NDSS Symposium 2011
Network security technologies must respond to ever more complex issues and malicious behaviors. The purpose of NDSS is to bring the global Internet community together to learn about and discuss cutting-edge advances in the science and application of network and distributed systems security. The three day program features refereed paper presentations, punctuated by selected invited talks on security as it is applied in the field.
Leaders in Cyber Security
The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technology.
Who Attends
- University Researchers and Educators
- Chief Technology and Privacy Officers
- Security Analysts and System Administrators
- Operations and Security Managers
Attendance is limited to foster maximum exchange of information and ideas.
The NDSS Difference
At NDSS ’11, you will have the opportunity to benefit from:
- Presentations of solution-oriented scientific and technical papers presented by leaders in the field
- Expert panels debating new and practical approaches to security problems
- Extended question and answer sessions following all sessions
- Informal discussions with colleagues over the three-day period
If you have questions regarding particular security challenges, bring them with you
Registration Information
Registration includes admission to all NDSS sessions, Proceedings book and CD, and scheduled meals and refreshment breaks. Register by 14 January 2011 and save!
Call for Papers
Papers are now being solicited on a wide range of network and distributed system security topics. The deadline for abstract submissions is 6 August 2010. For details, go to Call for Papers.
We are pleased and honored to once again be sponsored by the Internet Society (ISOC) in 2011.
NDSS Symposium 2011
San Diego, California
6-9 February 2011
18th Annual Network & Distributed System Security Symposium Proceedings
Session 1: Secure Emerging Applications: Social Networks and Smartphones
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
A Security API for Distributed Social Networks
Authors: Michael Backes, Matteo Maffei, Kim Pecina
Location Privacy via Private Proximity Testing
Authors: Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg, and Dan Boneh
Session 2: Wireless Attacks!
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Authors: Aurelien Francillon, Boris Danev, and Srdjan Capkun
Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks
Authors: Omid Fatemieh, Ali Farhadi, Ranyeer Chandra, and Carl A. Gunter
Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas
Authors: Liang Cai, Kai Zeng, Hao Chen, and Prasant Mohapatra
Session 3: OS Security
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions
Authors: Xi Xiong, Donghai Tian, and Peng Liu
Efficient Monitoring of Untrusted Kernel-Mode Execution
Authors: Abhinav Srivastava and Jonathon Giffin
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures
Authors: Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, and Xuxian Jiang
Session 4: Network Malware
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
Authors: Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, and Eugene Y. Vasserman
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
Authors: Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi
Session 5: Software Security / Code Analysis
Howard: A Dynamic Excavator for Reverse Engineering Data Structures
Authors: Asia Slowinska, Traian Stancescu, and Herbert Bos
No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects
Authors: David Dewey and Patrick Traynor
TIE: Principled Reverse Engineering of Types in Binary Programs
Authors: JongHyup Lee, Thanassis Avgerinos, and David Brumley
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation
Authors: Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, and Dawn Song
AEG: Automatic Exploit Generation
Authors: Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley
Session 6: Web Security
Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications
Authors: Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, and Engin Kirda
WebShield: Enabling Various Web Defense Techniques without Client Side Modifications
Authors: Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu and Clint Sbisa
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows
Authors: Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci
Session 7: Network Security
Accurate and Provably Secure Latency Estimation with Treeple
Authors: Eric Chan-Tin and Nicholas Hopper
On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses
Authors: Scott Coull, Fabian Monrose, and Michael Bailey
SWIRL: A Scalable Watermark to Detect Correlated Network Flows
Authors: Amir Houmansadr and Nikita Borisov
Session 8: Real-World Security: Cloud Computing, Biometrics, and Humans
SPARE: Replicas on Hold
Authors: Tobias Distler, Ivan Popov, Wolfgang Schroder-Preikschat, Hans P. Reiser, and Ruediger Kapitza,
Efficient Privacy-Preserving Biometric Identification
Authors: Yan Huang, Lior Malka, David Evans, and Jonathan Katz
Usability Testing a Malware-Resistant Input Mechanism
Authors: Alana Libonati, Jonathan M. McCune, and Michael K. Reiter
Session 9: Privacy
Tracker: Security and Privacy for RFID-based Supply Chains
Authors: Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva
PiOS: Detecting Privacy Leaks in iOS Applications
Authors: Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna
Privacy-Preserving Aggregation of Time-Series Data
Authors: Elaine Shi, T-H. Hubert Chan, Eleanor Rieffel, Richard Chow, and Dawn Song