NDSS Symposium 2010
Network security technologies must respond to ever more complex issues and malicious behaviors. The purpose of NDSS is to bring the global Internet community together to learn about and discuss cutting-edge advances in the science and application of network and distributed systems security. The three day program features refereed paper presentations, punctuated by selected invited talks on security as it is applied in the field.
Leaders in Cyber Security
NDSS brings together innovative and forward-thinking members of the Internet community – including leading-edge security researchers and implementers, globally-recognized security technology experts, and experienced professionals from both the private and public sectors – who design, develop, exploit and deploy the new and emerging technologies that define network and distributed system security.
Who Attends
- University Researchers and Educators
- Chief Technology and Privacy Officers
- Security Analysts and System Administrators
- Operations and Security Managers
Attendance is limited to foster maximum exchange of information and ideas.
The NDSS Difference
At NDSS ’10, you will have the opportunity to benefit from:
- Presentations of solution-oriented scientific and technical papers presented by leaders in the field
- Expert panels debating new and practical approaches to security problems
- Extended question and answer sessions following all sessions
- Informal discussions with colleagues over the three-day period
If you have questions regarding particular security challenges, bring them with you
Registration Information
Registration includes admission to all NDSS sessions, Proceedings book and CD, and scheduled meals and refreshment breaks. Register by 29 January 2010 and save!
Call for Papers
Papers are now being solicited on a wide range of network and distributed system security topics. The deadline for abstract submissions is 11 September 2009. For details, go to Call for Papers.
We are pleased and honored to once again be sponsored by the Internet Society (ISOC) in 2010.
Proceedings
Session 1: Distributed Systems and Networks
Server-side Verification of Client Behavior in Online Games
Paper (PDF: 289KB)
Authors: Darrell Bethea, Robert Cochran and Michael Reiter
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Paper (PDF: 942KB)
Authors: Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel
Stealth DoS Attacks on Secure Channels
Paper (PDF: 690KB)
Authors: Amir Herzberg and Haya Shulman
Session 2: Web Security and Privacy
Protecting Browsers from Extension Vulnerabilities
Paper (PDF: 439KB)
Authors: Adam Barth, Adrienne Porter Felt, Prateek Saxena, and Aaron Boodman
Adnostic: Privacy Preserving Targeted Advertising
Paper (PDF: 266KB)
Authors: Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum and Solon Barocas
FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications
Paper (PDF: 879KB)
Authors: Prateek Saxena, Steve Hanna, Pongsin Poosankam and Dawn Song
Session 3: Intrusion Detection and Attack Analysis
Effective Anomaly Detection with Scarce Training Data
Paper (PDF: 552KB)
Authors: William Robertson, Federico Maggi, Christopher Kruegel and Giovanni Vigna
Large-Scale Automatic Classification of Phishing Pages
Paper (PDF: 195KB)
Author: Colin Whittaker, Brian Ryner and Marria Nazif
A Systematic Characterization of IM Threats using Honeypots
Paper (PDF: 338KB)
Authors: Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos and Spiros Antonatos
Session 4: Spam
On Network-level Clusters for Spam Detection
Paper (PDF: 716KB)
Authors: Zhiyun Qian, Zhuoqing Mao, Yinglian Xie and Fang Yu
Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation
Paper (PDF: 573KB)
Authors: Sushant Sinha, Michael Bailey and Farnam Jahanian
Botnet Judo: Fighting Spam with Itself
Paper (PDF: 1.76MB)
Authors: Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver and Stefan Savage
Session 5: Anonymity and Cryptographic Systems
Contractual Anonymity
Paper (PDF: 263KB)
Authors: Edward J. Schwartz, David Brumley and Jonathan M. McCune
A3: An Extensible Platform for Application-Aware Anonymity
Paper (PDF: 411KB)
Authors: Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, and Matt Blaze
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography
Paper (PDF: 296KB)
Authors: Thomas Ristenpart and Scott Yilek
Session 6: Security Protocols and Policies
InvisiType: Object-Oriented Security Policies
Paper (PDF: 377KB)
Authors: Jiwon Seo and Monica S. Lam
A Security Evaluation of DNSSEC with NSEC3
Paper (PDF: 362KB)
Authors: Jason Bau and John Mitchell
On the Safety of Enterprise Policy Deployment
Paper (PDF: 315KB)
Authors: Yudong Gao, Ni Pan, Xu Chen and Z. Morley Mao
Session 7: Languages and Systems Security
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
Paper (PDF: 315KB)
Authors: Suresh Chari, Shai Halevi and Wietse Venema
Joe-E: A Security-Oriented Subset of Java
Paper (PDF: 234KB)
Authors: Adrian Mettler, David Wagner and Tyler Close
Preventing Capability Leaks in Secure JavaScript Subsets
Paper (PDF: 315KB)
Authors: Matthew Finifter, Joel Weinberger and Adam Barth
Session 8: Malware
Binary Code Extraction and Interface Identification for Security Applications
Paper (PDF: 422KB)
Authors:Juan Caballero, Noah M. Johnson, Stephen McCamant, and Dawn Song
Automatic Reverse Engineering of Data Structures from Binary Execution
Paper (PDF: 367KB)
Authors:Zhiqiang Lin, Xiangyu Zhang and Dongyan Xu
Efficient Detection of Split Personalities in Malware
Paper (PDF: 155KB)
Authors:Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel and Giovanni Vigna