ECE 579: Computer and Network Security

Fall 2007

Paper List

 
     

Topic

Paper

 Presenter 

 
 
TCP/IP Attacks & Defense

"Analysis of a Denial of Service Attack on TCP," by C. Schuba, et al., IEEE Symposium & Privacy'97

"Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants)," by A. Kuzmanovic and E. Knightly, ACM SIGCOMM'03

"Defending against Low-Rate TCP attacks: dynamic detection and protection." by H. Sun, J. Lui, and D. Yau, IEEE ICNP'04

 
DDoS Attacks & Defense (1) - Overlay-based approaches

"SOS: Secure Overlay Services," by A. Keromytis, V. Mishra, and D. Rubenstein, ACM SIGCOMM'02

"Mayday: Distributed Filtering for Internet Services," D. Andersen, Usenix USITS'03

"Counting DoS Attacks with Stateless Multipath Overlays," by A. Stavrou and A. Keromytis, ACM CCS'05

 
DDoS Attacks & Defense (2) - IP traceback

"Practical Network Support for IP Traceback," by S. Savage, et al., ACM SIGCOMM'00

 "Hash-Based IP Traceback," by A. Snoeren, et al., ACM SIGCOMM'01

"Pi: A Path Identification Mechanism to Defend Against DDoS Attacks," by A. Yaar, A. Perrig, and D. Song, IEEE Symposium on Security & Privacy'03

 

DDoS Attacks & Defense (3) - Capabilities & Others

"SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks," by A. Yaar, A. Perrig, and D. Song, IEEE Symposium on Seruciry & Privacy'04

"A DoS-limiting Network Architecture," by X. Yang, D. Wetherall, & W. Anderson,  ACM SIGCOMM'05

"DDoS Defense by Offense," by M. Walfish, et al., ACM SIGCOMM'06

 

Worm Detection & Prevention

"How to Own the Internet in your spare time," by S. Staniford, et al., USENIX Security'02

"Vigilante: End-to-End Containment of Internet Worms," by M. Costa, et al., SOSP'05

"Worm Origin Identification Using Random Walks," by Y. Xie, et al., IEEE Sym. on Security & Privacy'05

 
Botnets

"Botnet Tracking: Exploring a Root-Cause Methodology to Prevent DDoS," by F. Freiling, T. Holz, and G. Wicherski, ESORICS'05

"A Multifaceted Approach to Understanding the Botnet Phenomenon," by M. Rajab, et al., Internet Measurement Conference (IMC'06 )

"Army of Botnets," by R. Vogt, J. Aycock, and M. Jacobson, NDSS'07

 

P2P Overlay Network Security

"Eclipse Attacks on Overlay Networks: Threats and Defenses," by A. Singh, et al., IEEE INFOCOM'06

"Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification," by L. Xie and Se. Zhu, SecureComm'06

"Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems," by J. Han and Y. Liu, IEEE ICNP'06

 
Mobile Viruses & Cellular Network Security

"Exploiting Open Functionalilty in SMS-Capable Cellular Networks," by W. Enck, et al., ACM CCS'05

"Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks," by P. Traynor, et al., ACM MOBICOM'06

GSM and CDMA network security

"Smart-Phone Attacks and Defenses," by C. Guo, et al., ACM HotNets'04

 

 

 

ID-based Cryptography

Identity-Based Encryption from the Weil Pairing, Boneh and Franklin

Efficient Algorithms for Pairing-Based Cryptosystems, Barreto et al.

 
     
RFID Security


"RFID Security and Privacy: a Survey," by Ari Juels, IEEE JSAC, Vol. 24, No. 2, Feb. 2006

"Dynamic Key-Updating: Privacy Preserving Authentication for RFID Systems," by L. Lu, et al., IEEE PerCom'07

"Serveless Search and Authentication Protocols for RFID," by C. Tan, B. Sheng, and Q. Li, IEEE PerCom'07

 

 
 
Blind Signature

A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments, Ren et al.

 
 
802.11 Security

Intercepting Mobile Communications: The Insecurity of 802.11, MOBICOM 2001

"802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," by J. Bellardo and S. Savage, USENIX Security'03

Security Considerations for IEEE 802.15.4 Networks, by Sastry and Wagner.

"Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting," by J. Franklin, et al., USENIX Security'06

 
 
Key Management in Sensor Networks

A Key-Management Scheme for Distributed Sensor Networks, Eschenauer and Gligor.

A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, Du et al.

A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, Du et al. Location-based compromise-tolerant security mechanisms for wireless sensor networks, Zhang et al.

 
 
Broadcast Authentication in Sensor Networks 

SPINS: Security Protocols for Sensor Networks, Perrig et al. (Mobicom'01)

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks, Liu and Ning.

On broadcast authentication in wireless sensor networks, Ren et al.

 
 
Location Discovery in Sensor Networks

High-Accuracy, Low-Cost Localization System for Wireless Sensor Networks, by Stoleru et al. (SenSys'05)

 
 

Vehicular Networks

 

Challenges in Securing Vehicular Networks, by Parno and Perrig.
The Security of Vehicular Ad Hoc Networks, Raya and Hubaux (SASN'05)

 
 
Denial of Service in Sensor and Ad Hoc Networks

The Sybil Attack, by Douceur.
Denial of Service in Sensor Networks, Wood and Stankovic.
Denial of Service Resilience in Ad hoc Network, Aad et al. (MobiCom'04)

 
 
Denial of Service in  the Internet

Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds, by Kandula et al. (NSDI'05)

Globally Distributed Content Delivery, by Dilley et al. IEEE Internet Computing, September/October 2002

A DoS-limiting Network Architecture by Yang et al. (SIGCOMM'05)
Preventing Internet Denial-of-Service with Capabilities, Anderson et al.

MOVE: An End-to-End Solution To Network Denial of Service, Stavrou et a. (NDSS'05)

 
 
IP Traceback

Practical Network Support for IP Traceback, Savage et al. (SIGCOMM'00)
Hash-Based IP Traceback, Snoeren et al. (SIGOCMM'01)

Efficient Probabilistic Packet Marking by Dong et al. (ICNP'05)

FIT: Fast Internet Traceback, by Yaar, Perrig, and Song (Infocomm'05)

 
 
BGP Security

A Suvey of BGP Security, by Butler at al.
Understanding BGP Misconfiguration by Mahajan et al. (SIGCOMM'02)
Beware of BGP Attacks, Nordstrom and Dovrolis.

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network, by Wu et al. (NSDI'05)

Secure Border Gateway Protocol (S-BGP) -- Real World Performance and Deployment Issues, by Kent at al. (NDSS'00)