NDSS A*

69 papers

YearTitle / Authors
2017(Cross-)Browser Fingerprinting via OS and Hardware Level Features.
Yinzhi Cao, Song Li, Erik Wijmans
201724th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017
2017A Broad View of the Ecosystem of Socially Engineered Exploit Documents.
Stevens Le Blond, Cédric Gilbert, Utkarsh Upadhyay, Manuel Gomez-Rodriguez, David R. Choffnes
2017A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations.
Wilson Lian, Hovav Shacham, Stefan Savage
2017A Large-scale Analysis of the Mnemonic Password Advice.
Johannes Kiesel, Benno Stein, Stefan Lucks
2017ASLR on the Line: Practical Cache Attacks on the MMU.
Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, Cristiano Giuffrida
2017Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.
Robert Rudd, Richard Skowyra, David Bigelow, Veer Dedhia, Thomas Hobson, Stephen Crane, Christopher Liebchen, Per Larsen, Lucas Davi, Michael Franz, Ahmad-Reza Sadeghi, Hamed Okhravi
2017An Evil Copy: How the Loader Betrays You.
Xinyang Ge, Mathias Payer, Trent Jaeger
2017Are We There Yet? On RPKI's Deployment and Security.
Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann
2017Automated Analysis of Privacy Requirements for Mobile Apps.
Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman M. Sadeh, Steven M. Bellovin, Joel R. Reidenberg
2017Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability.
Yu Feng, Osbert Bastani, Ruben Martins, Isil Dillig, Saswat Anand
2017Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection.
Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, Paul Syverson
2017BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Aravind Machiry, Eric Gustafson, Chad Spensky, Christopher Salls, Nick Stephens, Ruoyu Wang, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna
2017Broken Hearted: How To Attack ECG Biometrics.
Simon Eberz, Nicola Paoletti, Marc Roeschlin, Andrea Patané, Marta Kwiatkowska, Ivan Martinovic
2017Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns.
Bum Jun Kwon, Virinchi Srinivas, Amol Deshpande, Tudor Dumitras
2017Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO.
Jesper Buus Nielsen, Thomas Schneider, Roberto Trifiletti
2017ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash
2017Cracking Android Pattern Lock in Five Attempts.
Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, Zheng Wang
2017DELTA: A Security Assessment Framework for Software-Defined Networks.
Seungsoo Lee, Changhoon Yoon, Chanhee Lee, Seungwon Shin, Vinod Yegneswaran, Phillip A. Porras
2017Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.
Giorgi Maisuradze, Michael Backes, Christian Rossow
2017Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
Xiaorui Pan, Xueqiang Wang, Yue Duan, Xiaofeng Wang, Heng Yin
2017Deconstructing Xen.
Le Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen, Binyu Zang, Jinming Li
2017Dial One for Scam: A Large-Scale Analysis of Technical Support Scams.
Najmeh Miramirkhani, Oleksii Starov, Nick Nikiforakis
2017Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.
Srdjan Matic, Carmela Troncoso, Juan Caballero
2017Dynamic Differential Location Privacy with Personalized Error Bounds.
Lei Yu, Ling Liu, Calton Pu
2017Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM.
Yeongpil Cho, Donghyun Kwon, Hayoon Yi, Yunheung Paek
2017Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.
Phani Vadrevu, Jienan Liu, Bo Li, Babak Rahbarinia, Kyu Hyung Lee, Roberto Perdisci
2017FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.
Zhenhua Li, Weiwei Wang, Christo Wilson, Jian Chen, Chen Qian, Taeho Jung, Lan Zhang, Kebin Liu, Xiangyang Li, Yunhao Liu
2017Fake Co-visitation Injection Attacks to Recommender Systems.
Guolei Yang, Neil Zhenqiang Gong, Ying Cai
2017Fast Actively Secure OT Extension for Short Secrets.
Arpita Patra, Pratik Sarkar, Ajith Suresh
2017HOP: Hardware makes Obfuscation Practical.
Kartik Nayak, Christopher W. Fletcher, Ling Ren, Nishanth Chandran, Satya V. Lokam, Elaine Shi, Vipul Goyal
2017Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Clémentine Maurice, Manuel Weber, Michael Schwarz, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Stefan Mangard, Kay Römer
2017Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.
Luis Garcia, Ferdinand Brasser, Mehmet Hazar Cintuglu, Ahmad-Reza Sadeghi, Osama A. Mohammed, Saman A. Zonouz
2017HisTorε: Differentially Private and Robust Statistics Collection for Tor.
Akshaya Mani, Micah Sherr
2017IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality.
Ian Miers, Payman Mohassel
2017Indiscreet Logs: Diffie-Hellman Backdoors in TLS.
Kristen Dorey, Nicholas Chang-Fong, Aleksander Essex
2017Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.
Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir D. Memon, Mustaque Ahamad
2017KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting.
Weitao Xu, Guohao Lan, Qi Lin, Sara Khalifa, Neil Bergmann, Mahbub Hassan, Wen Hu
2017MARX: Uncovering Class Hierarchies in C++ Programs.
Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, Cristiano Giuffrida
2017MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon J. Ross, Gianluca Stringhini
2017Measuring small subgroup attacks against Diffie-Hellman.
Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger
2017Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.
Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, Giovanni Vigna
2017ObliviSync: Practical Oblivious File Backup and Synchronization.
Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche
2017On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han
2017P2P Mixing and Unlinkable Bitcoin Transactions.
Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate
2017PSI: Precise Security Instrumentation for Enterprise Networks.
Tianlong Yu, Seyed Kaveh Fayaz, Michael P. Collins, Vyas Sekar, Srinivasan Seshan
2017PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.
Lucas Davi, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
2017Panoply: Low-TCB Linux Applications With SGX Enclaves.
Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena
2017Pushing the Communication Barrier in Secure Computation using Lookup Tables.
Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni, Michael Zohner
2017Ramblr: Making Reassembly Great Again.
Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, Giovanni Vigna
2017SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.
Jaebaek Seo, Byoungyoung Lee, Seong-min Kim, Ming-Wei Shih, Insik Shin, Dongsu Han, Taesoo Kim
2017Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities.
Alyssa Milburn, Herbert Bos, Cristiano Giuffrida
2017Self Destructing Exploit Executions via Input Perturbation.
Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu
2017Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Wenbo Yang, Yuanyuan Zhang, Juanru Li, Hui Liu, Qing Wang, Yueheng Zhang, Dawu Gu
2017SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2017Stack Bounds Protection with Low Fat Pointers.
Gregory J. Duck, Roland H. C. Yap, Lorenzo Cavallaro
2017T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
Ming-Wei Shih, Sangho Lee, Taesoo Kim, Marcus Peinado
2017TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.
Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
2017The Effect of DNS on Tor's Anonymity.
Benjamin Greschbach, Tobias Pulls, Laura M. Roberts, Philipp Winter, Nick Feamster
2017The Security Impact of HTTPS Interception.
Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael D. Bailey, J. Alex Halderman, Vern Paxson
2017Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda
2017Towards Implicit Visual Memory-Based Authentication.
Claude Castelluccia, Markus Dürmuth, Maximilian Golla, Fatma Deniz
2017TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub.
Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg
2017Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.
Kangjie Lu, Marie-Therese Walter, David Pfaff, Stefan Nümberger, Wenke Lee, Michael Backes
2017Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data.
Wenjie Lu, Shohei Kawasaki, Jun Sakuma
2017VUzzer: Application-aware Evolutionary Fuzzing.
Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, Herbert Bos
2017Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones.
Simon Birnbach, Richard Baker, Ivan Martinovic
2017WindowGuard: Systematic Protection of GUI Security in Android.
Chuangang Ren, Peng Liu, Sencun Zhu
2017WireGuard: Next Generation Kernel Network Tunnel.
Jason A. Donenfeld