NDSS Symposium 2006 Accepted Papers

A Crawler-based Study of Spyware in the Web

Steven D. Gribble , Alex Moshchuk, Tanya Bragin and Henry Levy

Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities

Yi-Min Wang , Doug Beck, Xuxian Jiang, Chad Verbowski, Shuo Chen and Sam King

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks

William Robertson, Giovanni Vigna, Christopher Kruegel and Richard Kemmerer

Isolating Intrusions by Automatic Experiments

Stephan Neuhaus and Andreas Zeller

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software

David Brumley, Dawn Song, Jad Chamcham and Xeno Kovah

Software Self-Healing Using Collaborative Application

Stelios Sidiroglou, Michael Locasto and A. Keromytis

Inoculating SSH Against Address Harvesting

Stuart Schechter, Jaeyeon Jung, Will Stockwell and Cynthia McLain

Enterprise Security: A Community of Interest Based Approach

P. McDaniel, Shubho Sen, O. Spatscheck and Bill Aiello

Protocol-Independent Adaptive Replay of Application Dialog

Weidong Cui, Vern Paxson, Nicholas Weaver and Randy Katz

Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles

Keith Frikken, Jiangtao Li and Mikhail Atallah

Deploying a New Hash Algorithm

Steven Bellovin and Eric Rescorla

Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage

Kevin Fu, Seny Kamaram and Yoshi Kohno

Induced Churn as Shelter from Routing-Table Poisoning

Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein and Petros Maniatis

Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach

Ryan Gerdes, Thomas Daniels, Mani Mina and Steve Russell

Modeling Botnet Propagation Using Time Zones

D. Dagon, Cliff Zou and Wenke Lee

Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm

Doug Szadja, Michael Pohl, Jason Owen and Barry Lawson

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications

Umesh Shankar, Trent Jaeger and Reiner Sailer