| 2021 | 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021 |
| 2021 | A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers? Yarin Perry, Neta Rozen Schiff, Michael Schapira |
| 2021 | A Formal Analysis of the FIDO UAF Protocol. Haonan Feng, Hui Li, Xuesong Pan, Ziming Zhao |
| 2021 | ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani |
| 2021 | All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers. Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider |
| 2021 | As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service. Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, Xiaofeng Wang, Xiapu Luo |
| 2021 | Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage. Soroush Karami, Panagiotis Ilia, Jason Polakis |
| 2021 | BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols. Eunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, Yongdae Kim |
| 2021 | Bitcontracts: Supporting Smart Contracts in Legacy Blockchains. Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun |
| 2021 | Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework. Abdallah Dawoud, Sven Bugiel |
| 2021 | CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. Adil Ahmad, Juhee Kim, Jaebaek Seo, Insik Shin, Pedro Fonseca, Byoungyoung Lee |
| 2021 | CV-Inspector: Towards Automating Detection of Adblock Circumvention. Hieu Le, Athina Markopoulou, Zubair Shafiq |
| 2021 | C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis. Yonghwi Kwon, Weihang Wang, Jinho Jung, Kyu Hyung Lee, Roberto Perdisci |
| 2021 | DOVE: A Data-Oblivious Virtual Environment. Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter |
| 2021 | Data Poisoning Attacks to Deep Learning Based Recommender Systems. Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, Mingwei Xu |
| 2021 | Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms. Mohsen Minaei, S. Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate |
| 2021 | Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning. Navid Emamdoost, Qiushi Wu, Kangjie Lu, Stephen McCamant |
| 2021 | Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection. Jiayun Xu, Yingjiu Li, Robert H. Deng |
| 2021 | Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes. Alexander Küchler, Alessandro Mantovani, Yufei Han, Leyla Bilge, Davide Balzarotti |
| 2021 | EarArray: Defending against DolphinAttack via Acoustic Attenuation. Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu |
| 2021 | Emilia: Catching Iago in Legacy Code. Rongzhen Cui, Lianying Zhao, David Lie |
| 2021 | Evading Voltage-Based Intrusion Detection on Automotive CAN. Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, Dongyan Xu |
| 2021 | FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data. Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant G. Honavar, Gang Wang, Xinyu Xing |
| 2021 | FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping. Xiaoyu Cao, Minghong Fang, Jia Liu, Neil Zhenqiang Gong |
| 2021 | Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos, Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili |
| 2021 | Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis. Tyler McDaniel, Jared M. Smith, Max Schuchard |
| 2021 | FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications. Diogo Barradas, Nuno Santos, Luís Rodrigues, Salvatore Signorello, Fernando M. V. Ramos, André Madeira |
| 2021 | Forward and Backward Private Conjunctive Searchable Symmetric Encryption. Sikhar Patranabis, Debdeep Mukhopadhyay |
| 2021 | From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware. Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li |
| 2021 | From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR. Chaoyi Lu, Baojun Liu, Yiming Zhang, Zhou Li, Fenglu Zhang, Haixin Duan, Ying Liu, Joann Qiongna Chen, Jinjin Liang, Zaifeng Zhang, Shuang Hao, Min Yang |
| 2021 | GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks. Qiao Zhang, Chunsheng Xin, Hongyi Wu |
| 2021 | HERA: Hotpatching of Embedded Real-time Applications. Christian Niesler, Sebastian Surminski, Lucas Davi |
| 2021 | Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem. Christopher Lentzsch, Sheel Jayesh Shah, Benjamin Andow, Martin Degeling, Anupam Das, William Enck |
| 2021 | Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE. Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk |
| 2021 | Improving Signal's Sealed Sender. Ian Martiny, Gabriel Kaptchuk, Adam J. Aviv, Daniel S. Roche, Eric Wustrow |
| 2021 | IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery. Wenbo Ding, Hongxin Hu, Long Cheng |
| 2021 | KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel. Changming Liu, Yaohui Chen, Long Lu |
| 2021 | LaKSA: A Probabilistic Proof-of-Stake Protocol. Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou |
| 2021 | Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation. Jack P. K. Ma, Raymond K. H. Tai, Yongjun Zhao, Sherman S. M. Chow |
| 2021 | MINOS: A Lightweight Real-Time Cryptojacking Detection System. Faraz Naseem Naseem, Ahmet Aris, Leonardo Babun, Ege Tekiner, A. Selcuk Uluagac |
| 2021 | Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning. Virat Shejwalkar, Amir Houmansadr |
| 2021 | Mondrian: Comprehensive Inter-domain Network Zoning Architecture. Jonghoon Kwon, Claude Hähni, Patrick Bamert, Adrian Perrig |
| 2021 | More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes. Leila Rashidi, Daniel Kostecki, Alexander James, Anthony Peterson, Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, Reihaneh Safavi-Naini |
