NDSS Symposium 2007 Accepted Papers

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing

Ying Zhang, Zhuoqing Mao and J. Wang

Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized Network Traces

Scott Coull, C. Wright, Fabian Monrose, Michael Collins and Michael K. Reiter

Fig: Automatic Fingerprint Generation

Juan Caballero, S. Venkataraman, Pongsin Poosankam, Min Gyung Kang and Dawn Song

Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis

Philipp Vogt, Engin Kirda, Christopher Kruegel and Giovanni Vigna

A Quantitative Study of Forum Spamming Using Context-based Analysis

Yuan Niu, Hao Chen, Francis Hsu and Yi-Min Wang

Phinding Phish: An Evaluation of Anti-Phishing Toolbars

Lorrie Cranor, Serge Egelman, Jason Hong and Yue Zhang

Army of Botnets

Ryan Vogt, John Aycock and Michael Jacobson

Shedding Light on the Configuration of Dark Addresses

Sushant Sinha, Michael Bailey and Farnam Jahanian

Consumable Credentials in Linear-Logic-Based Access-Control Systems

Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning and Michael K. Reiter

Secret Handshakes with Dynamic and Fuzzy Matching

Giuseppe Ateniese, Jonathan Kirsch and Marina Blanton

Attribute-Based Publishing with Hidden Credentials and Hidden Policies

Apu Kapadia, Patrick Tsang and Sean Smith

File System Design with Assured Delete

Radia Perlman

Cryptographic Methods for Storing Ballots on a Voting Machine

J. Bethencourt, Dan Boneh and Brent Waters

On the Practicality of Private Information Retrieval

R. Sion and Bogdan Carbunar

RICH: Automatically Protecting Against Integer-Based Vulnerabilities

David Brumley, Dawn Song, Tzi-cker Chiueh, Rob Johnson and Huija Lin

Generic Application-Level Protocol Analyzer and its Language

Nikita Borisov, David Brumley, Helen Wang, John Dunagan, Pallavi Joshi and Chuanxiong Guo

OPTWALL: A Hierarchical Traffic-Aware Firewall

Subrata Acharya, Bryan Mills, Mehmud Abliz, Taieb Znati, J. Wang, Zihui Ge and Albert Greenberg