| 2018 | 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018 |
| 2018 | A Large-scale Analysis of Content Modification by Open HTTP Proxies. Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis |
| 2018 | A Security Analysis of Honeywords. Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang |
| 2018 | ABC: Enabling Smartphone Authentication with Built-in Camera. Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren |
| 2018 | AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian |
| 2018 | Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem. Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, Phillipa Gill |
| 2018 | Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru |
| 2018 | Automated Generation of Event-Oriented Exploits in Android Hybrid Apps. Guangliang Yang, Jeff Huang, Guofei Gu |
| 2018 | Automated Website Fingerprinting through Deep Learning. Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen |
| 2018 | Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets. Andrea Biondo, Mauro Conti, Daniele Lain |
| 2018 | BreakApp: Automated, Flexible Application Compartmentalization. Nikos Vasilakis, Ben Karel, Nick Roessler, Nathan Dautenhahn, André DeHon, Jonathan M. Smith |
| 2018 | Broken Fingers: On the Usage of the Fingerprint API in Android. Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee |
| 2018 | Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. Jingjing Ren, Martina Lindorfer, Daniel J. Dubois, Ashwin Rao, David R. Choffnes, Narseo Vallina-Rodriguez |
| 2018 | CFIXX: Object Type Integrity for C++. Nathan Burow, Derrick Paul McKee, Scott A. Carr, Mathias Payer |
| 2018 | Chainspace: A Sharded Smart Contracts Platform. Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis |
| 2018 | Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna |
| 2018 | Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data. Alexandra-Mihaela Olteanu, Kévin Huguenin, Italo Dacosta, Jean-Pierre Hubaux |
| 2018 | De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice. Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun |
| 2018 | Decentralized Action Integrity for Trigger-Action IoT Platforms. Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash |
| 2018 | Device Pairing at the Touch of an Electrode. Marc Roeschlin, Ivan Martinovic, Kasper Bonne Rasmussen |
| 2018 | Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications. Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow |
| 2018 | Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing. Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, Insik Shin |
| 2018 | Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control. Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu |
| 2018 | Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang |
| 2018 | Fear and Logging in the Internet of Things. Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter |
| 2018 | Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. Weilin Xu, David Evans, Yanjun Qi |
| 2018 | Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang |
| 2018 | GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier. Byeongdo Hong, Sangwook Bae, Yongdae Kim |
| 2018 | Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. Peng Wang, Xianghang Mi, Xiaojing Liao, Xiaofeng Wang, Kan Yuan, Feng Qian, Raheem A. Beyah |
| 2018 | Inside Job: Applying Traffic Analysis to Measure Tor from Within. Rob Jansen, Marc Juarez, Rafa Gálvez, Tariq Elahi, Claudia Díaz |
| 2018 | InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android. Yaohui Chen, Yuping Li, Long Lu, Yueh-Hsun Lin, Hayawardh Vijayakumar, Zhi Wang, Xinming Ou |
| 2018 | Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations. Athanasios Andreou, Giridhari Venkatadri, Oana Goga, Krishna P. Gummadi, Patrick Loiseau, Alan Mislove |
| 2018 | IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, Xiaofeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang |
| 2018 | JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions. Bo Li, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci |
| 2018 | JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. Michael Schwarz, Moritz Lipp, Daniel Gruss |
| 2018 | K-Miner: Uncovering Memory Corruption in Linux. David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi |
| 2018 | K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All. Parimarjan Negi, Prafull Sharma, Vivek Jain, Bahman Bahmani |
| 2018 | KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard |
| 2018 | Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai |
| 2018 | Knock Knock, Who's There? Membership Inference on Aggregate Location Data. Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro |
| 2018 | LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE. Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, Elisa Bertino |
| 2018 | MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran |
| 2018 | Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin |
| 2018 | Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds. Dean Sullivan, Orlando Arias, Travis Meade, Yier Jin |
| 2018 | Mind Your Keys? A Security Evaluation of Java Keystores. Riccardo Focardi, Francesco Palmarini, Marco Squarcina, Graham Steel, Mauro Tempesta |
| 2018 | OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee |
| 2018 | OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, Xiaofeng Wang |
| 2018 | Preventing (Network) Time Travel with Chronos. Omer Deutsch, Neta Rozen Schiff, Danny Dolev, Michael Schapira |
| 2018 | Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center. Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang |
| 2018 | Removing Secrets from Android's TLS. Jaeho Lee, Dan S. Wallach |
| 2018 | Resolving the Predicament of Android Custom Permissions. Güliz Seray Tuncay, Soteris Demetriou, Karan Ganju, Carl A. Gunter |
| 2018 | Revisiting Private Stream Aggregation: Lattice-Based PSA. Daniela Becker, Jorge Guajardo, Karl-Heinz Zimmermann |
| 2018 | Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting. William Melicher, Anupam Das, Mahmood Sharif, Lujo Bauer, Limin Jia |
| 2018 | SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS. Cristian-Alexandru Staicu, Michael Pradel, Benjamin Livshits |
| 2018 | Securing Real-Time Microcontroller Systems through Customized Memory View Switching. Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu |
| 2018 | Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg |
| 2018 | Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks. Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross |
| 2018 | Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. Erick Bauman, Zhiqiang Lin, Kevin W. Hamlen |
| 2018 | TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing. Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun |
| 2018 | Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation. Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, Xiaofeng Wang |
| 2018 | Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images. Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III |
| 2018 | Towards Measuring the Effectiveness of Telephony Blacklists. Sharbani Pandit, Roberto Perdisci, Mustaque Ahamad, Payas Gupta |
| 2018 | Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, Thomas Moyer |
| 2018 | Towards a Timely Causality Analysis for Enterprise Security. Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal |
| 2018 | Trojaning Attack on Neural Networks. Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang |
| 2018 | Veil: Private Browsing Semantics Without Browser-side Assistance. Frank Wang, James Mickens, Nickolai Zeldovich |
| 2018 | VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong |
| 2018 | What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. Marius Muench, Jan Stijohann, Frank Kargl, Aurélien Francillon, Davide Balzarotti |
| 2018 | When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan |
| 2018 | ZEUS: Analyzing Safety of Smart Contracts. Sukrit Kalra, Seep Goel, Mohan Dhawan, Subodh Sharma |
| 2018 | ZeroTrace : Oblivious Memory Primitives from Intel SGX. Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher |
| 2018 | rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System. Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, Wenke Lee |