


default search action
27th NDSS 2020: San Diego, CA, USA
- 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society 2020, ISBN 1-891562-61-4

Keynote
- Paul Forney:

Overcoming the "Evil Twins" Attack: Lessons Learned from the Industrial Battlefield.
Web
- Taekjin Lee, Seongil Wi, Suyoung Lee, Sooel Son:

FUSE: Finding File Upload Bugs via Penetration Testing. - Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:

Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites. - Giada Stivala, Giancarlo Pellegrino:

Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms. - Avinash Sudhodanan, Soheil Khodayari, Juan Caballero:

Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks. - Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, Jason Polakis:

Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting.
Fuzzing
- Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Wörner, Thorsten Holz:

HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. - Kyungtae Kim, Dae R. Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, Byoungyoung Lee:

HFL: Hybrid Fuzzing on the Linux Kernel. - William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:

HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. - Yanhao Wang, Xiangkun Jia, Yuwei Liu, Kyle Zeng, Tiffany Bao, Dinghao Wu, Purui Su:

Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Censorship
- Sergey Frolov, Jack Wampler, Eric Wustrow:

Detecting Probe-resistant Proxies. - Reethika Ramesh, Ram Sundara Raman, Matthew Bernhard, Victor Ongkowijaya, Leonid Evdokimov, Anne Edmundson, Steven Sprecher, Muhammad Ikram, Roya Ensafi:

Decentralized Control: A Case Study of Russia. - Ram Sundara Raman, Adrian Stoll, Jakub Dalek, Reethika Ramesh, Will Scott, Roya Ensafi:

Measuring the Deployment of Network Censorship Filters at Global Scale. - Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Kevin S. Chan, Tracy D. Braun:

SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery. - Milad Nasr, Hadi Zolfaghari, Amir Houmansadr, Amirhossein Ghafari:

MassBrowser: Unblocking the Censored Web for the Masses, by the Masses.
"Smart" Home
- Yanzi Zhu, Zhujun Xiao, Yuxin Chen, Zhijing Li, Max Liu, Ben Y. Zhao, Heather Zheng:

Et Tu Alexa? When Commodity WiFi Devices Turn into Adversarial Motion Sensors. - Tao Chen, Longfei Shangguan, Zhenjiang Li, Kyle Jamieson:

Metamorph: Injecting Inaudible Commands into Over-the-air Voice Controlled Systems. - Qiben Yan, Kehai Liu, Qin Zhou, Hanqing Guo, Ning Zhang:

SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves. - Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, Brian Demsky:

Packet-Level Signatures for Smart Home Devices.
Mobile & Smartphone Security
- Zhongjie Ba, Tianhang Zheng, Xinyu Zhang, Zhan Qin, Baochun Li, Xue Liu, Kui Ren:

Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. - Haohuang Wen, Qingchuan Zhao, Qi Alfred Chen, Zhiqiang Lin:

Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps. - Imani N. Sherman, Jasmine D. Bowers, Keith McNamara Jr., Juan E. Gilbert, Jaime Ruiz, Patrick Traynor:

Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators. - Faysal Hossain Shezan, Kaiming Cheng, Zhen Zhang, Yinzhi Cao, Yuan Tian:

TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications. - Thijs van Ede, Riccardo Bortolameotti, Andrea Continella, Jingjing Ren, Daniel J. Dubois, Martina Lindorfer, David R. Choffnes, Maarten van Steen, Andreas Peter:

FlowPrint: Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.
Blockchains and MPC
- George Bissias, Brian Neil Levine:

Bobtail: Improved Blockchain Security with Low-Variance Mining. - Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, Srdjan Capkun:

Snappy: Fast On-chain Payments with Practical Collaterals. - Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon:

The Attack of the Clones Against Proof-of-Authority. - Daniel Perez, Benjamin Livshits:

Broken Metre: Attacking Resource Metering in EVM. - Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:

Finding Safety in Numbers with Secure Allegation Escrows.
Future Networks
- Jiahao Cao, Renjie Xie, Kun Sun, Qi Li, Guofei Gu, Mingwei Xu:

When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN. - Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi:

Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking. - Jonghoon Kwon, Taeho Lee, Claude Hähni, Adrian Perrig:

SVLAN: Secure & Scalable Network Virtualization.
Software Defenses
- Naif Saleh Almakhdhub, Abraham A. Clements, Saurabh Bagchi, Mathias Payer:

µRAI: Securing Embedded Systems with Return Address Integrity. - Taemin Park, Karel Dhondt, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz:

NoJITsu: Locking Down JavaScript Engines. - Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, Xiaosong Zhang:

SODA: A Generic Online Detection Framework for Smart Contracts.
Network Crime and Privacy
- Victor Le Pochat, Tim Van hamme, Sourena Maroofi, Tom van Goethem, Davy Preuveneers, Andrzej Duda, Wouter Joosen, Maciej Korczynski:

A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints. - Tao Wang:

Designing a Better Browser for Tor with BLAST. - Sandra Siby, Marc Juarez, Claudia Díaz, Narseo Vallina-Rodriguez, Carmela Troncoso:

Encrypted DNS -> Privacy? A Traffic Analysis Perspective. - Teemu Rytilahti, Thorsten Holz:

On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways.
Side Channels
- Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi:

ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. - Qinhan Tan, Zhihua Zeng, Kai Bu, Kui Ren:

PhantomCache: Obfuscating Cache Conflicts with Localized Randomization. - Saeid Tizpaz-Niari, Pavol Cerný, Ashutosh Trivedi:

Data-Driven Debugging for Functional Side Channels. - Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:

Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
Network Defenses
- Kyungho Joo, Wonsuk Choi, Dong Hoon Lee:

Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft. - Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu:

Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. - Marcel Kneib, Oleg Schell, Christopher Huth:

EASI: Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks. - Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu:

BLAG: Improving the Accuracy of Blacklists. - Hui Lin, Jianing Zhuang, Yih-Chun Hu, Huayu Zhou:

DefRec: Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures.
Oblivious Computation
- Laura Blackstone, Seny Kamara, Tarik Moataz:

Revisiting Leakage Abuse Attacks. - Weikeng Chen, Raluca Ada Popa:

Metal: A Metadata-Hiding File-Sharing System. - Thang Hoang, Jorge Guajardo, Attila A. Yavuz

:
MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework. - Hamid Mozaffari, Amir Houmansadr:

Heterogeneous Private Information Retrieval. - Ioannis Demertzis

, Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou:
Dynamic Searchable Encryption with Small Client Storage.
Network Attacks
- Jared M. Smith, Kyle Birkeland, Tyler McDaniel, Max Schuchard:

Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning through Real-World Measurements. - David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper:

IMP4GT: IMPersonation Attacks in 4G NeTworks. - Alireza Bahramali, Amir Houmansadr, Ramin Soltani, Dennis Goeckel, Don Towsley:

Practical Traffic Analysis Attacks on Secure Messaging Applications. - Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Sheng, Jianjun Chen, Ying Liu:

CDN Judo: Breaking the CDN DoS Protection with Itself.
Program Analysis
- Yue Duan, Xuezixiang Li, Jinghan Wang, Heng Yin:

DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing. - Qiushi Wu, Yang He, Stephen McCamant, Kangjie Lu:

Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.
Malware 1
- Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:

Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. - Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, Dave Tian:

Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. - Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen:

You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. - Wajih Ul Hassan, Mohammad A. Noureddine, Pubali Datta, Adam Bates:

OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
Private Computation and Learning
- Harsh Chaudhari, Rahul Rachuri, Ajith Suresh:

Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. - Jonas Böhler, Florian Kerschbaum:

Secure Sublinear Time Differentially Private Median Computation. - Honggang Yu, Kaichen Yang, Teng Zhang, Yun-Yun Tsai, Tsung-Yi Ho

, Yier Jin:
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples. - Arpita Patra, Ajith Suresh

:
BLAZE: Blazing Fast Privacy-Preserving Machine Learning.
Malware 2
- Alessandro Mantovani, Simone Aonzo, Xabier Ugarte-Pedrero, Alessio Merlo, Davide Balzarotti:

Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem. - Hojjat Aghakhani, Fabio Gritti, Francesco Mecca, Martina Lindorfer, Stefano Ortolani, Davide Balzarotti, Giovanni Vigna, Christopher Kruegel:

When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. - Runqing Yang, Shiqing Ma, Haitao Xu, Xiangyu Zhang, Yan Chen:

UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications. - Shiqing Luo, Anh Nguyen, Chen Song, Feng Lin, Wenyao Xu, Zhisheng Yan:

OcuLock: Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display. - Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar:

On the Resilience of Biometric Authentication Systems against Random Inputs. - Zhenfeng Zhang, Yuchen Wang, Kang Yang:

Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities.
Case Studies & Human Factors
- Matthew Smith, Martin Strohmeier, Jon Harman, Vincent Lenders, Ivan Martinovic:

A View from the Cockpit: Exploring Pilot Reactions to Attacks on Avionic Systems. - Peter Ney, Luis Ceze, Tadayoshi Kohno:

Genotype Extraction and False Relative Attacks: Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference. - Sebastian Roth, Timothy Barron, Stefano Calzavara, Nick Nikiforakis, Ben Stock:

Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies. - Peng Wang, Xiaojing Liao, Yue Qin, XiaoFeng Wang:

Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals. - Rock Stevens, Josiah Dykstra, Wendy Knox Everette, James Chapman, Garrett Bladow, Alexander Farmer, Kevin Halliday, Michelle L. Mazurek:

Compliance Cautions: Investigating Security Issues Associated with U.S. Digital-Security Standards.
Crypto
- Trevor Smith, Luke Dickenson, Kent E. Seamons:

Let's Revoke: Scalable Global Certificate Revocation. - Dimitrios Sikeridis, Panos Kampanakis, Michael Devetsikiotis:

Post-Quantum Authentication in TLS 1.3: A Performance Study. - Tomas Hlavacek, Ítalo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya Schulmann:

DISCO: Sidestepping RPKI's Deployment Barriers. - Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang:

Proof of Storage-Time: Efficiently Checking Continuous Data Availability.
Hardware & Speculative Attacks
- Yuan Xiao, Yinqian Zhang, Radu Teodorescu:

SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. - Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, Srdjan Capkun:

ProtectIOn: Root-of-Trust for IO in Compromised Platforms. - Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, Daniel Gruss:

ConTExT: A Generic Approach for Mitigating Spectre.
Privacy
- Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan

, Jilles Vreeken, Michael Backes:
Towards Plausible Graph Anonymization. - Jairo Giraldo, Alvaro A. Cárdenas, Murat Kantarcioglu, Jonathan Katz:

Adversarial Classification Under Differential Privacy. - Tianhao Wang

, Milan Lopuhaä-Zwakenberg, Zitao Li, Boris Skoric, Ninghui Li:
Locally Differentially Private Frequency Estimation with Consistency. - Ren Ding, Hong Hu, Wen Xu, Taesoo Kim:

DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














