Network security technologies must respond to ever more complex issues and malicious behaviors. The purpose of NDSS is to bring the global Internet community together to learn about and discuss cutting-edge advances in the science and application of network and distributed systems security. The three day program features refereed paper presentations, punctuated by selected invited talks on security as it is applied in the field.

Leaders in Cyber Security

NDSS brings together innovative and forward-thinking members of the Internet community – including leading-edge security researchers and implementers, globally-recognized security technology experts, and experienced professionals from both the private and public sectors – who design, develop, exploit and deploy the new and emerging technologies that define network and distributed system security.

Who Attends

  • University Researchers and Educators
  • Chief Technology and Privacy Officers
  • Security Analysts and System Administrators
  • Operations and Security Managers

Attendance is limited to foster maximum exchange of information and ideas.

The NDSS Difference

At NDSS ’10, you will have the opportunity to benefit from:

  • Presentations of solution-oriented scientific and technical papers presented by leaders in the field
  • Expert panels debating new and practical approaches to security problems
  • Extended question and answer sessions following all sessions
  • Informal discussions with colleagues over the three-day period

If you have questions regarding particular security challenges, bring them with you

Registration Information

Registration includes admission to all NDSS sessions, Proceedings book and CD, and scheduled meals and refreshment breaks.  Register by 29 January 2010 and save!

Call for Papers

Papers are now being solicited on a wide range of network and distributed system security topics. The deadline for abstract submissions is 11 September 2009. For details, go to Call for Papers.

We are pleased and honored to once again be sponsored by the Internet Society (ISOC) in 2010.


Session 1: Distributed Systems and Networks

Server-side Verification of Client Behavior in Online Games

Paper (PDF: 289KB)
Authors: Darrell Bethea, Robert Cochran and Michael Reiter

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs

Paper (PDF: 942KB)
Authors: Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel

Stealth DoS Attacks on Secure Channels

Paper (PDF: 690KB)
Authors: Amir Herzberg and Haya Shulman

Session 2: Web Security and Privacy

Protecting Browsers from Extension Vulnerabilities

Paper (PDF: 439KB)
Authors: Adam Barth, Adrienne Porter Felt, Prateek Saxena, and Aaron Boodman

Adnostic: Privacy Preserving Targeted Advertising

Paper (PDF: 266KB)
Authors: Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum and Solon Barocas

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications

Paper (PDF: 879KB)
Authors: Prateek Saxena, Steve Hanna, Pongsin Poosankam and Dawn Song

Session 3: Intrusion Detection and Attack Analysis

Effective Anomaly Detection with Scarce Training Data

Paper (PDF: 552KB)
Authors: William Robertson, Federico Maggi, Christopher Kruegel and Giovanni Vigna

Large-Scale Automatic Classification of Phishing Pages

Paper (PDF: 195KB)
Author: Colin Whittaker, Brian Ryner and Marria Nazif

A Systematic Characterization of IM Threats using Honeypots

Paper (PDF: 338KB)
Authors: Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos and Spiros Antonatos

Session 4: Spam

On Network-level Clusters for Spam Detection

Paper (PDF: 716KB)
Authors: Zhiyun Qian, Zhuoqing Mao, Yinglian Xie and Fang Yu

Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation

Paper (PDF: 573KB)
Authors: Sushant Sinha, Michael Bailey and Farnam Jahanian

Botnet Judo: Fighting Spam with Itself

Paper (PDF: 1.76MB)
Authors: Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver and Stefan Savage

Session 5: Anonymity and Cryptographic Systems

Contractual Anonymity

Paper (PDF: 263KB)
Authors: Edward J. Schwartz, David Brumley and Jonathan M. McCune

A3: An Extensible Platform for Application-Aware Anonymity

Paper (PDF: 411KB)
Authors: Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, and Matt Blaze

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography

Paper (PDF: 296KB)
Authors: Thomas Ristenpart and Scott Yilek

Session 6: Security Protocols and Policies

InvisiType: Object-Oriented Security Policies

Paper (PDF: 377KB)
Authors: Jiwon Seo and Monica S. Lam

A Security Evaluation of DNSSEC with NSEC3

Paper (PDF: 362KB)
Authors: Jason Bau and John Mitchell

On the Safety of Enterprise Policy Deployment

Paper (PDF: 315KB)
Authors: Yudong Gao, Ni Pan, Xu Chen and Z. Morley Mao

Session 7: Languages and Systems Security

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation

Paper (PDF: 315KB)
Authors: Suresh Chari, Shai Halevi and Wietse Venema

Joe-E: A Security-Oriented Subset of Java

Paper (PDF: 234KB)
Authors: Adrian Mettler, David Wagner and Tyler Close

Preventing Capability Leaks in Secure JavaScript Subsets

Paper (PDF: 315KB)
Authors: Matthew Finifter, Joel Weinberger and Adam Barth

Session 8: Malware

Binary Code Extraction and Interface Identification for Security Applications

Paper (PDF: 422KB)
Authors:Juan Caballero, Noah M. Johnson, Stephen McCamant, and Dawn Song

Automatic Reverse Engineering of Data Structures from Binary Execution

Paper (PDF: 367KB)
Authors:Zhiqiang Lin, Xiangyu Zhang and Dongyan Xu

Efficient Detection of Split Personalities in Malware

Paper (PDF: 155KB)
Authors:Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel and Giovanni Vigna