Sciweavers

NDSS
2007
IEEE
13 years 11 months ago
Cryptographic Methods for Storing Ballots on a Voting Machine
A direct recording electronic (DRE) voting machine must satisfy several requirements to ensure voter privacy and the integrity of the election. A recent proposal for a vote storag...
John Bethencourt, Dan Boneh, Brent Waters
NDSS
2007
IEEE
13 years 11 months ago
Army of Botnets
The trend toward smaller botnets may be more dangerous than large botnets, in terms of large-scale attacks like distributed denials of service. We examine the possibility of “su...
Ryan Vogt, John Aycock, Michael J. Jacobson Jr.
NDSS
2007
IEEE
13 years 11 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
NDSS
2007
IEEE
13 years 11 months ago
Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing
Compared to attacks against end hosts, Denial of Service (DoS) attacks against the Internet infrastructure such as those targeted at routers can be more devastating due to their g...
Ying Zhang, Zhuoqing Morley Mao, Jia Wang
NDSS
2007
IEEE
13 years 11 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
NDSS
2007
IEEE
13 years 11 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...
NDSS
2007
IEEE
13 years 11 months ago
Shedding Light on the Configuration of Dark Addresses
Sushant Sinha, Michael Bailey, Farnam Jahanian
NDSS
2007
IEEE
13 years 11 months ago
Fig: Automatic Fingerprint Generation
Fingerprinting is a widely used technique among the networking and security communities for identifying different implementations of the same piece of networking software running ...
Shobha Venkataraman, Juan Caballero, Pongsin Poosa...
NDSS
2007
IEEE
13 years 11 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...
NDSS
2007
IEEE
13 years 11 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...