Sciweavers

99
Voted
NDSS
2015
IEEE
9 years 11 months ago
NSEC5: Provably Preventing DNSSEC Zone Enumeration
Abstract—We use cryptographic techniques to study zone enumeration in DNSSEC. DNSSEC is designed to prevent attackers from tampering with domain name system (DNS) messages. The c...
Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos...
108
Voted
NDSS
2015
IEEE
9 years 11 months ago
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse
—Typosquatting is the act of purposefully registering a domain name that is a mistype of a popular domain name. It is a concept that has been known and studied for over 15 years,...
Pieter Agten, Wouter Joosen, Frank Piessens, Nick ...
103
Voted
NDSS
2015
IEEE
9 years 11 months ago
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions
—In cyber attack analysis, it is often highly desirable to understand the meaning of an unknown file or network message in the absence of their consumer (i.e. the program that p...
Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim...
100
Voted
NDSS
2015
IEEE
9 years 11 months ago
Preventing Use-after-free with Dangling Pointers Nullification
—Many system components and network applications are written in languages that are prone to memory corruption vulnerabilities. There have been countless cases where simple mistak...
Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tiel...
99
Voted
NDSS
2015
IEEE
9 years 11 months ago
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
Abstract—ARM TrustZone, which provides a Trusted Execution Environment (TEE), normally plays a role in keeping security-sensitive resources safe. However, to properly control acc...
Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong K...