NDSS Symposium 2006 Accepted Papers
A Crawler-based Study of Spyware in the Web
Steven D. Gribble , Alex Moshchuk, Tanya Bragin and Henry Levy
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
Yi-Min Wang , Doug Beck, Xuxian Jiang, Chad Verbowski, Shuo Chen and Sam King
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
William Robertson, Giovanni Vigna, Christopher Kruegel and Richard Kemmerer
Isolating Intrusions by Automatic Experiments
Stephan Neuhaus and Andreas Zeller
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software
David Brumley, Dawn Song, Jad Chamcham and Xeno Kovah
Software Self-Healing Using Collaborative Application
Stelios Sidiroglou, Michael Locasto and A. Keromytis
Inoculating SSH Against Address Harvesting
Stuart Schechter, Jaeyeon Jung, Will Stockwell and Cynthia McLain
Enterprise Security: A Community of Interest Based Approach
P. McDaniel, Shubho Sen, O. Spatscheck and Bill Aiello
Protocol-Independent Adaptive Replay of Application Dialog
Weidong Cui, Vern Paxson, Nicholas Weaver and Randy Katz
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
Keith Frikken, Jiangtao Li and Mikhail Atallah
Deploying a New Hash Algorithm
Steven Bellovin and Eric Rescorla
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
Kevin Fu, Seny Kamaram and Yoshi Kohno
Induced Churn as Shelter from Routing-Table Poisoning
Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein and Petros Maniatis
Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach
Ryan Gerdes, Thomas Daniels, Mani Mina and Steve Russell
Modeling Botnet Propagation Using Time Zones
D. Dagon, Cliff Zou and Wenke Lee
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm
Doug Szadja, Michael Pohl, Jason Owen and Barry Lawson
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications
Umesh Shankar, Trent Jaeger and Reiner Sailer