NDSS A*

84 papers

YearTitle / Authors
202229th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022
2022A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks.
Ege Tekiner, Abbas Acar, A. Selcuk Uluagac
2022ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.
Xueluan Gong, Yanjiao Chen, Jianshuo Dong, Qian Wang
2022Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates.
Rock Stevens, Faris Bugra Kokulu, Adam Doupé, Michelle L. Mazurek
2022An In-depth Analysis of Duplicated Linux Kernel Bug Reports.
Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang
2022Binary Search in Secure Computation.
Marina Blanton, Chen Yuan
2022Building Embedded Systems Like It's 1996.
Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu
2022CFInsight: A Comprehensive Metric for CFI Policies.
Tommaso Frassetto, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi
2022COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation.
Peng Xu, Yanhao Wang, Hong Hu, Purui Su
2022Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators.
Shijia Li, Chunfu Jia, Pengda Qiu, Qiyuan Chen, Jiang Ming, Debin Gao
2022Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures.
Ghada Dessouky, Emmanuel Stapf, Pouya Mahmoody, Alexander Gruler, Ahmad-Reza Sadeghi
2022Clarion: Anonymous Communication from Multiparty Shuffling Protocols.
Saba Eskandarian, Dan Boneh
2022Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection.
Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu
2022Cross-Language Attacks.
Samuel Mergendahl, Nathan Burow, Hamed Okhravi
2022D-Box: DMA-enabled Compartmentalization for Embedded Applications.
Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu
2022DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting.
Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom
2022DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection.
Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi
2022Demystifying Local Business Search Poisoning for Illicit Drug Promotion.
Peng Wang, Zilong Lin, Xiaojing Liao, Xiaofeng Wang
2022EMS: History-Driven Mutation for Coverage-based Fuzzing.
Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, Raheem Beyah
2022EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation.
Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin
2022Euler: Detecting Network Lateral Movement via Scalable Temporal Graph Link Prediction.
Isaiah J. King, H. Howie Huang
2022Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing.
Fabio Streun, Joel Wanner, Adrian Perrig
2022F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure.
Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig
2022FANDEMIC: Firmware Attack Construction and Deployment on Power Management Integrated Circuit and Impacts on IoT Applications.
Ryan Tsang, Doreen Joseph, Asmita, Soheil Salehi, Nadir Carreon, Prasant Mohapatra, Houman Homayoun
2022FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.
Aditya Singh Rathore, Yijie Shen, Chenhan Xu, Jacob Snyderman, Jinsong Han, Fan Zhang, Zhengxiong Li, Feng Lin, Wenyao Xu, Kui Ren
2022FedCRI: Federated Mobile Cyber-Risk Intelligence.
Hossein Fereidooni, Alexandra Dmitrienko, Phillip Rieger, Markus Miettinen, Ahmad-Reza Sadeghi, Felix Madlener
2022Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS).
Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich
2022FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware.
Grant Hernandez, Marius Muench, Dominik Christian Maier, Alyssa Milburn, Shinjo Park, Tobias Scharnowski, Tyler Tucker, Patrick Traynor, Kevin R. B. Butler
2022Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems.
Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, Gang Qu
2022Forensic Analysis of Configuration-based Attacks.
Muhammad Adil Inam, Wajih Ul Hassan, Ali Ahad, Adam Bates, Rashid Tahir, Tianyin Xu, Fareed Zaffar
2022Get a Model! Model Hijacking Attack Against Machine Learning Models.
Ahmed Salem, Michael Backes, Yang Zhang
2022GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line.
Yuanda Wang, Hanqing Guo, Qiben Yan
2022HARPO: Learning to Subvert Online Behavioral Advertising.
Jiang Zhang, Konstantinos Psounis, Muhammad Haroon, Zubair Shafiq
2022Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.
Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, Zelin Yang
2022HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale.
Hsun Lee, Yuming Hsu, Jing-Jie Wang, Hao-Cheng Yang, Yu-Heng Chen, Yih-Chun Hu, Hsu-Chun Hsiao
2022Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks.
Sizhuang Liang, Saman A. Zonouz, Raheem Beyah
2022Hybrid Trust Multi-party Computation with Trusted Execution Environment.
Pengfei Wu, Jianting Ning, Jiamin Shen, HongBing Wang, Ee-Chien Chang
2022Interpretable Federated Transformer Log Learning for Cloud Threat Forensics.
Gonzalo De La Torre Parra, Luis Selvera, Joseph Khoury, Hector Irizarry, Elias Bou-Harb, Paul Rad
2022Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.
Brian Johannesmeyer, Jakob Koschel, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
2022Let's Authenticate: Automated Certificates for User Authentication.
James Conners, Corey Devenport, Stephen Derbidge, Natalie Farnsworth, Kyler Gates, Stephen Lambert, Christopher McClain, Parker Nichols, Daniel Zappala
2022Local and Central Differential Privacy for Robustness and Privacy in Federated Learning.
Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro
2022LogicMEM: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference.
Zhenxiao Qi, Yu Qu, Heng Yin
2022MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity.
Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Shengwei An, Jingwei Xu, Xiangyu Zhang, Yuan Yao
2022MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing.
Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, Kai Lu
2022Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures.
Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin
2022NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus.
Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, Bart Preneel
2022On Utility and Privacy in Synthetic Genomic Data.
Bristena Oprisanu, Georgi Ganev, Emiliano De Cristofaro
2022PHYjacking: Physical Input Hijacking for Zero-Permission Authorization Attacks on Android.
Xianbo Wang, Shangcheng Shi, Yikang Chen, Wing Cheong Lau
2022PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.
Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian
2022Packet-Level Open-World App Fingerprinting on Wireless Traffic.
Jianfeng Li, Shuohan Wu, Hao Zhou, Xiapu Luo, Ting Wang, Yangyang Liu, Xiaobo Ma
2022PoF: Proof-of-Following for Vehicle Platoons.
Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, Nirnimesh Ghose
2022Preventing Kernel Hacks with HAKCs.
Derrick Paul McKee, Yianni Giannaris, Carolina Ortega, Howard E. Shrobe, Mathias Payer, Hamed Okhravi, Nathan Burow
2022Privacy in Urban Sensing with Instrumented Fleets, Using Air Pollution Monitoring As A Usecase.
Ismi Abidi, Ishan Nangia, Paarijaat Aditya, Rijurekha Sen
2022Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites.
Zifeng Kang, Song Li, Yinzhi Cao
2022Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel.
Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guoren Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, Paul L. Yu
2022Property Inference Attacks Against GANs.
Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang
2022ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang, Lingyu Wang
2022ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.
Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi
2022RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning.
Hongjun Choi, Zhiyuan Cheng, Xiangyu Zhang
2022RamBoAttack: A Robust and Query Efficient Deep Neural Network Decision Exploit.
Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe
2022Remote Memory-Deduplication Attacks.
Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss
2022Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks.
Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun
2022ScriptChecker: To Tame Third-party Script Execution With Task Capabilities.
Wu Luo, Xuhua Ding, Pengfei Wu, Xiaolei Zhang, Qingni Shen, Zhonghai Wu
2022Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators.
Wenjia Zhao, Kangjie Lu, Qiushi Wu, Yong Qi
2022SemperFi: Anti-spoofing GPS Receiver for UAVs.
Harshad Sathaye, Gerald LaMountain, Pau Closas, Aanjhan Ranganathan
2022Shaduf: Non-Cycle Payment Channel Rebalancing.
Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu
2022Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice.
Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang
2022SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing.
Zhengxiong Li, Baicheng Chen, Xingyu Chen, Huining Li, Chenhan Xu, Feng Lin, Chris Xiaoxuan Lu, Kui Ren, Wenyao Xu
2022Subverting Stateful Firewalls with Protocol States.
Amit Klein
2022SynthCT: Towards Portable Constant-Time Code.
Sushant Dinesh, Grant Garrett-Grossman, Christopher W. Fletcher
2022Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications.
Feras Al Kassar, Giulia Clerici, Luca Compagna, Davide Balzarotti, Fabian Yamaguchi
2022Tetrad: Actively Secure 4PC for Secure Training and Inference.
Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh
2022The Droid is in the Details: Environment-aware Evasion of Android Sandboxes.
Brian Kondracki, Babak Amin Azad, Najmeh Miramirkhani, Nick Nikiforakis
2022The Taming of the Stack: Isolating Stack Data from Memory Errors.
Kaiming Huang, Yongzhe Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger
2022The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments.
Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac
2022Titanium: A Metadata-Hiding File-Sharing System with Malicious Security.
Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz
2022Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks.
Ziwen Wan, Junjie Shen, Jalen Chuang, Xin Xia, Joshua Garcia, Jiaqi Ma, Qi Alfred Chen
2022Transparency Dictionaries with Succinct Proofs of Correct Operation.
Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath T. V. Setty
2022Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang
2022V-Range: Enabling Secure Ranging in 5G Wireless Networks.
Mridula Singh, Marc Roeschlin, Aanjhan Ranganathan, Srdjan Capkun
2022VPNInspector: Systematic Investigation of the VPN Ecosystem.
Reethika Ramesh, Leonid Evdokimov, Diwen Xue, Roya Ensafi
2022What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic Contradiction.
Yijun Yang, Ruiyuan Gao, Yu Li, Qiuxia Lai, Qiang Xu
2022ditto: WAN Traffic Obfuscation at Line Rate.
Roland Meier, Vincent Lenders, Laurent Vanbever
2022hbACSS: How to Robustly Share Many Secrets.
Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller