


default search action
NDSS 2014: San Diego, California, USA
- 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014. The Internet Society 2014
- Jing Zhang, Zakir Durumeric, Michael D. Bailey, Mingyan Liu, Manish Karir:
On the Mismanagement and Maliciousness of Networks. - Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov:
No Direction Home: The True Cost of Routing Around Decoys. - Younghwan Go, Eunyoung Jeong, Jongil Won, Yongdae Kim, Denis Foo Kune, KyoungSoo Park:
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission. - Antonio Nappa, Zhaoyan Xu, M. Zubair Rafique, Juan Caballero, Guofei Gu:
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers. - Christian Rossow:
Amplification Hell: Revisiting Network Protocols for DDoS Abuse. - Yueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding, Robert H. Deng:
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. - Stephen E. McLaughlin, Saman A. Zonouz, Devin J. Pohly, Patrick D. McDaniel:
A Trusted Safety Verifier for Process Controller Code. - Jonas Zaddach, Luca Bruno, Aurélien Francillon, Davide Balzarotti:
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. - Dongseok Jang, Zachary Tatlock, Sorin Lerner:
SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks. - Alireza Saberi, Yangchun Fu, Zhiqiang Lin:
Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization. - Chia-Chi Lin, Hongyang Li, Xiao-yong Zhou, XiaoFeng Wang:
Screenmilker: How to Milk Your Android Screen for Secrets. - Sanorita Dey, Nirupam Roy, Wenyuan Xu, Romit Roy Choudhury, Srihari Nelakuditi:
AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. - Claudio Marforio, Nikolaos Karapanos, Claudio Soriente, Kari Kostiainen, Srdjan Capkun:
Smartphones as Practical and Secure Location Verification Tokens for Payments. - Martin Georgiev, Suman Jana, Vitaly Shmatikov:
Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks. - Qing Zhang, David Y. Wang, Geoffrey M. Voelker:
DSpin: Detecting Automatically Spun Content on the Web. - Giancarlo Pellegrino, Davide Balzarotti:
Toward Black-Box Detection of Logic Flaws in Web Applications. - Arnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, Mark Lentczner:
Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud. - Fangqi Sun, Liang Xu, Zhendong Su:
Detecting Logic Vulnerabilities in E-commerce Applications. - Johannes Dahse, Thorsten Holz:
Simulation of Built-in PHP Features for Precise Static Code Analysis. - Mark Dermot Ryan:
Enhanced Certificate Transparency and End-to-End Encrypted Mail. - Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan:
Privacy through Pseudonymity in Mobile Telephony Systems. - Arik Friedman, Izchak Sharfman, Daniel Keren, Assaf Schuster:
Privacy-Preserving Distributed Stream Monitoring. - Rob Jansen, Florian Tschorsch, Aaron Johnson, Björn Scheuermann:
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network. - Lukasz Olejnik, Minh-Dung Tran, Claude Castelluccia:
Selling off User Privacy at Auction. - Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, XiaoFeng Wang:
The Tangled Web of Password Reuse. - Rafael Veras, Christopher Collins, Julie Thorpe:
On Semantic Patterns of Passwords and their Security Impact. - Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing:
Copker: Computing with Private Keys without RAM. - Emil Stefanov, Charalampos Papamanthou, Elaine Shi:
Practical Dynamic Searchable Encryption with Small Leakage. - Christina Garman, Matthew Green, Ian Miers:
Decentralized Anonymous Credentials. - David Cash, Joseph Jaeger, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner:
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation. - Kasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, Gene Tsudik:
Authentication Using Pulse-Response Biometrics. - Michael Dietz, Dan S. Wallach:
Hardening Persona - Improving Federated Web Login. - Maliheh Shirvanian, Stanislaw Jarecki, Nitesh Saxena, Naveen Nathan:
Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices. - Adam Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd, Kevin R. B. Butler:
Leveraging USB to Establish Host Identity Using Commodity Devices. - Robert Templeman, Mohammed Korayem, David J. Crandall, Apu Kapadia:
PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. - Bo Chen, Reza Curtmola:
Auditable Version Control Systems. - Zhang Xu, Haining Wang, Zichen Xu, Xiaorui Wang:
Power Attack: An Increasing Threat to Data Centers. - Youngsam Park, Jackie Jones, Damon McCoy, Elaine Shi, Markus Jakobsson:
Scambaiter: Understanding Targeted Nigerian Scams on Craigslist. - Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. - Siegfried Rasthofer, Steven Arzt, Eric Bodden:
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks. - Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, Xuxian Jiang:
AirBag: Boosting Smartphone Resistance to Malware Infection. - David Sounthiraraj, Justin Sahs, Garret Greenwood, Zhiqiang Lin, Latifur Khan:
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps. - Mu Zhang, Heng Yin:
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications. - Sebastian Poeplau, Yanick Fratantonio, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna:
Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications. - Luca Invernizzi, Stanislav Miskovic, Ruben Torres, Christopher Kruegel, Sabyasachi Saha, Giovanni Vigna, Sung-Ju Lee, Marco Mellia:
Nazca: Detecting Malware Distribution in Large-Scale Networks. - Sebastian Vogl, Jonas Pfoh, Thomas Kittel, Claudia Eckert:
Persistent Data-only Malware: Function Hooks without Code. - Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck:
DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. - Yeongjin Jang, Simon P. Chung, Bryan D. Payne, Wenke Lee:
Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications. - Ajaya Neupane, Nitesh Saxena, Keya Kuruvilla, Michael Georgescu, Rajesh K. Kana:
Neural Signatures of User-Centered Security: An fMRI Study of Phishing, and Malware Warnings. - Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Web PKI: Closing the Gap between Guidelines and Practices. - Travis Mayberry, Erik-Oliver Blass, Agnes Hui Chan:
Efficient Private File Retrieval by Combining ORAM and PIR. - Matthias Schulz, Adrian Loch, Matthias Hollick:
Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. - Arnis Parsovs:
Practical Issues with TLS Client Certificate Authentication.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.