| 2021 | NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces. Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu |
| 2021 | Obfuscated Access and Search Patterns in Searchable Encryption. Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum |
| 2021 | OblivSketch: Oblivious Network Measurement as a Cloud Service. Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal |
| 2021 | On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices. Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi |
| 2021 | PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. Haotian Chi, Qiang Zeng, Xiaojiang Du, Lannan Luo |
| 2021 | PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu |
| 2021 | PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification. Mitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, M. Fareed Arif, Syed Rafiul Hussain, Omar Chowdhury |
| 2021 | POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming. Min Zheng, Xiaolong Bai, Yajin Zhou, Chao Zhang, Fuping Qu |
| 2021 | POSEIDON: Privacy-Preserving Federated Neural Network Learning. Sinem Sav, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao Sa Sousa, Jean-Pierre Hubaux |
| 2021 | Practical Blind Membership Inference Attack via Differential Comparisons. Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, Yinzhi Cao |
| 2021 | Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu |
| 2021 | Preventing and Detecting State Inference Attacks on Android. Andrea Possemato, Dario Nisi, Yanick Fratantonio |
| 2021 | PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. Sebastian Zimmeck, Rafael Goldstein, David Baraka |
| 2021 | Processing Dangerous Paths - On Security and Privacy of the Portable Document Format. Jens Müller, Dominik Noss, Christian Mainka, Vladislav Mladenov, Jörg Schwenk |
| 2021 | QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit. James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic |
| 2021 | ROV++: Improved Deployable Defense against BGP Hijacking. Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, Bing Wang |
| 2021 | RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl |
| 2021 | Refining Indirect Call Targets at the Binary Level. Sun Hyoung Kim, Cong Sun, Dongrui Zeng, Gang Tan |
| 2021 | Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing. Jinghan Wang, Chengyu Song, Heng Yin |
| 2021 | Reining in the Web's Inconsistencies with Site Policy. Stefano Calzavara, Tobias Urban, Dennis Tatang, Marius Steffens, Ben Stock |
| 2021 | Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom |
| 2021 | Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson |
| 2021 | SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web. Mikhail Shcherbakov, Musard Balliu |
| 2021 | Shadow Attacks: Hiding and Replacing Content in Signed PDFs. Christian Mainka, Vladislav Mladenov, Simon Rohlmann |
| 2021 | SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin, Tao Wei |
| 2021 | SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramèr, Giulia Fanti, Ari Juels |
| 2021 | SymQEMU: Compilation-based symbolic execution for binaries. Sebastian Poeplau, Aurélien Francillon |
| 2021 | TASE: Reducing Latency of Symbolic Execution with Transactional Memory. Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter |
| 2021 | Tales of Favicons and Caches: Persistent Tracking in Modern Browsers. Konstantinos Solomos, John Kristoff, Chris Kanich, Jason Polakis |
| 2021 | The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud. Joongyum Kim, Junghwan Park, Sooel Son |
| 2021 | The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol. Michael Troncoso, Britta Hale |
| 2021 | To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media. Beliz Kaleli, Brian Kondracki, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini |
| 2021 | Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages. Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee |
| 2021 | Towards Understanding and Detecting Cyberbullying in Real-world Images. Nishant Vishwamitra, Hongxin Hu, Feng Luo, Long Cheng |
| 2021 | Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance. Kai Jansen, Liang Niu, Nian Xue, Ivan Martinovic, Christina Pöpper |
| 2021 | Understanding Worldwide Private Information Collection on Android. Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini |
| 2021 | Understanding and Detecting International Revenue Share Fraud. Merve Sahin, Aurélien Francillon |
| 2021 | Understanding the Growth and Security Considerations of ECS. Athanasios Kountouras, Panagiotis Kintis, Athanasios Avgetidis, Thomas Papastergiou, Charles Lever, Michalis Polychronakis, Manos Antonakakis |
| 2021 | WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics. Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao |
| 2021 | WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning. Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, Taesoo Kim |
| 2021 | Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI. Marius Steffens, Marius Musch, Martin Johns, Ben Stock |
| 2021 | XDA: Accurate, Robust Disassembly with Transfer Learning. Kexin Pei, Jonas Guan, David Williams-King, Junfeng Yang, Suman Jana |
| 2021 | Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks. Xianghang Mi, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, Xiaofeng Wang |
| 2021 | Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. Mohd Sabra, Anindya Maiti, Murtuza Jadliwala |
| 2021 | Доверя'й, но проверя'й: SFI safety for native-compiled Wasm. Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Fraser Brown, Sorin Lerner, Tyler McMullen, Stefan Savage, Deian Stefan |