NDSS Symposium 2011 Accepted Papers

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones

Roman Schlegel, Kehuan Zhang, Xiayong Zhou, Mehool Intwala, Apu Kapadia and Xiaofeng Wang

A Security API for Distributed Social Networks

Michael Backes , Matteo Maffei and Kim Pecina

Location Privacy via Private Proximity Testing

Arvind Narayanan , Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg and Dan Boneh

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Aurelien Francillon , Boris Danev and Srdjan Capkun

Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks

Omid Fatemieh , Ali Farhadi, Ranyeer Chandra and Carl A. Gunter

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas

Liang Cai, Kai Zeng, Hao Chen and Prasant Mohapatra

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions

Xi Xiong , Donghai Tian and Peng Liu

Efficient Monitoring of Untrusted Kernel-Mode Execution

Abhinav Srivastava and Jonathon Giffin

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures

Zhiqiang Lin , Junghwan Rhee, Xiangyu Zhang, Dongyan Xu and Xuxian Jiang

Losing Control of the Internet: Using the Data Plane to Attack the Control Plane

Max Schuchard , Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim and Eugene Y. Vasserman

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis

Leyla Bilge , Engin Kirda, Christopher Kruegel and Marco Balduzzi

Howard: A Dynamic Excavator for Reverse Engineering Data Structures

Asia Slowinska , Traian Stancescu and Herbert Bos

No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects

David Dewey and Patrick Traynor

TIE: Principled Reverse Engineering of Types in Binary Programs

JongHyup Lee, Thanassis Avgerinos and David Brumley

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation

Min Gyung Kang, Stephen McCamant, Pongsin Poosankam and Dawn Song

AEG: Automatic Exploit Generation

Thanassis Avgerinos , Brent Lim Tze Hao and David Brumley

Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications

Marco Balduzzi , Carmen Torrano Gimenez, Davide Balzarotti and Engin Kirda

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications

Zhichun Li , Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu and Clint Sbisa

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows

Xiapu Luo , Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang and Roberto Perdisci

Accurate and Provably Secure Latency Estimation with Treeple

Eric Chan-Tin and Nicholas Hopper

On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses

Scott Coull and Fabian Monrose

SWIRL: A Scalable Watermark to Detect Correlated Network Flows

Amir Houmansadr and Nikita Borisov

SPARE: Replicas on Hold

Tobias Distler, Ivan Popov, Wolfgang Schroder-Preikschat, Hans P. Reiser and Ruediger Kapitza

Efficient Privacy-Preserving Biometric Identification

Yan Huang, Lior Malka, David Evans and Jonathan Katz

Usability Testing a Malware-Resistant Input Mechanism

Alana Libonati , Jonathan M. McCune and Michael K. Reiter

Tracker: Security and Privacy for RFID-based Supply Chains

Erik-Oliver Blass , Kaotar Elkhiyaoui and Refik Molva

PiOS: Detecting Privacy Leaks in iOS Applications

Manuel Egele, Christopher Kruegel, Engin Kirda and Giovanni Vigna

Privacy-Preserving Aggregation of Time-Series Data

Elaine Shi, T-H. Hubert Chan, Eleanor Rieffel, Richard Chow and Dawn Song