Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education

About the Internet Society 



NDSS Symposium 2006

Conference Proceedings

The Web and Malice

A Crawler-based Study of Spyware in the Web - Alex Moshchuk, Tanya Bragin, Steven D. Gribble, Henry Levy, University of Washington

Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities - Yi-Min Wang, Microsoft Research; Doug Beck, Microsoft Research; Xuxian Jiang, Purdue University; Roussi Roussev, Florida Tech; Chad Verbowski, Microsoft Research; Shuo Chen, Microsoft Research; Sam King, Microsoft Research

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks - William Robertson, Giovanni Vigna, Christopher Kruegel, Richard A. Kemmerer, University of California, Santa Barbara

Healing and Learning

Isolating Intrusions by Automatic Experiments - Stephan Neuhaus, Andreas Zeller, Saarland University

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software - James Newsome, David Brumley, Dawn Song, Jad Chamcham, Xeno Kovah, Carnegie-Mellon University

Software Self-Healing Using Collaborative Application - Stelios Sidiroglou, Michael Locasto, Angelos Keromytis, Columbia University

Potpourri I

Inoculating SSH Against Address Harvesting - Stuart Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain, Massachusetts Institute of Technology

Enterprise Security: A Community of Interest Based Approach - Patrick McDaniel, Pennsylvania State University; Shubho Sen, AT&T; Oliver Spatscheck, AT&T; Jacobus Van der Merwe, AT&T; Bill Aiello, University of British Columbia; Charles Kalmanek, AT&T

Protocol-Independent Adaptive Replay of Application Dialog - Weidong Cui, University of California, Berkeley; Vern Paxson, International Computer Science Institute; Nicholas Weaver, International Computer Science Institute; Randy Katz, University of California, Berkeley


Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles - Keith Frikken, Jiangtao Li, Mikhail Atallah, Purdue University

Deploying a New Hash Algorithm - Steven Bellovin, Columbia University; Eric Rescorla, Network Resonance

Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage - Kevin Fu, University of Massachusetts, Amherst; Seny Kamaram, Johns Hopkins University; Yoshi Kohno, University of California, San Diego

Potpourri II

Induced Churn as Shelter from Routing-Table Poisoning - Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, University of California, Berkeley; Petros Maniatis, Intel Research

Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach - Ryan Gerdes, Thomas Daniels, Mani Mina, Steve Russell, Iowa State University

Modeling Botnet Propagation Using Time Zones - David Dagon, Georgia Tech; Cliff Zou, University of Central Florida; Wenke Lee, Georgia Tech

Privacy and Integrity

Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm - Doug Szajda, Michael Pohl, Jason Owen, Barry Lawson, University of Richmond

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications - Umesh Shankar, University of California, Berkeley; Trent Jaeger, Reiner Sailer, IBM Watson

Copyright and Reprint Permissions: The Internet Society owns the copyrights for this publication and all of the papers contained herein.  You may freely reproduce all or part of any paper for noncommercial purposes if you credit the author(s), provide notice to the Internet Society, and cite the Internet Society as the copyright owner.  Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author's employer if the paper was prepared within the scope of employment.

Address your correspondence to:  Membership Director, Internet Society, 1775 Wiehle Avenue, Suite 102, Reston, Virginia 20190-5108, U.S.A., tel. +1 703 326 9880, fax +1 703 326 9881,

The papers in this CD-Rom comprise the proceedings of the meeting mentioned above.  They reflect the authors' opinions and, in the interest of timely dissemination, are published as presented and without change.  Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Internet Society.

ISBN Number 1-891562-22-3 (Paper)
ISBN Number 1-891562-21-5 (CD-Rom)