| 2019 | 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019 |
| 2019 | A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, Deeph Chana |
| 2019 | A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence. Bingsheng Zhang, Roman Oliynykov, Hamed Balogun |
| 2019 | Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa |
| 2019 | Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification. Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li |
| 2019 | Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei |
| 2019 | Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries. Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, Wenke Lee |
| 2019 | BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals. Fenghao Xu, Wenrui Diao, Zhou Li, Jiongyi Chen, Kehuan Zhang |
| 2019 | Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng |
| 2019 | CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C++. Jangseop Shin, Donghyun Kwon, Jiwon Seo, Yeongpil Cho, Yunheung Paek |
| 2019 | Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. Orçun Çetin, Carlos Gañán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten |
| 2019 | Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis |
| 2019 | CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines. HyungSeok Han, DongHyeon Oh, Sang Kil Cha |
| 2019 | Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion. Cas Cremers, Martin Dehnel-Wild |
| 2019 | ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM. Anrin Chakraborti, Radu Sion |
| 2019 | Constructing an Adversary Solver for Equihash. Xiaofei Bai, Jian Gao, Chenglong Hu, Liang Zhang |
| 2019 | Countering Malicious Processes with Process-DNS Association. Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pärn, Zhichun Li, Cristian Lumezanu, Zhenyu Wu, Lu-An Tang, Ding Li |
| 2019 | Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs. Eihal Alowaisheq, Peng Wang, Sumayah A. Alrwais, Xiaojing Liao, Xiaofeng Wang, Tasneem Alowaisheq, Xianghang Mi, Siyuan Tang, Baojun Liu |
| 2019 | Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web. Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, Seungwon Shin |
| 2019 | DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter |
| 2019 | DNS Cache-Based User Tracking. Amit Klein, Benny Pinkas |
| 2019 | Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher |
| 2019 | Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin R. B. Butler, Patrick Traynor |
| 2019 | Distinguishing Attacks from Legitimate Authentication Traffic at Scale. Cormac Herley, Stuart E. Schechter |
| 2019 | Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild. Marius Steffens, Christian Rossow, Martin Johns, Ben Stock |
| 2019 | DroidCap: OS Support for Capability-based Permissions in Android. Abdallah Dawoud, Sven Bugiel |
| 2019 | Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags |
| 2019 | Establishing Software Root of Trust Unconditionally. Virgil D. Gligor, Shan Leung Maverick Woo |
| 2019 | ExSpectre: Hiding Malware in Speculative Execution. Jack Wampler, Ian Martiny, Eric Wustrow |
| 2019 | Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks |
| 2019 | Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin |
| 2019 | Ginseng: Keeping Secrets in Registers When You Distrust the Operating System. Min Hong Yun, Lin Zhong |
| 2019 | Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers. Gabriel Kaptchuk, Matthew Green, Ian Miers |
| 2019 | Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation. Binghui Wang, Jinyuan Jia, Neil Zhenqiang Gong |
| 2019 | How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories. Michael Meli, Matthew R. McNiece, Bradley Reaves |
| 2019 | How to End Password Reuse on the Web. Ke Coby Wang, Michael K. Reiter |
| 2019 | ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries. Anastasis Keliris, Michail Maniatakos |
| 2019 | IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. Z. Berkay Celik, Gang Tan, Patrick D. McDaniel |
| 2019 | JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. Michael Schwarz, Florian Lackner, Daniel Gruss |
| 2019 | Keynote: Modern Challenges for Cyber Defense. Deborah A. Frincke |
| 2019 | Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks. Alexander Sjösten, Steven Van Acker, Pablo Picazo-Sanchez, Andrei Sabelfeld |
| 2019 | Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications. Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chinprutthiwong, Guofei Gu |
| 2019 | MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. Inken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, Xiaofeng Wang, Michael Backes |
| 2019 | ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes |
| 2019 | Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis |
| 2019 | Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet. Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin |
| 2019 | Measuring the Facebook Advertising Ecosystem. Athanasios Andreou, Márcio Silva, Fabrício Benevenuto, Oana Goga, Patrick Loiseau, Alan Mislove |
