Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ndss/ndss2015.bht:"
@inproceedings{DBLP:conf/ndss/0001KK15, author = {Sangho Lee and Hyungsub Kim and Jong Kim}, title = {Identifying Cross-origin Resource Status Using Application Cache}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/identifying-cross-origin-resource-status-using-application-cache}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/0001KK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AgtenJPN15, author = {Pieter Agten and Wouter Joosen and Frank Piessens and Nick Nikiforakis}, title = {Seven Months' Worth of Mistakes: {A} Longitudinal Study of Typosquatting Abuse}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/seven-months-worth-mistakes-longitudinal-study-typosquatting-abuse}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AgtenJPN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AthanasakisAPPI15, author = {Michalis Athanasakis and Elias Athanasopoulos and Michalis Polychronakis and Georgios Portokalidis and Sotiris Ioannidis}, title = {The Devil is in the Constants: Bypassing Defenses in Browser {JIT} Engines}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/devil-constants-bypassing-defenses-browser-jit-engines}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AthanasakisAPPI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BauerCJPST15, author = {Lujo Bauer and Shaoying Cai and Limin Jia and Timothy Passaro and Michael Stroucken and Yuan Tian}, title = {Run-time Monitoring and Formal Analysis of Information Flows in Chromium}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/run-time-monitoring-and-formal-analysis-information-flows-chromium}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BauerCJPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BhargavanDP15, author = {Karthikeyan Bhargavan and Antoine Delignat{-}Lavaud and Alfredo Pironti}, title = {Verified Contributive Channel Bindings for Compound Authentication}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/verified-contributive-channel-bindings-compound-authentication}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BhargavanDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BilogrevicHMSH15, author = {Igor Bilogrevic and K{\'{e}}vin Huguenin and Stefan Mihaila and Reza Shokri and Jean{-}Pierre Hubaux}, title = {Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://doi.org/10.14722/ndss.2015.23032}, doi = {10.14722/NDSS.2015.23032}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BilogrevicHMSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BlockiKCD15, author = {Jeremiah Blocki and Saranga Komanduri and Lorrie Faith Cranor and Anupam Datta}, title = {Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/spaced-repetition-and-mnemonics-enable-recall-multiple-strong-passwords}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BlockiKCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BoshmafLSLLRB15, author = {Yazan Boshmaf and Dionysios Logothetis and Georgos Siganos and Jorge Ler{\'{\i}}a and Jos{\'{e}} Lorenzo and Matei Ripeanu and Konstantin Beznosov}, title = {Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/integro-leveraging-victim-prediction-robust-fake-account-detection-osns}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BoshmafLSLLRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BostPTG15, author = {Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser}, title = {Machine Learning Classification over Encrypted Data}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/machine-learning-classification-over-encrypted-data}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BostPTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CaoFBEKVC15, author = {Yinzhi Cao and Yanick Fratantonio and Antonio Bianchi and Manuel Egele and Christopher Kruegel and Giovanni Vigna and Yan Chen}, title = {EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/edgeminer-automatically-detecting-implicit-control-flow-transitions-through-android-framework}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CaoFBEKVC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ChenSABG15, author = {Xi Chen and Asia Slowinska and Dennis Andriesse and Herbert Bos and Cristiano Giuffrida}, title = {StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/stackarmor-comprehensive-protection-stack-based-memory-error-vulnerabilities-binaries}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ChenSABG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/CraneHBLF15, author = {Stephen Crane and Andrei Homescu and Stefan Brunthaler and Per Larsen and Michael Franz}, title = {Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/thwarting-cache-side-channel-attacks-through-dynamic-software-diversity}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/CraneHBLF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DaviLSSM15, author = {Lucas Davi and Christopher Liebchen and Ahmad{-}Reza Sadeghi and Kevin Z. Snow and Fabian Monrose}, title = {Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/isomeron-code-randomization-resilient-just-time-return-oriented-programming}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DaviLSSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DemetriouZNLYWG15, author = {Soteris Demetriou and Xiao{-}yong Zhou and Muhammad Naveed and Yeonjoon Lee and Kan Yuan and XiaoFeng Wang and Carl A. Gunter}, title = {What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/whats-your-dongle-and-bank-account-mandatory-and-discretionary-protection-android-external}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DemetriouZNLYWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Demmler0Z15, author = {Daniel Demmler and Thomas Schneider and Michael Zohner}, title = {{ABY} - {A} Framework for Efficient Mixed-Protocol Secure Two-Party Computation}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/aby---framework-efficient-mixed-protocol-secure-two-party-computation}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Demmler0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/DhawanPMM15, author = {Mohan Dhawan and Rishabh Poddar and Kshiteej Mahajan and Vijay Mann}, title = {{SPHINX:} Detecting Security Attacks in Software-Defined Networks}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/sphinx-detecting-security-attacks-software-defined-networks}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/DhawanPMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/EberzRLM15, author = {Simon Eberz and Kasper Bonne Rasmussen and Vincent Lenders and Ivan Martinovic}, title = {Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/preventing-lunchtime-attacks-fighting-insider-threats-eye-movement-biometrics}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/EberzRLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/EsheteAMPVY15, author = {Birhanu Eshete and Abeer Alhuzali and Maliheh Monshizadeh and Phillip A. Porras and Venkat N. Venkatakrishnan and Vinod Yegneswaran}, title = {EKHunter: {A} Counter-Offensive Toolkit for Exploit Kit Infiltration}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/ekhunter-counter-offensive-toolkit-exploit-kit-infiltration}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/EsheteAMPVY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GoldbergNPRVZ15, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv}, title = {{NSEC5:} Provably Preventing {DNSSEC} Zone Enumeration}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/nsec5-provably-preventing-dnssec-zone-enumeration}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GoldbergNPRVZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GordonKPGNR15, author = {Michael I. Gordon and Deokhwan Kim and Jeff H. Perkins and Limei Gilham and Nguyen Nguyen and Martin C. Rinard}, title = {Information Flow Analysis of Android Applications in DroidSafe}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/information-flow-analysis-android-applications-droidsafe}, timestamp = {Thu, 22 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GordonKPGNR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GuldenringRR15, author = {Benjamin G{\"{u}}ldenring and Volker Roth and Lars Ries}, title = {Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/knock-yourself-out-secure-authentication-short-re-usable-passwords}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GuldenringRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GuptaSBA15, author = {Payas Gupta and Bharat Srinivasan and Vijay Balasubramaniyan and Mustaque Ahamad}, title = {Phoneypot: Data-driven Understanding of Telephony Threats}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/phoneypot-data-driven-understanding-telephony-threats}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GuptaSBA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HongXWG15, author = {Sungmin Hong and Lei Xu and Haopei Wang and Guofei Gu}, title = {Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/poisoning-network-visibility-software-defined-networks-new-attacks-and-countermeasures}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HongXWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JangKKKK15, author = {Jin Soo Jang and Sunjune Kong and Minsu Kim and Daegyeong Kim and Brent ByungHoon Kang}, title = {SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/secret-secure-channel-between-rich-execution-environment-and-trusted-execution-environment}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JangKKKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JiLGMB15, author = {Shouling Ji and Weiqing Li and Neil Zhenqiang Gong and Prateek Mittal and Raheem A. Beyah}, title = {On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/your-social-network-de-anonymizablity-quantification-and-large-scale-evaluation-seed-knowledge}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JiLGMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JubaMLSR15, author = {Brendan Juba and Christopher Musco and Fan Long and Stelios Sidiroglou{-}Douskos and Martin C. Rinard}, title = {Principled Sampling for Anomaly Detection}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/principled-sampling-anomaly-detection}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JubaMLSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KranchB15, author = {Michael J. Kranch and Joseph Bonneau}, title = {Upgrading {HTTPS} in mid-air: An empirical study of strict transport security and key pinning}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/upgrading-https-mid-air-empirical-study-strict-transport-security-and-key-pinning}, timestamp = {Sun, 19 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/KranchB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/KwonPKKZXYQ15, author = {Yonghwi Kwon and Fei Peng and Dohyeong Kim and Kyungtae Kim and Xiangyu Zhang and Dongyan Xu and Vinod Yegneswaran and John Qian}, title = {{P2C:} Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/p2c-understanding-output-data-files-fly-transformation-producer-consumer-executions}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/KwonPKKZXYQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LeeSJWKLL15, author = {Byoungyoung Lee and Chengyu Song and Yeongjin Jang and Tielei Wang and Taesoo Kim and Long Lu and Wenke Lee}, title = {Preventing Use-after-free with Dangling Pointers Nullification}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/preventing-use-after-free-dangling-pointers-nullification}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LeeSJWKLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LianSS15, author = {Wilson Lian and Hovav Shacham and Stefan Savage}, title = {Too LeJIT to Quit: Extending {JIT} Spraying to {ARM}}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/too-lejit-quit-extending-jit-spraying-arm}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LianSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LuLKWLZQLJ15, author = {Kangjie Lu and Zhichun Li and Vasileios P. Kemerlis and Zhenyu Wu and Long Lu and Cong Zheng and Zhiyun Qian and Wenke Lee and Guofei Jiang}, title = {Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/checking-more-and-alerting-less-detecting-privacy-leakages-enhanced-data-flow-analysis-and-peer}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/LuLKWLZQLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MassadGT15, author = {Mohamed El Massad and Siddharth Garg and Mahesh V. Tripunitara}, title = {Integrated Circuit {(IC)} Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/integrated-circuit-ic-decamouflaging-reverse-engineering-camouflaged-ics-within-minutes}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MassadGT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MohanLBHF15, author = {Vishwath Mohan and Per Larsen and Stefan Brunthaler and Kevin W. Hamlen and Michael Franz}, title = {Opaque Control-Flow