NDSS Symposium 2005 Program
Cryptography in Network Security
Space-Efficient Block Storage Integrity
Alina Oprea, Carnegie Mellon University; Mike Reiter, Carnegie Mellon University; Ke Yang, Google
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
Giuseppe Ateniese, Johns Hopkins University; Kevin Fu, MIT; Matthew Green, Johns Hopkins University; Susan Hohenberger, MIT
Rekeying and Storage Cost for Multiple User Revocation
Sandeep S. Kulkarni, Michigan State University; Bezawada Bruhadeshwar, Michigan State University
Denial of Service Attacks
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
Xiapu Luo, Hong Kong Polytechnic University; Rocky K. C. Chang, Hong Kong Polytechnic University
MOVE: An End-to-End Solution to Network Denial of Service
Angelos Stavrou, Columbia University; Angelos D. Keromytis, Columbia University; Jason Nieh, Columbia University; Vishal Misra, Columbia University; Dan Rubenstein, Columbia University
Security Analysis and Improvements for IEEE 802.11i
Changhua He, Stanford University; John C. Mitchell, Stanford University
Peer-to-Peer Approaches
Privacy-Preserving Friends Troubleshooting Network
Qiang Huang, Princeton University; Helen J. Wang, Microsoft Research; Nikita Borisov, University of California, Berkeley
Tao Wan, Carleton University; Evangelos Kranakis, Carleton University; P.C. van Oorschot, Carleton University
Internet Defense
New Streaming Algorithms for Fast Detection of Superspreaders
Shobha Venkataraman, Carnegie Mellon University; Dawn Song, Carnegie Mellon University; Phillip B. Gibbons, Intel Research; Avrim Blum, Carnegie Mellon University
The Internet Motion Sensor – A Distributed Blackhole Monitoring System
Michael Bailey, University of Michigan; Evan Cooke, University of Michigan; Farnam Jahanian, University of Michigan; Jose Nazario, Arbor Networks; David Watson, University of Michigan
DNS-based Detection of Scanning Worms in an Enterprise Network
David Whyte, Carleton University; Evangelos Kranakis, Carleton University; P.C. van Oorschot, Carleton University
Intrusion Detection
DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks
Alexey Smirnov, Stony Brook University; Tzi-cker Chiueh, Stony Brook University
James Newsome, Carnegie Mellon University; Dawn Song, Carnegie Mellon University
Enriching Intrusion Alerts Through Multi-Host Causality
Samuel T. King, University of Michigan; Z. Morley Mao, University of Michigan; Dominic G. Lucchetti, University of Michigan; Peter M. Chen, University of Michigan
Platform Security
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities
Shuo Chen, University of Illinois, Urbana-Champaign; John Dunagan, Microsoft Research; Chad Verbowski, Microsoft Research; Yi-Min Wang, Microsoft Research
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
Weiqing Sun, Stony Brook University; Zhenkai Liang, Stony Brook University; V.N. Venkatakrishnan, Stony Brook University; R. Sekar, Stony Brook University