future. - Raghav Bhaskar, Saikat Guha, Srivatsan Laxman, Prasad Naldurg:
Verito: A Practical System for Transparency and Accountability in Virtual Economies. - Mehrdad Aliasgari, Marina Blanton
, Yihua Zhang, Aaron Steele:
Secure Computation on Floating Point Numbers. - Ory Samorodnitzky, Eran Tromer, Avishai Wool:
Analyzing Unique-Bid Auction Sites for Fun and Profit.
Session 12: Network Security II
- Sooel Son, Kathryn S. McKinley, Vitaly Shmatikov:
Fix Me Up: Repairing Access-Control Bugs in Web Applications. - Shobha Venkataraman, David Brumley, Subhabrata Sen, Oliver Spatscheck:
Automatically Inferring the Evolution of Malicious Activity on the Internet. - Nedim Srndic, Pavel Laskov:
Detection of Malicious PDF Files Based on Hierarchical Document Structure. - Davide Canali, Davide Balzarotti:
Behind the Scenes of Online Attacks: an Analysis of Exploitation Behaviors on the Web.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.