| 2023 | 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023 |
| 2023 | A Robust Counting Sketch for Data Plane Intrusion Detection. Sian Kim, Changhun Jung, Rhongho Jang, David Mohaisen, DaeHun Nyang |
| 2023 | A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities. Zihao Jin, Shuo Chen, Yang Chen, Haixin Duan, Jianjun Chen, Jianping Wu |
| 2023 | A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites. Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel |
| 2023 | Access Your Tesla without Your Awareness: Compromising Keyless Entry System of Model 3. Xinyi Xie, Kun Jiang, Rui Dai, Jun Lu, Lihui Wang, Qing Li, Jun Yu |
| 2023 | Accountable Javascript Code Delivery. Ilkan Esiyok, Pascal Berrang, Katriel Cohn-Gordon, Robert Künnemann |
| 2023 | Adversarial Robustness for Tabular Data through Cost and Utility Awareness. Klim Kireev, Bogdan Kulynych, Carmela Troncoso |
| 2023 | An OS-agnostic Approach to Memory Forensics. Andrea Oliveri, Matteo Dell'Amico, Davide Balzarotti |
| 2023 | Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation. Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin |
| 2023 | Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. Hugo Lefeuvre, Vlad-Andrei Badoiu, Yi Chen, Felipe Huici, Nathan Dautenhahn, Pierre Olivier |
| 2023 | Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems. Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor |
| 2023 | AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms. Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi |
| 2023 | Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations. Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas, Fredrik Tåquist |
| 2023 | BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems. Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin |
| 2023 | BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang |
| 2023 | Backdoor Attacks Against Dataset Distillation. Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang |
| 2023 | BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats. Jared Chandler, Adam Wick, Kathleen Fisher |
| 2023 | BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects. Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang |
| 2023 | Breaking and Fixing Virtual Channels: Domino Attack and Donner. Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei |
| 2023 | Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging. Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic |
| 2023 | Browser Permission Mechanisms Demystified. Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori |
| 2023 | CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph. Faysal Hossain Shezan, Zihao Su, Mingqing Kang, Nicholas Phair, Patrick William Thomas, Michelangelo van Dam, Yinzhi Cao, Yuan Tian |
| 2023 | ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems. Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, Chadi Assi |
| 2023 | Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. Andrea Di Dio, Koen Koning, Herbert Bos, Cristiano Giuffrida |
| 2023 | Cryptographic Oracle-based Conditional Payments. Varun Madathil, Sri Aravinda Krishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez |
| 2023 | DARWIN: Survival of the Fittest Fuzzing Mutators. Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi |
| 2023 | DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe |
| 2023 | Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis. Chuanpu Fu, Qi Li, Ke Xu |
| 2023 | DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing. Seongil Wi, Trung Tin Nguyen, Jihwan Kim, Ben Stock, Sooel Son |
| 2023 | Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks. Chongqing Lei, Zhen Ling, Yue Zhang, Kai Dong, Kaizheng Liu, Junzhou Luo, Xinwen Fu |
| 2023 | Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams. Xigao Li, Anurag Yepuri, Nick Nikiforakis |
| 2023 | Drone Security and the Mysterious Case of DJI's DroneID. Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz |
| 2023 | EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems. Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun |
| 2023 | Efficient Dynamic Proof of Retrievability for Cold Storage. Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang |
| 2023 | Evasion Attacks and Defenses on Smart Home Physical Event Verification. Muslum Ozgur Ozmen, Ruoyu Song, Habiba Farrukh, Z. Berkay Celik |
| 2023 | Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing. Mohit Kumar Jangid, Yue Zhang, Zhiqiang Lin |
| 2023 | FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities. Samuel Groß, Simon Koch, Lukas Bernhard, Thorsten Holz, Martin Johns |
| 2023 | Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection. Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi |
| 2023 | Fine-Grained Trackability in Protocol Executions. Ksenia Budykho, Ioana Boureanu, Stephan Wesemeyer, Daniel Romero, Matt Lewis, Yogaratnam Rahulan, Fortunat Rajaona, Steve Schneider |
| 2023 | Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes. Jiayun Fu, Xiaojing Ma, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu, Hai Jin, Dongmei Zhang |
| 2023 | Folk Models of Misinformation on Social Media. Filipo Sharevski, Amy Devine, Emma Pieroni, Peter Jachim |
| 2023 | Fusion: Efficient and Secure Inference Resilient to Malicious Servers. Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu |
| 2023 | Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation. Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li |
| 2023 | He-HTLC: Revisiting Incentives in HTLC. Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak |
| 2023 | HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity. Chongzhou Fang, Najmeh Nazari, Behnam Omidi, Han Wang, Aditya Puri, Manish Arora, Setareh Rafatirad, Houman Homayoun, Khaled N. Khasawneh |
| 2023 | Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites. Shujiang Wu, Pengfei Sun, Yao Zhao, Yinzhi Cao |
| 2023 | Hope of Delivery: Extracting User Locations From Mobile Instant Messengers. Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper |
| 2023 | How to Count Bots in Longitudinal Datasets of IP Addresses. Leon Böck, Dave Levin, Ramakrishna Padmanabhan, Christian Doerr, Max Mühlhäuser |
