Date | Presenter | Paper Title |
3rd, Oct. | 邱秉誠 | TBA |
17th, Oct. | 林忠立 |
SigFree: A Signature-free Buffer Overflow Attack Blocker 15th USENIX Security, July 2006. |
24th, Oct. | 陳泓瑋 | Wireless LAN Security |
31st, Oct. | 林佳潤 |
The Loop Fallacy and Serialization In Tracing Intrusion Connections through Stepping Stones ACM Symposium on Applied Computing (SAC2004 Track on Computer Security), |
7th, Nov. | 吳孟容 |
Doppelganger: Better Browser Privacy Without the Bother.
ACM Conference on Computer Communications Security (CCS 2006) |
7th, Nov. | 歐智文 |
On the Effectiveness of Distributed Worm Monitoring USENIX Security Symposium, 2005 |
14th, Nov. | 張繼軒 |
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models
Annual Computer Security Applications Conference (ACSAC 2005) |
21st, Nov. | 陳立函 |
Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet ACM Conference on Computer Communications Security (CCS 2005), |
21st, Nov. | 陳俊佑 |
Robust TCP Stream Reassembly in the Presence of Adversaries
USENIX Security Symposium, 2005 |
28th, Nov. | 吳宏毅 |
Countering DoS Attacks With Stateless Multipath Overlays ACM Conference on Computer Communications Security (CCS 2005) |
28th, Nov. | 張源平 | TCP/IP Splicing |
12th, Dec. | 邱秉誠 |
Protecting Against Unexpected System Calls
USENIX Security Symposium 2005 |
12th, Dec. | 林忠立 |
Efficient Techniques for Comprehensive Protection from Memory Error Exploits USENIX Security Symposium 2005 |
19th, Dec. | 林佳潤 |
Non-Control-Data Attacks Are Realistic Threats USENIX Security Symposium 2005 |
19th, Dec. | 吳孟容 |
Behavior-based Spyware Detection
USENIX Security Symposium 2006 |
26th, Dec. | 歐智文 |
Vulnerabilities of Passive Internet Threat Monitors USENIX Security Symposium 2006 |
26th, Dec. | 張繼軒 |
Polymorphic Blending Attacks USENIX Security Symposium 2006 |
2nd, Jan. | 陳立函 | TBA |
2nd, Jan. | 陳俊佑 |
An Architecture for Generating Semantic Aware Signatures
USENIX Security Symposium 2005 |
6th, Feb. | 邱秉誠 | Ayalvadi Ganesh, Dinan Gunawardena, Peter Key, Laurent Massouli, Jacob Scott , ``Efficient quarantining of scanning worms: optimal detection and coordination ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006. |
6th, Feb. | 林忠立 | Richard Thommes and Mark Coates, `` Epidemiological Modelling of Peer-to-Peer Viruses and Pollution ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006. |
13th, Feb. | 林佳潤 | Michele Garetto, Weibo Gong, and Don Towsley, ``Modeling Malware Spreading Dynamics,'' IEEE INFOCOM, San Francisco, CA, USA, April, 2003. |
13th, Feb. | 吳孟容 | Zhenhai Duan, Xin Yuan, and Jaideep Chandrashekar, `` Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates,'' IEEE INFOCOM, Barcelona, Spain, April, 2006. |
Frist Week of March | 歐智文 | David Moore, Colleen Shannon, Geoffrey Voelker, and Stefan Savage,`` Internet Quarantine: Requirements for Containing Self-Propagating Code,'' IEEE INFOCOM, San Francisco, CA, USA, April, 2003. |
First Week of March | 張繼軒 | MINA GUIRGUIS, AZER BESTAVROS, IBRAHIM MATTA, and YUTING ZHANG , ``Reduction of Quality (RoQ) Attacks on Internet End-Systems,'' IEEE INFOCOM, Miami, FL, USA, March, 2005. |
March | 陳立函 | Nathan Tuck, Timothy Sherwood, Brad Calder, and George Varghese , `` Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection,'' IEEE INFOCOM, Hong Kong, April, 2004. |
March | 陳俊佑 | Qiming Li, Ee-Chien Chang, and Mun Choon Chan, `` On the Effectiveness of DDoS Attacks on Statistical Filtering,'' IEEE INFOCOM, Miami, FL, USA, March, 2005. |
March | 吳宏毅 | A. Bremler-Barr and H. Levy, ``Spoofing Prevention Method,” IEEE INFOCOM, Miami, FL, USA, March, 2005. |
March | 張源平 | Yan Gao, Leweng Deng, Aleksandar Kuzmanovic, and Yan Chen, `` Internet Cache Pollution Attacks and Countermeasures,'' in Proc. of the 14th IEEE International Conference on Network Protocols (ICNP), Nov. 2006 |
March | 邱秉誠 | Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal, and Edward W. Knightly, `` DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006. |
March | 林忠立 | Tian Bu, Aiyou Chen, Scott Vander Wiel ,and Thomas Woo,`` Design and Evaluation of a Fast and Robust Worm Detection Algorithm IEEE INFOCOM, Barcelona, Spain, April, 2006. |
April | 林佳潤 | Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, and H. Jonathan Chao, `` PacketScore: Statistical-based overload control against Distributed Denial-of-Service Attacks,'' IEEE INFOCOM, Hong Kong, April, 2004. |
April | 吳孟容 | Hazem Hamed, Adel El-Atawy, and Ehab Al-Shaer, `` Adaptive Statistical Optimization Techniques for Firewall Packet Filtering ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006. |
April | 歐智文 | Yong Tang and Shigang Chen, `` Defending Against Internet Worms: A Signature-Based Approach,'' IEEE INFOCOM, Miami, FL, March, 2005. |
April | 張繼軒 | Abraham Yaar, Adrian Perrig, and Dawn Song, `` FIT: Fast Internet Traceback,'' IEEE INFOCOM, Miami, FL, March, 2005. |
April | 陳立函 | Xin Li et al., MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis,'' IEEE INFOCOM, Barcelona, Spain, April, 2006. |
April | 陳俊佑 | Alefiya Hussain, John Heidemann, and Christos Papadopoulos, ``Identification of Repeated Denial of Service Attacks ,'' IEEE INFOCOM, Barcelona, Spain, April, 2006. |
April | 吳宏毅 | Jun Li, Jelena Mirkovic, Mengqiu Wang, Peter Reiher, Lixia Zhang, "SAVE: source address validity enforcement protocol," IEEE INFOCOM, New York, New York, June 2002. |
April | 張源平 | Dahai Xu, Mung Chiang, and Jennifer Rexford, `` DEFT: Distributed Exponentially-weighted Flow Splitting ,'' IEEE INFOCOM, Anchorage, Alaska, May 2007. |