default search action
30th NDSS 2023: San Diego, CA, USA
- 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023. The Internet Society 2023
Software Security I
- Hugo Lefeuvre, Vlad-Andrei Badoiu, Yi Chen, Felipe Huici, Nathan Dautenhahn, Pierre Olivier:
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. - Victor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, Cristiano Giuffrida:
Let Me Unwind That For You: Exceptions to Backward-Edge Protection. - Zhenhao Luo, Pengfei Wang, Baosheng Wang, Yong Tang, Wei Xie, Xu Zhou, Danjun Liu, Kai Lu:
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. - Runhao Li, Bin Zhang, Jiongyi Chen, Wenfeng Lin, Chao Feng, Chaojing Tang:
Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs.
ML and AI I
- Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Backdoor Attacks Against Dataset Distillation. - Wenjie Qu, Jinyuan Jia, Neil Zhenqiang Gong:
REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service. - Klim Kireev, Bogdan Kulynych, Carmela Troncoso:
Adversarial Robustness for Tabular Data through Cost and Utility Awareness. - Jiayun Fu, Xiaojing Ma, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu, Hai Jin, Dongmei Zhang:
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Privacy and Anonymity I
- Hussein Darir, Geir E. Dullerud, Nikita Borisov:
ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks. - Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. - Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu:
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. - Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi:
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection.
Software Security II
- Seongil Wi, Trung Tin Nguyen, Jihwan Kim, Ben Stock, Sooel Son:
DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing. - Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Browser Permission Mechanisms Demystified. - Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz:
Drone Security and the Mysterious Case of DJI's DroneID.
ML and AI II
- Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. - Jung-Woo Chang, Mojan Javaheripi, Seira Hidano, Farinaz Koushanfar:
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression. - Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck:
Machine Unlearning of Features and Labels. - Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu:
Fusion: Efficient and Secure Inference Resilient to Malicious Servers.
Privacy and Anonymity II
- Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas:
Trellis: Robust and Scalable Metadata-private Anonymous Broadcast. - Piyush Kumar Sharma, Devashish Gosain, Claudia Díaz:
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies. - Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
Thwarting Smartphone SMS Attacks at the Radio Interface Layer. - Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Fan Zhang, Kui Ren:
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Fuzzing
- Samuel Groß, Simon Koch, Lukas Bernhard, Thorsten Holz, Martin Johns:
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities. - Alexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele:
No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions. - Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. - Fuchen Ma, Yuanliang Chen, Meng Ren, Yuanhang Zhou, Yu Jiang, Ting Chen, Huizhong Li, Jiaguang Sun:
LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
ML and AI III
- Tianyue Chu, Álvaro García-Recuero, Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris:
Securing Federated Sensitive Topic Classification against Poisoning Attacks. - Yanzuo Chen, Yuanyuan Yuan, Shuai Wang:
OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables. - Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin:
BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems. - Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin:
Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
Network Protocols
- Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li:
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation. - Konrad Yuri Gbur, Florian Tschorsch:
QUICforge: Client-side Request Forgery in QUIC. - Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas, Fredrik Tåquist:
Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations. - Carlotta Tagliaro, Florian Hahn, Riccardo Sepe, Alessio Aceti, Martina Lindorfer:
I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape. - Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu:
Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels.
Blockchains I
- Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, Ahmad-Reza Sadeghi:
POSE: Practical Off-chain Smart Contract Execution. - Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak:
OptRand: Optimistically Responsive Reconfigurable Distributed Randomness. - Hwanjo Heo, Seungwon Woo, Taeung Yoon, Min Suk Kang, Seungwon Shin:
Partitioning Ethereum without Eclipsing It. - Christoph Sendner, Huili Chen, Hossein Fereidooni, Lukas Petzi, Jan König, Jasper Stang, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Farinaz Koushanfar:
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning. - Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
Real Threshold ECDSA.
Mobile Security and Privacy
- Mark Huasong Meng, Qing Zhang, Guangshuai Xia, Yuwei Zheng, Yanjun Zhang, Guangdong Bai, Zhi Liu, Sin G. Teo, Jin Song Dong:
Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers. - Seung-Kyun Han, Jinsoo Jang:
MyTEE: Own the Trusted Execution Environment on Embedded Devices. - Ke Sun, Chunyu Xia, Songlin Xu, Xinyu Zhang:
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors. - Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms. - Chongqing Lei, Zhen Ling, Yue Zhang, Kai Dong, Kaizheng Liu, Junzhou Luo, Xinwen Fu:
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
Trustworthy Computing
- Baltasar Dinis, Peter Druschel, Rodrigo Rodrigues:
RR: A Fault Model for Efficient TEE Replication. - Andrea Di Dio, Koen Koning, Herbert Bos, Cristiano Giuffrida:
Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. - Mohit Kumar Jangid, Yue Zhang, Zhiqiang Lin:
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing. - Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor:
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
Blockchains II
- Varun Madathil, Sri Aravinda Krishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez:
Cryptographic Oracle-based Conditional Payments. - Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang:
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects. - Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Breaking and Fixing Virtual Channels: Domino Attack and Donner. - Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak:
He-HTLC: Revisiting Incentives in HTLC.
