NDSS Symposium 2003 Program
Defending Against Network Attacks
Fighting Spam by Encapsulating Policy in Email Addresses
John Ioannidis
Moderately Hard, Memory-Bound Functions
Martin Abadi, Michael Burrows, Ted Wobber
Secure IP Telephony using Multi-layered Protection
Brennen Reynolds, Dipak Ghosal
Mobility and Secure Routing
Efficient Security Mechanisms for Routing Protocols
Yih-Chun Hu, Adrian Perrig, David Johnson
Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick McDaniel, Aviel Rubin
Integrating Security, Mobility and Multi-Homing in a HIP Way
Pekka Nikander, Yukka Ylitalo, Jorma Wall
Access Control and Penetration Resistance
Access Control Based on Execution History
Martin Abadi, Cedric Fournet
Testing C Programs for Buffer Overflow Vulnerabilities
Eric Haugh, Matthew Bishop
SiRiUS: Securing Remote Untrusted Storage
Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh
Network Monitoring and Intrusion Detection
A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention
John Wilander, Mariam Kamkar
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
Tal Garfinkel
Detecting Service Violations and DoS Attacks
Ashan Habib, Mohamed Hefeeda, Bharat Bhargava
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Tal Garfinkel, Mendel Rosenblum
Cryptographic Protocols and Constructs
Anca Ivan, Yevgeniy Dodis
Proactive Two-Party Signatures for User Authentication
Antonio Nicolosi, Maxwell Krohn, Yevgeniy Dodis, David Mazieres
Security in Multicast Protocols
Efficient Multicast Packet Authentication
Alain Pannetrat, Refik Molva