NDSS A*

91 papers

YearTitle / Authors
201926th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019
2019A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems.
Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, Deeph Chana
2019A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence.
Bingsheng Zhang, Roman Oliynykov, Hamed Balogun
2019Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding.
Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
2019Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li
2019Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability.
Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei
2019Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, Wenke Lee
2019BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals.
Fenghao Xu, Wenrui Diao, Zhou Li, Jiongyi Chen, Kehuan Zhang
2019Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption.
Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng
2019CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C++.
Jangseop Shin, Donghyun Kwon, Jiwon Seo, Yeongpil Cho, Yunheung Paek
2019Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai.
Orçun Çetin, Carlos Gañán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten
2019Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.
Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis
2019CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines.
HyungSeok Han, DongHyeon Oh, Sang Kil Cha
2019Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion.
Cas Cremers, Martin Dehnel-Wild
2019ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM.
Anrin Chakraborti, Radu Sion
2019Constructing an Adversary Solver for Equihash.
Xiaofei Bai, Jian Gao, Chenglong Hu, Liang Zhang
2019Countering Malicious Processes with Process-DNS Association.
Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pärn, Zhichun Li, Cristian Lumezanu, Zhenyu Wu, Lu-An Tang, Ding Li
2019Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Eihal Alowaisheq, Peng Wang, Sumayah A. Alrwais, Xiaojing Liao, Xiaofeng Wang, Tasneem Alowaisheq, Xianghang Mi, Siyuan Tang, Baojun Liu
2019Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web.
Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, Seungwon Shin
2019DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems.
Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter
2019DNS Cache-Based User Tracking.
Amit Klein, Benny Pinkas
2019Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing.
Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher
2019Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System.
Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin R. B. Butler, Patrick Traynor
2019Distinguishing Attacks from Legitimate Authentication Traffic at Scale.
Cormac Herley, Stuart E. Schechter
2019Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild.
Marius Steffens, Christian Rossow, Martin Johns, Ben Stock
2019DroidCap: OS Support for Capability-based Permissions in Android.
Abdallah Dawoud, Sven Bugiel
2019Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory.
Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags
2019Establishing Software Root of Trust Unconditionally.
Virgil D. Gligor, Shan Leung Maverick Woo
2019ExSpectre: Hiding Malware in Speculative Execution.
Jack Wampler, Ian Martiny, Eric Wustrow
2019Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
2019Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services.
Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin
2019Ginseng: Keeping Secrets in Registers When You Distrust the Operating System.
Min Hong Yun, Lin Zhong
2019Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers.
Gabriel Kaptchuk, Matthew Green, Ian Miers
2019Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation.
Binghui Wang, Jinyuan Jia, Neil Zhenqiang Gong
2019How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories.
Michael Meli, Matthew R. McNiece, Bradley Reaves
2019How to End Password Reuse on the Web.
Ke Coby Wang, Michael K. Reiter
2019ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries.
Anastasis Keliris, Michail Maniatakos
2019IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT.
Z. Berkay Celik, Gang Tan, Patrick D. McDaniel
2019JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.
Michael Schwarz, Florian Lackner, Daniel Gruss
2019Keynote: Modern Challenges for Cyber Defense.
Deborah A. Frincke
2019Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks.
Alexander Sjösten, Steven Van Acker, Pablo Picazo-Sanchez, Andrei Sabelfeld
2019Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications.
Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chinprutthiwong, Guofei Gu
2019MBeacon: Privacy-Preserving Beacons for DNA Methylation Data.
Inken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, Xiaofeng Wang, Michael Backes
2019ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models.
Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes
2019Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation.
Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis
2019Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet.
Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin
2019Measuring the Facebook Advertising Ecosystem.
Athanasios Andreou, Márcio Silva, Fabrício Benevenuto, Oana Goga, Patrick Loiseau, Alan Mislove
2019Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises.
Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero
2019NAUTILUS: Fishing for Deep Bugs with Grammars.
Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert
2019NIC: Detecting Adversarial Samples with Neural Network Invariant Checking.
Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang
2019Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android.
Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen
2019Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs.
Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, Zhexin Zhang
2019Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints.
Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, Prateek Saxena
2019NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, Adam Bates
2019OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.
Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee
2019Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines.
Sina Faezi, Sujit Rokka Chhetri, Arnav Vaibhav Malawade, John Charles Chaput, William H. Grover, Philip Brisk, Mohammad Abdullah Al Faruque
2019On the Challenges of Geographical Avoidance for Tor.
Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper
2019One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, Purui Su
2019PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary.
Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, Michael Franz
2019Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data.
Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis
2019Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems.
Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson
2019Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino
2019Private Continual Release of Real-Valued Data Streams.
Victor Perrier, Hassan Jameel Asghar, Dali Kaafar
2019Profit: Detecting and Quantifying Side Channels in Networked Applications.
Nicolás Rosner, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan
2019Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers.
Muhammad Ahmad Bashir, Umar Farooq, Maryam Shahid, Muhammad Fareed Zaffar, Christo Wilson
2019REDQUEEN: Fuzzing with Input-to-State Correspondence.
Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz
2019RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid.
Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah
2019Robust Performance Metrics for Authentication Systems.
Shridatt Sugrim, Can Liu, Meghan McLean, Janne Lindqvist
2019SABRE: Protecting Bitcoin against Routing Attacks.
Maria Apostolaki, Gian Marti, Jan Müller, Laurent Vanbever
2019SANCTUARY: ARMing TrustZone with User-space Enclaves.
Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf
2019Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.
Lei Zhao, Yue Duan, Heng Yin, Jifeng Xuan
2019Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks.
Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi
2019Statistical Privacy for Streaming Traffic.
Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang
2019Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems.
Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami
2019TEE-aided Write Protection Against Privileged Data Tampering.
Lianying Zhao, Mohammad Mannan
2019TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V.
Samuel Weiser, Mario Werner, Ferdinand Brasser, Maja Malenko, Stefan Mangard, Ahmad-Reza Sadeghi
2019TextBugger: Generating Adversarial Text Against Real-world Applications.
Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang
2019The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection.
Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt
2019The use of TLS in Censorship Circumvention.
Sergey Frolov, Eric Wustrow
2019Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals.
A. Theodore Markettos, Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson
2019Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers.
Meng Luo, Pierre Laperdrix, Nima Honarmand, Nick Nikiforakis
2019Total Recall: Persistence of Passwords in Android.
Jaeho Lee, Ang Chen, Dan S. Wallach
2019Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation.
Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, Wouter Joosen
2019UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks.
Mridula Singh, Patrick Leu, Srdjan Capkun
2019Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, Robert H. Deng
2019Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries.
Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Paul L. Yu
2019Vault: Fast Bootstrapping for the Algorand Cryptocurrency.
Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich
2019We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy.
Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz
2019YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes.
Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand
2019maTLS: How to Make TLS middlebox-aware?
Hyunwoo Lee, Zach Smith, Junghwan Lim, Gyeongjae Choi, Selin Chun, Taejoong Chung, Ted Taekyoung Kwon
2019rORAM: Efficient Range ORAM with O(log2 N) Locality.
Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion