Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education


NDSS Sponsors
NDSS 2011 - The Network and Security Conference

NDSS Symposium 2011

The Dana on Mission Bay
San Diego, California
6-9 February 2011

18th Annual Network & Distributed System Security Symposium



Presentation slide (PPT: 5.4MB)
Presentation slide (PDF 4.MB)

Session 1: Secure Emerging Applications: Social Networks and Smartphones

Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
Paper (PDF: 267KB)
Authors: Roman Schlegel, Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang

A Security API for Distributed Social Networks
Paper (PDF: 1MB)
Presentation slide (PDF: 3MB)
Authors: Michael Backes, Matteo Maffei, Kim Pecina

Location Privacy via Private Proximity Testing
Paper (PDF: 479KB)
Presentation slide (PDF: 830KB)
Authors: Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg, and Dan Boneh

Session 2: Wireless Attacks!

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Paper (PDF: 4MB)
Presentation slide (PDF: 1.7MB)
Authors: Aurelien Francillon, Boris Danev, and Srdjan Capkun

Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks
Paper (PDF: 1.5MB)
Presentation slide (PDF: 1MB)
Authors: Omid Fatemieh, Ali Farhadi, Ranyeer Chandra, and Carl A. Gunter

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas
Paper (PDF: 760KB)
Presentation slide (PDF: 3.8MB)
Authors: Liang Cai, Kai Zeng, Hao Chen, and Prasant Mohapatra

Session 3: OS Security

Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions
Paper (PDF: 632KB)
Presentation slide (PDF: 2.4MB)
Authors: Xi Xiong, Donghai Tian, and Peng Liu

Efficient Monitoring of Untrusted Kernel-Mode Execution
Paper (PDF: 670KB)
Authors: Abhinav Srivastava and Jonathon Giffin

SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures
Paper (PDF: 448KB)
Presentation slide (PDF: 1MB)
Authors: Zhiqiang Lin, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu, and Xuxian Jiang

Session 4: Network Malware

Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
Paper (PDF: 258KB)
Authors: Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune, Nicholas Hopper, Yongdae Kim, and Eugene Y. Vasserman

EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
Paper (PDF: 206KB)
Presentation slide (PDF: 420KB)
Authors: Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi

Session 5: Software Security / Code Analysis

Howard: A Dynamic Excavator for Reverse Engineering Data Structures
Paper (PDF: 574KB)
Presentation slide (PDF: 710KB)
Authors: Asia Slowinska, Traian Stancescu, and Herbert Bos

No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects
Paper (PDF: 332KB)
Presentation slide (PDF: 1.2MB)
Authors: David Dewey and Patrick Traynor

TIE: Principled Reverse Engineering of Types in Binary Programs
Paper (PDF: 267KB)
Presentation slide (PDF: 4.3MB)
Authors: JongHyup Lee, Thanassis Avgerinos, and David Brumley

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation
Paper (PDF: 253KB)
Presentation slide (PDF: 370KB)
Authors: Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, and Dawn Song

AEG: Automatic Exploit Generation
Paper (PDF: 419KB)
Presentation slide (PDF: 2MB)
Authors: Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley

Session 6: Web Security

Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications
Paper (PDF: 196KB)
Presentation slide (PDF: 880KB)
Authors: Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, and Engin Kirda

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications
Paper (PDF: 285KB)
Presentation slide (PDF: 440KB)
Authors: Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu and Clint Sbisa

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows
Paper (PDF: 971KB)
Presentation slide (PDF: 1.3MB)
Authors: Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, and Roberto Perdisci

Session 7: Network Security

Accurate and Provably Secure Latency Estimation with Treeple
Paper (PDF: 294KB)
Authors: Eric Chan-Tin and Nicholas Hopper

On Measuring the Similarity of Network Hosts: Pitfalls, New Metrics, and Empirical Analyses
Paper (PDF: 790KB)
Authors: Scott Coull, Fabian Monrose, and Michael Bailey

SWIRL: A Scalable Watermark to Detect Correlated Network Flows
Paper (PDF: 591KB)
Authors: Amir Houmansadr and Nikita Borisov

Session 8: Real-World Security: Cloud Computing, Biometrics, and Humans

SPARE: Replicas on Hold
Paper (PDF: 587KB)
Authors: Tobias Distler, Ivan Popov, Wolfgang Schroder-Preikschat, Hans P. Reiser, and Ruediger Kapitza,

Efficient Privacy-Preserving Biometric Identification
Paper (PDF: 1.1MB)
Presentation slide (PDF: 2.5MB)
Authors: Yan Huang, Lior Malka, David Evans, and Jonathan Katz

Usability Testing a Malware-Resistant Input Mechanism
Paper (PDF: 411KB)
Presentation slide (PDF: 1.4MB)
Authors: Alana Libonati, Jonathan M. McCune, and Michael K. Reiter

Session 9: Privacy

Tracker: Security and Privacy for RFID-based Supply Chains
Paper (PDF: 312KB)
Presentation slide (PDF: 110KB)
Authors: Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva

PiOS: Detecting Privacy Leaks in iOS Applications
Paper (PDF: 278KB)
Presentation slide (PDF: 420KB)
Authors: Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna

Privacy-Preserving Aggregation of Time-Series Data
Paper (PDF: 361KB)
Presentation slide (PDF: 4.9MB)
Authors: Elaine Shi, T-H. Hubert Chan, Eleanor Rieffel, Richard Chow, and Dawn Song