| 2023 | I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape. Carlotta Tagliaro, Florian Hahn, Riccardo Sepe, Alessio Aceti, Martina Lindorfer |
| 2023 | InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise. Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Fan Zhang, Kui Ren |
| 2023 | LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols. Fuchen Ma, Yuanliang Chen, Meng Ren, Yuanhang Zhou, Yu Jiang, Ting Chen, Huizhong Li, Jiaguang Sun |
| 2023 | Let Me Unwind That For You: Exceptions to Backward-Edge Protection. Victor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, Cristiano Giuffrida |
| 2023 | Machine Unlearning of Features and Labels. Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck |
| 2023 | MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags. Xingyu Chen, Zhengxiong Li, Baicheng Chen, Yi Zhu, Chris Xiaoxuan Lu, Zhengyu Peng, Feng Lin, Wenyao Xu, Kui Ren, Chunming Qiao |
| 2023 | MyTEE: Own the Trusted Execution Environment on Embedded Devices. Seung-Kyun Han, Jinsoo Jang |
| 2023 | Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors. Mir Masood Ali, Binoy Chitale, Mohammad Ghasemisharif, Chris Kanich, Nick Nikiforakis, Jason Polakis |
| 2023 | No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions. Alexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele |
| 2023 | OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption. Zhiqiang Wu, Rui Li |
| 2023 | OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables. Yanzuo Chen, Yuanyuan Yuan, Shuai Wang |
| 2023 | On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies. Piyush Kumar Sharma, Devashish Gosain, Claudia Díaz |
| 2023 | OptRand: Optimistically Responsive Reconfigurable Distributed Randomness. Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak |
| 2023 | POSE: Practical Off-chain Smart Contract Execution. Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, Ahmad-Reza Sadeghi |
| 2023 | PPA: Preference Profiling Attack Against Federated Learning. Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang |
| 2023 | Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging. Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean F. Lawlor |
| 2023 | Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels. Joon-Ha Jang, ManGi Cho, Jaehoon Kim, Dongkwan Kim, Yongdae Kim |
| 2023 | Partitioning Ethereum without Eclipsing It. Hwanjo Heo, Seungwon Woo, Taeung Yoon, Min Suk Kang, Seungwon Shin |
| 2023 | Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers. Mark Huasong Meng, Qing Zhang, Guangshuai Xia, Yuwei Zheng, Yanjun Zhang, Guangdong Bai, Zhi Liu, Sin G. Teo, Jin Song Dong |
| 2023 | Preventing SIM Box Fraud Using Device Model Fingerprinting. Beomseok Oh, Junho Ahn, Sangwook Bae, Mincheol Son, Yonghwa Lee, Min Suk Kang, Yongdae Kim |
| 2023 | Privacy-Preserving Database Fingerprinting. Tianxi Ji, Erman Ayday, Emre Yilmaz, Ming Li, Pan Li |
| 2023 | Private Certifier Intersection. Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty |
| 2023 | ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks. Hussein Darir, Geir E. Dullerud, Nikita Borisov |
| 2023 | QUICforge: Client-side Request Forgery in QUIC. Konrad Yuri Gbur, Florian Tschorsch |
| 2023 | RAI2: Responsible Identity Audit Governing the Artificial Intelligence. Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu |
| 2023 | REDsec: Running Encrypted Discretized Neural Networks in Seconds. Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos |
| 2023 | REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service. Wenjie Qu, Jinyuan Jia, Neil Zhenqiang Gong |
| 2023 | RR: A Fault Model for Efficient TEE Replication. Baltasar Dinis, Peter Druschel, Rodrigo Rodrigues |
| 2023 | ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning. Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis |
| 2023 | Real Threshold ECDSA. Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow |
| 2023 | RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression. Jung-Woo Chang, Mojan Javaheripi, Seira Hidano, Farinaz Koushanfar |
| 2023 | Securing Federated Sensitive Topic Classification against Poisoning Attacks. Tianyue Chu, Álvaro García-Recuero, Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris |
| 2023 | Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning. Christoph Sendner, Huili Chen, Hossein Fereidooni, Lukas Petzi, Jan König, Jasper Stang, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Farinaz Koushanfar |
| 2023 | Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems. Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates |
| 2023 | SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response. Huadi Zhu, Mingyan Xiao, Demoria Sherman, Ming Li |
| 2023 | StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors. Ke Sun, Chunyu Xia, Songlin Xu, Xinyu Zhang |
| 2023 | SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications. An Chen, Jiho Lee, Basanta Chaulagain, Yonghwi Kwon, Kyu Hyung Lee |
| 2023 | Tactics, Threats & Targets: Modeling Disinformation and its Mitigation. Muhammad Shujaat Mirza, Labeeba Begum, Liang Niu, Sarah Pardo, Azza Abouzied, Paolo Papotti, Christina Pöpper |
| 2023 | The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang |
| 2023 | The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang |
| 2023 | Thwarting Smartphone SMS Attacks at the Radio Interface Layer. Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin |
| 2023 | Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs. Runhao Li, Bin Zhang, Jiongyi Chen, Wenfeng Lin, Chao Feng, Chaojing Tang |
| 2023 | Trellis: Robust and Scalable Metadata-private Anonymous Broadcast. Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas |
| 2023 | Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof. Jinseob Jeong, Dongkwan Kim, Joon-Ha Jang, Juhwan Noh, Changhun Song, Yongdae Kim |
| 2023 | VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests. Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik |
| 2023 | VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. Zhenhao Luo, Pengfei Wang, Baosheng Wang, Yong Tang, Wei Xie, Xu Zhou, Danjun Liu, Kai Lu |
| 2023 | Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels. Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu |