default search action
28th NDSS 2021
- 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021. The Internet Society 2021
Network Security
- Tyler McDaniel, Jared M. Smith, Max Schuchard:
Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis. - Yarin Perry, Neta Rozen Schiff, Michael Schapira:
A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers? - Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:
OblivSketch: Oblivious Network Measurement as a Cloud Service. - Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, Bing Wang:
ROV++: Improved Deployable Defense against BGP Hijacking. - Kai Jansen, Liang Niu, Nian Xue, Ivan Martinovic, Christina Pöpper:
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Program Analysis 1
- Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee:
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages. - Jens Müller, Dominik Noss, Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
Processing Dangerous Paths - On Security and Privacy of the Portable Document Format. - Kexin Pei, Jonas Guan, David Williams-King, Junfeng Yang, Suman Jana:
XDA: Accurate, Robust Disassembly with Transfer Learning. - Christian Mainka, Vladislav Mladenov, Simon Rohlmann:
Shadow Attacks: Hiding and Replacing Content in Signed PDFs. - Changming Liu, Yaohui Chen, Long Lu:
KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel.
Privacy
- Soroush Karami, Panagiotis Ilia, Jason Polakis:
Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage. - Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers. - Ian Martiny, Gabriel Kaptchuk, Adam J. Aviv, Daniel S. Roche, Eric Wustrow:
Improving Signal's Sealed Sender. - Konstantinos Solomos, John Kristoff, Chris Kanich, Jason Polakis:
Tales of Favicons and Caches: Persistent Tracking in Modern Browsers.
Network Policies
- Stefano Calzavara, Tobias Urban, Dennis Tatang, Marius Steffens, Ben Stock:
Reining in the Web's Inconsistencies with Site Policy. - Chaoyi Lu, Baojun Liu, Yiming Zhang, Zhou Li, Fenglu Zhang, Haixin Duan, Ying Liu, Joann Qiongna Chen, Jinjin Liang, Zaifeng Zhang, Shuang Hao, Min Yang:
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR. - Athanasios Kountouras, Panagiotis Kintis, Athanasios Avgetidis, Thomas Papastergiou, Charles Lever, Michalis Polychronakis, Manos Antonakakis:
Understanding the Growth and Security Considerations of ECS. - Jonghoon Kwon, Claude Hähni, Patrick Bamert, Adrian Perrig:
Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
Program Analysis 2
- Abdallah Dawoud, Sven Bugiel:
Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework. - Sebastian Poeplau, Aurélien Francillon:
SymQEMU: Compilation-based symbolic execution for binaries. - Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing Latency of Symbolic Execution with Transactional Memory. - Sun Hyoung Kim, Cong Sun, Dongrui Zeng, Gang Tan:
Refining Indirect Call Targets at the Binary Level.
Crypto
- Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum:
Obfuscated Access and Search Patterns in Searchable Encryption. - Leila Rashidi, Daniel Kostecki, Alexander James, Anthony Peterson, Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, Reihaneh Safavi-Naini:
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes. - Sikhar Patranabis, Debdeep Mukhopadhyay:
Forward and Backward Private Conjunctive Searchable Symmetric Encryption. - Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Web Security
- Mohd Sabra, Anindya Maiti, Murtuza Jadliwala:
Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. - Mohsen Minaei, S. Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate:
Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms. - Marius Steffens, Marius Musch, Martin Johns, Ben Stock:
Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI. - Beliz Kaleli, Brian Kondracki, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini:
To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media. - Mikhail Shcherbakov, Musard Balliu:
SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web.
Mobile Security
- Joongyum Kim, Junghwan Park, Sooel Son:
The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud. - Xianghang Mi, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, XiaoFeng Wang:
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks. - Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini:
Understanding Worldwide Private Information Collection on Android. - Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi:
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices. - Andrea Possemato, Dario Nisi, Yanick Fratantonio:
Preventing and Detecting State Inference Attacks on Android.
Blockchains
- Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, XiaoFeng Wang, Xiapu Luo:
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service. - Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. - Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:
LaKSA: A Probabilistic Proof-of-Stake Protocol. - Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramèr, Giulia Fanti, Ari Juels:
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. - Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.
