|
|
|
|
|
Topic |
Paper |
Presenter |
| |
| |
|
TCP/IP
Attacks & Defense |
"Analysis
of a Denial of Service Attack on TCP," by C. Schuba,
et al., IEEE Symposium &
Privacy'97
"Low-Rate
TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and
Elephants)," by A. Kuzmanovic and E. Knightly, ACM SIGCOMM'03
"Defending against
Low-Rate TCP attacks: dynamic detection and protection." by H. Sun,
J. Lui, and D. Yau, IEEE ICNP'04 |
|
|
DDoS
Attacks & Defense (1) - Overlay-based approaches |
"SOS:
Secure Overlay Services," by A. Keromytis, V. Mishra, and D.
Rubenstein, ACM SIGCOMM'02
"Mayday: Distributed
Filtering for Internet Services," D. Andersen, Usenix USITS'03
"Counting DoS
Attacks with Stateless Multipath Overlays," by A. Stavrou and A.
Keromytis, ACM CCS'05 |
|
|
DDoS
Attacks & Defense (2) - IP traceback |
"Practical
Network Support for IP Traceback," by S. Savage, et al., ACM
SIGCOMM'00
"Hash-Based
IP Traceback," by A. Snoeren, et al., ACM SIGCOMM'01
"Pi: A Path
Identification Mechanism to Defend Against DDoS Attacks," by A. Yaar,
A. Perrig, and D. Song, IEEE Symposium on Security & Privacy'03 |
|
DDoS Attacks & Defense (3) - Capabilities & Others |
"SIFF:
A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks,"
by A. Yaar, A. Perrig, and D. Song, IEEE Symposium on Seruciry &
Privacy'04
"A DoS-limiting
Network Architecture," by X. Yang, D. Wetherall, & W. Anderson, ACM
SIGCOMM'05
"DDoS Defense by
Offense," by M. Walfish, et al., ACM SIGCOMM'06 |
|
Worm
Detection & Prevention |
"How to
Own the Internet in your spare time," by S. Staniford, et al.,
USENIX Security'02
"Vigilante:
End-to-End Containment of Internet Worms," by M. Costa,
et al., SOSP'05
"Worm Origin
Identification Using Random Walks," by Y. Xie,
et al., IEEE Sym. on Security &
Privacy'05 |
|
|
Botnets
|
"Botnet
Tracking: Exploring a Root-Cause Methodology to Prevent DDoS," by F.
Freiling, T. Holz, and G. Wicherski, ESORICS'05
"A Multifaceted
Approach to Understanding the Botnet Phenomenon," by M. Rajab,
et al., Internet Measurement
Conference (IMC'06 )
"Army of Botnets,"
by R. Vogt, J. Aycock, and M. Jacobson, NDSS'07 |
|
P2P
Overlay Network Security |
"Eclipse
Attacks on Overlay Networks: Threats and Defenses," by A. Singh,
et al., IEEE INFOCOM'06
"Message Dropping
Attacks in Overlay Networks: Attack Detection and Attacker
Identification," by L. Xie and Se. Zhu, SecureComm'06
"Rumor Riding:
Anonymizing Unstructured Peer-to-Peer Systems," by J. Han and Y.
Liu, IEEE ICNP'06 |
|
|
Mobile
Viruses & Cellular Network Security |
"Exploiting
Open Functionalilty in SMS-Capable Cellular Networks," by W. Enck,
et al., ACM CCS'05
"Mitigating Attacks
on Open Functionality in SMS-Capable Cellular Networks," by P.
Traynor, et al., ACM MOBICOM'06
GSM and
CDMA network security
"Smart-Phone
Attacks and Defenses," by C. Guo,
et al., ACM HotNets'04 |
|
|
|
|
ID-based
Cryptography |
Identity-Based Encryption from the Weil Pairing, Boneh and Franklin
Efficient Algorithms for Pairing-Based Cryptosystems, Barreto et al. |
|
|
|
|
|
|
RFID
Security |
"RFID Security and Privacy: a
Survey," by Ari Juels, IEEE JSAC, Vol. 24, No. 2, Feb. 2006
"Dynamic
Key-Updating: Privacy Preserving Authentication for RFID Systems,"
by L. Lu, et al., IEEE PerCom'07
"Serveless Search
and Authentication Protocols for RFID," by C. Tan, B. Sheng, and Q.
Li, IEEE PerCom'07
|
|
| |
|
Blind
Signature |
A Novel Privacy Preserving
Authentication and Access Control Scheme for Pervasive Computing
Environments, Ren et al. |
|
| |
|
802.11
Security |
Intercepting Mobile
Communications: The Insecurity of 802.11, MOBICOM 2001
"802.11 Denial-of-Service Attacks:
Real Vulnerabilities and Practical Solutions," by J. Bellardo and S.
Savage, USENIX Security'03
Security Considerations for IEEE
802.15.4 Networks, by Sastry and Wagner.
"Passive Data Link Layer 802.11
Wireless Device Driver Fingerprinting," by J. Franklin,
et al., USENIX Security'06 |
|
| |
Key Management
in Sensor Networks
|
A
Key-Management Scheme for Distributed Sensor Networks, Eschenauer and
Gligor.
A Pairwise Key Pre-distribution Scheme for Wireless
Sensor Networks, Du et al.
A
Key Management Scheme for Wireless Sensor Networks Using Deployment
Knowledge, Du et al. Location-based compromise-tolerant
security mechanisms for wireless sensor networks, Zhang et al. |
|
| |
|
Broadcast Authentication in Sensor
Networks |
SPINS: Security Protocols for Sensor Networks,
Perrig et al. (Mobicom'01)
Multi-Level
µTESLA: Broadcast Authentication for Distributed Sensor Networks, Liu
and Ning.
On broadcast authentication in wireless
sensor networks, Ren et al. |
|
| |
Location
Discovery in Sensor Networks
|
High-Accuracy,
Low-Cost Localization System for Wireless Sensor Networks, by Stoleru
et al. (SenSys'05) |
|
|
|
|
Vehicular
Networks |
Challenges in
Securing Vehicular Networks, by Parno and
Perrig. The Security
of Vehicular Ad Hoc Networks, Raya and Hubaux (SASN'05) |
|
| |
Denial of
Service in Sensor and Ad Hoc Networks
|
The Sybil
Attack, by Douceur. Denial
of Service in Sensor Networks, Wood and Stankovic. Denial
of Service Resilience in Ad hoc Network, Aad et al. (MobiCom'04) |
|
| |
Denial of
Service in the Internet
|
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic
Flash Crowds, by
Kandula et al. (NSDI'05)
Globally Distributed Content Delivery, by Dilley et al.
IEEE Internet Computing, September/October 2002
A
DoS-limiting Network Architecture by Yang et al. (SIGCOMM'05)
Preventing
Internet Denial-of-Service with Capabilities, Anderson et al.
MOVE: An End-to-End
Solution To Network Denial of Service, Stavrou et a.
(NDSS'05) |
|
| |
IP Traceback
|
Practical
Network Support for IP Traceback,
Savage et al. (SIGCOMM'00)
Hash-Based
IP Traceback,
Snoeren et al.
(SIGOCMM'01)
Efficient
Probabilistic Packet Marking by Dong et al.
(ICNP'05)
FIT: Fast
Internet Traceback, by Yaar, Perrig, and Song (Infocomm'05) |
|
|
|
| BGP
Security |
A Suvey of BGP
Security, by Butler at al. Understanding
BGP Misconfiguration by Mahajan et al. (SIGCOMM'02)
Beware
of BGP Attacks, Nordstrom and Dovrolis.
Finding a
Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP
Network, by Wu et al. (NSDI'05)
Secure Border
Gateway Protocol (S-BGP) -- Real World Performance and Deployment
Issues, by Kent at al. (NDSS'00) |
|