NDSS

Conference Proceedings

Multicast Authentication

DoS Protection for Reliably Authenticated Broadcast

Carl Gunter, Sanjeev Khanna, Kaijun Tan, Santosh Venkatesh

Distillation Codes and Applications to DoS Resistant Multicast Authentication

Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perrig, and J.D. Tygar

Intrusion Detection

Efficient Context-Sensitive Intrusion Detection

Jonathon T. Giffin, Somesh Jha, and Barton P. Miller

Global Intrusion Detection in the DOMINO Overlay System

Vinod Yegneswaran, Paul Barford and Somesh Jha

Building Attack Scenarios through Integration of Complementary Alert Correlation Method

Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant

New Directions

Client-Side Defense Against Web-Based Identity Theft

Neil Chou, Robert Ledesma, Yuka Teraguchi, and John C. Mitchell

Using Directional Antennas to Prevent Wormhole Attacks

Lingxuan Hu and David Evans

An Effective Architecture and Algorithm for Detecting Worms with Various Scan

Jiang Wu, Sarma Vangala, Lixin Gao and Kevin Kwiat

Secure Software

A Practical Dynamic Buffer Overflow Detector

Olatunji Ruwase and Monica S. Lam

Model Checking One Million Lines of C Code

Hao Chen, Drew Dean and David Wagner

Ostia: A Delegating Architecture for Secure System Call Interposition

Tal Garfinkel, Ben Pfaff, Mendel Rosenblum

Database and Audit Log Protection

Authentication and Integrity in Outsourced Databases

Einar Mykletun, Maithili Narasimha, and Gene Tsudik

Building an Encrypted and Searchable Audit Log

Brent R. Waters, Dirk Balfanz, Glenn Durfee, D. K. Smetters

Protocols

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography

Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura, and Hans Eberle

The Design and Implementation of Datagram TLS

Nagendra Modadugu and Eric Rescorla

The Perils of Unauthenticated Encryption: Kerberos Version 4

Tom Yu, Sam Hartman and Kenneth Raeburn