ACM SIGSAC Hilton Alexandria Mark Center
ACM CCS 2006

Accepted Papers

  1. An Independent Audit Framework for Software Dependent Voting Systems
    Sujata Doshi and Aviel D. Rubin.
  2. An Information-Theoretic Model for Adaptive Side-Channel Attacks
    Boris Koepf and David Basin.
  3. PORs: Proofs of Retrievability for Large Files
    Ari Juels and Burt Kaliski.
  4. Predicting Vulnerable Software Components
    Stephan Neuhaus, Thomas Zimmermann and Andreas Zeller.
  5. Privacy-Preserving Evaluation of Branching Programs
    Justin Brickell, Don Porter, Vitaly Shmatikov and Emmett Witchel.
  6. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
    Hovav Shacham.
  7. Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
    Alexandra Boldyreva, Craig Gentry, Adam O'Neill and Dae Hyun Yum.
  8. Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs
    Patrick Tsang, Man Ho Au, Apu Kapadia and Sean Smith.
  9. On the Accuracy of Decentralized Virtual Coordinate Systems in Adversarial Networks
    David Zage and Cristina Nita-Rotaru.
  10. An Analysis of Browser Domain-Isolation Bugs and A Light-Weight Transparent Defense Mechanism
    Shuo Chen, Yi-Min Wang and David Ross.
  11. Chosen-Ciphertext Secure Proxy Re-Encryption
    Ran Canetti and Susan Hohenberger.
  12. Hardware-rooted Trust for Secure Key Management and Transient Trust
    Jeffrey Dwoskin and Ruby B. Lee.
  13. Security under Key-Dependent Inputs
    Shai Halevi and Hugo Krawczyk.
  14. Capturing System-wide Information Flow for Malware Detection and Analysis
    Heng Yin, Dawn Song, Manuel Egele, Engin Kirda and Christopher Kruegel.
  15. Protecting Browsers from DNS Rebinding Attacks
    Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao and Dan Boneh.
  16. Information Disclosure under Realistic Assumptions: Privacy versus Optimality
    Lei Zhang, Sushil Jajodia and Alexander Brodsky.
  17. Privacy Preserving Error Resilient DNA Searching through Oblivious Automata
    Juan Ramn Troncoso-Pastoriza, Stefan Katzenbeisser and Mehmet Celik.
  18. Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions
    Benoit Libert, Jean-Jacques Quisquater and Moti Yung.
  19. Highly Efficient Techniques for Network Forensics
    Miroslav Ponec, Paul Giura, Herve Bronnimann and Joel Wein.
  20. Provably Secure Ciphertext Policy ABE
    Ling Cheung and Calvin Newport.
  21. Provable Data Possession at Untrusted Stores
    Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson and Dawn Song.
  22. Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention
    Jose Maria Gonzalez, Vern Paxson and Nicholas Weaver.
  23. Secure 2-party k-Means Clustering
    Paul Bunn and Rafail Ostrovsky.
  24. Automated Detection of Persistent Kernel Control-Flow Attacks
    Nick Petroni and Michael Hicks.
  25. Cryptanalysis of the Windows Random Number Generator
    Leo Dorrendorf, Zvi Gutterman and Benny Pinkas.
  26. Optimal Security Hardening Using Multi-objective Optimization on Attack Tree Models of Networks
    Rinku Dewri, Nayot Poolsappasit, Indrajit Ray and Darrell Whitley.
  27. Dynamic pharming attacks and the locked same-origin policies for web browsers
    Chris Karlof, Umesh Shankar, J.D. Tygar and David Wagner.
  28. BeamAuth: Two-Factor Web Authentication with a Bookmark
    Ben Adida.
  29. Split-Ballot Voting: Everlasting Privacy With Distributed Trust
    Tal Moran and Moni Naor.
  30. Robust Computational Secret Sharing, Revisited
    Mihir Bellare and Phillip Rogaway.
  31. MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities
    Emre Can Sezer, Peng Ning, Chongkyung Kil and Jun Xu.
  32. Stealthy Malware Detection Through VMM-Based "Out-of-the-Box" Semantic View Reconstruction
    Xuxian Jiang, Dongyan Xu and Xinyuan Wang.
  33. Attribute-Based Encryption with Non-Monotonic Access Structures
    Rafail Ostrovsky, Amit Sahai and Brent Waters.
  34. Multi-Module Vulnerability Analysis of Web-based Applications
    Davide Balzarotti, Marco Cova, Viktoria Felmetsger and Giovanni Vigna.
  35. Automaton Segmentation: A New Approach to Preserve Privacy in XML Information Brokering
    Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee and Chao-Hsien Chu.
  36. How much anonymity does network latency leak?
    Nicholas Hopper, Eugene Vasserman and David Chan-Tin.
  37. Covert Channels in Privacy-Preserving Identification Systems
    Dan Bailey, Dan Boneh, Eu-Jin Goh and Ari Juels.
  38. Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image Categorization
    Jeremy Elson, John Douceur and Jon Howell.
  39. Detecting Covert Timing Channels: An Entropy-Based Approach
    Steven Gianvecchio and Haining Wang.
  40. Robust Key Generation from Signal Envelopes in Wireless Networks
    Babak Azimi-Sadjadi, Alejandra Mercado, Aggelos Kiayias and Bulent Yener.
  41. Efficient Policy Analysis for Administrative Role Based Access
    Scott Stoller, ping yang, C.R. Ramakrishnan and Mikhail Gofman.
  42. ConceptDoppler: A Weather Tracker for Internet Censorship
    Jedidiah R. Crandall, Daniel Zinn, Michael Byrd, Earl Barr and Rich East.
  43. On the Infeasibility of Modeling Polymorphic Shellcode
    Yingbo Song, Michael Locasto, Angelos Stavrou, Angelos Keromytis and Salvatore Stolfo.
  44. Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity
    Nikita Borisov, George Danezis, Prateek Mittal and Parisa Tabriz.
  45. Polyglot: Automatic Extraction of Protocol Format using Dynamic Binary Analysis
    Juan Caballero and Dawn Song.
  46. Harvesting Verifiable Challenges from Oblivious Online Sources
    Alex Halderman and Brent Waters.
  47. Stability of superpeer networks against attack: some analytical results
    Bivas Mitra, Sujoy Ghose and Niloy Ganguly.
  48. Towards Automated Provisioning of Secure Virtualized Networks
    Serdar Cabuk, Chris I. Dalton, HariGovind V. Ramasamy and Matthias Schunter.
  49. Alpaca: extensible authorization for distributed services
    Christopher Lesniewski-Laas, Bryan Ford, Jacob Strauss, M. Frans Kaashoek and Robert Morris.
  50. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
    Jason Franklin, Vern Paxson, Adrian Perrig and Stefan Savage.
  51. CANDID: Retrofitting Code to prevent SQL Injection Attacks using Symbolic Queries
    Sruthi Bandhakavi, Prithvi Bisht, Madhusudan Parthasarathy and V.N. Venkatakrishnan.
  52. Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking
    Baik Hoh, Marco Gruteser, Hui Xiong and Ansaf Alrabady.
  53. Do Background Images Improve "Draw a Secret" Graphical Passwords?
    Paul Dunphy and Jeff Yan.
  54. FilteringvSpam with Behavioral Blacklisting
    Anirudh Ramachandran, Nick Feamster and Santosh Vempala.
  55. Robust Group Key Agreement using Short Broadcasts
    Jihye Kim, Stanislaw Jarecki and Gene Tsudik.