Internet Society Frontpage

Events Membership
About the Internet Standards
Publications  Public Policy
About ISOC Education


NDSS Sponsors
NDSS 2010 - The Network and Security Conference


Session 1: Distributed Systems and Networks

Server-side Verification of Client Behavior in Online Games
Paper (PDF: 289KB)
Authors: Darrell Bethea, Robert Cochran and Michael Reiter

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Paper (PDF: 942KB)
Authors: Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel

Stealth DoS Attacks on Secure Channels
Paper (PDF: 690KB)
Authors: Amir Herzberg and Haya Shulman

Session 2: Web Security and Privacy

Protecting Browsers from Extension Vulnerabilities
Paper (PDF: 439KB)
Authors: Adam Barth, Adrienne Porter Felt, Prateek Saxena, and Aaron Boodman

Adnostic: Privacy Preserving Targeted Advertising
Paper (PDF: 266KB)
Authors: Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum and Solon Barocas

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications
Paper (PDF: 879KB)
Authors: Prateek Saxena, Steve Hanna, Pongsin Poosankam and Dawn Song

Session 3: Intrusion Detection and Attack Analysis

Effective Anomaly Detection with Scarce Training Data
Paper (PDF: 552KB)
Authors: William Robertson, Federico Maggi, Christopher Kruegel and Giovanni Vigna

Large-Scale Automatic Classification of Phishing Pages
Paper (PDF: 195KB)
Author: Colin Whittaker, Brian Ryner and Marria Nazif

A Systematic Characterization of IM Threats using Honeypots
Paper (PDF: 338KB)
Authors: Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos and Spiros Antonatos

Session 4: Spam

On Network-level Clusters for Spam Detection
Paper (PDF: 716KB)
Authors: Zhiyun Qian, Zhuoqing Mao, Yinglian Xie and Fang Yu

Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation
Paper (PDF: 573KB)
Authors: Sushant Sinha, Michael Bailey and Farnam Jahanian

Botnet Judo: Fighting Spam with Itself
Paper (PDF: 1.76MB)
Authors: Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver and Stefan Savage

Session 5: Anonymity and Cryptographic Systems

Contractual Anonymity
Paper (PDF: 263KB)
Authors: Edward J. Schwartz, David Brumley and Jonathan M. McCune

A3: An Extensible Platform for Application-Aware Anonymity
Paper (PDF: 411KB)
Authors: Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, and Matt Blaze

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography
Paper (PDF: 296KB)
Authors: Thomas Ristenpart and Scott Yilek

Session 6: Security Protocols and Policies

InvisiType: Object-Oriented Security Policies
Paper (PDF: 377KB)
Authors: Jiwon Seo and Monica S. Lam

A Security Evaluation of DNSSEC with NSEC3
Paper (PDF: 362KB)
Authors: Jason Bau and John Mitchell

On the Safety of Enterprise Policy Deployment
Paper (PDF: 315KB)
Authors: Yudong Gao, Ni Pan, Xu Chen and Z. Morley Mao

Session 7: Languages and Systems Security

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
Paper (PDF: 315KB)
Authors: Suresh Chari, Shai Halevi and Wietse Venema

Joe-E: A Security-Oriented Subset of Java
Paper (PDF: 234KB)
Authors: Adrian Mettler, David Wagner and Tyler Close

Preventing Capability Leaks in Secure JavaScript Subsets
Paper (PDF: 315KB)
Authors: Matthew Finifter, Joel Weinberger and Adam Barth

Session 8: Malware

Binary Code Extraction and Interface Identification for Security Applications
Paper (PDF: 422KB)
Authors:Juan Caballero, Noah M. Johnson, Stephen McCamant, and Dawn Song

Automatic Reverse Engineering of Data Structures from Binary Execution
Paper (PDF: 367KB)
Authors:Zhiqiang Lin, Xiangyu Zhang and Dongyan Xu

Efficient Detection of Split Personalities in Malware
Paper (PDF: 155KB)
Authors:Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel and Giovanni Vigna