Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education

Events 

NDSS Symposium 2005

Conference Proceedings

Cryptography in Network Security

Space-Efficient Block Storage Integrity - Alina Oprea, Carnegie Mellon University ; Mike Reiter, Carnegie Mellon University ;  Ke Yang, Google

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage - Giuseppe Ateniese, Johns Hopkins University ; Kevin Fu, MIT ; Matthew Green, Johns Hopkins University ;   Susan Hohenberger, MIT

Rekeying and Storage Cost for Multiple User Revocation - Sandeep S. Kulkarni, Michigan State University ; Bezawada Bruhadeshwar, Michigan State University

Denial of Service Attacks

On a New Class of Pulsing Denial-of-Service Attacks and the Defense - Xiapu Luo, Hong Kong Polytechnic University ; Rocky K. C. Chang, Hong Kong Polytechnic University

MOVE:  An End-to-End Solution to Network Denial of Service - Angelos Stavrou, Columbia University ; Angelos D. Keromytis, Columbia University ;   Jason Nieh, Columbia University ; Vishal Misra, Columbia University ;   Dan Rubenstein, Columbia University

Security Analysis and Improvements for IEEE 802.11i - Changhua He, Stanford University ; John C. Mitchell, Stanford University

Peer-to-Peer Approaches

Privacy-Preserving Friends Troubleshooting Network - Qiang Huang, Princeton University; Helen J. Wang, Microsoft Research ;   Nikita Borisov, University of California, Berkeley

Pretty Secure BGP, psBGP - Tao Wan, Carleton University ; Evangelos Kranakis, Carleton University ; P.C. van Oorschot, Carleton University

Internet Defense

New Streaming Algorithms for Fast Detection of Superspreaders - Shobha Venkataraman, Carnegie Mellon University ; Dawn Song, Carnegie Mellon University ; Phillip B. Gibbons, Intel Research ; Avrim Blum, Carnegie Mellon University

The Internet Motion Sensor - A Distributed Blackhole Monitoring System - Michael Bailey, University of Michigan ; Evan Cooke, University of Michigan ; Farnam Jahanian, University of Michigan ; Jose Nazario, Arbor Networks ; David Watson, University of Michigan

DNS-based Detection of Scanning Worms in an Enterprise Network - David Whyte, Carleton University ; Evangelos Kranakis, Carleton University ; P.C. van Oorschot, Carleton University

Intrusion Detection

DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks - Alexey Smirnov, Stony Brook University ; Tzi-cker Chiueh, Stony Brook University

Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software - James Newsome, Carnegie Mellon University ; Dawn Song, Carnegie Mellon University

Enriching Intrusion Alerts Through Multi-Host Causality - Samuel T. King,, University of Michigan ; Z. Morley Mao, University of Michigan ; Dominic G. Lucchetti, University of Michigan ; Peter M. Chen, University of Michigan

Platform Security

A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities - Shuo Chen, University of Illinois, Urbana-Champaign ; John Dunagan, Microsoft Research ; Chad Verbowski, Microsoft Research ; Yi-Min Wang, Microsoft Research

One-Way Isolation:  An Effective Approach for Realizing Safe Execution Environments - Weiqing Sun, Stony Brook University ; Zhenkai Liang, Stony Brook University ; V.N. Venkatakrishnan, Stony Brook University ; R. Sekar, Stony Brook University


Copyright and Reprint Permissions: The Internet Society owns the copyrights for this publication and all of the papers contained herein.  You may freely reproduce all or part of any paper for noncommercial purposes if you credit the author(s), provide notice to the Internet Society, and cite the Internet Society as the copyright owner.  Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author's employer if the paper was prepared within the scope of employment.

Address your correspondence to:  Director of Conferences and Education, Internet Society, 1775 Wiehle Avenue, Suite 102, Reston, Virginia  20190-5108, U.S.A., tel. +1 703 326 9880, fax +1 703 326 9881, orders@isoc.org.

The papers in this CD-Rom comprise the proceedings of the meeting mentioned above.  They reflect the authors' opinions and, in the interest of timely dissemination, are published as presented and without change.  Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Internet Society.

ISBN Number 1-891562-20-7 (Paper)
ISBN Number 1-891562-19-3 (CD-Rom)