default search action
27th NDSS 2020: San Diego, CA, USA
- 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society 2020, ISBN 1-891562-61-4
Keynote
- Paul Forney:
Overcoming the "Evil Twins" Attack: Lessons Learned from the Industrial Battlefield.
Web
- Taekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son:
FUSE: Finding File Upload Bugs via Penetration Testing. - Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites. - Giada Stivala, Giancarlo Pellegrino:
Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms. - Avinash Sudhodanan, Soheil Khodayari, Juan Caballero:
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks. - Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, Jason Polakis:
Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting.
Fuzzing
- Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz:
HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. - Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, Byoungyoung Lee:
HFL: Hybrid Fuzzing on the Linux Kernel. - William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. - Yanhao Wang, Xiangkun Jia, Yuwei Liu, Kyle Zeng, Tiffany Bao, Dinghao Wu, Purui Su:
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Censorship
- Sergey Frolov, Jack Wampler, Eric Wustrow:
Detecting Probe-resistant Proxies. - Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi:
Decentralized Control: A Case Study of Russia. - Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi:
Measuring the Deployment of Network Censorship Filters at Global Scale. - Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun:
SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. - Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari:
MassBrowser: Unblocking the Censored Web for the Masses, by the Masses.
"Smart" Home
- Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Heather Zheng:
Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors. - Tao Chen, Longfei Shangguan, Zhenjiang Li, Kyle Jamieson:
Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems. - Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, Ning Zhang:
SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. - Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, Brian Demsky:
Packet-Level Signatures for Smart Home Devices.
Mobile & Smartphone Security
- Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, Kui Ren:
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. - Haohuang Wen, Qingchuan Zhao, Qi Alfred Chen, Zhiqiang Lin:
Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps. - Imani N. Sherman, Jasmine D. Bowers, Keith McNamara Jr., Juan E. Gilbert, Jaime Ruiz, Patrick Traynor:
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators. - Faysal Hossain Shezan, Kaiming Cheng, Zhen Zhang, Yinzhi Cao, Yuan Tian:
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications. - Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David R. Choffnes, Maarten van Steen, Andreas Peter:
FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.
Blockchains and MPC
- George Bissias, Brian Neil Levine:
Bobtail: Improved Blockchain Security with Low-Variance Mining. - Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun:
Snappy: Fast On-chain Payments with Practical Collaterals. - Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon:
The Attack of the Clones Against Proof-of-Authority. - Daniel Perez, Benjamin Livshits:
Broken Metre: Attacking Resource Metering in EVM. - Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
Finding Safety in Numbers with Secure Allegation Escrows.
Future Networks
- Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:
When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. - Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi:
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking. - Jonghoon Kwon, Taeho Lee, Claude Hähni, Adrian Perrig:
SVLAN: Secure & Scalable Network Virtualization.
Software Defenses
- Naif Saleh Almakhdhub, Abraham A. Clements, Saurabh Bagchi, Mathias Payer:
µRAI: Securing Embedded Systems with Return Address Integrity. - Taemin Park, Karel Dhondt, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz:
NoJITsu: Locking Down JavaScript Engines. - Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, Xiaosong Zhang:
SODA: A Generic Online Detection Framework for Smart Contracts.
Network Crime and Privacy
- Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski:
A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. - Tao Wang:
Designing a Better Browser for Tor with BLAST. - Sandra Siby, Marc Juarez, Claudia Díaz, Narseo Vallina-Rodriguez, Carmela Troncoso:
Encrypted DNS -> Privacy? A Traffic Analysis Perspective. - Teemu Rytilahti, Thorsten Holz:
On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways.
Side Channels
- Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi:
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. - Qinhan Tan, Zhihua Zeng, Kai Bu, Kui Ren:
PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. - Saeid Tizpaz-Niari, Pavol Cerný, Ashutosh Trivedi:
Data-Driven Debugging for Functional Side Channels. - Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
Network Defenses
- Kyungho Joo, Wonsuk Choi, Dong Hoon Lee:
Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft. - Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu:
Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. - Marcel Kneib, Oleg Schell, Christopher Huth:
EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks. - Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu:
BLAG: Improving the Accuracy of Blacklists. - Hui Lin, Jianing Zhuang, Yih-Chun Hu, Huayu Zhou:
DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures.
