:facetid:toc:\"db/conf/ndss/ndss2010.bht\"OK:facetid:toc:db/conf/ndss/ndss2010.bhtDavide BalzarottiMarco CovaChristoph KarlbergerEngin KirdaChristopher KruegelGiovanni VignaEfficient Detection of Split Personalities in Malware.NDSS2010Conference and Workshop Papersopenconf/ndss/BalzarottiCKKKV10https://www.ndss-symposium.org/ndss2010/efficient-detection-split-personalities-malwarehttps://dblp.org/rec/conf/ndss/BalzarottiCKKKV10URL#4965032Adam BarthAdrienne Porter FeltPrateek SaxenaAaron BoodmanProtecting Browsers from Extension Vulnerabilities.NDSS2010Conference and Workshop Papersopenconf/ndss/BarthFSB10https://www.ndss-symposium.org/ndss2010/protecting-browsers-extension-vulnerabilitieshttps://dblp.org/rec/conf/ndss/BarthFSB10URL#4965033Jason BauJohn C. MitchellA Security Evaluation of DNSSEC with NSEC3.NDSS2010Conference and Workshop Papersopenconf/ndss/BauM10https://www.ndss-symposium.org/ndss2010/security-evaluation-dnssec-nsec3https://dblp.org/rec/conf/ndss/BauM10URL#4965034Darrell BetheaRobert A. CochranMichael K. ReiterServer-side Verification of Client Behavior in Online Games.NDSS2010Conference and Workshop Papersopenconf/ndss/BetheaCR10https://www.ndss-symposium.org/ndss2010/server-side-verification-client-behavior-online-gameshttps://dblp.org/rec/conf/ndss/BetheaCR10URL#4965035Juan CaballeroNoah M. JohnsonStephen McCamantDawn SongBinary Code Extraction and Interface Identification for Security Applications.NDSS2010Conference and Workshop Papersopenconf/ndss/CaballeroJMS10https://www.ndss-symposium.org/ndss2010/binary-code-extraction-and-interface-identification-security-applicationshttps://dblp.org/rec/conf/ndss/CaballeroJMS10URL#4965036Suresh ChariShai HaleviWietse Z. VenemaWhere Do You Want to Go Today? Escalating Privileges by Pathname Manipulation.NDSS2010Conference and Workshop Papersopenconf/ndss/ChariHV10https://www.ndss-symposium.org/ndss2010/where-do-you-want-go-today-escalating-privileges-pathname-manipulationhttps://dblp.org/rec/conf/ndss/ChariHV10URL#4965037Matthew FinifterJoel WeinbergerAdam BarthPreventing Capability Leaks in Secure JavaScript Subsets.NDSS2010Conference and Workshop Papersopenconf/ndss/FinifterWB10https://www.ndss-symposium.org/ndss2010/preventing-capability-leaks-secure-javascript-subsetshttps://dblp.org/rec/conf/ndss/FinifterWB10URL#4965038Yudong GaoNi PanXu ChenZhuoqing Morley MaoOn the Safety of Enterprise Policy Deployment.NDSS2010Conference and Workshop Papersopenconf/ndss/GaoPCM10https://www.ndss-symposium.org/ndss2010/safety-enterprise-policy-deploymenthttps://dblp.org/rec/conf/ndss/GaoPCM10URL#4965039Amir HerzbergHaya SchulmannStealth DoS Attacks on Secure Channels.NDSS2010Conference and Workshop Papersopenconf/ndss/HerzbergS10https://www.ndss-symposium.org/ndss2010/stealth-dos-attacks-secure-channelshttps://dblp.org/rec/conf/ndss/HerzbergS10URL#4965040Zhiqiang LinXiangyu Zhang 0001Dongyan XuAutomatic Reverse Engineering of Data Structures from Binary Execution.NDSS2010Conference and Workshop Papersopenconf/ndss/LinZX10https://www.ndss-symposium.org/ndss2010/automatic-reverse-engineering-data-structures-binary-executionhttps://dblp.org/rec/conf/ndss/LinZX10URL#4965041Adrian MettlerDavid A. Wagner 0001Tyler CloseJoe-E: A Security-Oriented Subset of Java.NDSS2010Conference and Workshop Papersopenconf/ndss/MettlerWC10https://www.ndss-symposium.org/ndss2010/joe-e-security-oriented-subset-javahttps://dblp.org/rec/conf/ndss/MettlerWC10URL#4965042Andreas PitsillidisKirill LevchenkoChristian KreibichChris KanichGeoffrey M. VoelkerVern PaxsonNicholas WeaverStefan SavageBotnet Judo: Fighting Spam with Itself.NDSS2010Conference and Workshop Papersopenconf/ndss/PitsillidisLKKVPWS10https://www.ndss-symposium.org/ndss2010/botnet-judo-fighting-spam-itselfhttps://dblp.org/rec/conf/ndss/PitsillidisLKKVPWS10URL#4965043Iasonas PolakisThanasis PetsasEvangelos P. MarkatosSpyros AntonatosA Systematic Characterization of IM Threats using