Network Protocols
- James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:
QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit. - Haonan Feng, Hui Li, Xuesong Pan, Ziming Zhao:
A Formal Analysis of the FIDO UAF Protocol. - Mitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, M. Fareed Arif, Syed Rafiul Hussain, Omar Chowdhury:
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification. - Michael Troncoso, Britta Hale:
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol. - Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu:
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Side-channels and Speculation
- Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson:
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. - Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. - Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk:
Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE. - Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin, Tao Wei:
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets.
Malware and Cyber-crime
- Merve Sahin, Aurélien Francillon:
Understanding and Detecting International Revenue Share Fraud. - Jiayun Xu, Yingjiu Li, Robert H. Deng:
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection. - Faraz Naseem Naseem, Ahmet Aris, Leonardo Babun, Ege Tekiner, A. Selcuk Uluagac:
MINOS: A Lightweight Real-Time Cryptojacking Detection System. - Alexander Küchler, Alessandro Mantovani, Yufei Han, Leyla Bilge, Davide Balzarotti:
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes.
"Smart" Home
- Christopher Lentzsch, Sheel Jayesh Shah, Benjamin Andow, Martin Degeling, Anupam Das, William Enck:
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem. - Wenbo Ding, Hongxin Hu, Long Cheng:
IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery. - Haotian Chi, Qiang Zeng, Xiaojiang Du, Lannan Luo:
PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. - Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu:
EarArray: Defending against DolphinAttack via Acoustic Attenuation.
Software Defenses
- Min Zheng, Xiaolong Bai, Yajin Zhou, Chao Zhang, Fuping Qu:
POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming. - Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Fraser Brown, Sorin Lerner, Tyler McMullen, Stefan Savage, Deian Stefan:
Доверя'й, но проверя'й: SFI safety for native-compiled Wasm. - Navid Emamdoost, Qiushi Wu, Kangjie Lu, Stephen McCamant:
Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning.
Machine Learning
- Jack P. K. Ma, Raymond K. H. Tai, Yongjun Zhao, Sherman S. M. Chow:
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation. - Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, Yinzhi Cao:
Practical Blind Membership Inference Attack via Differential Comparisons. - Qiao Zhang, Chunsheng Xin, Hongyi Wu:
GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks. - Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant G. Honavar, Gang Wang, Xinyu Xing:
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
Fuzzing
- Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu:
PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. - Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos, Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:
Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. - Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, Taesoo Kim:
WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning. - Jinghan Wang, Chengyu Song, Heng Yin:
Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing.
Embedded Security
- Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, Dongyan Xu:
Evading Voltage-Based Intrusion Detection on Automotive CAN. - Christian Niesler, Sebastian Surminski, Lucas Davi:
HERA: Hotpatching of Embedded Real-time Applications. - Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li:
From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware. - Eunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, Yongdae Kim:
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
Federated Learning and Poisoning attacks
- Sinem Sav, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao Sa Sousa, Jean-Pierre Hubaux:
POSEIDON: Privacy-Preserving Federated Neural Network Learning. - Xiaoyu Cao, Minghong Fang, Jia Liu, Neil Zhenqiang Gong:
FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping. - Virat Shejwalkar, Amir Houmansadr:
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning. - Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, Mingwei Xu:
Data Poisoning Attacks to Deep Learning Based Recommender Systems.
Forensics and Audits
- Yonghwi Kwon, Weihang Wang, Jinho Jung, Kyu Hyung Lee, Roberto Perdisci:
C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis. - Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani:
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. - Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao:
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
Trusted Computing
- Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
DOVE: A Data-Oblivious Virtual Environment. - Adil Ahmad, Juhee Kim, Jaebaek Seo, Insik Shin, Pedro Fonseca, Byoungyoung Lee:
CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. - Rongzhen Cui, Lianying Zhao, David Lie:
Emilia: Catching Iago in Legacy Code.
Machine Learning Applications
- Hieu Le, Athina Markopoulou, Zubair Shafiq:
CV-Inspector: Towards Automating Detection of Adblock Circumvention. - Diogo Barradas, Nuno Santos, Luís Rodrigues, Salvatore Signorello, Fernando M. V. Ramos, André Madeira:
FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications. - Sebastian Zimmeck, Rafael Goldstein, David Baraka:
PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. - Nishant Vishwamitra, Hongxin Hu, Feng Luo, Long Cheng:
Towards Understanding and Detecting Cyberbullying in Real-world Images.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.