Conference Proceedings

Cryptography in Network Security

Space-Efficient Block Storage Integrity

Alina Oprea, Carnegie Mellon University ; Mike Reiter, Carnegie Mellon University ;  Ke Yang, Google

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage

Giuseppe Ateniese, Johns Hopkins University ; Kevin Fu, MIT ; Matthew Green, Johns Hopkins University ;  Susan Hohenberger, MIT

Rekeying and Storage Cost for Multiple User Revocation

Sandeep S. Kulkarni, Michigan State University ; Bezawada Bruhadeshwar, Michigan State University

Denial of Service Attacks

On a New Class of Pulsing Denial-of-Service Attacks and the Defense

Xiapu Luo, Hong Kong Polytechnic University ; Rocky K. C. Chang, Hong Kong Polytechnic University

MOVE:  An End-to-End Solution to Network Denial of Service

Angelos Stavrou, Columbia University ; Angelos D. Keromytis, Columbia University; Jason Nieh, Columbia University; Vishal Misra, Columbia University; Dan Rubenstein, Columbia University

Security Analysis and Improvements for IEEE 802.11i

Changhua He, Stanford University ; John C. Mitchell, Stanford University

Peer-to-Peer Approaches

Privacy-Preserving Friends Troubleshooting Network

Qiang Huang, Princeton University; Helen J. Wang, Microsoft Research; Nikita Borisov, University of California, Berkeley

Pretty Secure BGP, psBGP

Tao Wan, Carleton University ; Evangelos Kranakis, Carleton University ; P.C. van Oorschot, Carleton University

Internet Defense

New Streaming Algorithms for Fast Detection of Superspreaders

Shobha Venkataraman, Carnegie Mellon University ; Dawn Song, Carnegie Mellon University ; Phillip B. Gibbons, Intel Research ; Avrim Blum, Carnegie Mellon University

The Internet Motion Sensor – A Distributed Blackhole Monitoring System

Michael Bailey, University of Michigan ; Evan Cooke, University of Michigan ; Farnam Jahanian, University of Michigan ; Jose Nazario, Arbor Networks ; David Watson, University of Michigan

DNS-based Detection of Scanning Worms in an Enterprise Network

David Whyte, Carleton University ; Evangelos Kranakis, Carleton University ; P.C. van Oorschot, Carleton University

Intrusion Detection

DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks

Alexey Smirnov, Stony Brook University ; Tzi-cker Chiueh, Stony Brook University

Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software

James Newsome, Carnegie Mellon University ; Dawn Song, Carnegie Mellon University

Enriching Intrusion Alerts Through Multi-Host Causality

Samuel T. King,, University of Michigan ; Z. Morley Mao, University of Michigan ; Dominic G. Lucchetti, University of Michigan ; Peter M. Chen, University of Michigan

Platform Security

A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities

Shuo Chen, University of Illinois, Urbana-Champaign; John Dunagan, Microsoft Research ; Chad Verbowski, Microsoft Research ; Yi-Min Wang, Microsoft Research

One-Way Isolation:  An Effective Approach for Realizing Safe Execution Environments

Weiqing Sun, Stony Brook University ; Zhenkai Liang, Stony Brook University ; V.N. Venkatakrishnan, Stony Brook University ; R. Sekar, Stony Brook University