NDSS Symposium 2008 Program

Session 1: Large Scale Systems

A New Privacy-Enhanced Matchmaking Protocol

Author: J. Shin, V. Gligor

Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority

Author: D. Dagon, N. Provos,; C. Lee, W. Lee

A Tune-up for Tor: Improving Security and Performance in the Tor Network

Author: R. Snader, N. Borisov

Session 2: Collaborative Systems

Halo: High Assurance Locate for Distributed Hash Tables

Author: A. Kapadia, N. Triandopoulos

Robust Receipt-Free Election System with Ballot Secrecy and Verifiability

Author: S.S.M. Chow, J. Liu, D. Wong

Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems

Author: P. Traynor, K. Butler, W. Enck, P. McDaniel

Session 3: Privacy

Analyzing Privacy in Enterprise Packet Trace Anonymization

Author: B. Ribeiro, W. Chen, ;G. Miklau, D. Towsley

Taming the Devil: Techniques for Evaluating Anonymized Network Data

Author: S. Coull, C. Wright, A. Keromytis, F. Monrose, ;M. Reiter

Usable PIR

Author: P. Williams, R. Sion

Session 4: Software Hardening

Automated Whitebox Fuzz Testing

Author: P. Godefroid, M. Levin, D. Molnar

Would Diversity Really Increase the Robustness of the Routing Infrastructure Against Software Defects?

Author: J. Caballero, T. Kampouris, D. Song, J. Wang

PRECIP: Towards Practical and Retrofittable Confidential Information Protection

Author: X. Wang, Z. Li, N. Li, J.Y. Choi

Session 5: Reverse Engineering

Automatic Network Protocol Analysis

Author: G. Wondracek, P. Milani, C. Kruegel, E. Kirda

Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution

Author: Z. Lin, X. Jiang,; D. Xu, X. Zhang

HookFinder: Identifying and Understanding Malware Hooking Behaviors

Author: H. Yin, Z. Liang, D. Song

Session 6: Intrusion Prevention

Measuring and Detecting Fast-Flux Service Networks

Author: T. Holz, C. Gorecki, K. Rieck, F. Freiling

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic

Author: G. Gu, J. Zhang, W. Lee

Limits of Learning-based Signature Generation with Adversaries

Author: S. Venkataraman, A. Blum, D. Song

Session 7: Malware

Impeding Malware Analysis Using Conditional Code Obfuscation

M. Sharif, A. Lanzi, J. Giffin, W. Lee

Analysis-Resistant Malware

Author: J. Bethencourt, D. Song, B. Waters

Exploiting Opportunistic Scheduling in Cellular Data Networks

Author: R. Racic, D. Ma , H. Chen, X. Liu