the proceedings contain 19 papers. the topics discussed include: an efficient black-box technique for defeating web application attacks;CSAR: a practical and provable technique to make randomized systems accountable;s...
the proceedings contain 19 papers. the topics discussed include: an efficient black-box technique for defeating web application attacks;CSAR: a practical and provable technique to make randomized systems accountable;scalable, behavior-based malware clustering;recursive DNS architectures and vulnerability implications;document structure integrity: a robust basis for cross-site scripting defense;coordinated scan detection;RAINBOW: a robust and invisible non-blind watermark for network flows;conditioned-safe ceremonies and a user study of an application to web authentication;K-Tracer: a system for extracting kernel malware behavior;and safe passage for passwords and other sensitive data.
the proceedings contain 16 papers. the topics discussed include: an algebraic approach to IP traceback;an architecture for flexible multi-security domain networks;authenticating streamed data in the presence of random...
ISBN:
(纸本)189156210X
the proceedings contain 16 papers. the topics discussed include: an algebraic approach to IP traceback;an architecture for flexible multi-security domain networks;authenticating streamed data in the presence of random packet loss;authentication and key agreement via memorable password;building certification paths: forward vs. reverse;cryptography as a network service;decentralized Jini security;efficient and secure source authentication for multicast;practical experiences with ATM encryption;principles of policy in secure groups;SPL: an access control language for security policies with complex constraints;and termination in language-based systems.
the proceedings contain 16 papers. the topics discussed include: a black-box tracing technique to identify causes of least-privilege incompatibilities;DIRA: automatic detection, identification, and repair of control-h...
ISBN:
(纸本)1891562207
the proceedings contain 16 papers. the topics discussed include: a black-box tracing technique to identify causes of least-privilege incompatibilities;DIRA: automatic detection, identification, and repair of control-hijacking attacks;DNS-based detection of scanning worms in an enterprise network;dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software;enriching intrusion alerts through multi-host causality;improved proxy re-encryption schemes with applications to secure distributed storage;rekeying and storage cost for multiple user revocation;and MOVE: an end-to-end solution to network denial of service.
the proceedings contain 16 papers. the topics discussed include: a practical dynamic buffer overflow detector;an effective architecture and algorithm for detecting worms with various scan techniques;authentication and...
ISBN:
(纸本)1891562185
the proceedings contain 16 papers. the topics discussed include: a practical dynamic buffer overflow detector;an effective architecture and algorithm for detecting worms with various scan techniques;authentication and integrity in outsourced databases;building attack scenarios through integration of complementary alert correlation methods;analyzing and comparing the protection quality of security enhanced operating systems;client-side defense against web-based identity theft;distillation codes and applications to dos resistant multicast authentication;dos protection for reliably authenticated broadcast;efficient context-sensitive intrusion detection;global intrusion detection in the DOMINO overlay system;and the design and implementation of datagram TLS.
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographic techniques. In addition, many of the...
the number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present a system, IntScope, which can automatically detect integer overflow vulnerabilities in x...
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to reduce errors. Watermarking techniques all...
Kernel rootkits can provide user level-malware programs withthe additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an operating system. While existing research ...
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted service providers to support transaction...
Developing a systematic understanding of the attack surface of emergent networks, such as software-defined networks (SDNs), is necessary and arguably the starting point toward making it more secure. Prior studies have...
详细信息
ISBN:
(纸本)1891562460
Developing a systematic understanding of the attack surface of emergent networks, such as software-defined networks (SDNs), is necessary and arguably the starting point toward making it more secure. Prior studies have largely relied on ad hoc empirical methods to evaluate the security of various SDN elements from different perspectives. However, they have stopped short of converging on a systematic methodology or developing automated systems to rigorously test for security flaws in SDNs. thus, conducting security assessments of new SDN software remains a non-replicable and unregimented process. this paper makes the case for automating and standardizing the vulnerability identification process in SDNs. As a first step, we developed a security assessment framework, DELTA, that reinstantiates published SDN attacks in diverse test environments. Next, we enhanced our tool with a protocol-aware fuzzing module to automatically discover new vulnerabilities. In our evaluation, DELTA successfully reproduced 20 known attack scenarios across diverse SDN controller environments and discovered seven novel SDN application mislead attacks.
暂无评论