NDSS Symposium 2010 Accepted Papers

Server-side Verification of Client Behavior in Online Games

Darrell Bethea, Robert Cochran and Michael Reiter

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs

Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel

Stealth DoS Attacks on Secure Channels

Amir Herzberg and Haya Shulman

Protecting Browsers from Extension Vulnerabilities

Adam Barth, Adrienne Porter Felt, Prateek Saxena, and Aaron Boodman

Adnostic: Privacy Preserving Targeted Advertising

Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum and Solon Barocas

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications

Prateek Saxena, Steve Hanna, Pongsin Poosankam and Dawn Song

Effective Anomaly Detection with Scarce Training Data

William Robertson, Federico Maggi, Christopher Kruegel and Giovanni Vigna

Large-Scale Automatic Classification of Phishing Pages

Colin Whittaker, Brian Ryner and Marria Nazif

A Systematic Characterization of IM Threats using Honeypots

Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos and Spiros Antonatos

On Network-level Clusters for Spam Detection

Zhiyun Qian, Zhuoqing Mao, Yinglian Xie and Fang Yu

Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation

Sushant Sinha, Michael Bailey and Farnam Jahanian

Botnet Judo: Fighting Spam with Itself

Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver and Stefan Savage

Contractual Anonymity

Edward J. Schwartz, David Brumley and Jonathan M. McCune

A3: An Extensible Platform for Application-Aware Anonymity

Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo and Matt Blaze

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography

Thomas Ristenpart and Scott Yilek

InvisiType: Object-Oriented Security Policies

Jiwon Seo and Monica S. Lam

A Security Evaluation of DNSSEC with NSEC3

Jason Bau and John Mitchell

On the Safety of Enterprise Policy Deployment

Yudong Gao, Ni Pan, Xu Chen and Z. Morley Mao

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation

Suresh Chari, Shai Halevi and Wietse Venema

Joe-E: A Security-Oriented Subset of Java

Adrian Mettler, David Wagner and Tyler Close

Preventing Capability Leaks in Secure JavaScript Subsets

Matthew Finifter, Joel Weinberger and Adam Barth

Binary Code Extraction and Interface Identification for Security Applications

Juan Caballero, Noah M. Johnson, Stephen McCamant, and Dawn Song

Automatic Reverse Engineering of Data Structures from Binary Execution

Zhiqiang Lin, Xiangyu Zhang and Dongyan Xu

Efficient Detection of Split Personalities in Malware

Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel and Giovanni Vigna