NDSS Symposium 2005
Cryptography in Network Security
Space-Efficient Block Storage Integrity - Alina Oprea, Carnegie Mellon University ; Mike Reiter, Carnegie Mellon University ; Ke Yang, Google
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage - Giuseppe Ateniese, Johns Hopkins University ; Kevin Fu, MIT ; Matthew Green, Johns Hopkins University ; Susan Hohenberger, MIT
Rekeying and Storage Cost for Multiple User Revocation - Sandeep S. Kulkarni, Michigan State University ; Bezawada Bruhadeshwar, Michigan State University
Denial of Service Attacks
On a New Class of Pulsing Denial-of-Service Attacks and the Defense - Xiapu Luo, Hong Kong Polytechnic University ; Rocky K. C. Chang, Hong Kong Polytechnic University
MOVE: An End-to-End Solution to Network Denial of Service - Angelos Stavrou, Columbia University ; Angelos D. Keromytis, Columbia University ; Jason Nieh, Columbia University ; Vishal Misra, Columbia University ; Dan Rubenstein, Columbia University
Security Analysis and Improvements for IEEE 802.11i - Changhua He, Stanford University ; John C. Mitchell, Stanford University
Privacy-Preserving Friends Troubleshooting Network - Qiang Huang, Princeton University; Helen J. Wang, Microsoft Research ; Nikita Borisov, University of California, Berkeley
Pretty Secure BGP, psBGP - Tao Wan, Carleton University ; Evangelos Kranakis, Carleton University ; P.C. van Oorschot, Carleton University
New Streaming Algorithms for Fast Detection of Superspreaders - Shobha Venkataraman, Carnegie Mellon University ; Dawn Song, Carnegie Mellon University ; Phillip B. Gibbons, Intel Research ; Avrim Blum, Carnegie Mellon University
The Internet Motion Sensor - A Distributed Blackhole Monitoring System - Michael Bailey, University of Michigan ; Evan Cooke, University of Michigan ; Farnam Jahanian, University of Michigan ; Jose Nazario, Arbor Networks ; David Watson, University of Michigan
DNS-based Detection of Scanning Worms in an Enterprise Network - David Whyte, Carleton University ; Evangelos Kranakis, Carleton University ; P.C. van Oorschot, Carleton University
DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks - Alexey Smirnov, Stony Brook University ; Tzi-cker Chiueh, Stony Brook University
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software - James Newsome, Carnegie Mellon University ; Dawn Song, Carnegie Mellon University
Enriching Intrusion Alerts Through Multi-Host Causality - Samuel T. King,, University of Michigan ; Z. Morley Mao, University of Michigan ; Dominic G. Lucchetti, University of Michigan ; Peter M. Chen, University of Michigan
A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities - Shuo Chen, University of Illinois, Urbana-Champaign ; John Dunagan, Microsoft Research ; Chad Verbowski, Microsoft Research ; Yi-Min Wang, Microsoft Research
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments - Weiqing Sun, Stony Brook University ; Zhenkai Liang, Stony Brook University ; V.N. Venkatakrishnan, Stony Brook University ; R. Sekar, Stony Brook University
Copyright and Reprint Permissions: The Internet Society owns the copyrights for this publication and all of the papers contained herein. You may freely reproduce all or part of any paper for noncommercial purposes if you credit the author(s), provide notice to the Internet Society, and cite the Internet Society as the copyright owner. Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author's employer if the paper was prepared within the scope of employment.
Address your correspondence to: Director of Conferences and Education, Internet Society, 1775 Wiehle Avenue, Suite 102, Reston, Virginia 20190-5108, U.S.A., tel. +1 703 326 9880, fax +1 703 326 9881, email@example.com.
The papers in this CD-Rom comprise the proceedings of the meeting mentioned above. They reflect the authors' opinions and, in the interest of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Internet Society.
ISBN Number 1-891562-20-7 (Paper)