Sciweavers

80
Voted
NDSS
2008
IEEE
15 years 10 months ago
PRECIP: Towards Practical and Retrofittable Confidential Information Protection
XiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl C...
88
Voted
NDSS
2008
IEEE
15 years 10 months ago
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?
Juan Caballero, Theocharis Kampouris, Dawn Song, J...
NDSS
2008
IEEE
15 years 10 months ago
A Tune-up for Tor: Improving Security and Performance in the Tor Network
The Tor anonymous communication network uses selfreported bandwidth values to select routers for building tunnels. Since tunnels are allocated in proportion to this bandwidth, thi...
Robin Snader, Nikita Borisov
145
Voted
NDSS
2008
IEEE
15 years 10 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
124
Voted
NDSS
2008
IEEE
15 years 10 months ago
Taming the Devil: Techniques for Evaluating Anonymized Network Data
Anonymization plays a key role in enabling the public release of network datasets, and yet there are few, if any, techniques for evaluating the efficacy of network data anonymiza...
Scott E. Coull, Charles V. Wright, Angelos D. Kero...
104
Voted
NDSS
2008
IEEE
15 years 10 months ago
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability
Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong
120
Voted
NDSS
2008
IEEE
15 years 10 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...
151
Voted
NDSS
2008
IEEE
15 years 10 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
NDSS
2008
IEEE
15 years 10 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
165
Voted
NDSS
2008
IEEE
15 years 10 months ago
Exploiting Opportunistic Scheduling in Cellular Data Networks
Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to effic...
Radmilo Racic, Denys Ma, Hao Chen, Xin Liu