文件名称:NDSS 2009论文集
文件大小:8.8MB
文件格式:RAR
更新时间:2014-06-08 13:38:02
北大 计算机安全 网络安全 ISOC NDSS
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://qysh123.download.csdn.net/ 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。CSDN这套系统不敢恭维,也请大家见谅。) 计算机安全界的会议ISOC Network and Distributed System Security Symposium (NDSS)2009年的文章,ISOC是互联网领域最专业组织之一,NDSS也是安全界较为重要的国际会议。特别值得一提的是北大的王铁磊同学,继2009年在NDSS上发表一篇文章之后,2010年在SP上获得了最佳学生论文奖。值得我们学习的榜样啊!
【文件预览】:
NDSS 2009-ISOC Network and Distributed System Security Symposium
----Distributed Systems()
--------The Blind Stone Tablet_ Outsourcing Durability to Untrusted Parties.pdf(301KB)
--------Sybillnfer_ Detecting Sybil Nodes using Social Networks.pdf(316KB)
--------Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.pdf(374KB)
----Traffic Protection and Infrastructure Security()
--------Traffic Morphing_ An Efficient Defense Against Statistical Traffic Analysis.pdf(423KB)
--------Recursive DNS Architectures and Vulnerability Implications.pdf(1.25MB)
--------RAINBOW_ A Robust and Invisible Non-Blind Watermark for Network Flows.pdf(593KB)
----Web Security()
--------An Efficient Black-box Technique for Defeating Web Application Attacks.pdf(393KB)
--------Document Structure Integrity_ A Robust Basis for Cross-site Scripting Defense.pdf(811KB)
--------Noncespaces_ Using Randomization to Enforce Information Flow Tracking and Thwart Cross-site Scripting.pdf(740KB)
----Malware()
--------K-Tracer_ A System for Extracting Kernel Malware Behavior.pdf(1.14MB)
--------RB-Seeker_ Auto-detection of Redirection Botnets.pdf(713KB)
--------Scalable, Behavior-Based Malware Clustering.pdf(463KB)
----Authentication and Accountability()
--------Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication.pdf(763KB)
--------Safe Passage for Passwords and Other Sensitive Data.pdf(547KB)
--------CSAR_ A Practical and Provable Technique to Make Randomized Systems Accountable.pdf(488KB)
----Intrusion Detection()
--------Spectrogram_ A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic.pdf(259KB)
--------Coordinated Scan Detection.pdf(407KB)
--------Detecting Forged TCP Reset Packets.pdf(215KB)
----Host Security()
--------Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.pdf(260KB)
--------IntScope_ Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.pdf(198KB)