Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized Network Traces
2024-1-4 21:5:41 Author: www.ndss-symposium.org(查看原文) 阅读量:5 收藏

Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing

Ying Zhang, Zhuoqing Mao and J. Wang

Read More

Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized Network Traces

Scott Coull, C. Wright, Fabian Monrose, Michael Collins and Michael K. Reiter

Read More

Fig: Automatic Fingerprint Generation

Juan Caballero, S. Venkataraman, Pongsin Poosankam, Min Gyung Kang and Dawn Song

Read More

Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis

Philipp Vogt, Engin Kirda, Christopher Kruegel and Giovanni Vigna

Read More

A Quantitative Study of Forum Spamming Using Context-based Analysis

Yuan Niu, Hao Chen, Francis Hsu and Yi-Min Wang

Read More

Phinding Phish: An Evaluation of Anti-Phishing Toolbars

Lorrie Cranor, Serge Egelman, Jason Hong and Yue Zhang

Read More

Army of Botnets

Ryan Vogt, John Aycock and Michael Jacobson

Read More

Shedding Light on the Configuration of Dark Addresses

Sushant Sinha, Michael Bailey and Farnam Jahanian

Read More

Consumable Credentials in Linear-Logic-Based Access-Control Systems

Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning and Michael K. Reiter

Read More

Secret Handshakes with Dynamic and Fuzzy Matching

Giuseppe Ateniese, Jonathan Kirsch and Marina Blanton

Read More

Attribute-Based Publishing with Hidden Credentials and Hidden Policies

Apu Kapadia, Patrick Tsang and Sean Smith

Read More

File System Design with Assured Delete

Radia Perlman

Read More

Cryptographic Methods for Storing Ballots on a Voting Machine

J. Bethencourt, Dan Boneh and Brent Waters

Read More

On the Practicality of Private Information Retrieval

R. Sion and Bogdan Carbunar

Read More

RICH: Automatically Protecting Against Integer-Based Vulnerabilities

David Brumley, Dawn Song, Tzi-cker Chiueh, Rob Johnson and Huija Lin

Read More

Generic Application-Level Protocol Analyzer and its Language

Nikita Borisov, David Brumley, Helen Wang, John Dunagan, Pallavi Joshi and Chuanxiong Guo

Read More

OPTWALL: A Hierarchical Traffic-Aware Firewall

Subrata Acharya, Bryan Mills, Mehmud Abliz, Taieb Znati, J. Wang, Zihui Ge and Albert Greenberg

Read More


文章来源: https://www.ndss-symposium.org/ndss2007/accepted-papers/#Playing%20Devil%E2%80%99s%20Advocate:%20Inferring%20Sensitive%20Information%20from%20Anonymized%20Network%20Traces
如有侵权请联系:admin#unsafe.sh