| 2022 | 29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA, April 24-28, 2022 |
| 2022 | A Lightweight IoT Cryptojacking Detection Mechanism in Heterogeneous Smart Home Networks. Ege Tekiner, Abbas Acar, A. Selcuk Uluagac |
| 2022 | ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks. Xueluan Gong, Yanjiao Chen, Jianshuo Dong, Qian Wang |
| 2022 | Above and Beyond: Organizational Efforts to Complement U.S. Digital Security Compliance Mandates. Rock Stevens, Faris Bugra Kokulu, Adam Doupé, Michelle L. Mazurek |
| 2022 | An In-depth Analysis of Duplicated Linux Kernel Bug Reports. Dongliang Mu, Yuhang Wu, Yueqi Chen, Zhenpeng Lin, Chensheng Yu, Xinyu Xing, Gang Wang |
| 2022 | Binary Search in Secure Computation. Marina Blanton, Chen Yuan |
| 2022 | Building Embedded Systems Like It's 1996. Ruotong Yu, Francesca Del Nin, Yuchen Zhang, Shan Huang, Pallavi Kaliyar, Sarah Zakto, Mauro Conti, Georgios Portokalidis, Jun Xu |
| 2022 | CFInsight: A Comprehensive Metric for CFI Policies. Tommaso Frassetto, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi |
| 2022 | COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation. Peng Xu, Yanhao Wang, Hong Hu, Purui Su |
| 2022 | Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators. Shijia Li, Chunfu Jia, Pengda Qiu, Qiyuan Chen, Jiang Ming, Debin Gao |
| 2022 | Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures. Ghada Dessouky, Emmanuel Stapf, Pouya Mahmoody, Alexander Gruler, Ahmad-Reza Sadeghi |
| 2022 | Clarion: Anonymous Communication from Multiparty Shuffling Protocols. Saba Eskandarian, Dan Boneh |
| 2022 | Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection. Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, Shi-Min Hu |
| 2022 | Cross-Language Attacks. Samuel Mergendahl, Nathan Burow, Hamed Okhravi |
| 2022 | D-Box: DMA-enabled Compartmentalization for Embedded Applications. Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu |
| 2022 | DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting. Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom |
| 2022 | DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection. Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi |
| 2022 | Demystifying Local Business Search Poisoning for Illicit Drug Promotion. Peng Wang, Zilong Lin, Xiaojing Liao, Xiaofeng Wang |
| 2022 | EMS: History-Driven Mutation for Coverage-based Fuzzing. Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Binbin Zhao, Kangjie Lu, Raheem Beyah |
| 2022 | EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation. Jinwoo Kim, Eduard Marin, Mauro Conti, Seungwon Shin |
| 2022 | Euler: Detecting Network Lateral Movement via Scalable Temporal Graph Link Prediction. Isaiah J. King, H. Howie Huang |
| 2022 | Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing. Fabio Streun, Joel Wanner, Adrian Perrig |
| 2022 | F-PKI: Enabling Innovation and Trust Flexibility in the HTTPS Public-Key Infrastructure. Laurent Chuat, Cyrill Krähenbühl, Prateek Mittal, Adrian Perrig |
| 2022 | FANDEMIC: Firmware Attack Construction and Deployment on Power Management Integrated Circuit and Impacts on IoT Applications. Ryan Tsang, Doreen Joseph, Asmita, Soheil Salehi, Nadir Carreon, Prasant Mohapatra, Houman Homayoun |
| 2022 | FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing. Aditya Singh Rathore, Yijie Shen, Chenhan Xu, Jacob Snyderman, Jinsong Han, Fan Zhang, Zhengxiong Li, Feng Lin, Wenyao Xu, Kui Ren |
| 2022 | FedCRI: Federated Mobile Cyber-Risk Intelligence. Hossein Fereidooni, Alexandra Dmitrienko, Phillip Rieger, Markus Miettinen, Ahmad-Reza Sadeghi, Felix Madlener |
| 2022 | Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS). Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich |
| 2022 | FirmWire: Transparent Dynamic Analysis for Cellular Baseband Firmware. Grant Hernandez, Marius Muench, Dominik Christian Maier, Alyssa Milburn, Shinjo Park, Tobias Scharnowski, Tyler Tucker, Patrick Traynor, Kevin R. B. Butler |
