| 2020 | 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020 |
| 2020 | A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski |
| 2020 | A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems. Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic |
| 2020 | ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi |
| 2020 | Adversarial Classification Under Differential Privacy. Jairo Giraldo, Alvaro A. Cárdenas, Murat Kantarcioglu, Jonathan Katz |
| 2020 | Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators. Imani N. Sherman, Jasmine D. Bowers, Keith McNamara Jr., Juan E. Gilbert, Jaime Ruiz, Patrick Traynor |
| 2020 | Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps. Haohuang Wen, Qingchuan Zhao, Qi Alfred Chen, Zhiqiang Lin |
| 2020 | Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking. Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi |
| 2020 | BLAG: Improving the Accuracy of Blacklists. Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu |
| 2020 | BLAZE: Blazing Fast Privacy-Preserving Machine Learning. Arpita Patra, Ajith Suresh |
| 2020 | Bobtail: Improved Blockchain Security with Low-Variance Mining. George Bissias, Brian Neil Levine |
| 2020 | Broken Metre: Attacking Resource Metering in EVM. Daniel Perez, Benjamin Livshits |
| 2020 | CDN Judo: Breaking the CDN DoS Protection with Itself. Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Sheng, Jianjun Chen, Ying Liu |
| 2020 | Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, Jason Polakis |
| 2020 | CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples. Honggang Yu, Kaichen Yang, Teng Zhang, Yun-Yun Tsai, Tsung-Yi Ho, Yier Jin |
| 2020 | Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies. Sebastian Roth, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, Ben Stock |
| 2020 | Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards. Rock Stevens, Josiah Dykstra, Wendy Knox Everette, James Chapman, Garrett Bladow, Alexander Farmer, Kevin Halliday, Michelle L. Mazurek |
| 2020 | ConTExT: A Generic Approach for Mitigating Spectre. Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, Daniel Gruss |
| 2020 | Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks. Avinash Sudhodanan, Soheil Khodayari, Juan Caballero |
| 2020 | Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, Dave Tian |
| 2020 | DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report. Ren Ding, Hong Hu, Wen Xu, Taesoo Kim |
| 2020 | DISCO: Sidestepping RPKI's Deployment Barriers. Tomas Hlavacek, Ítalo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya Schulmann |
| 2020 | Data-Driven Debugging for Functional Side Channels. Saeid Tizpaz-Niari, Pavol Cerný, Ashutosh Trivedi |
| 2020 | Decentralized Control: A Case Study of Russia. Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi |
| 2020 | Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms. Giada Stivala, Giancarlo Pellegrino |
| 2020 | DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing. Yue Duan, Xuezixiang Li, Jinghan Wang, Heng Yin |
| 2020 | DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures. Hui Lin, Jianing Zhuang, Yih-Chun Hu, Huayu Zhou |
| 2020 | Designing a Better Browser for Tor with BLAST. Tao Wang |
| 2020 | Detecting Probe-resistant Proxies. Sergey Frolov, Jack Wampler, Eric Wustrow |
| 2020 | Dynamic Searchable Encryption with Small Client Storage. Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou |
| 2020 | EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks. Marcel Kneib, Oleg Schell, Christopher Huth |
| 2020 | Encrypted DNS -> Privacy? A Traffic Analysis Perspective. Sandra Deepthy Siby, Marc Juarez, Claudia Díaz, Narseo Vallina-Rodriguez, Carmela Troncoso |
| 2020 | Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors. Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Heather Zheng |
| 2020 | FUSE: Finding File Upload Bugs via Penetration Testing. Taekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son |
| 2020 | Finding Safety in Numbers with Secure Allegation Escrows. Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee |
| 2020 | FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic. Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David R. Choffnes, Maarten van Steen, Andreas Peter |
| 2020 | Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference. Peter Ney, Luis Ceze, Tadayoshi Kohno |
| 2020 | HFL: Hybrid Fuzzing on the Linux Kernel. Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, Byoungyoung Lee |
| 2020 | HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz |
| 2020 | Heterogeneous Private Information Retrieval. Hamid Mozaffari, Amir Houmansadr |
| 2020 | Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft. Kyungho Joo, Wonsuk Choi, Dong Hoon Lee |
| 2020 | HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele |
| 2020 | IMP4GT: IMPersonation Attacks in 4G NeTworks. David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper |
| 2020 | Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals. Peng Wang, Xiaojing Liao, Yue Qin, Xiaofeng Wang |
| 2020 | Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, Kui Ren |
| 2020 | Let's Revoke: Scalable Global Certificate Revocation. Trevor Smith, Luke Dickenson, Kent E. Seamons |
