NDSS Symposium 2005
Conference Proceedings
Cryptography in Network Security
Space-Efficient Block Storage Integrity
Alina Oprea, Carnegie Mellon University ; Mike Reiter, Carnegie Mellon University ; Ke Yang, Google
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
Giuseppe Ateniese, Johns Hopkins University ; Kevin Fu, MIT ; Matthew Green, Johns Hopkins University ; Susan Hohenberger, MIT
Rekeying and Storage Cost for Multiple User Revocation
Sandeep S. Kulkarni, Michigan State University ; Bezawada Bruhadeshwar, Michigan State University
Denial of Service Attacks
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
Xiapu Luo, Hong Kong Polytechnic University ; Rocky K. C. Chang, Hong Kong Polytechnic University
MOVE: An End-to-End Solution to Network Denial of Service
Angelos Stavrou, Columbia University ; Angelos D. Keromytis, Columbia University; Jason Nieh, Columbia University; Vishal Misra, Columbia University; Dan Rubenstein, Columbia University
Security Analysis and Improvements for IEEE 802.11i
Changhua He, Stanford University ; John C. Mitchell, Stanford University
Peer-to-Peer Approaches
Privacy-Preserving Friends Troubleshooting Network
Qiang Huang, Princeton University; Helen J. Wang, Microsoft Research; Nikita Borisov, University of California, Berkeley
Pretty Secure BGP, psBGP
Tao Wan, Carleton University ; Evangelos Kranakis, Carleton University ; P.C. van Oorschot, Carleton University
Internet Defense
New Streaming Algorithms for Fast Detection of Superspreaders
Shobha Venkataraman, Carnegie Mellon University ; Dawn Song, Carnegie Mellon University ; Phillip B. Gibbons, Intel Research ; Avrim Blum, Carnegie Mellon University
The Internet Motion Sensor – A Distributed Blackhole Monitoring System
Michael Bailey, University of Michigan ; Evan Cooke, University of Michigan ; Farnam Jahanian, University of Michigan ; Jose Nazario, Arbor Networks ; David Watson, University of Michigan
DNS-based Detection of Scanning Worms in an Enterprise Network
David Whyte, Carleton University ; Evangelos Kranakis, Carleton University ; P.C. van Oorschot, Carleton University
Intrusion Detection
DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks
Alexey Smirnov, Stony Brook University ; Tzi-cker Chiueh, Stony Brook University
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software
James Newsome, Carnegie Mellon University ; Dawn Song, Carnegie Mellon University
Enriching Intrusion Alerts Through Multi-Host Causality
Samuel T. King,, University of Michigan ; Z. Morley Mao, University of Michigan ; Dominic G. Lucchetti, University of Michigan ; Peter M. Chen, University of Michigan
Platform Security
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities
Shuo Chen, University of Illinois, Urbana-Champaign; John Dunagan, Microsoft Research ; Chad Verbowski, Microsoft Research ; Yi-Min Wang, Microsoft Research
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
Weiqing Sun, Stony Brook University ; Zhenkai Liang, Stony Brook University ; V.N. Venkatakrishnan, Stony Brook University ; R. Sekar, Stony Brook University