miércoles, 7 de octubre de 2009

Presentaciones: 16th Annual Network & Distributed System Security Symposium

Como complemento al post "Simposio NDSS (Seguridad de Redes y Sistemas Distribuidos)" también se publicaron las siguientes slides y papers:

NDSS Symposium 2009 -The Catamaran Resort Hotel and Spa - San Diego, CA - 8 - 11 February

16th Annual Network & Distributed System Security Symposium

Session 1: Web Security

Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Paper (PDF: 811KB)
Presentation slide (PDF: 481KB) - Authors: Y. Nadji, P. Saxena, D. Song

An Efficient Black-box Technique for Defeating Web Application Attacks
Paper (PDF: 394KB)
Presentation slide (PDF: 144KB) - Author: R. Sekar

Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-site Scripting Attacks
Paper (PDF: 740KB)
Presentation slide (PDF: 2.2MB) - Authors: M. Van Gundy, H. Chen

Session 2: Distributed Systems:

The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
Paper (PDF: 302KB)
Presentation slide (PDF: 184KB) - Authors: P. Williams, R. Sion, D. Shasha

Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Paper (PDF: 375KB) - Authors: S.S.M. Chow, J. Lee, L. Subramanian

Sybillnfer: Detecting Sybil Nodes using Social Networks
Paper (PDF: 316KB) - Authors: G. Danezis, P. Mittal

Session 3: Intrusion Detection:

Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
Paper (PDF: 260KB) - Authors: Y. Song, A. Keromytis, S. Stolfo

Detecting Forged TCP Reset Packets
Paper (PDF: 216KB)
Presentation slide (PDF: 144KB) - Author: N. Weaver, R. Sommer, V. Paxson

Coordinated Scan Detection
Paper (PDF: 408KB)
Presentation slide (PDF: 367KB) - Author: C. Gates

Session 4: Malware:

RB-Seeker: Auto-detection of Redirection Botnets
Paper (PDF: 713KB)
Presentation slide (PDF: 1.7MB) - Authors: X. Hu, M. Knysz, K.G. Shin

Scalable, Behavior-Based Malware Clustering
Paper (PDF: 463KB)
Presentation slide (PDF: 210KB) - Authors: U. Bayer, P. Milani Comparetti, C. Hlauschek, C. Kruegel, E. Kirda

K-Tracer: A System for Extracting Kernel Malware Behavior
Paper (PDF: 1.1MB) - Authors: A. Lanzi, M. Sharif, W. Lee

Session 5: Traffic Protection and Infrastructure Security:

RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows
Paper (PDF: 594KB)
Presentation slide (PDF: 1.7MB) - Authors: A. Houmansadr, N. Kiyavash, N. Borisov

Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis
Paper (PDF: 424KB) - Authors: C. Wright, S. Coull, F. Monrose

Recursive DNS Architectures and Vulnerability Implications
Paper (PDF: 1.2MB) - Authors: D. Dagon, M. Antonakakis, K. Day, X. Luo, C.P. Lee, W. Lee

Session 6: Host Security:

Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Paper (PDF: 261KB)
Presentation slide (PDF: 1.2MB) - Authors: H. Chen, N. Li, Z. Mao

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution
Paper (PDF: 198KB)
Presentation slide (PDF: 1.2MB) - Authors: T. Wang, T. Wei, Z. Lin, W. Zou

Session 7: Authentication and Accountability:

Safe Passage for Passwords and Other Sensitive Data
Paper (PDF: 548KB)
Presentation slide (PDF: 621KB) - Authors: J. McCune, A. Perrig, M. Reiter

Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication
Paper (PDF: 764KB) - Author: C. Karlof, J.D. Tygar, D. Wagner

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable
Paper (PDF: 489KB) - Authors: M. Backes, P. Druschel, A. Haeberlen, D. Unruh


No hay comentarios: