NDSS Symposium 2003 Accepted Papers

Fighting Spam by Encapsulating Policy in Email Addresses

John Ioannidis

Moderately Hard, Memory-Bound Functions

Martin Abadi, Michael Burrows and Ted Wobber

Secure IP Telephony using Multi-layered Protection

Brennen Reynolds and Dipak Ghosal

Efficient Security Mechanisms for Routing Protocols

Yih-Chun Hu, A. Perrig and David Johnson

Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing

Geoffrey Goodell, Bill Aiello, Timothy Griffin, John Ioannidis, P. McDaniel and A. Rubin

Integrating Security, Mobility and Multi-Homing in a HIP Way

Pekka Nikander, Yukka Yiltalo and Jorma Wall

Access Control Based on Execution History

Martin Abadi and Cedric Fournet

Testing C Programs for Buffer Overflow Vulnerabilities

Eric Haugh and Matthew Bishop

SiRiUS: Securing Remote Untrusted Storage

Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu and Dan Boneh

A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention

John Wilander and Martin Kamkar

Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools

Tal Garfinkel

Detecting Service Violations and DoS Attacks

Ashan Habib, Mohamed Hefeeda and Bharat Bhargava

A Virtual Machine Introspection Based Architecture for Intrusion Detection

Tal Garfinkel and Mendel Rosenblum

Proxy Cryptography Revisited

Anca Ivan and Yevgeniy Dodis

Proactive Two-Party Signatures for User Authentication

Antonio Nicolosi, Maxwell Krohn, Yevgeniy Dodis and David Mazieres

Efficient Multicast Packet Authentication

Alain Pannetrat and Refik Molva

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

Dongang Liu and Peng Ning