NDSS

Network security technologies must respond to ever more complex issues and malicious behaviors. The purpose of NDSS is to bring the global Internet community together to learn about and discuss cutting-edge advances in the science and application of network and distributed systems security. The three day program features refereed paper presentations, punctuated by selected invited talks on security as it is applied in the field.

Leaders in Cyber Security

The Network and Distributed System Security Symposium fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available network and distributed systems security technology.

Who Attends

  • University Researchers and Educators
  • Chief Technology and Privacy Officers
  • Security Analysts and System Administrators
  • Operations and Security Managers

Attendance is limited to foster maximum exchange of information and ideas.

The NDSS Difference

At NDSS ’11, you will have the opportunity to benefit from:

  • Presentations of solution-oriented scientific and technical papers presented by leaders in the field
  • Expert panels debating new and practical approaches to security problems
  • Extended question and answer sessions following all sessions
  • Informal discussions with colleagues over the three-day period

If you have questions regarding particular security challenges, bring them with you

Registration Information

Registration includes admission to all NDSS sessions, Proceedings book and CD, and scheduled meals and refreshment breaks. Register by 14 January 2011 and save!

Call for Papers

Papers are now being solicited on a wide range of network and distributed system security topics. The deadline for abstract submissions is 6 August 2010. For details, go to Call for Papers.

We are pleased and honored to once again be sponsored by the Internet Society (ISOC) in 2011.

NDSS Symposium 2011

The Dana on Mission Bay
San Diego, California
6-9 February 2011

18th Annual Network & Distributed System Security Symposium Proceedings

Session 1: Secure Emerging Applications: Social Networks and Smartphones

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Authors: Roman Schlegel, Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang

A Security API for Distributed Social Networks

Authors: Michael Backes, Matteo Maffei, Kim Pecina

Location Privacy via Private Proximity Testing

Authors: Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg, and Dan Boneh

Session 2: Wireless Attacks!

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Authors: Aurelien Francillon, Boris Danev, and Srdjan Capkun

Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks

Authors: Omid Fatemieh, Ali Farhadi, Ranyeer Chandra, and Carl A. Gunter

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas

Authors: Liang Cai, Kai Zeng, Hao Chen, and Prasant Mohapatra

Session 3: OS Security

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions

Authors: Xi Xiong, Donghai Tian, and Peng Liu

Efficient Monitoring of Untrusted Kernel-Mode Execution

Authors: Abhinav Srivastava and Jonathon Giffin

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures

Authors: Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, and Xuxian Jiang

Session 4: Network Malware

Losing Control of the Internet: Using the Data Plane to Attack the Control Plane

Authors: Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, and Eugene Y. Vasserman

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis

Authors: Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi

Session 5: Software Security / Code Analysis

Howard: A Dynamic Excavator for Reverse Engineering Data Structures

Authors: Asia Slowinska, Traian Stancescu, and Herbert Bos

No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects

Authors: David Dewey and Patrick Traynor

TIE: Principled Reverse Engineering of Types in Binary Programs

Authors: JongHyup Lee, Thanassis Avgerinos, and David Brumley

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation

Authors: Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, and Dawn Song

AEG: Automatic Exploit Generation

Authors: Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley

Session 6: Web Security

Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications

Authors: Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, and Engin Kirda

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications

Authors: Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu and Clint Sbisa

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows

Authors: Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci

Session 7: Network Security

Accurate and Provably Secure Latency Estimation with Treeple

Authors: Eric Chan-Tin and Nicholas Hopper

On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses

Authors: Scott Coull, Fabian Monrose, and Michael Bailey

SWIRL: A Scalable Watermark to Detect Correlated Network Flows

Authors: Amir Houmansadr and Nikita Borisov

Session 8: Real-World Security: Cloud Computing, Biometrics, and Humans

SPARE: Replicas on Hold

Authors: Tobias Distler, Ivan Popov, Wolfgang Schroder-Preikschat, Hans P. Reiser, and Ruediger Kapitza,

Efficient Privacy-Preserving Biometric Identification

Authors: Yan Huang, Lior Malka, David Evans, and Jonathan Katz

Usability Testing a Malware-Resistant Input Mechanism

Authors: Alana Libonati, Jonathan M. McCune, and Michael K. Reiter
Session 9: Privacy

Tracker: Security and Privacy for RFID-based Supply Chains

Authors: Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva

PiOS: Detecting Privacy Leaks in iOS Applications

Authors: Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna

Privacy-Preserving Aggregation of Time-Series Data

Authors: Elaine Shi, T-H. Hubert Chan, Eleanor Rieffel, Richard Chow, and Dawn Song