CCS'04 Accepted Full Papers 

   

Paper ID Number

Title of Accepted CCS’04 submission

004

Comparing the Expressive Power of Access Control Models

019

Web Tap: Detecting Covert Web Traffic

037

Direct Anonymous Attestation

038

Mitigating Bandwidth-Exhaustion Attacks using Congestion Puzzles                    (Return to Top)

053

On Achieving Software Diversity for Improved Network Security using Distributed Coloring Algorithms

064

Security Policies for Downgrading

066

Reusable Cryptographic Fuzzy Extractors

073

Group Signatures with Verifier-Local Revocation

076

On Mutually-Exclusive Roles and Separation of Duty

087

$k$-Anonymous Secret Handshakes with Reusable Credentials                    (Return to Top)

105

Versatile Padding Schemes for Joint Signature and Encryption

134

Attacking and repairing the WinZip "Advanced Encryption" scheme

135

Pong-Cache Poisoning in GUESS

145

Private inference control

149

Fragile Mixing

151

Using Build-Integrated Static Checking to Preserve Correctness Invariants                    (Return to Top)

155

A Decision Procedure for the Verification of Security Protocols with Explicit Destructors

158

IP Covert Timing Channels: An Initial Exploration

164

ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption

165

KNOW why your access was denied: Regulating feedback for usable security

171

Privacy  and Security in Library RFID: Issues, Practices, and Architectures                    (Return to Top)

172

On the Difficulty of Scalably Detecting Network Attacks

173

Verifying Policy-Based Security for Web Services

184

Cryptanalysis of a Provably Secure CRT-RSA Algorithm

187

Parallel Mixing

210

Operational Experiences with High-Volume Network Intrusion Detection

214

Gray-Box Extraction of Execution Graphs for Anomaly Detection

243

New Client Puzzle Outsourcing Techniques for DoS Resistance                    (Return to Top)

247

A PIN-Entry Method Resilient Against Shoulder Surfing

56

Payload Attribution via Hierarchical Bloom Filters

141

On the Effectiveness of Address Space Randomization

142

Testing Intrusion Detection Signatures Using Mutant Exploits

150

Concealing Complex Policies in Hidden Credentials

219

Attestation-based Policy Enforcement for Remote Access

224

The Dual Receiver Cryptogram and Its Applications  
                   (Return to Top)