Integrity}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/opaque-control-flow-integrity}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MohanLBHF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MorRNK15, author = {Nitesh Mor and Oriana Riva and Suman Nath and John Kubiatowicz}, title = {Bloom Cookies: Web Search Personalization without User Tracking}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/bloom-cookies-web-search-personalization-without-user-tracking}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MorRNK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Moreno-SanchezK15, author = {Pedro Moreno{-}Sanchez and Aniket Kate and Matteo Maffei and Kim Pecina}, title = {Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/privacy-preserving-payments-credit-networks-enabling-trust-privacy-online-marketplaces}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Moreno-SanchezK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PanCC15, author = {Xiang Pan and Yinzhi Cao and Yan Chen}, title = {I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/i-do-not-know-what-you-visited-last-summer-protecting-users-third-party-web-tracking}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PanCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PetersGP15, author = {Timothy Peters and Mark A. Gondree and Zachary N. J. Peterson}, title = {{DEFY:} {A} Deniable, Encrypted File System for Log-Structured Storage}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/defy-deniable-encrypted-file-system-log-structured-storage}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PetersGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PorrasCFSY15, author = {Phillip A. Porras and Steven Cheung and Martin W. Fong and Keith Skinner and Vinod Yegneswaran}, title = {Securing the Software Defined Network Control Layer}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/securing-software-defined-network-control-layer}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PorrasCFSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PrakashHY15, author = {Aravind Prakash and Xunchao Hu and Heng Yin}, title = {vfGuard: Strict Protection for Virtual Function Calls in {COTS} {C++} Binaries}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/vfguard-strict-protection-virtual-function-calls-cots-c-binaries}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PrakashHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Shoshitaishvili15, author = {Yan Shoshitaishvili and Ruoyu Wang and Christophe Hauser and Christopher Kruegel and Giovanni Vigna}, title = {Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/firmalice-automatic-detection-authentication-bypass-vulnerabilities-binary-firmware}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Shoshitaishvili15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SongZWLM15, author = {Chengyu Song and Chao Zhang and Tielei Wang and Wenke Lee and David Melski}, title = {Exploiting and Protecting Dynamic Code Generation}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/exploiting-and-protecting-dynamic-code-generation}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SongZWLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/TamKFC15, author = {Kimberly Tam and Salahuddin J. Khan and Aristide Fattori and Lorenzo Cavallaro}, title = {CopperDroid: Automatic Reconstruction of Android Malware Behaviors}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/copperdroid-automatic-reconstruction-android-malware-behaviors}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/TamKFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VervierTD15, author = {Pierre{-}Antoine Vervier and Olivier Thonnard and Marc Dacier}, title = {Mind Your Blocks: On the Stealthiness of Malicious {BGP} Hijacks}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/mind-your-blocks-stealthiness-malicious-bgp-hijacks}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VervierTD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/VissersJN15, author = {Thomas Vissers and Wouter Joosen and Nick Nikiforakis}, title = {Parking Sensors: Analyzing and Detecting Parked Domains}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/parking-sensors-analyzing-and-detecting-parked-domains}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/VissersJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WahbySRBW15, author = {Riad S. Wahby and Srinath T. V. Setty and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish}, title = {Efficient {RAM} and control flow in verifiable outsourced computation}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/efficient-ram-and-control-flow-verifiable-outsourced-computation}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WahbySRBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangSWJ15, author = {Xueqiang Wang and Kun Sun and Yuewu Wang and Jiwu Jing}, title = {DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/deepdroid-dynamically-enforcing-enterprise-policy-android-devices}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangSWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YakdanEGS15, author = {Khaled Yakdan and Sebastian Eschweiler and Elmar Gerhards{-}Padilla and Matthew Smith}, title = {No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/no-more-gotos-decompilation-using-pattern-independent-control-flow-structuring-and-semantics}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/YakdanEGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Younan15, author = {Yves Younan}, title = {FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/freesentry-protecting-against-use-after-free-vulnerabilities-due-dangling-pointers}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Younan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhangSCCS15, author = {Chao Zhang and Chengyu Song and Kevin Zhijie Chen and Zhaofeng Chen and Dawn Song}, title = {VTint: Protecting Virtual Function Tables' Integrity}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/vtint-protecting-virtual-function-tables-integrity}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhangSCCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZhaoM15, author = {Lianying Zhao and Mohammad Mannan}, title = {Gracewipe: Secure and Verifiable Deletion under Coercion}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/gracewipe-secure-and-verifiable-deletion-under-coercion}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZhaoM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ndss/2015, title = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.