NDSS A*

88 papers

YearTitle / Authors
202128th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021
2021A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers?
Yarin Perry, Neta Rozen Schiff, Michael Schapira
2021A Formal Analysis of the FIDO UAF Protocol.
Haonan Feng, Hui Li, Xuesong Pan, Ziming Zhao
2021ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani
2021All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers.
Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
2021As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.
Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, Xiaofeng Wang, Xiapu Luo
2021Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage.
Soroush Karami, Panagiotis Ilia, Jason Polakis
2021BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
Eunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, Yongdae Kim
2021Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.
Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun
2021Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework.
Abdallah Dawoud, Sven Bugiel
2021CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs.
Adil Ahmad, Juhee Kim, Jaebaek Seo, Insik Shin, Pedro Fonseca, Byoungyoung Lee
2021CV-Inspector: Towards Automating Detection of Adblock Circumvention.
Hieu Le, Athina Markopoulou, Zubair Shafiq
2021C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis.
Yonghwi Kwon, Weihang Wang, Jinho Jung, Kyu Hyung Lee, Roberto Perdisci
2021DOVE: A Data-Oblivious Virtual Environment.
Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter
2021Data Poisoning Attacks to Deep Learning Based Recommender Systems.
Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, Mingwei Xu
2021Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms.
Mohsen Minaei, S. Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate
2021Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning.
Navid Emamdoost, Qiushi Wu, Kangjie Lu, Stephen McCamant
2021Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection.
Jiayun Xu, Yingjiu Li, Robert H. Deng
2021Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes.
Alexander Küchler, Alessandro Mantovani, Yufei Han, Leyla Bilge, Davide Balzarotti
2021EarArray: Defending against DolphinAttack via Acoustic Attenuation.
Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu
2021Emilia: Catching Iago in Legacy Code.
Rongzhen Cui, Lianying Zhao, David Lie
2021Evading Voltage-Based Intrusion Detection on Automotive CAN.
Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, Dongyan Xu
2021FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant G. Honavar, Gang Wang, Xinyu Xing
2021FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping.
Xiaoyu Cao, Minghong Fang, Jia Liu, Neil Zhenqiang Gong
2021Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos, Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili
2021Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis.
Tyler McDaniel, Jared M. Smith, Max Schuchard
2021FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications.
Diogo Barradas, Nuno Santos, Luís Rodrigues, Salvatore Signorello, Fernando M. V. Ramos, André Madeira
2021Forward and Backward Private Conjunctive Searchable Symmetric Encryption.
Sikhar Patranabis, Debdeep Mukhopadhyay
2021From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware.
Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li
2021From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Chaoyi Lu, Baojun Liu, Yiming Zhang, Zhou Li, Fenglu Zhang, Haixin Duan, Ying Liu, Joann Qiongna Chen, Jinjin Liang, Zaifeng Zhang, Shuang Hao, Min Yang
2021GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks.
Qiao Zhang, Chunsheng Xin, Hongyi Wu
2021HERA: Hotpatching of Embedded Real-time Applications.
Christian Niesler, Sebastian Surminski, Lucas Davi
2021Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem.
Christopher Lentzsch, Sheel Jayesh Shah, Benjamin Andow, Martin Degeling, Anupam Das, William Enck
2021Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE.
Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk
2021Improving Signal's Sealed Sender.
Ian Martiny, Gabriel Kaptchuk, Adam J. Aviv, Daniel S. Roche, Eric Wustrow
2021IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery.
Wenbo Ding, Hongxin Hu, Long Cheng
2021KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel.
Changming Liu, Yaohui Chen, Long Lu
2021LaKSA: A Probabilistic Proof-of-Stake Protocol.
Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou
2021Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation.
Jack P. K. Ma, Raymond K. H. Tai, Yongjun Zhao, Sherman S. M. Chow
2021MINOS: A Lightweight Real-Time Cryptojacking Detection System.
Faraz Naseem Naseem, Ahmet Aris, Leonardo Babun, Ege Tekiner, A. Selcuk Uluagac
2021Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning.
Virat Shejwalkar, Amir Houmansadr
2021Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
Jonghoon Kwon, Claude Hähni, Patrick Bamert, Adrian Perrig
2021More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes.
