Title |
Speakers |
Summary |
Topic Types |
Keynote "Finding concurrency and memory errors in C++ programs", |
Manuel Costa
|
Abstract: Concurrent programming errors arise when threads share data incorrectly. Programmers often avoid these errors ... |
|
Network Security I |
Sven Dietrich
|
N/A |
Security
|
Protecting against DNS reflection attacks with Bloom filters |
Sebastiano di Paola
,
Dario Lombardo
|
N/A |
|
Effective Network Vulnerability Assessment through Model Abstraction |
Xinming Ou
,
Su Zhang
,
John Homer
|
N/A |
|
Decoy Document Deployment for Effective Masquerade Attack Detection |
Malek ben Salem
,
Salvatore. J. Stolfo
|
N/A |
|
"The Quest for Trusted Computing: Promises, Expectations, Practice, and Challenges", |
Ahmad-reza Sadeghi
|
"Abstract: Trusted Computing (TC) aims at providing a framework to establish trust among the components ... |
Security
|
Attacks |
Michael Meier
|
N/A |
Security
|
Reverse Social Engineering Attacks in Online Social Networks |
Calton Pu
,
Engin Kirda
,
Davide Balzarotti
,
Danesh Irani
,
Marco Balduzzi
|
N/A |
|
Timing attacks on VoIP PIN input |
Ge Zhang
,
Simone Fischer-hbner
|
N/A |
|
"Using Traffic Direction Systems to simplify fraud... and complicate investigations!", |
Max Goncharov
|
Abstract: Directing traffic to cash in on referrals is a common and legitimate method of ... |
Security
|
Web Security |
Paolo Milani Comparetti
|
N/A |
Security
|
Biting the hand that serves you: A closer look at client-side Flash proxies for cross-domain requests |
Martin Johns
,
Sebastian Lekies
|
N/A |
|
Mitigating Cross-Site Form History Spamming Attacks with Domain-based Ranking |
Chuan Yue
|
N/A |
Security
|
Escape from Monkey Island: Evading High-Interaction Honeyclients |
Christopher Kruegel
,
Giovanni Vigna
,
Marco Cova
,
Alexandros Kapravelos
|
N/A |
|
Network Security II |
Ulrich Flegel
|
N/A |
Security
|
An Assessment of Overt Malicious Activity Manifest in Residential Network |
Anja Feldmann
,
Robin Sommer
,
Vern Paxson
,
Gregor Maier
,
Matthias Vallentin
|
N/A |
|
What's Clicking What? Techniques and Innovations of Today's Clickbots |
Christian Kreibich
,
Chris Grier
,
Vern Paxson
,
Brad Miller
,
Paul Pearce
|
N/A |
|
MISHIMA: Multilateration of Internet hosts hidden using malicious fast-flux agents (Short Paper) |
Christopher Kruegel
,
Giovanni Vigna
,
Greg Banks
,
Richard A. Kemmerer
,
Aristide Fattori
|
N/A |
|
Host Security |
Lorenzo Cavallaro
|
N/A |
Security
|
Code Pointer Masking: Hardening Applications against Code Injection Attacks |
Yves Younan
,
Frank Piessens
,
Pieter Philippaerts
,
Stijn Muylle
,
Sven Lachmund
,
Thomas Walter
|
N/A |
|