NDSS Symposium 2008 Program
Session 1: Large Scale Systems
A New Privacy-Enhanced Matchmaking Protocol
Author: J. Shin, V. Gligor
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
Author: D. Dagon, N. Provos,; C. Lee, W. Lee
A Tune-up for Tor: Improving Security and Performance in the Tor Network
Author: R. Snader, N. Borisov
Session 2: Collaborative Systems
Halo: High Assurance Locate for Distributed Hash Tables
Author: A. Kapadia, N. Triandopoulos
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability
Author: S.S.M. Chow, J. Liu, D. Wong
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems
Author: P. Traynor, K. Butler, W. Enck, P. McDaniel
Session 3: Privacy
Analyzing Privacy in Enterprise Packet Trace Anonymization
Author: B. Ribeiro, W. Chen, ;G. Miklau, D. Towsley
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Author: S. Coull, C. Wright, A. Keromytis, F. Monrose, ;M. Reiter
Author: P. Williams, R. Sion
Session 4: Software Hardening
Automated Whitebox Fuzz Testing
Author: P. Godefroid, M. Levin, D. Molnar
Author: J. Caballero, T. Kampouris, D. Song, J. Wang
PRECIP: Towards Practical and Retrofittable Confidential Information Protection
Author: X. Wang, Z. Li, N. Li, J.Y. Choi
Session 5: Reverse Engineering
Automatic Network Protocol Analysis
Author: G. Wondracek, P. Milani, C. Kruegel, E. Kirda
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Author: Z. Lin, X. Jiang,; D. Xu, X. Zhang
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Author: H. Yin, Z. Liang, D. Song
Session 6: Intrusion Prevention
Measuring and Detecting Fast-Flux Service Networks
Author: T. Holz, C. Gorecki, K. Rieck, F. Freiling
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic
Author: G. Gu, J. Zhang, W. Lee
Limits of Learning-based Signature Generation with Adversaries
Author: S. Venkataraman, A. Blum, D. Song
Session 7: Malware
Impeding Malware Analysis Using Conditional Code Obfuscation
M. Sharif, A. Lanzi, J. Giffin, W. Lee
Author: J. Bethencourt, D. Song, B. Waters
Exploiting Opportunistic Scheduling in Cellular Data Networks
Author: R. Racic, D. Ma , H. Chen, X. Liu