Skip to content

Latest commit

 

History

History
61 lines (37 loc) · 7.38 KB

reading_list.md

File metadata and controls

61 lines (37 loc) · 7.38 KB

《计算机网络安全技术》课程阅读论文列表

2018年版

TCP/IP & NIDS

  1. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics, Mark Handley, Christian Kreibich and Vern Paxson, USENIX Security 2001

  2. Wang, Z., Cao, Y., Qian, Z., Song, C., & Krishnamurthy, S. V. Your state is not mine- a closer look at evading stateful internet censorship (pp. 114–127). Presented at the the 2017 Internet Measurement Conference, New York, New York, USA: ACM Press.

  3. Sommer, R., & Paxson, V. Outside the closed world: On using machine learning for network intrusion detection. 2010 IEEE Symposium on Security and Privacy (SP)

  4. Tschantz, M. C., Afroz, S., Anonymous, & Paxson, V. (n.d.). SoK: Towards Grounding Censorship Circumvention in Empiricism (pp. 914–933). Presented at the 2016 IEEE Symposium on Security and Privacy (SP)

  5. Y. Cao, Z. Qian, Z. Wang, T. Dao, and S. V. Krishnamurthy, “Off-Path TCP Exploits: Global Rate Limit Considered Dangerous,” usenix Security. 2015

  6. Ensafi, R., Fifield, D., Winter, P., Feamster, N., Weaver, N., & Paxson, V. (2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers (pp. 445–458). Presented at the the 2015 ACM Conference, New York, New York, USA

DNS Security

  1. H. Yang, E. Osterweil, D. Massey, S. Lu, and L. Zhang, “Deploying Cryptography in Internet-Scale Systems: A Case con DNSSEC,” IEEE Trans. Dependable and Secure Comput., vol. 8, no. 5, pp. 656–669, 2011.
  2. Chung, T., van Rijswijk-Deij, R., 0002, B. C., Choffnes, D. R., Levin, D., Maggs, B. M., et al. (2017). A Longitudinal, End-to-End View of the DNSSEC Ecosystem. USENIX Security Symposium.
  3. Lauinger, T., Chaabane, A., Buyukkayhan, A. S., Onarlioglu, K., & 0002, W. R. (2017). Game of Registrars - An Empirical Analysis of Post-Expiration Domain Name Takeovers. USENIX Security Symposium.

TLS and PKI

  1. [Clark J, van Oorschot P C. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancementsC]//Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013: 511-525.
  2. J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J.-P. Wu. When HTTPS Meets CDN: A Case of Authentication in Delegated Service IEEE Symposium on Security and Privacy 2014, pp. 1–14, Feb. 2014.
  3. Larisch, J., Choffnes, D. R., Levin, D., Maggs, B. M., Mislove, A., & Wilson, C. (2017). CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers. IEEE Symposium on Security and Privacy, 539–556. http://doi.org/10.1109/SP.2017.17
  4. Durumeric, Z., Ma, Z., Springall, D., Barnes, R., Sullivan, N., Bursztein, E., et al. (n.d.). The Security Impact of HTTPS Interception. Presented at the Network and Distributed System Security Symposium, 2017
  5. Durumeric, Z., Halderman, J. A., Adrian, D., Mirian, A., Kasten, J., Bursztein, E., et al. (2015). Neither Snow Nor Rain Nor MITM...An Empirical Analysis of Email Delivery Security, IMC 2015
  6. Beurdouche, B., & Bhargavan, K. (2015). A messy state of the union: Taming the composite state machines of TLS. IEEE symposium on Security & Privacy, 2015
  7. Chen, J., Jiang, J., Duan, H., Weaver, N., Wan, T., & Paxson, V. Host of Troubles: Multiple Host Ambiguities in HTTP Implementations ACM SIGSAC CCS 2016.
  8. M. Johns, S. Lekies, and B. Stock, “Eradicating DNS Rebinding with the Extended Same-Origin Policy,” 2013. ( Usenix Security 2013)
  9. Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Haixin Duan, Shuo Chen, Tao Wan, Nicholas Weaver, Cookies lack integrity: real world implications, USENIX Security, 2015.

Web Security

  1. Schwenk, J., Niemietz, M., & Mainka, C. (2017). Same-Origin Policy - Evaluation in Modern Browsers. USENIX Security Symposium.2017
  2. Rui Wang, Shuo Chen, XiaoFeng Wang, and Shaz Qadeer, How to Shop for Free Online – Security Analysis of Cashier-as-a-Service Based Web Stores, S&P 2011
  3. R. Wang, S. Chen, and X. Wang, “Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services,” pp. 365–379, 2012.
  4. Ying Zhang, Zhuoqing Morley Mao, and Jia Wang Rate TCP-Targeted DoS Attacks Disrupts Internet RoutingProceedings of 14th Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, February 2007. [slides]
  5. M. S. Kang, S. B. Lee, and V. D. Gligor, “The Crossfire Attack,” presented at the 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change, pp. 127–141.
  6. Rossow, C. Amplification hell: Revisiting network protocols for DDoS abuse. NDSS 2014.

DDOS

  1. Jianjun Chen, Jian Jiang, Xiaofeng Zheng, Haixin Duan, Jinjin Liang, Tao Wan, Kang Li, Vern Paxson, Forwarding-Loop Attacks in Content Delivery Networks, accepted by NDSS 2016
  2. Yossi Gilad , Amir Herzberg, Michael Sudkovitch and Michael Goberman, CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds,NDSS 2016

Underground Economy

  1. Xiaojing Liao,Kan Yuan, Xiaofeng Wang(*), Zhongyu Pei,Hao Yang, Jianjun Chen, Haixin Duan(*), Kun Du, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, Raheem Beyah, Seeking Nonsense, Looking for Trouble: Efficient Promotional­ Infection Detection through Semantic Inconsistency Search, IEEE Symposium on Security & Privacy, 2016
  2. Kun Du, Hao Yang, Zhou Li, Haixin Duan(*), Kehuan Zhang. The Ever-changing Labyrinth: A Large-scale Analysis of Wildcard DNS Powered Blackhat SEO, USENIX Security 2016
  3. Ho, G., Javed, A., Paxson, V., & Wagner, D. (n.d.). Detecting Credential Spearphishing Attacks in Enterprise Settings. Usenix 2017