Sciweavers

NDSS
2008
IEEE
14 years 3 months ago
A New Privacy-Enhanced Matchmaking Protocol
Although several wide-spread internet applications (e.g., job-referral services, dating services) can benefit from online matchmaking, protocols defined over the past two decade...
Ji Sun Shin, Virgil D. Gligor
NDSS
2008
IEEE
14 years 3 months ago
Limits of Learning-based Signature Generation with Adversaries
Automatic signature generation is necessary because there may often be little time between the discovery of a vulnerability, and exploits developed to target the vulnerability. Mu...
Shobha Venkataraman, Avrim Blum, Dawn Song
NDSS
2008
IEEE
14 years 3 months ago
Halo: High-Assurance Locate for Distributed Hash Tables
We study the problem of reliably searching for resources in untrusted peer-to-peer networks, where a significant portion of the participating network nodes may act maliciously to...
Apu Kapadia, Nikos Triandopoulos
NDSS
2008
IEEE
14 years 3 months ago
Measuring and Detecting Fast-Flux Service Networks
We present the first empirical study of fast-flux service networks (FFSNs), a newly emerging and still not widelyknown phenomenon in the Internet. FFSNs employ DNS to establish ...
Thorsten Holz, Christian Gorecki, Konrad Rieck, Fe...
NDSS
2008
IEEE
14 years 3 months ago
PRECIP: Towards Practical and Retrofittable Confidential Information Protection
XiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl C...
NDSS
2008
IEEE
14 years 3 months ago
A Tune-up for Tor: Improving Security and Performance in the Tor Network
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, thi...
Robin Snader, Nikita Borisov
NDSS
2008
IEEE
14 years 3 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
NDSS
2008
IEEE
14 years 3 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...