NDSS Symposium 2007
NDSS 2007 – The Network and Security Conference
The 14th Annual Network & Distributed System Security Symposium
Catamaran Resort Hotel – San Diego, CA – 28th February – 2nd March
Proceedings
Session 1: Threats
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing (PDF: 318KB)
Ying Zhang, Zhuoqing Morley Mao, University of Michigan; Jia Wang, AT&T Labs Research
Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized Network Traces (PDF: 278KB)
Scott Coull, Charles Wright, Fabian Monrose, Johns Hopkins University; Michael Collins, Michael Reiter, Carnegie Mellon University
Fig: Automatic Fingerprint Generation (PDF: 175KB)
Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Song, Carnegie Mellon University
Session 2: Web Security
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis (PDF: 177KB)
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel – Secure Systems Lab Technical University Vienna; Giovanni Vigna – University of California, Santa Barbara
A Quantitative Study of Forum Spamming Using Context-based Analysis(PDF: 370KB)
Yuan Niu, Hao Chen, Francis Hsu, University of California, Davis; Yi-Min Wang, Ming Ma, Microsoft Research
Session 3: More Threats
Phinding Phish: An Evaluation of Anti-Phishing Toolbars (PDF: 1,5MB)
Lorrie Cranor, Serge Egelman, Jason Hong, Yue Zhang, Carnegie Mellon University
Army of Botnets
Ryan Vogt, John Aycock, Michael Jacobson, University of Calgary, Canada (PDF: 217KB)
Shedding Light on the Configuration of Dark Addresses (PDF: 359KB)
Sushant Sinha, Michael Bailey, Farnam Jahanian, University of Michigan
Session 4: Authentication
Consumable Credentials in Linear-Logic-Based Access-Control Systems (PDF: 213KB)
Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter, Carnegie Mellon University
Secret Handshakes with Dynamic and Fuzzy Matching (PDF: 263KB)
Giuseppe Ateniese, Jonathan Kirsch, Johns Hopkins University; Marina Blanton, Purdue University
Attribute-Based Publishing with Hidden Credentials and Hidden Policies(PDF: 438KB)
Apu Kapadia, Patrick Tsang, Sean Smith, Dartmouth College
Session 5: Privacy
File System Design with Assured Delete (PDF: 234KB)
Radia Perlman, Sun Microsystems
Cryptographic Methods for Storing Ballots on a Voting Machine (PDF: 191KB)
John Bethencourt, Carnegie Mellon University; Dan Boneh, Stanford University; Brent Waters, SRI International
On the Practicality of Private Information Retrieval (PDF: 160KB)
Radu Sion, Stony Brook University; Bogdan Carbunar, Motorola Labs
Session 6: Intrusion Detection and Prevention
RICH: Automatically Protecting Against Integer-Based Vulnerabilities (PDF: 155KB)
Author: David Brumley, Dawn Song, Carnegie Mellon University; Tzi-cker Chiueh, Rob Johnson, Stony Brook University; Huijia Lin, Cornell University
Generic Application-Level Protocol Analyzer and its Language (PDF: 387KB)
Nikita Borisov, University of Illinois at Urbana-Champaign; David Brumley, Carnegie Mellon University; Helen Wang, John Dunagan, Microsoft Research; Pallavi Joshi, University of California, Berkeley; Chuanxiong Guo, the Institute of Communications Engineering, Nanjing, China
OPTWALL: A Hierarchical Traffic-Aware Firewall (PDF: 188KB)
Subrata Acharya, Bryan Mills, Mehmud Abliz, Taieb Znati, University of Pittsburgh; Jia Wang, Zihui Ge, Albert Greenberg, AT&T Labs Research