| 2022 | Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems. Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, Gang Qu |
| 2022 | Forensic Analysis of Configuration-based Attacks. Muhammad Adil Inam, Wajih Ul Hassan, Ali Ahad, Adam Bates, Rashid Tahir, Tianyin Xu, Fareed Zaffar |
| 2022 | Get a Model! Model Hijacking Attack Against Machine Learning Models. Ahmed Salem, Michael Backes, Yang Zhang |
| 2022 | GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. Yuanda Wang, Hanqing Guo, Qiben Yan |
| 2022 | HARPO: Learning to Subvert Online Behavioral Advertising. Jiang Zhang, Konstantinos Psounis, Muhammad Haroon, Zubair Shafiq |
| 2022 | Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems. Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, Zelin Yang |
| 2022 | HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale. Hsun Lee, Yuming Hsu, Jing-Jie Wang, Hao-Cheng Yang, Yu-Heng Chen, Yih-Chun Hu, Hsu-Chun Hsiao |
| 2022 | Hiding My Real Self! Protecting Intellectual Property in Additive Manufacturing Systems Against Optical Side-Channel Attacks. Sizhuang Liang, Saman A. Zonouz, Raheem Beyah |
| 2022 | Hybrid Trust Multi-party Computation with Trusted Execution Environment. Pengfei Wu, Jianting Ning, Jiamin Shen, HongBing Wang, Ee-Chien Chang |
| 2022 | Interpretable Federated Transformer Log Learning for Cloud Threat Forensics. Gonzalo De La Torre Parra, Luis Selvera, Joseph Khoury, Hector Irizarry, Elias Bou-Harb, Paul Rad |
| 2022 | Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. Brian Johannesmeyer, Jakob Koschel, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida |
| 2022 | Let's Authenticate: Automated Certificates for User Authentication. James Conners, Corey Devenport, Stephen Derbidge, Natalie Farnsworth, Kyler Gates, Stephen Lambert, Christopher McClain, Parker Nichols, Daniel Zappala |
| 2022 | Local and Central Differential Privacy for Robustness and Privacy in Federated Learning. Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro |
| 2022 | LogicMEM: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference. Zhenxiao Qi, Yu Qu, Heng Yin |
| 2022 | MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity. Guanhong Tao, Qiuling Xu, Yingqi Liu, Guangyu Shen, Shengwei An, Jingwei Xu, Xiangyu Zhang, Yuan Yao |
| 2022 | MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing. Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, Kai Lu |
| 2022 | Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures. Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin |
| 2022 | NC-Max: Breaking the Security-Performance Tradeoff in Nakamoto Consensus. Ren Zhang, Dingwei Zhang, Quake Wang, Shichen Wu, Jan Xie, Bart Preneel |
| 2022 | On Utility and Privacy in Synthetic Genomic Data. Bristena Oprisanu, Georgi Ganev, Emiliano De Cristofaro |
| 2022 | PHYjacking: Physical Input Hijacking for Zero-Permission Authorization Attacks on Android. Xianbo Wang, Shangcheng Shi, Yikang Chen, Wing Cheong Lau |
| 2022 | PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP. Xuewei Feng, Qi Li, Kun Sun, Ke Xu, Baojun Liu, Xiaofeng Zheng, Qiushi Yang, Haixin Duan, Zhiyun Qian |
| 2022 | Packet-Level Open-World App Fingerprinting on Wireless Traffic. Jianfeng Li, Shuohan Wu, Hao Zhou, Xiapu Luo, Ting Wang, Yangyang Liu, Xiaobo Ma |
| 2022 | PoF: Proof-of-Following for Vehicle Platoons. Ziqi Xu, Jingcheng Li, Yanjun Pan, Loukas Lazos, Ming Li, Nirnimesh Ghose |
| 2022 | Preventing Kernel Hacks with HAKCs. Derrick Paul McKee, Yianni Giannaris, Carolina Ortega, Howard E. Shrobe, Mathias Payer, Hamed Okhravi, Nathan Burow |
| 2022 | Privacy in Urban Sensing with Instrumented Fleets, Using Air Pollution Monitoring As A Usecase. Ismi Abidi, Ishan Nangia, Paarijaat Aditya, Rijurekha Sen |
| 2022 | Probe the Proto: Measuring Client-Side Prototype Pollution Vulnerabilities of One Million Real-world Websites. Zifeng Kang, Song Li, Yinzhi Cao |
| 2022 | Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel. Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guoren Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, Paul L. Yu |
| 2022 | Property Inference Attacks Against GANs. Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang |
| 2022 | ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV). Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang, Lingyu Wang |
| 2022 | ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment. Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi |
| 2022 | RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning. Hongjun Choi, Zhiyuan Cheng, Xiangyu Zhang |
| 2022 | RamBoAttack: A Robust and Query Efficient Deep Neural Network Decision Exploit. Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe |
| 2022 | Remote Memory-Deduplication Attacks. Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss |
| 2022 | Repttack: Exploiting Cloud Schedulers to Guide Co-Location Attacks. Chongzhou Fang, Han Wang, Najmeh Nazari, Behnam Omidi, Avesta Sasan, Khaled N. Khasawneh, Setareh Rafatirad, Houman Homayoun |
| 2022 | ScriptChecker: To Tame Third-party Script Execution With Task Capabilities. Wu Luo, Xuhua Ding, Pengfei Wu, Xiaolei Zhang, Qingni Shen, Zhonghai Wu |
| 2022 | Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators. Wenjia Zhao, Kangjie Lu, Qiushi Wu, Yong Qi |
| 2022 | SemperFi: Anti-spoofing GPS Receiver for UAVs. Harshad Sathaye, Gerald LaMountain, Pau Closas, Aanjhan Ranganathan |
| 2022 | Shaduf: Non-Cycle Payment Channel Rebalancing. Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu |
| 2022 | Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice. Bingyong Guo, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, Zhenfeng Zhang |
| 2022 | SpiralSpy: Exploring a Stealthy and Practical Covert Channel to Attack Air-gapped Computing Devices via mmWave Sensing. Zhengxiong Li, Baicheng Chen, Xingyu Chen, Huining Li, Chenhan Xu, Feng Lin, Chris Xiaoxuan Lu, Kui Ren, Wenyao Xu |
| 2022 | Subverting Stateful Firewalls with Protocol States. Amit Klein |
| 2022 | SynthCT: Towards Portable Constant-Time Code. Sushant Dinesh, Grant Garrett-Grossman, Christopher W. Fletcher |
| 2022 | Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications. Feras Al Kassar, Giulia Clerici, Luca Compagna, Davide Balzarotti, Fabian Yamaguchi |
| 2022 | Tetrad: Actively Secure 4PC for Secure Training and Inference. Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh |
| 2022 | The Droid is in the Details: Environment-aware Evasion of Android Sandboxes. Brian Kondracki, Babak Amin Azad, Najmeh Miramirkhani, Nick Nikiforakis |
| 2022 | The Taming of the Stack: Isolating Stack Data from Memory Errors. Kaiming Huang, Yongzhe Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger |
| 2022 | The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments. Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac |
| 2022 | Titanium: A Metadata-Hiding File-Sharing System with Malicious Security. Weikeng Chen, Thang Hoang, Jorge Guajardo, Attila A. Yavuz |
| 2022 | Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks. Ziwen Wan, Junjie Shen, Jalen Chuang, Xin Xia, Joshua Garcia, Jiaqi Ma, Qi Alfred Chen |
| 2022 | Transparency Dictionaries with Succinct Proofs of Correct Operation. Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath T. V. Setty |
| 2022 | Uncovering Cross-Context Inconsistent Access Control Enforcement in Android. Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang |
| 2022 | V-Range: Enabling Secure Ranging in 5G Wireless Networks. Mridula Singh, Marc Roeschlin, Aanjhan Ranganathan, Srdjan Capkun |
| 2022 | VPNInspector: Systematic Investigation of the VPN Ecosystem. Reethika Ramesh, Leonid Evdokimov, Diwen Xue, Roya Ensafi |
| 2022 | What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic Contradiction. Yijun Yang, Ruiyuan Gao, Yu Li, Qiuxia Lai, Qiang Xu |
| 2022 | ditto: WAN Traffic Obfuscation at Line Rate. Roland Meier, Vincent Lenders, Laurent Vanbever |
| 2022 | hbACSS: How to Robustly Share Many Secrets. Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller |