Contractual Anonymity
2023-12-27 14:51:35 Author: www.ndss-symposium.org(查看原文) 阅读量:4 收藏

Server-side Verification of Client Behavior in Online Games

Darrell Bethea, Robert Cochran and Michael Reiter

Read More

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs

Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel

Read More

Stealth DoS Attacks on Secure Channels

Amir Herzberg and Haya Shulman

Read More

Protecting Browsers from Extension Vulnerabilities

Adam Barth, Adrienne Porter Felt, Prateek Saxena, and Aaron Boodman

Read More

Adnostic: Privacy Preserving Targeted Advertising

Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum and Solon Barocas

Read More

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications

Prateek Saxena, Steve Hanna, Pongsin Poosankam and Dawn Song

Read More

Effective Anomaly Detection with Scarce Training Data

William Robertson, Federico Maggi, Christopher Kruegel and Giovanni Vigna

Read More

Large-Scale Automatic Classification of Phishing Pages

Colin Whittaker, Brian Ryner and Marria Nazif

Read More

A Systematic Characterization of IM Threats using Honeypots

Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos and Spiros Antonatos

Read More

On Network-level Clusters for Spam Detection

Zhiyun Qian, Zhuoqing Mao, Yinglian Xie and Fang Yu

Read More

Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation

Sushant Sinha, Michael Bailey and Farnam Jahanian

Read More

Botnet Judo: Fighting Spam with Itself

Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver and Stefan Savage

Read More

Contractual Anonymity

Edward J. Schwartz, David Brumley and Jonathan M. McCune

Read More

A3: An Extensible Platform for Application-Aware Anonymity

Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo and Matt Blaze

Read More

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography

Thomas Ristenpart and Scott Yilek

Read More

InvisiType: Object-Oriented Security Policies

Jiwon Seo and Monica S. Lam

Read More

A Security Evaluation of DNSSEC with NSEC3

Jason Bau and John Mitchell

Read More

On the Safety of Enterprise Policy Deployment

Yudong Gao, Ni Pan, Xu Chen and Z. Morley Mao

Read More

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation

Suresh Chari, Shai Halevi and Wietse Venema

Read More

Joe-E: A Security-Oriented Subset of Java

Adrian Mettler, David Wagner and Tyler Close

Read More

Preventing Capability Leaks in Secure JavaScript Subsets

Matthew Finifter, Joel Weinberger and Adam Barth

Read More

Binary Code Extraction and Interface Identification for Security Applications

Juan Caballero, Noah M. Johnson, Stephen McCamant, and Dawn Song

Read More

Automatic Reverse Engineering of Data Structures from Binary Execution

Zhiqiang Lin, Xiangyu Zhang and Dongyan Xu

Read More

Efficient Detection of Split Personalities in Malware

Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel and Giovanni Vigna

Read More


文章来源: https://www.ndss-symposium.org/ndss2010/accepted-papers/#Contractual%20Anonymity
如有侵权请联系:admin#unsafe.sh