| 2019 | Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises. Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero |
| 2019 | NAUTILUS: Fishing for Deep Bugs with Grammars. Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert |
| 2019 | NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang |
| 2019 | Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android. Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen |
| 2019 | Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs. Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, Zhexin Zhang |
| 2019 | Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints. Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, Prateek Saxena |
| 2019 | NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, Adam Bates |
| 2019 | OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee |
| 2019 | Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines. Sina Faezi, Sujit Rokka Chhetri, Arnav Vaibhav Malawade, John Charles Chaput, William H. Grover, Philip Brisk, Mohammad Abdullah Al Faruque |
| 2019 | On the Challenges of Geographical Avoidance for Tor. Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper |
| 2019 | One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics. Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, Purui Su |
| 2019 | PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, Michael Franz |
| 2019 | Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data. Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis |
| 2019 | Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson |
| 2019 | Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino |
| 2019 | Private Continual Release of Real-Valued Data Streams. Victor Perrier, Hassan Jameel Asghar, Dali Kaafar |
| 2019 | Profit: Detecting and Quantifying Side Channels in Networked Applications. Nicolás Rosner, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan |
| 2019 | Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers. Muhammad Ahmad Bashir, Umar Farooq, Maryam Shahid, Muhammad Fareed Zaffar, Christo Wilson |
| 2019 | REDQUEEN: Fuzzing with Input-to-State Correspondence. Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz |
| 2019 | RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid. Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah |
| 2019 | Robust Performance Metrics for Authentication Systems. Shridatt Sugrim, Can Liu, Meghan McLean, Janne Lindqvist |
| 2019 | SABRE: Protecting Bitcoin against Routing Attacks. Maria Apostolaki, Gian Marti, Jan Müller, Laurent Vanbever |
| 2019 | SANCTUARY: ARMing TrustZone with User-space Enclaves. Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf |
| 2019 | Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. Lei Zhao, Yue Duan, Heng Yin, Jifeng Xuan |
| 2019 | Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi |
| 2019 | Statistical Privacy for Streaming Traffic. Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang |
| 2019 | Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems. Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami |
| 2019 | TEE-aided Write Protection Against Privileged Data Tampering. Lianying Zhao, Mohammad Mannan |
| 2019 | TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V. Samuel Weiser, Mario Werner, Ferdinand Brasser, Maja Malenko, Stefan Mangard, Ahmad-Reza Sadeghi |
| 2019 | TextBugger: Generating Adversarial Text Against Real-world Applications. Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang |
| 2019 | The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection. Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt |
| 2019 | The use of TLS in Censorship Circumvention. Sergey Frolov, Eric Wustrow |
| 2019 | Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals. A. Theodore Markettos, Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson |
| 2019 | Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. Meng Luo, Pierre Laperdrix, Nima Honarmand, Nick Nikiforakis |
| 2019 | Total Recall: Persistence of Passwords in Android. Jaeho Lee, Ang Chen, Dan S. Wallach |
| 2019 | Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, Wouter Joosen |
| 2019 | UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks. Mridula Singh, Patrick Leu, Srdjan Capkun |
| 2019 | Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment. Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, Robert H. Deng |
| 2019 | Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Paul L. Yu |
| 2019 | Vault: Fast Bootstrapping for the Algorand Cryptocurrency. Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich |
| 2019 | We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz |
| 2019 | YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes. Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand |
| 2019 | maTLS: How to Make TLS middlebox-aware? Hyunwoo Lee, Zach Smith, Junghwan Lim, Gyeongjae Choi, Selin Chun, Taejoong Chung, Ted Taekyoung Kwon |
| 2019 | rORAM: Efficient Range ORAM with O(log2 N) Locality. Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion |