文件名称:NDSS Symposium 2009论文集(Proceedings of NDSS Symposium 2009)
文件大小:16.63MB
文件格式:RAR
更新时间:2015-01-27 10:42:28
NDSS Symposium 2009 security computer
NDSS Symposium 2009 论文集 rank1的安全会议 自己整理的哟,不用一篇篇下了
【文件预览】:
NDSS 2009
----Session 7 Authentication and Accountability()
--------Safe Passage for Passwords and Other Sensitive Data.pdf(547KB)
--------Safe Passage for Passwords and Other Sensitive Data PS.pdf(621KB)
--------Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication.pdf(763KB)
--------CSAR()
----Session 3 Intrusion Detection()
--------A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic.pdf(259KB)
--------Detecting Forged TCP Reset Packets.pdf(215KB)
--------Detecting Forged TCP Reset Packets PS.pdf(144KB)
--------Coordinated Scan Detection PS.pdf(366KB)
--------Coordinated Scan Detection.pdf(407KB)
----Session 5 Traffic Protection and Infrastructure Security()
--------Recursive DNS Architectures and Vulnerability Implications.pdf(1.25MB)
--------A Robust and Invisible Non-Blind Watermark for Network Flows.pdf(593KB)
--------An Efficient Defense Against Statistical Traffic Analysis.pdf(423KB)
--------A Robust and Invisible Non-Blind Watermark for Network Flows PS.pdf(1.7MB)
----Session 2 Distributed Systems()
--------Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.pdf(374KB)
--------The Blind Stone Tablet Outsourcing Durability to Untrusted Parties.pdf(301KB)
--------Detecting Sybil Nodes using Social Networks.pdf(316KB)
--------The Blind Stone Tablet Outsourcing Durability to Untrusted Parties JPS.pdf(184KB)
----Session 1 Web Security()
--------Using Randomization to Enforce Information Flow Tracking and Thwart Cross-site Scripting Attacks PS.pdf(2.16MB)
--------An Efficient Black-box Technique for Defeating Web Application Attacks.pdf(393KB)
--------An Efficient Black-box Technique for Defeating Web Application Attacks PS.pdf(143KB)
--------A Robust Basis for Cross-site Scripting Defense PS.pdf(481KB)
--------Using Randomization to Enforce Information Flow Tracking and Thwart Cross-site Scripting Attacks.pdf(740KB)
--------A Robust Basis for Cross-site Scripting Defense.pdf(811KB)
----Session 4 Malware()
--------Auto-detection of Redirection Botnets PS.pdf(1.71MB)
--------A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic.pdf(259KB)
--------A System for Extracting Kernel Malware Behavior.pdf(1.14MB)
--------Auto-detection of Redirection Botnets.pdf(713KB)
--------Behavior-Based Malware Clustering.pdf(463KB)
--------Behavior-Based Malware Clustering PS.pdf(210KB)
----Session 6 Host Security()
--------Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.pdf(260KB)
--------Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems PS.pdf(1.22MB)
--------Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution PS.pdf(1.19MB)
--------Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.pdf(198KB)