Talks

Y.J. Pyun, "Tracing Traffic Through Intermediate Hosts that Repacketize Flows", presented at the 26th Annual IEEE Conference on Computer Communications (Infocom 2007), May 2007, Anchorage, AK. [PDF].

P. Peng, "On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques", presented at the IEEE Symposium on Security and Privacy, May 2006, Oakland, CA. [PDF].

D. Reeves, "The FootFall Project", presented at the Information Assurance PI meeting, September 2006, Denver, CO. [PDF].

D. Reeves, "The FootFall Project", presented at the Information Assurance PI meeting, March 2006, San Franciso, CA. [PDF].

D. Reeves, "The FootFall Project", presented at the Information Assurance PI meeting, October 2005, Verona, NY. [PDF].

Pai Peng, "Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets", presented at the Second International Workshop on Security in Distributed Computing Systems (SDCS 2005), February 2005. [PDF]

D. Reeves, "The FootFall Project", presented at the Traceback / Insider Threat PI Workshop, February 2005, Myrtle Beach, SC. [PDF]

D. Reeves, "The FootFall Project", presented at IAIC/P2ING PI Workshop, June 2004, San Diego, CA. [PDF]

X. Wang, "The Loop Fallacy and Serialization in Tracing Intrusion Connections Through Stepping Stones", ACM Symposium on Applied Computing, March 2004, Nicosia, Cyprus. [PDF]

D. Reeves, "The FootFall Project", presented at IAIC Workshop, November 2003, Nashville, TN. [PDF]

X. Wang. "Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Interpacket Delays", presented at the ACM Conference on Computer and Communications Security (CCS 2003), October 2003, Washington, DC. [PDF]

D. Reeves, "Tracing Attackers Through the Internet", presented at the University of Louisville Speed Scientific School, October 2003, Louisville, KY. [PDF]

X. Wang. "Inter-Packet Delay-Based Correlation for Tracing Encrypted Connections through Stepping Stones", presented at the 7th European Symposium on Research in Computer Security – (ESORICS 2002), October 2002, Zurich, Switzerland. [PDF]

X. Wang, "Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework", presented at the 16th International Conference on Information Security (IFIP/Sec’01), June 2001, Paris, France. [PDF]

 

 

 
  last updated July 14, 2007 by reeves at eos dot ncsu dot edu