NDSS A*

72 papers

YearTitle / Authors
201825th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018
2018A Large-scale Analysis of Content Modification by Open HTTP Proxies.
Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis
2018A Security Analysis of Honeywords.
Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang
2018ABC: Enabling Smartphone Authentication with Built-in Camera.
Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren
2018AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian
2018Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem.
Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, Phillipa Gill
2018Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru
2018Automated Generation of Event-Oriented Exploits in Android Hybrid Apps.
Guangliang Yang, Jeff Huang, Guofei Gu
2018Automated Website Fingerprinting through Deep Learning.
Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen
2018Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets.
Andrea Biondo, Mauro Conti, Daniele Lain
2018BreakApp: Automated, Flexible Application Compartmentalization.
Nikos Vasilakis, Ben Karel, Nick Roessler, Nathan Dautenhahn, André DeHon, Jonathan M. Smith
2018Broken Fingers: On the Usage of the Fingerprint API in Android.
Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee
2018Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions.
Jingjing Ren, Martina Lindorfer, Daniel J. Dubois, Ashwin Rao, David R. Choffnes, Narseo Vallina-Rodriguez
2018CFIXX: Object Type Integrity for C++.
Nathan Burow, Derrick Paul McKee, Scott A. Carr, Mathias Payer
2018Chainspace: A Sharded Smart Contracts Platform.
Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis
2018Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna
2018Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data.
Alexandra-Mihaela Olteanu, Kévin Huguenin, Italo Dacosta, Jean-Pierre Hubaux
2018De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice.
Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun
2018Decentralized Action Integrity for Trigger-Action IoT Platforms.
Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash
2018Device Pairing at the Touch of an Electrode.
Marc Roeschlin, Ivan Martinovic, Kasper Bonne Rasmussen
2018Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications.
Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow
2018Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing.
Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, Insik Shin
2018Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu
2018Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang
2018Fear and Logging in the Internet of Things.
Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter
2018Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks.
Weilin Xu, David Evans, Yanjun Qi
2018Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang
2018GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.
Byeongdo Hong, Sangwook Bae, Yongdae Kim
2018Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
Peng Wang, Xianghang Mi, Xiaojing Liao, Xiaofeng Wang, Kan Yuan, Feng Qian, Raheem A. Beyah
2018Inside Job: Applying Traffic Analysis to Measure Tor from Within.
Rob Jansen, Marc Juarez, Rafa Gálvez, Tariq Elahi, Claudia Díaz
2018InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android.
Yaohui Chen, Yuping Li, Long Lu, Yueh-Hsun Lin, Hayawardh Vijayakumar, Zhi Wang, Xinming Ou
2018Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations.
Athanasios Andreou, Giridhari Venkatadri, Oana Goga, Krishna P. Gummadi, Patrick Loiseau, Alan Mislove
2018IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.
Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, Xiaofeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang
2018JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
Bo Li, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci
2018JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks.
Michael Schwarz, Moritz Lipp, Daniel Gruss
2018K-Miner: Uncovering Memory Corruption in Linux.
David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi
2018K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All.
Parimarjan Negi, Prafull Sharma, Vivek Jain, Bahman Bahmani
2018KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard
2018Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai
2018Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro
2018LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, Elisa Bertino
2018MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation.
Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran
2018Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis.
Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin
2018Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds.
Dean Sullivan, Orlando Arias, Travis Meade, Yier Jin
2018Mind Your Keys? A Security Evaluation of Java Keystores.
Riccardo Focardi, Francesco Palmarini, Marco Squarcina, Graham Steel, Mauro Tempesta
2018OBLIVIATE: A Data Oblivious Filesystem for Intel SGX.
Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee
2018OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, Xiaofeng Wang
2018Preventing (Network) Time Travel with Chronos.
Omer Deutsch, Neta Rozen Schiff, Danny Dolev, Michael Schapira
2018Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center.
Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang
2018Removing Secrets from Android's TLS.
Jaeho Lee, Dan S. Wallach
2018Resolving the Predicament of Android Custom Permissions.
Güliz Seray Tuncay, Soteris Demetriou, Karan Ganju, Carl A. Gunter
2018Revisiting Private Stream Aggregation: Lattice-Based PSA.
Daniela Becker, Jorge Guajardo, Karl-Heinz Zimmermann
2018Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
William Melicher, Anupam Das, Mahmood Sharif, Lujo Bauer, Limin Jia
2018SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS.
Cristian-Alexandru Staicu, Michael Pradel, Benjamin Livshits
2018Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu
2018Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg
2018Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross
2018Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics.
Erick Bauman, Zhiqiang Lin, Kevin W. Hamlen
2018TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing.
Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun
2018Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, Xiaofeng Wang
2018Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III
2018Towards Measuring the Effectiveness of Telephony Blacklists.
Sharbani Pandit, Roberto Perdisci, Mustaque Ahamad, Payas Gupta
2018Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs.
Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, Thomas Moyer
2018Towards a Timely Causality Analysis for Enterprise Security.
Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal
2018Trojaning Attack on Neural Networks.
Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang
2018Veil: Private Browsing Semantics Without Browser-side Assistance.
Frank Wang, James Mickens, Nickolai Zeldovich
2018VulDeePecker: A Deep Learning-Based System for Vulnerability Detection.
Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong
2018What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
Marius Muench, Jan Stijohann, Frank Kargl, Aurélien Francillon, Davide Balzarotti
2018When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan
2018ZEUS: Analyzing Safety of Smart Contracts.
Sukrit Kalra, Seep Goel, Mohan Dhawan, Subodh Sharma
2018ZeroTrace : Oblivious Memory Primitives from Intel SGX.
Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher
2018rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.
Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, Wenke Lee