NDSS Symposium 2004 Program
Multicast Authentication
DoS Protection for Reliably Authenticated Broadcast
Carl Gunter, Sanjeev Khanna, Kaijun Tan, Santosh Venkatesh
Distillation Codes and Applications to DoS Resistant Multicast Authentication
Chris Karlof, Naveen Sastry, Yaping Li, Adrian Perring, and J.D. Tygar
Intrusion Detection
Efficient Context-Sensitive Intrusion Detection
Jonathon T. Giffin, Somesh Jha, and Barton P. Miller
Global Intrusion Detection in the DOMINO Overlay System
Vinod Yegneswaran, Paul Barford and Somesh Jha
Building Attack Scenarios through Integration of Complementary Alert Correlation Method
Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant
New Directions
Client-Side Defense Against Web-Based Identity Theft
Neil Chou, Robert Ledesma, Yuka Teraguchi, and John C. Mitchell
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu and David Evans
An Effective Architecture and Algorithm for Detecting Worms with Various Scan
Jiang Wu, Sarma Vangala, Lixin Gao and Kevin Kwiat
Secure Software
A Practical Dynamic Buffer Overflow Detector
Olatunji Ruwase and Monica S. Lam
Model Checking One Million Lines of C Code
Hao Chen, Drew Dean and David Wagner
Ostia: A Delegating Architecture for Secure System Call Interposition
Tal Garfinkel, Ben Pfaff, Mendel Rosenblum
Database and Audit Log Protection
Authentication and Integrity in Outsourced Databases
Einar Mykletun, Maithili Narasimha, and Gene Tsudik
Building an Encrypted and Searchable Audit Log
Brent R. Waters, Dirk Balfanz, Glenn Durfee, D. K. Smetters
Protocols
Speeding up Secure Web Transactions Using Elliptic Curve Cryptography
Vipul Gupta, Douglas Stebila, Stephen Fung, Sheueling Chang Shantz, Nils Gura, and Hans Eberle
The Design and Implementation of Datagram TLS
Nagendra Modadugu and Eric Rescorla
The Perils of Unauthenticated Encryption: Kerberos Version 4
Tom Yu, Sam Hartman and Kenneth Raeburn