Leila Rashidi, Daniel Kostecki, Alexander James, Anthony Peterson, Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, Reihaneh Safavi-Naini
2021NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu
2021Obfuscated Access and Search Patterns in Searchable Encryption.
Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum
2021OblivSketch: Oblivious Network Measurement as a Cloud Service.
Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal
2021On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi
2021PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
Haotian Chi, Qiang Zeng, Xiaojiang Du, Lannan Luo
2021PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles.
Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu
2021PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification.
Mitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, M. Fareed Arif, Syed Rafiul Hussain, Omar Chowdhury
2021POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming.
Min Zheng, Xiaolong Bai, Yajin Zhou, Chao Zhang, Fuping Qu
2021POSEIDON: Privacy-Preserving Federated Neural Network Learning.
Sinem Sav, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao Sa Sousa, Jean-Pierre Hubaux
2021Practical Blind Membership Inference Attack via Differential Comparisons.
Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, Yinzhi Cao
2021Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu
2021Preventing and Detecting State Inference Attacks on Android.
Andrea Possemato, Dario Nisi, Yanick Fratantonio
2021PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps.
Sebastian Zimmeck, Rafael Goldstein, David Baraka
2021Processing Dangerous Paths - On Security and Privacy of the Portable Document Format.
Jens Müller, Dominik Noss, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
2021QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit.
James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic
2021ROV++: Improved Deployable Defense against BGP Hijacking.
Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, Bing Wang
2021RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness.
Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl
2021Refining Indirect Call Targets at the Binary Level.
Sun Hyoung Kim, Cong Sun, Dongrui Zeng, Gang Tan
2021Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing.
Jinghan Wang, Chengyu Song, Heng Yin
2021Reining in the Web's Inconsistencies with Site Policy.
Stefano Calzavara, Tobias Urban, Dennis Tatang, Marius Steffens, Ben Stock
2021Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers.
Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom
2021Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel.
Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson
2021SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web.
Mikhail Shcherbakov, Musard Balliu
2021Shadow Attacks: Hiding and Replacing Content in Signed PDFs.
Christian Mainka, Vladislav Mladenov, Simon Rohlmann
2021SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets.
Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin, Tao Wei
2021SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramèr, Giulia Fanti, Ari Juels
2021SymQEMU: Compilation-based symbolic execution for binaries.
Sebastian Poeplau, Aurélien Francillon
2021TASE: Reducing Latency of Symbolic Execution with Transactional Memory.
Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter
2021Tales of Favicons and Caches: Persistent Tracking in Modern Browsers.
Konstantinos Solomos, John Kristoff, Chris Kanich, Jason Polakis
2021The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud.
Joongyum Kim, Junghwan Park, Sooel Son
2021The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol.
Michael Troncoso, Britta Hale
2021To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media.
Beliz Kaleli, Brian Kondracki, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini
2021Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages.
Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee
2021Towards Understanding and Detecting Cyberbullying in Real-world Images.
Nishant Vishwamitra, Hongxin Hu, Feng Luo, Long Cheng
2021Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Kai Jansen, Liang Niu, Nian Xue, Ivan Martinovic, Christina Pöpper
2021Understanding Worldwide Private Information Collection on Android.
Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini
2021Understanding and Detecting International Revenue Share Fraud.
Merve Sahin, Aurélien Francillon
2021Understanding the Growth and Security Considerations of ECS.
Athanasios Kountouras, Panagiotis Kintis, Athanasios Avgetidis, Thomas Papastergiou, Charles Lever, Michalis Polychronakis, Manos Antonakakis
2021WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao
2021WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning.
Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, Taesoo Kim
2021Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI.
Marius Steffens, Marius Musch, Martin Johns, Ben Stock
2021XDA: Accurate, Robust Disassembly with Transfer Learning.
Kexin Pei, Jonas Guan, David Williams-King, Junfeng Yang, Suman Jana
2021Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks.
Xianghang Mi, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, Xiaofeng Wang
2021Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks.
Mohd Sabra, Anindya Maiti, Murtuza Jadliwala
2021Доверя'й, но проверя'й: SFI safety for native-compiled Wasm.
Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Fraser Brown, Sorin Lerner, Tyler McMullen, Stefan Savage, Deian Stefan