NDSS Symposium 2005 Program

Cryptography in Network Security

Space-Efficient Block Storage Integrity

Alina Oprea, Carnegie Mellon University; Mike Reiter, Carnegie Mellon University; Ke Yang, Google

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage

Giuseppe Ateniese, Johns Hopkins University; Kevin Fu, MIT; Matthew Green, Johns Hopkins University; Susan Hohenberger, MIT

Rekeying and Storage Cost for Multiple User Revocation

Sandeep S. Kulkarni, Michigan State University; Bezawada Bruhadeshwar, Michigan State University

Denial of Service Attacks

On a New Class of Pulsing Denial-of-Service Attacks and the Defense

Xiapu Luo, Hong Kong Polytechnic University; Rocky K. C. Chang, Hong Kong Polytechnic University

MOVE: An End-to-End Solution to Network Denial of Service

Angelos Stavrou, Columbia University; Angelos D. Keromytis, Columbia University; Jason Nieh, Columbia University; Vishal Misra, Columbia University; Dan Rubenstein, Columbia University

Security Analysis and Improvements for IEEE 802.11i

Changhua He, Stanford University; John C. Mitchell, Stanford University

Peer-to-Peer Approaches

Privacy-Preserving Friends Troubleshooting Network

Qiang Huang, Princeton University; Helen J. Wang, Microsoft Research; Nikita Borisov, University of California, Berkeley

Pretty Secure BGP, psBGP

Tao Wan, Carleton University; Evangelos Kranakis, Carleton University; P.C. van Oorschot, Carleton University

Internet Defense

New Streaming Algorithms for Fast Detection of Superspreaders

Shobha Venkataraman, Carnegie Mellon University; Dawn Song, Carnegie Mellon University; Phillip B. Gibbons, Intel Research; Avrim Blum, Carnegie Mellon University

The Internet Motion Sensor – A Distributed Blackhole Monitoring System

Michael Bailey, University of Michigan; Evan Cooke, University of Michigan; Farnam Jahanian, University of Michigan; Jose Nazario, Arbor Networks; David Watson, University of Michigan

DNS-based Detection of Scanning Worms in an Enterprise Network

David Whyte, Carleton University; Evangelos Kranakis, Carleton University; P.C. van Oorschot, Carleton University

Intrusion Detection

DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks

Alexey Smirnov, Stony Brook University; Tzi-cker Chiueh, Stony Brook University

Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software

James Newsome, Carnegie Mellon University; Dawn Song, Carnegie Mellon University

Enriching Intrusion Alerts Through Multi-Host Causality

Samuel T. King, University of Michigan; Z. Morley Mao, University of Michigan; Dominic G. Lucchetti, University of Michigan; Peter M. Chen, University of Michigan

Platform Security

A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities

Shuo Chen, University of Illinois, Urbana-Champaign; John Dunagan, Microsoft Research; Chad Verbowski, Microsoft Research; Yi-Min Wang, Microsoft Research

One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments

Weiqing Sun, Stony Brook University; Zhenkai Liang, Stony Brook University; V.N. Venkatakrishnan, Stony Brook University; R. Sekar, Stony Brook University