NDSS A*

90 papers

YearTitle / Authors
202027th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020
2020A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.
Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski
2020A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems.
Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic
2020ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.
Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi
2020Adversarial Classification Under Differential Privacy.
Jairo Giraldo, Alvaro A. Cárdenas, Murat Kantarcioglu, Jonathan Katz
2020Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators.
Imani N. Sherman, Jasmine D. Bowers, Keith McNamara Jr., Juan E. Gilbert, Jaime Ruiz, Patrick Traynor
2020Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.
Haohuang Wen, Qingchuan Zhao, Qi Alfred Chen, Zhiqiang Lin
2020Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.
Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi
2020BLAG: Improving the Accuracy of Blacklists.
Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu
2020BLAZE: Blazing Fast Privacy-Preserving Machine Learning.
Arpita Patra, Ajith Suresh
2020Bobtail: Improved Blockchain Security with Low-Variance Mining.
George Bissias, Brian Neil Levine
2020Broken Metre: Attacking Resource Metering in EVM.
Daniel Perez, Benjamin Livshits
2020CDN Judo: Breaking the CDN DoS Protection with Itself.
Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Sheng, Jianjun Chen, Ying Liu
2020Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting.
Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, Jason Polakis
2020CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.
Honggang Yu, Kaichen Yang, Teng Zhang, Yun-Yun Tsai, Tsung-Yi Ho, Yier Jin
2020Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies.
Sebastian Roth, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, Ben Stock
2020Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards.
Rock Stevens, Josiah Dykstra, Wendy Knox Everette, James Chapman, Garrett Bladow, Alexander Farmer, Kevin Halliday, Michelle L. Mazurek
2020ConTExT: A Generic Approach for Mitigating Spectre.
Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, Daniel Gruss
2020Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks.
Avinash Sudhodanan, Soheil Khodayari, Juan Caballero
2020Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.
Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, Dave Tian
2020DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report.
Ren Ding, Hong Hu, Wen Xu, Taesoo Kim
2020DISCO: Sidestepping RPKI's Deployment Barriers.
Tomas Hlavacek, Ítalo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya Schulmann
2020Data-Driven Debugging for Functional Side Channels.
Saeid Tizpaz-Niari, Pavol Cerný, Ashutosh Trivedi
2020Decentralized Control: A Case Study of Russia.
Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi
2020Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms.
Giada Stivala, Giancarlo Pellegrino
2020DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing.
Yue Duan, Xuezixiang Li, Jinghan Wang, Heng Yin
2020DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures.
Hui Lin, Jianing Zhuang, Yih-Chun Hu, Huayu Zhou
2020Designing a Better Browser for Tor with BLAST.
Tao Wang
2020Detecting Probe-resistant Proxies.
Sergey Frolov, Jack Wampler, Eric Wustrow
2020Dynamic Searchable Encryption with Small Client Storage.
Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou
2020EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks.
Marcel Kneib, Oleg Schell, Christopher Huth
2020Encrypted DNS -> Privacy? A Traffic Analysis Perspective.
Sandra Deepthy Siby, Marc Juarez, Claudia Díaz, Narseo Vallina-Rodriguez, Carmela Troncoso
2020Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors.
Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Heather Zheng
2020FUSE: Finding File Upload Bugs via Penetration Testing.
Taekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son
2020Finding Safety in Numbers with Secure Allegation Escrows.
Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee
2020FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.
Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David R. Choffnes, Maarten van Steen, Andreas Peter
2020Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference.
Peter Ney, Luis Ceze, Tadayoshi Kohno
2020HFL: Hybrid Fuzzing on the Linux Kernel.
Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, Byoungyoung Lee
2020HYPER-CUBE: High-Dimensional Hypervisor Fuzzing.
Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz
2020Heterogeneous Private Information Retrieval.
Hamid Mozaffari, Amir Houmansadr
2020Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft.
Kyungho Joo, Wonsuk Choi, Dong Hoon Lee
2020HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.
William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele
2020IMP4GT: IMPersonation Attacks in 4G NeTworks.
David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper
2020Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals.
Peng Wang, Xiaojing Liao, Yue Qin, Xiaofeng Wang
2020Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, Kui Ren
2020Let's Revoke: Scalable Global Certificate Revocation.
Trevor Smith, Luke Dickenson, Kent E. Seamons
2020Locally Differentially Private Frequency Estimation with Consistency.
Tianhao Wang, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li
2020MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework.
Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2020MassBrowser: Unblocking the Censored Web for the Masses, by the Masses.
Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari
2020Measuring the Deployment of Network Censorship Filters at Global Scale.
Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi
2020Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites.
Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori
2020Metal: A Metadata-Hiding File-Sharing System.
Weikeng Chen, Raluca Ada Popa
2020Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems.
Tao Chen, Longfei Shangguan, Zhenjiang Li, Kyle Jamieson
2020Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa
2020NoJITsu: Locking Down JavaScript Engines.
Taemin Park, Karel Dhondt, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz
2020Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Yanhao Wang, Xiangkun Jia, Yuwei Liu, Kyle Zeng, Tiffany Bao, Dinghao Wu, Purui Su
2020OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display.
Shiqing Luo, Anh Nguyen, Chen Song, Feng Lin, Wenyao Xu, Zhisheng Yan
2020OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
Wajih Ul Hassan, Mohammad A. Noureddine, Pubali Datta, Adam Bates
2020On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways.
Teemu Rytilahti, Thorsten Holz
2020On the Resilience of Biometric Authentication Systems against Random Inputs.
Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar
2020Overcoming the "Evil Twins" Attack: Lessons Learned from the Industrial Battlefield.
Paul Forney
2020Packet-Level Signatures for Smart Home Devices.
Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, Brian Demsky
2020PhantomCache: Obfuscating Cache Conflicts with Localized Randomization.
Qinhan Tan, Zhihua Zeng, Kai Bu, Kui Ren
2020Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches.
Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu
2020Post-Quantum Authentication in TLS 1.3: A Performance Study.
Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis
2020Practical Traffic Analysis Attacks on Secure Messaging Applications.
Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley
2020Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.
Qiushi Wu, Yang He, Stephen McCamant, Kangjie Lu
2020Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem.
Alessandro Mantovani, Simone Aonzo, Xabier Ugarte-Pedrero, Alessio Merlo, Davide Balzarotti
2020Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang
2020ProtectIOn: Root-of-Trust for IO in Compromised Platforms.
Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun
2020Revisiting Leakage Abuse Attacks.
Laura Blackstone, Seny Kamara, Tarik Moataz
2020SODA: A Generic Online Detection Framework for Smart Contracts.
Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, Xiaosong Zhang
2020SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities.
Yuan Xiao, Yinqian Zhang, Radu Teodorescu
2020SVLAN: Secure & Scalable Network Virtualization.
Jonghoon Kwon, Taeho Lee, Claude Hähni, Adrian Perrig
2020Secure Sublinear Time Differentially Private Median Computation.
Jonas Böhler, Florian Kerschbaum
2020Snappy: Fast On-chain Payments with Practical Collaterals.
Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun
2020Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities.
Zhenfeng Zhang, Yuchen Wang, Kang Yang
2020SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.
Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, Ning Zhang
2020SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.
Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun
2020TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications.
Faysal Hossain Shezan, Kaiming Cheng, Zhen Zhang, Yinzhi Cao, Yuan Tian
2020The Attack of the Clones Against Proof-of-Authority.
Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon
2020Towards Plausible Graph Anonymization.
Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan, Jilles Vreeken, Michael Backes
2020Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning.
Harsh Chaudhari, Rahul Rachuri, Ajith Suresh
2020UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.
Runqing Yang, Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen
2020Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats.
Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer
2020When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.
Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, Christopher Kruegel
2020When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN.
Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu
2020Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning through Real-World Measurements.
Jared M. Smith, Kyle Birkeland, Tyler McDaniel, Max Schuchard
2020You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen
2020µRAI: Securing Embedded Systems with Return Address Integrity.
Naif Saleh Almakhdhub, Abraham A. Clements, Saurabh Bagchi, Mathias Payer