| 2020 | Locally Differentially Private Frequency Estimation with Consistency. Tianhao Wang, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li |
| 2020 | MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework. Thang Hoang, Jorge Guajardo, Attila A. Yavuz |
| 2020 | MassBrowser: Unblocking the Censored Web for the Masses, by the Masses. Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari |
| 2020 | Measuring the Deployment of Network Censorship Filters at Global Scale. Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi |
| 2020 | Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites. Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori |
| 2020 | Metal: A Metadata-Hiding File-Sharing System. Weikeng Chen, Raluca Ada Popa |
| 2020 | Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems. Tao Chen, Longfei Shangguan, Zhenjiang Li, Kyle Jamieson |
| 2020 | Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa |
| 2020 | NoJITsu: Locking Down JavaScript Engines. Taemin Park, Karel Dhondt, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz |
| 2020 | Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. Yanhao Wang, Xiangkun Jia, Yuwei Liu, Kyle Zeng, Tiffany Bao, Dinghao Wu, Purui Su |
| 2020 | OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display. Shiqing Luo, Anh Nguyen, Chen Song, Feng Lin, Wenyao Xu, Zhisheng Yan |
| 2020 | OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis. Wajih Ul Hassan, Mohammad A. Noureddine, Pubali Datta, Adam Bates |
| 2020 | On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways. Teemu Rytilahti, Thorsten Holz |
| 2020 | On the Resilience of Biometric Authentication Systems against Random Inputs. Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar |
| 2020 | Overcoming the "Evil Twins" Attack: Lessons Learned from the Industrial Battlefield. Paul Forney |
| 2020 | Packet-Level Signatures for Smart Home Devices. Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, Brian Demsky |
| 2020 | PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. Qinhan Tan, Zhihua Zeng, Kai Bu, Kui Ren |
| 2020 | Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu |
| 2020 | Post-Quantum Authentication in TLS 1.3: A Performance Study. Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis |
| 2020 | Practical Traffic Analysis Attacks on Secure Messaging Applications. Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley |
| 2020 | Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison. Qiushi Wu, Yang He, Stephen McCamant, Kangjie Lu |
| 2020 | Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem. Alessandro Mantovani, Simone Aonzo, Xabier Ugarte-Pedrero, Alessio Merlo, Davide Balzarotti |
| 2020 | Proof of Storage-Time: Efficiently Checking Continuous Data Availability. Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang |
| 2020 | ProtectIOn: Root-of-Trust for IO in Compromised Platforms. Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun |
| 2020 | Revisiting Leakage Abuse Attacks. Laura Blackstone, Seny Kamara, Tarik Moataz |
| 2020 | SODA: A Generic Online Detection Framework for Smart Contracts. Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, Xiaosong Zhang |
| 2020 | SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. Yuan Xiao, Yinqian Zhang, Radu Teodorescu |
| 2020 | SVLAN: Secure & Scalable Network Virtualization. Jonghoon Kwon, Taeho Lee, Claude Hähni, Adrian Perrig |
| 2020 | Secure Sublinear Time Differentially Private Median Computation. Jonas Böhler, Florian Kerschbaum |
| 2020 | Snappy: Fast On-chain Payments with Practical Collaterals. Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun |
| 2020 | Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities. Zhenfeng Zhang, Yuchen Wang, Kang Yang |
| 2020 | SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, Ning Zhang |
| 2020 | SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun |
| 2020 | TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications. Faysal Hossain Shezan, Kaiming Cheng, Zhen Zhang, Yinzhi Cao, Yuan Tian |
| 2020 | The Attack of the Clones Against Proof-of-Authority. Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon |
| 2020 | Towards Plausible Graph Anonymization. Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan, Jilles Vreeken, Michael Backes |
| 2020 | Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. Harsh Chaudhari, Rahul Rachuri, Ajith Suresh |
| 2020 | UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications. Runqing Yang, Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen |
| 2020 | Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer |
| 2020 | When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, Christopher Kruegel |
| 2020 | When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu |
| 2020 | Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning through Real-World Measurements. Jared M. Smith, Kyle Birkeland, Tyler McDaniel, Max Schuchard |
| 2020 | You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen |
| 2020 | µRAI: Securing Embedded Systems with Return Address Integrity. Naif Saleh Almakhdhub, Abraham A. Clements, Saurabh Bagchi, Mathias Payer |