Oblivious Computation
- Laura Blackstone, Seny Kamara, Tarik Moataz:
Revisiting Leakage Abuse Attacks. - Weikeng Chen, Raluca Ada Popa:
Metal: A Metadata-Hiding File-Sharing System. - Thang Hoang, Jorge Guajardo, Attila A. Yavuz:
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework. - Hamid Mozaffari, Amir Houmansadr:
Heterogeneous Private Information Retrieval. - Ioannis Demertzis, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou:
Dynamic Searchable Encryption with Small Client Storage.
Network Attacks
- Jared M. Smith, Kyle Birkeland, Tyler McDaniel, Max Schuchard:
Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning through Real-World Measurements. - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:
IMP4GT: IMPersonation Attacks in 4G NeTworks. - Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:
Practical Traffic Analysis Attacks on Secure Messaging Applications. - Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Sheng, Jianjun Chen, Ying Liu:
CDN Judo: Breaking the CDN DoS Protection with Itself.
Program Analysis
- Yue Duan, Xuezixiang Li, Jinghan Wang, Heng Yin:
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing. - Qiushi Wu, Yang He, Stephen McCamant, Kangjie Lu:
Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.
Malware 1
- Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:
Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. - Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, Dave Tian:
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. - Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen:
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. - Wajih Ul Hassan, Mohammad A. Noureddine, Pubali Datta, Adam Bates:
OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
Private Computation and Learning
- Harsh Chaudhari, Rahul Rachuri, Ajith Suresh:
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. - Jonas Böhler, Florian Kerschbaum:
Secure Sublinear Time Differentially Private Median Computation. - Honggang Yu, Kaichen Yang, Teng Zhang, Yun-Yun Tsai, Tsung-Yi Ho, Yier Jin:
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples. - Arpita Patra, Ajith Suresh:
BLAZE: Blazing Fast Privacy-Preserving Machine Learning.
Malware 2
- Alessandro Mantovani, Simone Aonzo, Xabier Ugarte-Pedrero, Alessio Merlo, Davide Balzarotti:
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem. - Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, Christopher Kruegel:
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. - Runqing Yang, Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen:
UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications. - Shiqing Luo, Anh Nguyen, Chen Song, Feng Lin, Wenyao Xu, Zhisheng Yan:
OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display. - Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:
On the Resilience of Biometric Authentication Systems against Random Inputs. - Zhenfeng Zhang, Yuchen Wang, Kang Yang:
Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities.
Case Studies & Human Factors
- Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic:
A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems. - Peter Ney, Luis Ceze, Tadayoshi Kohno:
Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference. - Sebastian Roth, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, Ben Stock:
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies. - Peng Wang, Xiaojing Liao, Yue Qin, XiaoFeng Wang:
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals. - Rock Stevens, Josiah Dykstra, Wendy Knox Everette, James Chapman, Garrett Bladow, Alexander Farmer, Kevin Halliday, Michelle L. Mazurek:
Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards.
Crypto
- Trevor Smith, Luke Dickenson, Kent E. Seamons:
Let's Revoke: Scalable Global Certificate Revocation. - Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis:
Post-Quantum Authentication in TLS 1.3: A Performance Study. - Tomas Hlavacek, Ítalo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya Schulmann:
DISCO: Sidestepping RPKI's Deployment Barriers. - Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang:
Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
Hardware & Speculative Attacks
- Yuan Xiao, Yinqian Zhang, Radu Teodorescu:
SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. - Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:
ProtectIOn: Root-of-Trust for IO in Compromised Platforms. - Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, Daniel Gruss:
ConTExT: A Generic Approach for Mitigating Spectre.
Privacy
- Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan, Jilles Vreeken, Michael Backes:
Towards Plausible Graph Anonymization. - Jairo Giraldo, Alvaro A. Cárdenas, Murat Kantarcioglu, Jonathan Katz:
Adversarial Classification Under Differential Privacy. - Tianhao Wang, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Locally Differentially Private Frequency Estimation with Consistency. - Ren Ding, Hong Hu, Wen Xu, Taesoo Kim:
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.