default search action
NDSS 2015: San Diego, California, USA
- 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015. The Internet Society 2015
Session 1: Web Security
- Sangho Lee, Hyungsub Kim, Jong Kim:
Identifying Cross-origin Resource Status Using Application Cache. - Thomas Vissers, Wouter Joosen, Nick Nikiforakis:
Parking Sensors: Analyzing and Detecting Parked Domains. - Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis:
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. - Michael J. Kranch, Joseph Bonneau:
Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning. - Xiang Pan, Yinzhi Cao, Yan Chen:
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.
Session 2: Mobile Security
- Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, Limei Gilham, Nguyen Nguyen, Martin C. Rinard:
Information Flow Analysis of Android Applications in DroidSafe. - Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl A. Gunter:
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. - Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. - Kimberly Tam, Salahuddin J. Khan, Aristide Fattori, Lorenzo Cavallaro:
CopperDroid: Automatic Reconstruction of Android Malware Behaviors. - Xueqiang Wang, Kun Sun, Yuewu Wang, Jiwu Jing:
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Session 3: Detection, Analysis, Prevention & Response - Part I
- Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song:
VTint: Protecting Virtual Function Tables' Integrity. - Payas Gupta, Bharat Srinivasan, Vijay Balasubramaniyan, Mustaque Ahamad:
Phoneypot: Data-driven Understanding of Telephony Threats. - Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, Brent ByungHoon Kang:
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment. - Yves Younan:
FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers. - Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran:
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.
Session 4: Privacy - Part I
- Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser:
Machine Learning Classification over Encrypted Data. - Lianying Zhao, Mohammad Mannan:
Gracewipe: Secure and Verifiable Deletion under Coercion. - Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina:
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces. - Kangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang:
Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting. - Timothy Peters, Mark A. Gondree, Zachary N. J. Peterson:
DEFY: A Deniable, Encrypted File System for Log-Structured Storage.
Session 5: Detection, Analysis, Prevention & Response - Part II
- Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. - Xi Chen, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. - Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose:
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. - Stephen Crane, Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz:
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.
Session 6a: Detection, Analysis, Prevention & Response - Part III
- Brendan Juba, Christopher Musco, Fan Long, Stelios Sidiroglou-Douskos, Martin C. Rinard:
Principled Sampling for Anomaly Detection. - Mohamed El Massad, Siddharth Garg, Mahesh V. Tripunitara:
Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes. - Vishwath Mohan, Per Larsen, Stefan Brunthaler, Kevin W. Hamlen, Michael Franz:
Opaque Control-Flow Integrity.
Session 6b: Privacy - Part II
- Nitesh Mor, Oriana Riva, Suman Nath, John Kubiatowicz:
Bloom Cookies: Web Search Personalization without User Tracking. - Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv:
NSEC5: Provably Preventing DNSSEC Zone Enumeration.
Session 7: Social Networks and Cloud Services
- Igor Bilogrevic, Kévin Huguenin, Stefan Mihaila, Reza Shokri, Jean-Pierre Hubaux:
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms. - Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah:
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. - Riad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish:
Efficient RAM and control flow in verifiable outsourced computation. - Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov:
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.
Session 8: Authentication
- Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta:
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. - Daniel Demmler, Thomas Schneider, Michael Zohner:
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. - Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. - Benjamin Güldenring, Volker Roth, Lars Ries:
Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords. - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti:
Verified Contributive Channel Bindings for Compound Authentication.
Session 9: Web Security
- Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, Sotiris Ioannidis:
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. - Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski:
Exploiting and Protecting Dynamic Code Generation. - Wilson Lian, Hovav Shacham, Stefan Savage:
Too LeJIT to Quit: Extending JIT Spraying to ARM. - Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian:
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Session 10: Network Security
- Pierre-Antoine Vervier, Olivier Thonnard, Marc Dacier:
Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks. - Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann:
SPHINX: Detecting Security Attacks in Software-Defined Networks. - Phillip A. Porras, Steven Cheung, Martin W. Fong, Keith Skinner, Vinod Yegneswaran:
Securing the Software Defined Network Control Layer. - Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu:
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.
Session 11: Detection, Analysis, Prevention & Response - Part IV
- Yan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna:
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. - Aravind Prakash, Xunchao Hu, Heng Yin:
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. - Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian:
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. - Khaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith:
No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.