NDSS Symposium 2012 Accepted Papers

Plain-Text Recovery Attacks Against Datagram TLS

Kenneth Paterson and Nadhem Alfardan

ANDaNA: Anonymous Named Data Networking Application

Steven Dibenedetto, Paolo Gasti, Gene Tsudik and Ersin Uzun

Persistent OSPF Attacks

Gabi Nakibly, Alex Kirshon, Dima Gonikman and Dan Boneh

You are what you like! Information leakage through users’ Interests

Abdelberi Chaabane, Gergely Acs and Mohamed Ali Kaafar

X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks

Prateek Mittal, Matthew Caesar and Nikita Borisov

Towards Online Spam Filtering in Social Networks

Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary

Location leaks over the GSM air interface

Denis Foo Kune, John Koelndorfer, Nicholas Hopper and Yongdae Kim

Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks

Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi and Jean-Pierre Hubaux

You Can Run, but You Can’t Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks

Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Z. Morley Mao, Ming Zhang and Yi-Min Wang

Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications

Nico Golde, Kévin Redon and Ravishankar Borgaonkar

Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud

Yanbin Lu

Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds

Yangyi Chen, Bo Peng, Xiaofeng Wang and Haixu Tang

Making argument systems for outsourced computation practical (sometimes)

Srinath Setty, Richard Mcpherson, Andrew Blumberg and Michael Walfish

Towards Practical Oblivious RAM

Emil Stefanov, Elaine Shi and Dawn Song

Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation

Lok Yan, Manjukumar Jayachandra, Mu Zhang and Heng Yin

FreeMarket: Shopping for free in Android applications

Daniel Reynaud, Dawn Song, Tom Magrino, Edward Wu and Richard Shin

Distance Hijacking Attacks on Distance Bounding Protocols

Cas Cremers, Kasper Bonne Rasmussen and Srdjan Capkun

Throttling Tor Bandwidth Parasites

Rob Jansen, Nicholas Hopper and Paul Syverson

Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous

Maxfield Schuchard, Christopher Thompson, Nicholas Hopper and Yongdae Kim

Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems

Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru and Radu State

Charm: A Framework for Rapidly Prototyping Cryptosystems

Joseph A. Akinyele, Matthew D. Green and Aviel D. Rubin

Abuse Detection and Prevention Systems at a Large Scale Video Sharing Website

Yu-To Chen, Pierre Grinspan, Blake Livingston, Palash Nandy and Brian Palmer

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation

Mohammad Islam, Mehmet Kuzu and Murat Kantarcioglu

On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability

Qiang Yan, Jin Han, Yingjiu Li and Robert H. Deng

Adaptive Password-Strength Meters from Markov Models

Claude Castelluccia, Markus Duermuth and Daniele Perito

Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?

Yan Huang, David Evans and Jonathan Katz

Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications

Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber and Edgar Weippl

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger and Ahmad-Reza Sadeghi

Towards Taming Privilege-Escalation Attacks on Android

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi and Bhargava Shastry

Systematic Detection of Capability Leaks in Stock Android Smartphones

Michael Grace, Yajin Zhou, Zhi Wang and Xuxian Jiang

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

Yajin Zhou, Zhi Wang, Wu Zhou and Xuxian Jiang

Insights into User Behavior in Dealing with Internet Attacks

Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda and Davide Balzarotti

PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks

Yinzhi Cao, Vinod Yegneswaran, Phillip Porras and Yan Chen

The Latent Community Model for Detecting Sybils in Social Networks

Zhuhua Cai and Christopher Jermaine

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation

Man Ho Au, Apu Kapadia and Willy Susilo

Accountable Wiretapping -or- I know they can hear you now

Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor and Dan Wallach

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation

Rob Jansen and Nicholas Hopper

Discovering Semantic Data of Interest from Un-mappable Memory with Confidence

Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang and Dongyan Xu

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes

Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou

SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust

Karim Eldefrawy, Aurélien Francillon, Daniele Perito and Gene Tsudik

Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring

Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu and Changzhen Hu

WarningBird: Detecting Suspicious URLs in Twitter Stream

Sangho Lee and Jong Kim

Using replicated execution for a more secure and reliable web browser

Hui Xue, Nathan Dautenhahn and Samuel King

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications

Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu and Martin Abadi

Chrome Extensions: Threat Analysis and Countermeasures

Lei Liu, Xinwen Zhang, Guanhua Yan and Songqing Chen

Ghost Domain Names: Revoked Yet Still Resolvable

Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Haixin Duan and Jianping Wu

ShortMAC: Efficient Data-Plane Fault Localization

Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig and Patrick Tague

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Jignesh Patel, Alex Liu and Eric Torng

The Case for Prefetching and Prevalidating TLS Server Certificates

Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson and Dan Boneh

Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems

Hyojeong Lee, Jeff Seibert, Charles Killian and Cristina Nita-Rotaru

Automated Synthesis of Secure Distributed Applications

Michael Backes, Matteo Maffei and Kim Pecina

A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware

Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August and Angelos D. Keromytis

Static detection of C++ vtable escape vulnerabilities in binary code

David Dewey and Jon Giffin

Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis

Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang and Heng Yin