2006 22nd Annual Computer Security Applications Conference (ACSAC'06)

11-15 Dec. 2006

Filter Results

Displaying Results 1 - 25 of 55
  • 22nd Annual Computer Security Applications Conference - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • 22nd Annual Computer Security Applications Conference-Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • 22nd Annual Computer Security Applications Conference-Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for reuse | PDF file iconPDF (44 KB)
    Freely Available from IEEE
  • 22nd Annual Computer Security Applications Conference - TOC

    Publication Year: 2006, Page(s):v - viii
    Request permission for reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2006, Page(s): ix
    Request permission for reuse | PDF file iconPDF (31 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2006, Page(s): x
    Request permission for reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): x
    Request permission for reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2006, Page(s):xi - xii
    Request permission for reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2006, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2006, Page(s): xiv
    Request permission for reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety

    Publication Year: 2006, Page(s):3 - 22
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    Amidst threats of pandemic avian influenza and bioterrorist attack, public health surveillance and preparedness have never been more important. Early detection of biological events, electronic reporting of laboratory test results, efficient exchange of case reports across jurisdictions, and timely alerting of health threats are critical components of effective health protection. Essential to publi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shamon: A System for Distributed Mandatory Access Control

    Publication Year: 2006, Page(s):23 - 32
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies across a distributed set of machines. The Shamon enables local reference monitor guarantees to be attained for a set of reference monitors on these machines. We implement a prototype system on the Xen hypervisor with a trusted ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for a Collaborative DDoS Defense

    Publication Year: 2006, Page(s):33 - 42
    Cited by:  Papers (24)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1164 KB) | HTML iconHTML

    Increasing use of the Internet for critical services makes flooding distributed denial-of-service (DDoS) a top security threat. A distributed nature of DDoS suggests that a distributed mechanism is necessary for a successful defense. Three main DDoS defense functionalities - attack detection, rate limiting and traffic differentiation - are most effective when performed at the victim-end, core and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • V-COPS: A Vulnerability-Based Cooperative Alert Distribution System

    Publication Year: 2006, Page(s):43 - 56
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attacks, such as worms. With a limited number of sensors deployed over the Internet and a long attack verification period, when the alert is released by analysis centers, the best time to stop the attack may have passed. On the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine

    Publication Year: 2006, Page(s):57 - 66
    Cited by:  Papers (5)  |  Patents (14)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    Performing sensitive online transactions using computers found in cybercafes and public libraries is risky. The untrusted nature of these machines creates a target rich environment. A simple keystroke logger, a common pay load of many viruses, records and transmits the secret information (e.g., passwords, credit card numbers, PIN numbers) entered into these machines. In addition, sophisticated mal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy

    Publication Year: 2006, Page(s):67 - 76
    Cited by:  Papers (6)  |  Patents (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (737 KB) | HTML iconHTML

    In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spyware which snoops on the user's activity. Using such a machine is obviously undesirable, and yet roaming users often have no choice. They are in no position to judge the security status of Internet cafe, airport lounge or bu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vulnerability Analysis of MMS User Agents

    Publication Year: 2006, Page(s):77 - 88
    Cited by:  Papers (12)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users through a multi-step process, whose end-points are the MMS User Agents that reside on the users mobile phones. The security of these components is critical, because they might have access to private information and, if compr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Backtracking Algorithmic Complexity Attacks against a NIDS

    Publication Year: 2006, Page(s):89 - 98
    Cited by:  Papers (25)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (220 KB) | HTML iconHTML

    Network Intrusion Detection Systems (NIDS) have become crucial to securing modern networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or near wire-speed. Failure to do so allows malicious packets to slip through a NIDS undetected. In this paper, we explore NIDS evasion through algorithmic complexity attacks. We present a highly effective attack against the Sno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NetSpy: Automatic Generation of Spyware Signatures for NIDS

    Publication Year: 2006, Page(s):99 - 108
    Cited by:  Papers (5)  |  Patents (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (161 KB) | HTML iconHTML

    We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with network traffic generated by the untrusted program. If classified as spyware, NetSpy also generates a signature characterizing the malicious substrate of the spyware's network behavior. Such a signature can be used by net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Policy Violations through Traffic Analysis

    Publication Year: 2006, Page(s):109 - 120
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (432 KB) | HTML iconHTML

    Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, a permitted protocol can be used as a carrier for another protocol not otherwise permitted. However, if the observable behaviour of the protocol exhibits differences between permitted and non-permitted uses, it is possibl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical Attack Graph Generation for Network Defense

    Publication Year: 2006, Page(s):121 - 130
    Cited by:  Papers (102)  |  Patents (7)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (590 KB) | HTML iconHTML

    Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patching the vulnerabilities and configuration errors that allow the attackers the greatest amount of access. We have created a new type of attack graph, the multiple-prerequisite graph, that scales nearly linearly as the siz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Distributed Cluster Formation in Wireless Sensor Networks

    Publication Year: 2006, Page(s):131 - 140
    Cited by:  Papers (34)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    In wireless sensor networks, clustering sensor nodes into small groups is an effective technique to achieve scalability, self-organization, power saving, channel access, routing, etc. A number of cluster formation protocols have been proposed recently. However, most existing protocols assume benign environments, and are vulnerable to attacks from malicious nodes. In this paper, we propose a secure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification-Based Intrusion Detection in WLANs

    Publication Year: 2006, Page(s):141 - 152
    Cited by:  Papers (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabilities that may lead to denial of service, session hijacking, and address masquerading attacks. In this paper, we describe and implement a specification-based intrusion detection system for IEEE 802.11 wireless infrastructu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From Languages to Systems: Understanding Practical Application Development in Security-typed Languages

    Publication Year: 2006, Page(s):153 - 164
    Cited by:  Papers (6)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (474 KB) | HTML iconHTML

    Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple "toy" programs. As described in this paper, we have developed the first real-world, security-typed application: a secure email system written in the Java language variant Jif. Real-world policies are mapped onto the information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Internet Voting System Supporting User Privacy

    Publication Year: 2006, Page(s):165 - 174
    Cited by:  Papers (13)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    This work introduces the Adder system , an Internet-based, free and open source electronic voting system which employs strong cryptography. Our system is a fully functional e-voting platform and enjoys a number of security properties, such as robustness, trust distribution, ballot privacy, auditability and verifiability. It can readily implement and carry out various voting procedures in parallel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.