Keys and Certification
- Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean F. Lawlor:
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging. - Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. - Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty:
Private Certifier Intersection. - Zhiqiang Wu, Rui Li:
OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption.
Cyber-Physical Systems Security I
- Jinseob Jeong, Dongkwan Kim, Joon-Ha Jang, Juhwan Noh, Changhun Song, Yongdae Kim:
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof. - Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun:
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems. - Muslum Ozgur Ozmen, Ruoyu Song, Habiba Farrukh, Z. Berkay Celik:
Evasion Attacks and Defenses on Smart Home Physical Event Verification. - Huadi Zhu, Mingyan Xiao, Demoria Sherman, Ming Li:
SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response.
Web Security I
- Ilkan Esiyok, Pascal Berrang, Katriel Cohn-Gordon, Robert Künnemann:
Accountable Javascript Code Delivery. - Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis:
ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning. - Shujiang Wu, Pengfei Sun, Yao Zhao, Yinzhi Cao:
Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites. - Zihao Jin, Shuo Chen, Yang Chen, Haixin Duan, Jianjun Chen, Jianping Wu:
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Cyber-Crime and Forensics
- Andrea Oliveri, Matteo Dell'Amico, Davide Balzarotti:
An OS-agnostic Approach to Memory Forensics. - Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang:
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. - Xigao Li, Anurag Yepuri, Nick Nikiforakis:
Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams. - Beomseok Oh, Junho Ahn, Sangwook Bae, Mincheol Son, Yonghwa Lee, Min Suk Kang, Yongdae Kim:
Preventing SIM Box Fraud Using Device Model Fingerprinting.
Cyber-Physical Systems Security II
- Xinyi Xie, Kun Jiang, Rui Dai, Jun Lu, Lihui Wang, Qing Li, Jun Yu:
Access Your Tesla without Your Awareness: Compromising Keyless Entry System of Model 3. - Xingyu Chen, Zhengxiong Li, Baicheng Chen, Yi Zhu, Chris Xiaoxuan Lu, Zhengyu Peng, Feng Lin, Wenyao Xu, Kui Ren, Chunming Qiao:
MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags. - Joon-Ha Jang, ManGi Cho, Jaehoon Kim, Dongkwan Kim, Yongdae Kim:
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels. - Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic:
Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging.
Web Security II
- Faysal Hossain Shezan, Zihao Su, Mingqing Kang, Nicholas Phair, Patrick William Thomas, Michelangelo van Dam, Yinzhi Cao, Yuan Tian:
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph. - An Chen, Jiho Lee, Basanta Chaulagain, Yonghwi Kwon, Kyu Hyung Lee:
SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications. - Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper:
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers. - Muhammad Shujaat Mirza, Labeeba Begum, Liang Niu, Sarah Pardo, Azza Abouzied, Paolo Papotti, Christina Pöpper:
Tactics, Threats & Targets: Modeling Disinformation and its Mitigation.
Cyber Attacks
- Leon Böck, Dave Levin, Ramakrishna Padmanabhan, Christian Doerr, Max Mühlhäuser:
How to Count Bots in Longitudinal Datasets of IP Addresses. - Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates:
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems. - Jared Chandler, Adam Wick, Kathleen Fisher:
BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats. - Chuanpu Fu, Qi Li, Ke Xu:
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
Cloud and Edge Computing
- Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang:
Efficient Dynamic Proof of Retrievability for Cold Storage. - Chongzhou Fang, Najmeh Nazari, Behnam Omidi, Han Wang, Aditya Puri, Manish Arora, Setareh Rafatirad, Houman Homayoun, Khaled N. Khasawneh:
HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity. - Sian Kim, Changhun Jung, RhongHo Jang, David Mohaisen, DaeHun Nyang:
A Robust Counting Sketch for Data Plane Intrusion Detection. - Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos:
REDsec: Running Encrypted Discretized Neural Networks in Seconds.
Web Security III
- Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe:
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. - Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik:
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests. - Mir Masood Ali, Binoy Chitale, Mohammad Ghasemisharif, Chris Kanich, Nick Nikiforakis, Jason Polakis:
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors. - Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, Chadi Assi:
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
Usable Security and Privacy
- Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel:
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites. - Tianxi Ji, Erman Ayday, Emre Yilmaz, Ming Li, Pan Li:
Privacy-Preserving Database Fingerprinting. - Ksenia Budykho, Ioana Boureanu, Stephan Wesemeyer, Daniel Romero, Matt Lewis, Yogaratnam Rahulan, Fortunat Rajaona, Steve Schneider:
Fine-Grained Trackability in Protocol Executions.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.