default search action
NDSS 2008: San Diego, California, USA
Session 1: Large Scale Systems
- Ji Sun Shin, Virgil D. Gligor:
A New Privacy-Enhanced Matchmaking Protocol. - David Dagon, Niels Provos, Christopher P. Lee, Wenke Lee:
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. - Robin Snader, Nikita Borisov:
A Tune-up for Tor: Improving Security and Performance in the Tor Network.
Session 2: Collaborative Systems
- Apu Kapadia, Nikos Triandopoulos:
Halo: High-Assurance Locate for Distributed Hash Tables. - Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong:
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. - Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel:
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Session 3: Privacy
- Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Donald F. Towsley:
Analyzing Privacy in Enterprise Packet Trace Anonymization. - Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter:
Taming the Devil: Techniques for Evaluating Anonymized Network Data. - Peter Williams, Radu Sion:
Usable PIR.
Session 4: Software Hardening
- Patrice Godefroid, Michael Y. Levin, David A. Molnar:
Automated Whitebox Fuzz Testing. - Juan Caballero, Theocharis Kampouris, Dawn Song, Jia Wang:
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? - XiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi:
PRECIP: Towards Practical and Retrofittable Confidential Information Protection.
Session 5: Reverse Engineering
- Gilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda:
Automatic Network Protocol Analysis. - Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang:
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. - Heng Yin, Zhenkai Liang, Dawn Song:
HookFinder: Identifying and Understanding Malware Hooking Behaviors.
Session 6: Intrusion Prevention
- Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling:
Measuring and Detecting Fast-Flux Service Networks. - Guofei Gu, Junjie Zhang, Wenke Lee:
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. - Shobha Venkataraman, Avrim Blum, Dawn Song:
Limits of Learning-based Signature Generation with Adversaries.
Session 7: Malware
- Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee:
Impeding Malware Analysis Using Conditional Code Obfuscation. - John Bethencourt, Dawn Song, Brent Waters:
Analysis-Resistant Malware. - Radmilo Racic, Denys Ma, Hao Chen, Xin Liu:
Exploiting Opportunistic Scheduling in Cellular Data Networks.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.