Honeypots.NDSS2010Conference and Workshop Papersopenconf/ndss/PolakisPMA10https://www.ndss-symposium.org/ndss2010/systematic-characterization-im-threats-using-honeypotshttps://dblp.org/rec/conf/ndss/PolakisPMA10URL#4965044Zhiyun QianZhuoqing Morley MaoYinglian XieFang Yu 0002On Network-level Clusters for Spam Detection.NDSS2010Conference and Workshop Papersopenconf/ndss/QianMXY10https://www.ndss-symposium.org/ndss2010/network-level-clusters-spam-detectionhttps://dblp.org/rec/conf/ndss/QianMXY10URL#4965045Thomas RistenpartScott YilekWhen Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.NDSS2010Conference and Workshop Papersopenconf/ndss/RistenpartY10https://www.ndss-symposium.org/ndss2010/when-good-randomness-goes-bad-virtual-machine-reset-vulnerabilities-and-hedging-deployedhttps://dblp.org/rec/conf/ndss/RistenpartY10URL#4965046William K. RobertsonFederico MaggiChristopher KruegelGiovanni VignaEffective Anomaly Detection with Scarce Training Data.NDSS2010Conference and Workshop Papersopenconf/ndss/RobertsonMKV10https://www.ndss-symposium.org/ndss2010/effective-anomaly-detection-scarce-training-datahttps://dblp.org/rec/conf/ndss/RobertsonMKV10URL#4965047Prateek SaxenaSteve HannaPongsin PoosankamDawn SongFLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.NDSS2010Conference and Workshop Papersopenconf/ndss/SaxenaHPS10https://www.ndss-symposium.org/ndss2010/flax-systematic-discovery-client-side-validation-vulnerabilities-rich-web-applicationshttps://dblp.org/rec/conf/ndss/SaxenaHPS10URL#4965048Edward J. SchwartzDavid BrumleyJonathan M. McCuneContractual Anonymity.NDSS2010Conference and Workshop Papersopenconf/ndss/SchwartzBM10https://www.ndss-symposium.org/ndss2010/contractual-anonymityhttps://dblp.org/rec/conf/ndss/SchwartzBM10URL#4965049Jiwon Seo 0002Monica S. LamInvisiType: Object-Oriented Security Policies.NDSS2010Conference and Workshop Papersopenconf/ndss/SeoL10https://www.ndss-symposium.org/ndss2010/invisitype-object-oriented-security-policieshttps://dblp.org/rec/conf/ndss/SeoL10URL#4965050Micah SherrAndrew MaoWilliam R. MarczakWenchao ZhouBoon Thau LooMatt BlazeA3: An Extensible Platform for Application-Aware Anonymity.NDSS2010Conference and Workshop Papersopenconf/ndss/SherrMMZLB10https://www.ndss-symposium.org/ndss2010/a3-extensible-platform-application-aware-anonymityhttps://dblp.org/rec/conf/ndss/SherrMMZLB10URL#4965051Sushant SinhaMichael D. BaileyFarnam JahanianImproving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.NDSS2010Conference and Workshop Papersopenconf/ndss/SinhaBJ10https://www.ndss-symposium.org/ndss2010/improving-spam-blacklisting-through-dynamic-thresholding-and-speculative-aggregationhttps://dblp.org/rec/conf/ndss/SinhaBJ10URL#4965052Vincent ToubianaArvind NarayananDan BonehHelen NissenbaumSolon BarocasAdnostic: Privacy Preserving Targeted Advertising.NDSS2010Conference and Workshop Papersopenconf/ndss/ToubianaNBNB10https://www.ndss-symposium.org/ndss2010/adnostic-privacy-preserving-targeted-advertisinghttps://dblp.org/rec/conf/ndss/ToubianaNBNB10URL#4965053Colin WhittakerBrian RynerMarria NazifLarge-Scale Automatic Classification of Phishing Pages.NDSS2010Conference and Workshop Papersopenconf/ndss/WhittakerRN10https://www.ndss-symposium.org/ndss2010/large-scale-automatic-classification-phishing-pageshttps://dblp.org/rec/conf/ndss/WhittakerRN10URL#4965054Scott WolchokOwen S. HofmannNadia HeningerEdward W. FeltenJ. Alex HaldermanChristopher J. RossbachBrent WatersEmmett WitchelDefeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.NDSS2010Conference and Workshop Papersopenconf/ndss/WolchokHHFHRWW10https://www.ndss-symposium.org/ndss2010/defeating-vanish-low-cost-sybil-attacks-against-large-dhtshttps://dblp.org/rec/conf/ndss/WolchokHHFHRWW10URL#4965055Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010NDSSThe Internet Society2010Editorshipopenconf/ndss/2010https://www.ndss-symposium.org/ndss2010/https://dblp.org/rec/conf/ndss/2010URL#4998972