ACM SIGSAC Hilton Alexandria Mark Center
ACM CCS 2006

Accepted Papers




  1. Dictionary Attacks Using Keyboard Acoustic Emanations.
    Yigael Berger, Avishai Wool, and Arie Yeredor
  2. Providing Witness Anonymity in Peer-to-Peer Systems.
    Bo Zhu, Sanjeev Setia, and Sushil Jajodia
  3. Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation.
    Mihir Bellare, Tadayoshi Kohno, and Victor Shoup
  4. Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies.
    Ninghui Li and Qihua Wang
  5. Multi-Signatures in the Plain Public-Key Model and a Generalized Forking Lemma.
    Mihir Bellare and Gregory Neven
  6. Deniable Authentication and Key Exchange.
    Mario Di Raimondo, Rosario Gennaro, and Hugo Krawczyk
  7. Safety and Consistency in Policy-Based Authorization Systems.
    Adam J. Lee and Marianne Winslett
  8. Fourth-Factor Authentication: Somebody You Know.
    John Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, and Moti Yung
  9. A Fully Collusion Resistant Broadcast, Trace, and Revoke System.
    Dan Boneh and Brent Waters
  10. Resiliency Policies in Access Control.
    Ninghui Li, Mahesh V. Tripunitara, and Qihua Wang
  11. Evading Network Anomaly Detection Systems: Formal Reasoning and Practical Techniques.
    Prahlad Fogla and Wenke Lee
  12. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data.
    Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters
  13. Doppelganger: Better Browser Privacy Without the Bother.
    Umesh Shankar and Chris Karlof
  14. Packet Vaccine: Black-box Exploit Detection and Signature Generation.
    XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, and Jong Youl Choi
  15. Protomatching Network Traffic for High Throughput Network Intrusion Detection.
    Shai Rubin, Somesh Jha, and Barton P. Miller
  16. Secure Attribute-Based Systems.
    Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters
  17. Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
    Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci
  18. Inferring the Source of Encrypted HTTP Connections.
    Marc Liberatore and Brian Neil Levine
  19. Secure Function Evaluation with Ordered Binary Decision Diagrams.
    Eu-Jin Goh, Louis Kruger, Somesh Jha, and Dan Boneh
  20. Secure Hierarchical In-Network Aggregation in Sensor Networks.
    Haowen Chan, Adrian Perrig, and Dawn Song
  21. Optimizing BGP Security by Exploiting Path Stability.
    William Aiello, Kevin Butler, and Patrick McDaniel
  22. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions.
    Reza Curtmola, Juan Garay, Seny Kamara, and Rafail Ostrovsky
  23. Forward Secure Signatures with Untrusted Update.
    Xavier Boyen, Hovav Shacham, Emily Shen, and Brent Waters
  24. How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication.
    Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich
  25. Computationally Sound Secrecy Proofs by Mechanized Flow Analysis.
    Michael Backes and Peeter Laud
  26. A Scalable Approach to Attack Graph Generation.
    Xinming Ou, Wayne F. Boyer, and Miles A. McQueen
  27. An Effective Defense Against Email Spam Laundering.
    Mengjun Xie, Heng Yin, and Haining Wang
  28. Formal Specification and Verification of Data Separation in an Application-Specific Separation Kernel.
    Constance Heitmeyer, Myla Archer, Elizabeth Leonard, and John McLean
  29. Data Collection With Self-Enforcing Privacy.
    Philippe Golle, Frank McSherry, and Ilya Mironov
  30. Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure.
    V. T. Lam, S. Antonatos, P. Akritidis, and K. G. Anagnostakis
  31. TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks.
    Kun Sun, Peng Ning, Cliff Wang, An Liu, and Yuzheng Zhou
  32. On the Modeling and Analysis of Obligations.
    Keith Irwin, Ting Yu, and William H. Winsborough
  33. EXE: A System for Automatically Generating Inputs of Death Using Symbolic Execution.
    Cristian Cadar, Vijay Ganesh, Peter Pawlowski, David Dill, and Dawson Engler
  34. A Natural Language Approach to Automated Cryptanalysis of Two-time Pads.
    Joshua Mason, Kathryn Watkins, Jason Eisner, and Adam Stubblefield
  35. Hot or Not: Revealing Hidden Services by their Clock Skew
    Steven J. Murdoch
  36. Replayer: Automatic Protocol Replay by Binary Analysis.
    James Newsome, David Brumley, Jason Franklin, and Dawn Song
  37. RoleMiner: Mining Roles using Subset Enumeration.
    Jaideep Vaidya, Vijayalakshmi Atluri, and Janice Warner
  38. Salsa: A Structured Approach to Large-Scale Anonymity.
    Arjun Nambiar and Matthew Wright