Fall 2006

Date Presenter Paper Title
3rd, Oct. 邱秉誠 TBA
17th, Oct. 林忠立 SigFree: A Signature-free Buffer Overflow Attack Blocker
15th USENIX Security, July 2006.
24th, Oct. 陳泓瑋 Wireless LAN Security
31st, Oct. 林佳潤 The Loop Fallacy and Serialization In Tracing Intrusion Connections through Stepping Stones
ACM Symposium on Applied Computing (SAC2004 Track on Computer Security),
7th, Nov. 吳孟容 Doppelganger: Better Browser Privacy Without the Bother.
ACM Conference on Computer Communications Security (CCS 2006)
7th, Nov. 歐智文 On the Effectiveness of Distributed Worm Monitoring
USENIX Security Symposium, 2005
14th, Nov. 張繼軒 Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models
Annual Computer Security Applications Conference (ACSAC 2005)
21st, Nov. 陳立函 Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet
ACM Conference on Computer Communications Security (CCS 2005),
21st, Nov. 陳俊佑 Robust TCP Stream Reassembly in the Presence of Adversaries
USENIX Security Symposium, 2005
28th, Nov. 吳宏毅 Countering DoS Attacks With Stateless Multipath Overlays
ACM Conference on Computer Communications Security (CCS 2005)
28th, Nov. 張源平 TCP/IP Splicing
12th, Dec. 邱秉誠 Protecting Against Unexpected System Calls
USENIX Security Symposium 2005
12th, Dec. 林忠立 Efficient Techniques for Comprehensive Protection from Memory Error Exploits
USENIX Security Symposium 2005
19th, Dec. 林佳潤 Non-Control-Data Attacks Are Realistic Threats
USENIX Security Symposium 2005
19th, Dec. 吳孟容 Behavior-based Spyware Detection
USENIX Security Symposium 2006
26th, Dec. 歐智文 Vulnerabilities of Passive Internet Threat Monitors
USENIX Security Symposium 2006
26th, Dec. 張繼軒 Polymorphic Blending Attacks
USENIX Security Symposium 2006
2nd, Jan. 陳立函 TBA
2nd, Jan. 陳俊佑 An Architecture for Generating Semantic Aware Signatures
USENIX Security Symposium 2005


Spring 2007

6th, Feb. 邱秉誠 Ayalvadi Ganesh, Dinan Gunawardena, Peter Key, Laurent Massouli, Jacob Scott , ``Efficient quarantining of scanning worms: optimal detection and coordination ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006.
6th, Feb. 林忠立 Richard Thommes and Mark Coates, `` Epidemiological Modelling of Peer-to-Peer Viruses and Pollution ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006.
13th, Feb. 林佳潤 Michele Garetto, Weibo Gong, and Don Towsley, ``Modeling Malware Spreading Dynamics,'' IEEE INFOCOM, San Francisco, CA, USA, April, 2003.
13th, Feb. 吳孟容 Zhenhai Duan, Xin Yuan, and Jaideep Chandrashekar, `` Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates,'' IEEE INFOCOM, Barcelona, Spain, April, 2006.
Frist Week of March 歐智文 David Moore, Colleen Shannon, Geoffrey Voelker, and Stefan Savage,`` Internet Quarantine: Requirements for Containing Self-Propagating Code,'' IEEE INFOCOM, San Francisco, CA, USA, April, 2003.
First Week of March 張繼軒 MINA GUIRGUIS, AZER BESTAVROS, IBRAHIM MATTA, and YUTING ZHANG , ``Reduction of Quality (RoQ) Attacks on Internet End-Systems,'' IEEE INFOCOM, Miami, FL, USA, March, 2005.
March 陳立函 Nathan Tuck, Timothy Sherwood, Brad Calder, and George Varghese , `` Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection,'' IEEE INFOCOM, Hong Kong, April, 2004.
March 陳俊佑 Qiming Li, Ee-Chien Chang, and Mun Choon Chan, `` On the Effectiveness of DDoS Attacks on Statistical Filtering,'' IEEE INFOCOM, Miami, FL, USA, March, 2005.
March 吳宏毅 A. Bremler-Barr and H. Levy, ``Spoofing Prevention Method,” IEEE INFOCOM, Miami, FL, USA, March, 2005.
March 張源平 Yan Gao, Leweng Deng, Aleksandar Kuzmanovic, and Yan Chen, `` Internet Cache Pollution Attacks and Countermeasures,'' in Proc. of the 14th IEEE International Conference on Network Protocols (ICNP), Nov. 2006
March 邱秉誠 Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, and Edward W. Knightly, `` DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006.
March 林忠立 Tian Bu, Aiyou Chen, Scott Vander Wiel ,and Thomas Woo,`` Design and Evaluation of a Fast and Robust Worm Detection Algorithm IEEE INFOCOM, Barcelona, Spain, April, 2006.
April 林佳潤 Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, and H. Jonathan Chao, `` PacketScore: Statistical-based overload control against Distributed Denial-of-Service Attacks,'' IEEE INFOCOM, Hong Kong, April, 2004.
April 吳孟容 Hazem Hamed, Adel El-Atawy, and Ehab Al-Shaer, `` Adaptive Statistical Optimization Techniques for Firewall Packet Filtering ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006.
April 歐智文 Yong Tang and Shigang Chen, `` Defending Against Internet Worms: A Signature-Based Approach,'' IEEE INFOCOM, Miami, FL, March, 2005.
April 張繼軒 Abraham Yaar, Adrian Perrig, and Dawn Song, `` FIT: Fast Internet Traceback,'' IEEE INFOCOM, Miami, FL, March, 2005.
April 陳立函 Xin Li et al., MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis,'' IEEE INFOCOM, Barcelona, Spain, April, 2006.
April 陳俊佑 Alefiya Hussain, John Heidemann, and Christos Papadopoulos, ``Identification of Repeated Denial of Service Attacks ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006.
April 吳宏毅 Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, Lixia Zhang, "SAVE: source address validity enforcement protocol," IEEE INFOCOM, New York, New York, June 2002.
April 張源平 Dahai Xu, Mung Chiang, and Jennifer Rexford, `` DEFT: Distributed Exponentially-weighted Flow Splitting ,'' IEEE INFOCOM, Anchorage, Alaska, May 2007.