Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks
2023-12-26 20:2:48 Author: www.ndss-symposium.org(查看原文) 阅读量:7 收藏

Plain-Text Recovery Attacks Against Datagram TLS

Kenneth Paterson and Nadhem Alfardan

Read More

ANDaNA: Anonymous Named Data Networking Application

Steven Dibenedetto, Paolo Gasti, Gene Tsudik and Ersin Uzun

Read More

Persistent OSPF Attacks

Gabi Nakibly, Alex Kirshon, Dima Gonikman and Dan Boneh

Read More

You are what you like! Information leakage through users’ Interests

Abdelberi Chaabane, Gergely Acs and Mohamed Ali Kaafar

Read More

X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks

Prateek Mittal, Matthew Caesar and Nikita Borisov

Read More

Towards Online Spam Filtering in Social Networks

Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary

Read More

Location leaks over the GSM air interface

Denis Foo Kune, John Koelndorfer, Nicholas Hopper and Yongdae Kim

Read More

Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks

Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi and Jean-Pierre Hubaux

Read More

You Can Run, but You Can’t Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks

Zhiyun Qian, Zhaoguang Wang, Qiang Xu, Z. Morley Mao, Ming Zhang and Yi-Min Wang

Read More

Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications

Nico Golde, Kévin Redon and Ravishankar Borgaonkar

Read More

Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud

Yanbin Lu

Read More

Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds

Yangyi Chen, Bo Peng, Xiaofeng Wang and Haixu Tang

Read More

Making argument systems for outsourced computation practical (sometimes)

Srinath Setty, Richard Mcpherson, Andrew Blumberg and Michael Walfish

Read More

Towards Practical Oblivious RAM

Emil Stefanov, Elaine Shi and Dawn Song

Read More

Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation

Lok Yan, Manjukumar Jayachandra, Mu Zhang and Heng Yin

Read More

FreeMarket: Shopping for free in Android applications

Daniel Reynaud, Dawn Song, Tom Magrino, Edward Wu and Richard Shin

Read More

Distance Hijacking Attacks on Distance Bounding Protocols

Cas Cremers, Kasper Bonne Rasmussen and Srdjan Capkun

Read More

Throttling Tor Bandwidth Parasites

Rob Jansen, Nicholas Hopper and Paul Syverson

Read More

Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous

Maxfield Schuchard, Christopher Thompson, Nicholas Hopper and Yongdae Kim

Read More

Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems

Jeff Seibert, Sheila Becker, Cristina Nita-Rotaru and Radu State

Read More

Charm: A Framework for Rapidly Prototyping Cryptosystems

Joseph A. Akinyele, Matthew D. Green and Aviel D. Rubin

Read More

Abuse Detection and Prevention Systems at a Large Scale Video Sharing Website

Yu-To Chen, Pierre Grinspan, Blake Livingston, Palash Nandy and Brian Palmer

Read More

Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation

Mohammad Islam, Mehmet Kuzu and Murat Kantarcioglu

Read More

On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability

Qiang Yan, Jin Han, Yingjiu Li and Robert H. Deng

Read More

Adaptive Password-Strength Meters from Markov Models

Claude Castelluccia, Markus Duermuth and Daniele Perito

Read More

Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?

Yan Huang, David Evans and Jonathan Katz

Read More

Guess Who’s Texting You? Evaluating the Security of Smartphone Messaging Applications

Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber and Edgar Weippl

Read More

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger and Ahmad-Reza Sadeghi

Read More

Towards Taming Privilege-Escalation Attacks on Android

Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi and Bhargava Shastry

Read More

Systematic Detection of Capability Leaks in Stock Android Smartphones

Michael Grace, Yajin Zhou, Zhi Wang and Xuxian Jiang

Read More

Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets

Yajin Zhou, Zhi Wang, Wu Zhou and Xuxian Jiang

Read More

Insights into User Behavior in Dealing with Internet Attacks

Kaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda and Davide Balzarotti

Read More

PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks

Yinzhi Cao, Vinod Yegneswaran, Phillip Porras and Yan Chen

Read More

The Latent Community Model for Detecting Sybils in Social Networks

Zhuhua Cai and Christopher Jermaine

Read More

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation

Man Ho Au, Apu Kapadia and Willy Susilo

Read More

Accountable Wiretapping -or- I know they can hear you now

Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor and Dan Wallach

Read More

Shadow: Running Tor in a Box for Accurate and Efficient Experimentation

Rob Jansen and Nicholas Hopper

Read More

Discovering Semantic Data of Interest from Un-mappable Memory with Confidence

Zhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang and Dongyan Xu

Read More

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes

Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou

Read More

SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust

Karim Eldefrawy, Gene Tsudik, Aurélien Francillon and Daniele Perito

Read More

Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring

Donghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu and Changzhen Hu

Read More

WarningBird: Detecting Suspicious URLs in Twitter Stream

Sangho Lee and Jong Kim

Read More

Using replicated execution for a more secure and reliable web browser

Hui Xue, Nathan Dautenhahn and Samuel King

Read More

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications

Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu and Martin Abadi

Read More

Chrome Extensions: Threat Analysis and Countermeasures

Lei Liu, Xinwen Zhang, Guanhua Yan and Songqing Chen

Read More

Ghost Domain Names: Revoked Yet Still Resolvable

Jian Jiang, Jinjin Liang, Kang Li, Jun Li, Haixin Duan and Jianping Wu

Read More

ShortMAC: Efficient Data-Plane Fault Localization

Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig and Patrick Tague

Read More

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Jignesh Patel, Alex Liu and Eric Torng

Read More

The Case for Prefetching and Prevalidating TLS Server Certificates

Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson and Dan Boneh

Read More

Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems

Hyojeong Lee, Jeff Seibert, Charles Killian and Cristina Nita-Rotaru

Read More

Automated Synthesis of Secure Distributed Applications

Michael Backes, Matteo Maffei and Kim Pecina

Read More

A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware

Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August and Angelos D. Keromytis

Read More

Static detection of C++ vtable escape vulnerabilities in binary code

David Dewey and Jon Giffin

Read More

Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis

Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang and Heng Yin

Read More


文章来源: https://www.ndss-symposium.org/ndss2012/accepted-papers/#Track%20Me%20If%20You%20Can:%20On%20the%20Effectiveness%20of%20Context-based%20Identifier%20Changes%20in%20Deployed%20Mobile%20Networks
如有侵权请联系:admin#unsafe.sh