default search action
NDSS 2006: San Diego, California, USA
The Web and Malice
- Alexander Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy:
A Crawler-based Study of Spyware in the Web. - Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King:
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. - William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer:
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks.
- Stephan Neuhaus, Andreas Zeller:
Isolating Intrusions by Automatic Experiments. - James Newsome, David Brumley, Dawn Xiaodong Song:
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. - Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis:
Software Self-Healing Using Collaborative Application Communities.
- Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain:
Inoculating SSH Against Address Harvesting. - Patrick D. McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek:
Enterprise Security: A Community of Interest Based Approach. - Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz:
Protocol-Independent Adaptive Replay of Application Dialog.
- Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah:
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. - Steven M. Bellovin, Eric Rescorla:
Deploying a New Hash Algorithm. - Kevin Fu, Seny Kamara, Yoshi Kohno:
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
- Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis:
Induced Churn as Shelter from Routing-Table Poisoning. - Ryan M. Gerdes, Thomas E. Daniels, Mani Mina, Steve Russell:
Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach. - David Dagon, Cliff Changchun Zou, Wenke Lee:
Modeling Botnet Propagation Using Time Zones.
- Doug Szajda, Michael Pohl, Jason Owen, Barry G. Lawson:
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm. - Umesh Shankar, Trent Jaeger, Reiner Sailer:
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.