NDSS A*

95 papers

YearTitle / Authors
202330th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023
2023A Robust Counting Sketch for Data Plane Intrusion Detection.
Sian Kim, Changhun Jung, Rhongho Jang, David Mohaisen, DaeHun Nyang
2023A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Zihao Jin, Shuo Chen, Yang Chen, Haixin Duan, Jianjun Chen, Jianping Wu
2023A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.
Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel
2023Access Your Tesla without Your Awareness: Compromising Keyless Entry System of Model 3.
Xinyi Xie, Kun Jiang, Rui Dai, Jun Lu, Lihui Wang, Qing Li, Jun Yu
2023Accountable Javascript Code Delivery.
Ilkan Esiyok, Pascal Berrang, Katriel Cohn-Gordon, Robert Künnemann
2023Adversarial Robustness for Tabular Data through Cost and Utility Awareness.
Klim Kireev, Bogdan Kulynych, Carmela Troncoso
2023An OS-agnostic Approach to Memory Forensics.
Andrea Oliveri, Matteo Dell'Amico, Davide Balzarotti
2023Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin
2023Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software.
Hugo Lefeuvre, Vlad-Andrei Badoiu, Yi Chen, Felipe Huici, Nathan Dautenhahn, Pierre Olivier
2023Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor
2023AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.
Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi
2023Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations.
Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas, Fredrik Tåquist
2023BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems.
Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin
2023BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang
2023Backdoor Attacks Against Dataset Distillation.
Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang
2023BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats.
Jared Chandler, Adam Wick, Kathleen Fisher
2023BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects.
Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang
2023Breaking and Fixing Virtual Channels: Domino Attack and Donner.
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei
2023Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging.
Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic
2023Browser Permission Mechanisms Demystified.
Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori
2023CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph.
Faysal Hossain Shezan, Zihao Su, Mingqing Kang, Nicholas Phair, Patrick William Thomas, Michelangelo van Dam, Yinzhi Cao, Yuan Tian
2023ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, Chadi Assi
2023Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks.
Andrea Di Dio, Koen Koning, Herbert Bos, Cristiano Giuffrida
2023Cryptographic Oracle-based Conditional Payments.
Varun Madathil, Sri Aravinda Krishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez
2023DARWIN: Survival of the Fittest Fuzzing Mutators.
Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi
2023DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.
Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe
2023Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
Chuanpu Fu, Qi Li, Ke Xu
2023DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing.
Seongil Wi, Trung Tin Nguyen, Jihwan Kim, Ben Stock, Sooel Son
2023Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
Chongqing Lei, Zhen Ling, Yue Zhang, Kai Dong, Kaizheng Liu, Junzhou Luo, Xinwen Fu
2023Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams.
Xigao Li, Anurag Yepuri, Nick Nikiforakis
2023Drone Security and the Mysterious Case of DJI's DroneID.
Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz
2023EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems.
Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun
2023Efficient Dynamic Proof of Retrievability for Cold Storage.
Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang
2023Evasion Attacks and Defenses on Smart Home Physical Event Verification.
Muslum Ozgur Ozmen, Ruoyu Song, Habiba Farrukh, Z. Berkay Celik
2023Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.
Mohit Kumar Jangid, Yue Zhang, Zhiqiang Lin
2023FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities.
Samuel Groß, Simon Koch, Lukas Bernhard, Thorsten Holz, Martin Johns
2023Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection.
Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi
2023Fine-Grained Trackability in Protocol Executions.
Ksenia Budykho, Ioana Boureanu, Stephan Wesemeyer, Daniel Romero, Matt Lewis, Yogaratnam Rahulan, Fortunat Rajaona, Steve Schneider
2023Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Jiayun Fu, Xiaojing Ma, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu, Hai Jin, Dongmei Zhang
2023Folk Models of Misinformation on Social Media.
Filipo Sharevski, Amy Devine, Emma Pieroni, Peter Jachim
2023Fusion: Efficient and Secure Inference Resilient to Malicious Servers.
Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu
2023Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation.
Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li
2023He-HTLC: Revisiting Incentives in HTLC.
Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak
2023HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity.
Chongzhou Fang, Najmeh Nazari, Behnam Omidi, Han Wang, Aditya Puri, Manish Arora, Setareh Rafatirad, Houman Homayoun, Khaled N. Khasawneh
2023Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites.
Shujiang Wu, Pengfei Sun, Yao Zhao, Yinzhi Cao
2023Hope of Delivery: Extracting User Locations From Mobile Instant Messengers.
Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper
2023How to Count Bots in Longitudinal Datasets of IP Addresses.
Leon Böck, Dave Levin, Ramakrishna Padmanabhan, Christian Doerr, Max Mühlhäuser
2023I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape.
Carlotta Tagliaro, Florian Hahn, Riccardo Sepe, Alessio Aceti, Martina Lindorfer
2023InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Fan Zhang, Kui Ren
2023LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
Fuchen Ma, Yuanliang Chen, Meng Ren, Yuanhang Zhou, Yu Jiang, Ting Chen, Huizhong Li, Jiaguang Sun
2023Let Me Unwind That For You: Exceptions to Backward-Edge Protection.
Victor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, Cristiano Giuffrida
2023Machine Unlearning of Features and Labels.
Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck
2023MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags.
Xingyu Chen, Zhengxiong Li, Baicheng Chen, Yi Zhu, Chris Xiaoxuan Lu, Zhengyu Peng, Feng Lin, Wenyao Xu, Kui Ren, Chunming Qiao
2023MyTEE: Own the Trusted Execution Environment on Embedded Devices.
Seung-Kyun Han, Jinsoo Jang
2023Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
Mir Masood Ali, Binoy Chitale, Mohammad Ghasemisharif, Chris Kanich, Nick Nikiforakis, Jason Polakis
2023No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions.
Alexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele
2023OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption.
Zhiqiang Wu, Rui Li
2023OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables.
Yanzuo Chen, Yuanyuan Yuan, Shuai Wang
2023On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies.
Piyush Kumar Sharma, Devashish Gosain, Claudia Díaz
2023OptRand: Optimistically Responsive Reconfigurable Distributed Randomness.
Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak
2023POSE: Practical Off-chain Smart Contract Execution.
Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, Ahmad-Reza Sadeghi
2023PPA: Preference Profiling Attack Against Federated Learning.
Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang
2023Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging.
Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean F. Lawlor
2023Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels.
Joon-Ha Jang, ManGi Cho, Jaehoon Kim, Dongkwan Kim, Yongdae Kim
2023Partitioning Ethereum without Eclipsing It.
Hwanjo Heo, Seungwon Woo, Taeung Yoon, Min Suk Kang, Seungwon Shin
2023Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers.
Mark Huasong Meng, Qing Zhang, Guangshuai Xia, Yuwei Zheng, Yanjun Zhang, Guangdong Bai, Zhi Liu, Sin G. Teo, Jin Song Dong
2023Preventing SIM Box Fraud Using Device Model Fingerprinting.
Beomseok Oh, Junho Ahn, Sangwook Bae, Mincheol Son, Yonghwa Lee, Min Suk Kang, Yongdae Kim
2023Privacy-Preserving Database Fingerprinting.
Tianxi Ji, Erman Ayday, Emre Yilmaz, Ming Li, Pan Li
2023Private Certifier Intersection.
Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty
2023ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks.
Hussein Darir, Geir E. Dullerud, Nikita Borisov
2023QUICforge: Client-side Request Forgery in QUIC.
Konrad Yuri Gbur, Florian Tschorsch
2023RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu
2023REDsec: Running Encrypted Discretized Neural Networks in Seconds.
Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos
2023REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service.
Wenjie Qu, Jinyuan Jia, Neil Zhenqiang Gong
2023RR: A Fault Model for Efficient TEE Replication.
Baltasar Dinis, Peter Druschel, Rodrigo Rodrigues
2023ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning.
Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis
2023Real Threshold ECDSA.
Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow
2023RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression.
Jung-Woo Chang, Mojan Javaheripi, Seira Hidano, Farinaz Koushanfar
2023Securing Federated Sensitive Topic Classification against Poisoning Attacks.
Tianyue Chu, Álvaro García-Recuero, Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris
2023Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
Christoph Sendner, Huili Chen, Hossein Fereidooni, Lukas Petzi, Jan König, Jasper Stang, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Farinaz Koushanfar
2023Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates
2023SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response.
Huadi Zhu, Mingyan Xiao, Demoria Sherman, Ming Li
2023StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors.
Ke Sun, Chunyu Xia, Songlin Xu, Xinyu Zhang
2023SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications.
An Chen, Jiho Lee, Basanta Chaulagain, Yonghwi Kwon, Kyu Hyung Lee
2023Tactics, Threats & Targets: Modeling Disinformation and its Mitigation.
Muhammad Shujaat Mirza, Labeeba Begum, Liang Niu, Sarah Pardo, Azza Abouzied, Paolo Papotti, Christina Pöpper
2023The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.
Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang
2023The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang
2023Thwarting Smartphone SMS Attacks at the Radio Interface Layer.
Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin
2023Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs.
Runhao Li, Bin Zhang, Jiongyi Chen, Wenfeng Lin, Chao Feng, Chaojing Tang
2023Trellis: Robust and Scalable Metadata-private Anonymous Broadcast.
Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas
2023Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof.
Jinseob Jeong, Dongkwan Kim, Joon-Ha Jang, Juhwan Noh, Changhun Song, Yongdae Kim
2023VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests.
Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik
2023VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Zhenhao Luo, Pengfei Wang, Baosheng Wang, Yong Tang, Wei Xie, Xu Zhou, Danjun Liu, Kai Lu
2023Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels.
Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu