Search dblp for Publications

export results for "toc:db/conf/ndss/ndss2009.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ndss/BackesDHU09,
  author       = {Michael Backes and
                  Peter Druschel and
                  Andreas Haeberlen and
                  Dominique Unruh},
  title        = {{CSAR:} {A} Practical and Provable Technique to Make Randomized Systems
                  Accountable},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/csar-practical-and-provable-technique-make-randomized-systems-accountable/},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BackesDHU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BayerCHKK09,
  author       = {Ulrich Bayer and
                  Paolo Milani Comparetti and
                  Clemens Hlauschek and
                  Christopher Kr{\"{u}}gel and
                  Engin Kirda},
  title        = {Scalable, Behavior-Based Malware Clustering},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/scalable-behavior-based-malware-clustering/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BayerCHKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenLM09,
  author       = {Hong Chen and
                  Ninghui Li and
                  Ziqing Mao},
  title        = {Analyzing and Comparing the Protection Quality of Security Enhanced
                  Operating Systems},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/analyzing-and-comparing-the-protection-quality-of-security-enhanced-operating-systems/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChowLS09,
  author       = {Sherman S. M. Chow and
                  Jie{-}Han Lee and
                  Lakshminarayanan Subramanian},
  title        = {Two-Party Computation Model for Privacy-Preserving Queries over Distributed
                  Databases},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/two-party-computation-model-privacy-preserving-queries-over-distributed-databases/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChowLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DagonADLLL09,
  author       = {David Dagon and
                  Manos Antonakakis and
                  Kevin Day and
                  Xiapu Luo and
                  Christopher P. Lee and
                  Wenke Lee},
  title        = {Recursive {DNS} Architectures and Vulnerability Implications},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/recursive-dns-architectures-and-vulnerability-implications/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DagonADLLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DanezisM09,
  author       = {George Danezis and
                  Prateek Mittal},
  title        = {SybilInfer: Detecting Sybil Nodes using Social Networks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/sybillnfer-detecting-sybil-nodes-using-social-networks/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DanezisM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Gates09,
  author       = {Carrie Gates},
  title        = {Coordinated Scan Detection},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/coordinated-scan-detection/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Gates09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GundyC09,
  author       = {Matthew Van Gundy and
                  Hao Chen},
  title        = {Noncespaces: Using Randomization to Enforce Information Flow Tracking
                  and Thwart Cross-Site Scripting Attacks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/noncespaces-using-randomization-to-enforce-information-flow-tracking-and-thwart-cross-site-scripting-attacks/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GundyC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HoumansadrKB09,
  author       = {Amir Houmansadr and
                  Negar Kiyavash and
                  Nikita Borisov},
  title        = {{RAINBOW:} {A} Robust And Invisible Non-Blind Watermark for Network
                  Flows},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/rainbow-a-robust-and-invisible-non-blind-watermark-for-network-flows/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HoumansadrKB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HuKS09,
  author       = {Xin Hu and
                  Matthew Knysz and
                  Kang G. Shin},
  title        = {RB-Seeker: Auto-detection of Redirection Botnets},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/rb-seeker-auto-detection-of-redirection-botnets/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HuKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/KarlofTW09,
  author       = {Chris Karlof and
                  J. Doug Tygar and
                  David A. Wagner},
  title        = {Conditioned-safe Ceremonies and a User Study of an Application to
                  Web Authentication},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/conditioned-safe-ceremonies-and-user-study-application-web-authentication/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/KarlofTW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LanziSL09,
  author       = {Andrea Lanzi and
                  Monirul Islam Sharif and
                  Wenke Lee},
  title        = {K-Tracer: {A} System for Extracting Kernel Malware Behavior},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/k-tracer-system-extracting-kernel-malware-behavior/},
  timestamp    = {Wed, 11 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LanziSL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/McCunePR09,
  author       = {Jonathan M. McCune and
                  Adrian Perrig and
                  Michael K. Reiter},
  title        = {Safe Passage for Passwords and Other Sensitive Data},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/safe-passage-for-passwords-and-other-sensitive-data/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/McCunePR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NadjiSS09,
  author       = {Yacin Nadji and
                  Prateek Saxena and
                  Dawn Song},
  title        = {Document Structure Integrity: {A} Robust Basis for Cross-site Scripting
                  Defense},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/document-structure-integrity-a-robust-basis-for-cross-site-scripting-defense/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/NadjiSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Sekar09,
  author       = {R. Sekar},
  title        = {An Efficient Black-box Technique for Defeating Web Application Attacks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/an-efficient-black-box-technique-for-defeating-web-application-attacks/},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/Sekar09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SongKS09,
  author       = {Yingbo Song and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  title        = {Spectrogram: {A} Mixture-of-Markov-Chains Model for Anomaly Detection
                  in Web Traffic},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/spectrogram-mixture-markov-chains-model-anomaly-detection-web-traffic/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SongKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangWLZ09,
  author       = {Tielei Wang and
                  Tao Wei and
                  Zhiqiang Lin and
                  Wei Zou},
  title        = {IntScope: Automatically Detecting Integer Overflow Vulnerability in
                  {X86} Binary Using Symbolic Execution},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/intscope-automatically-detecting-integer-overflow-vulnerability-in-x86-binary-using-symbolic-execution/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangWLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WeaverSP09,
  author       = {Nicholas Weaver and
                  Robin Sommer and
                  Vern Paxson},
  title        = {Detecting Forged {TCP} Reset Packets},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/detecting-forged-tcp-reset-packets/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WeaverSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WilliamsSS09,
  author       = {Peter Williams and
                  Radu Sion and
                  Dennis E. Shasha},
  title        = {The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/the-blind-stone-tablet-outsourcing-durability-to-untrusted-parties/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WilliamsSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WrightCM09,
  author       = {Charles V. Wright and
                  Scott E. Coull and
                  Fabian Monrose},
  title        = {Traffic Morphing: An Efficient Defense Against Statistical Traffic
                  Analysis},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/traffic-morphing-efficient-defense-against-statistical-traffic-analysis/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WrightCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2009,
  title        = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2009, San Diego, California, USA, 8th February - 11th February
                  2009},
  publisher    = {The Internet Society},
  year         = {2009},
  url          = {https://www.ndss-symposium.org/ndss2009/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics