The Community for Technology Leaders
2007 IEEE Symposium on Security and Privacy (SP '07) (2007)
Berkeley, California
May 20, 2007 to May 23, 2007
ISSN: 1081-6011
ISBN: 0-7695-2848-1
TABLE OF CONTENTS

Accurate Real-time Identification of IP Prefix Hijacking (Abstract)

Xin Hu , University of Michigan
Z. Morley Mao , University of Michigan
pp. 3-17

DSSS-Based Flow Marking Technique for Invisible Traceback (Abstract)

Wei Yu , Texas A&M University, College Station, TX
Xinwen Fu , Dakota State University,Madison, SD
Steve Graham , Dakota State University,Madison, SD
Dong Xuan , Ohio-State University, Columbus, OH
Wei Zhao , Rensselaer Polytechnic Institute, Troy, NY
pp. 18-32

On the Safety and Efficiency of Firewall Policy Deployment (Abstract)

Charles C. Zhang , University of Illinois at Urbana-Champaign
Marianne Winslett , University of Illinois at Urbana-Champaign
Carl A. Gunter , University of Illinois at Urbana-Champaign
pp. 33-50

The Emperor's New Security Indicators (Abstract)

Stuart E. Schechter , MIT Lincoln Laboratory
Rachna Dhamija , Harvard University
Andy Ozment , MIT Lincoln Laboratory
Ian Fischer , Harvard University
pp. 51-65

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) (Abstract)

Philippe Golle , Palo Alto Research Center
David Wagner , University of California, Berkeley
pp. 66-70

A Systematic Approach to Uncover Security Flaws in GUI Logic (Abstract)

Jose Meseguer , University of Illinois at Urbana-Champaign
Ralf Sasse , Microsoft Research
Helen J. Wang , Microsoft Research
Yi-Min Wang , Microsoft Research
pp. 71-85

Extended Abstract: Forward-Secure Sequential Aggregate Authentication (Abstract)

Di Ma , University of California, Irvine
Gene Tsudik , University of California, Irvine
pp. 86-91

Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos (Abstract)

Alexandra Boldyreva , Georgia Institute of Technology
Virendra Kumar , Georgia Institute of Technology
pp. 92-100
Introduction
Network Security

Accurate Real-time Identification of IP Prefix Hijacking (Abstract)

Xin Hu , University of Michigan
Z. Morley Mao , University of Michigan
pp. 3-17

DSSS-Based Flow Marking Technique for Invisible Traceback (Abstract)

Wei Yu , Texas A&M University, College Station, TX
Xinwen Fu , Dakota State University,Madison, SD
Steve Graham , Dakota State University,Madison, SD
Dong Xuan , Ohio-State University, Columbus, OH
Wei Zhao , Rensselaer Polytechnic Institute, Troy, NY
pp. 18-32

On the Safety and Efficiency of Firewall Policy Deployment (Abstract)

Charles C. Zhang , University of Illinois at Urbana-Champaign
Marianne Winslett , University of Illinois at Urbana-Champaign
Carl A. Gunter , University of Illinois at Urbana-Champaign
pp. 33-50
Authentication

The Emperor?s New Security Indicators (Abstract)

Stuart E. Schechter , MIT Lincoln Laboratory
Rachna Dhamija , Harvard University
Andy Ozment , MIT Lincoln Laboratory
Ian Fischer , Harvard University
pp. 51-65

Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract) (Abstract)

Philippe Golle , Palo Alto Research Center
David Wagner , University of California, Berkeley
pp. 66-70

A Systematic Approach to Uncover Security Flaws in GUI Logic (Abstract)

Shuo Chen , Microsoft research
Jose Meseguer , University of Illinois at Urbana-Champaign
Ralf Sasse , Microsoft Research
Helen J. Wang , Microsoft Research
Yi-Min Wang , Microsoft Research
pp. 71-85

Extended Abstract: Forward-Secure Sequential Aggregate Authentication (Abstract)

Di Ma , University of California, Irvine
Gene Tsudik , University of California, Irvine
pp. 86-91

Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos (Abstract)

Alexandra Boldyreva , Georgia Institute of Technology
Virendra Kumar , Georgia Institute of Technology
pp. 92-100
Privacy

Endorsed E-Cash (Abstract)

Jan Camenisch , IBM Zurich
Anna Lysyanskaya , Brown University
Mira Meyerovich , Brown University
pp. 101-115

Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems (Abstract)

Xinyuan Wang , George Mason University
Shiping Chen , Sybase, Inc.
Sushil Jajodia , George Mason University
pp. 116-130
Access Control and Audit

Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model (Abstract)

Marco Pistoia , IBM T. J. Watson Research Ctr.
Anindya Banerjee , Kansas State University
David A. Naumann , Stevens Institute of Technology
pp. 149-163

Usable Mandatory Integrity Protection for Operating Systems (Abstract)

Ninghui Li , Purdue University
Ziqing Mao , Purdue University
Hong Chen , Purdue University
pp. 164-178

Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments (Abstract)

Somesh Jha , University of Wisconsin
Stefan Katzenbeisser , Technische Universitat Munchen
Helmut Veith , Technische Universitat Munchen
pp. 179-186
Information Flow

Information Flow in the Peer-Reviewing Process (Abstract)

Michael Backes , Saarland University
Markus Durmuth , Saarland University
Dominique Unruh , Saarland University
pp. 187-191

A Cryptographic Decentralized Label Model (Abstract)

Jeffrey A. Vaughan , University of Pennsylvania
Steve Zdancewic , University of Pennsylvania
pp. 192-206

Gradual Release: Unifying Declassification, Encryption and Key Release Policies (Abstract)

Aslan Askarov , Chalmers University of Technology
Andrei Sabelfeld , Chalmers University of Technology
pp. 207-221

Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control (Abstract)

Pau-Chen Cheng , IBM Thomas J. Watson Research Center
Pankaj Rohatgi , IBM Thomas J. Watson Research Center
Claudia Keser , IBM Thomas J. Watson Research Center
Paul A. Karger , IBM Thomas J. Watson Research Center
Grant M. Wagner , US Department of Defense
Angela Schuett Reninger , US Department of Defense
pp. 222-230
Host Security

Exploring Multiple Execution Paths for Malware Analysis (Abstract)

Andreas Moser , Technical University Vienna
Christopher Kruegel , Technical University Vienna
Engin Kirda , Technical University Vienna
pp. 231-245

Lurking in the Shadows: Identifying Systemic Threats to Kernel Data (Abstract)

Arati Baliga , Rutgers University
Pandurang Kamat , Rutgers University
Liviu Iftode , Rutgers University
pp. 246-251

ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing (Abstract)

Weidong Cui , Microsoft Research
Marcus Peinado , Microsoft Research
Helen J. Wang , Microsoft Research
Michael E. Locasto , Columbia University
pp. 252-266

Minimal TCB Code Execution (Abstract)

Jonathan M. McCune , Carnegie Mellon University
Bryan Parno , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
Michael K. Reiter , Carnegie Mellon University
Arvind Seshadri , Carnegie Mellon University
pp. 267-272

Using Rescue Points to Navigate Software Recovery (Abstract)

Stelios Sidiroglou , Columbia University
Oren Laadan , Columbia University
Angelos D. Keromytis , Columbia University
Jason Nieh , Columbia University
pp. 273-280
Hardware and Replication

Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems (Abstract)

Ted Huffmire , University of California, Santa Barbara
Brett Brotherton , University of California, Santa Barbara
Gang Wang , University of California, Santa Barbara
Timothy Sherwood , University of California, Santa Barbara
Ryan Kastner , University of California, Santa Barbara
Timothy Levin , Naval Postgraduate School
Thuy Nguyen , Naval Postgraduate School
Cynthia Irvine , Naval Postgraduate School
pp. 281-295

Trojan Detection using IC Fingerprinting (Abstract)

Dakshi Agrawal , IBM T. J. Watson Research Center
Selcuk Baktir , IBM T. J. Watson Research Center
Deniz Karakoyunlu , Worcester Polytechnic Institute
Pankaj Rohatgi , IBM T. J. Watson Research Center
Berk Sunar , Worcester Polytechnic Institute
pp. 296-310

On the Optimal Communication Complexity of Multiphase Protocols for Perfect Communication (Abstract)

Kannan Srinathan , International Institute of IT, India
N. R. Prasad , University of Washington
C. Pandu Rangan , IIT Madras
pp. 311-320
Encryption

Ciphertext-Policy Attribute-Based Encryption (Abstract)

John Bethencourt , Carnegie Mellon University
Amit Sahai , UCLA
Brent Waters , SRI International
pp. 321-334

Attacking the IPsec Standards in Encryption-only Configurations (Abstract)

Jean Paul Degabriele , Hewlett-Packard Laboratories, UK
Kenneth G. Paterson , University of London, UK
pp. 335-349

Multi-Dimensional Range Query over Encrypted Data (Abstract)

Elaine Shi , Carnegie Mellon University
John Bethencourt , Carnegie Mellon University
T-H. Hubert Chan , Carnegie Mellon University
Dawn Song , Carnegie Mellon University
Adrian Perrig , Carnegie Mellon University
pp. 350-364
Author Index

Author Index (PDF)

pp. 365
85 ms
(Ver 3.3 (11022016))