![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
30th NDSS 2023: San Diego, CA, USA
- 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023. The Internet Society 2023
Software Security I
- Hugo Lefeuvre, Vlad-Andrei Badoiu, Yi Chen, Felipe Huici, Nathan Dautenhahn, Pierre Olivier:
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. - Victor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, Cristiano Giuffrida:
Let Me Unwind That For You: Exceptions to Backward-Edge Protection. - Zhenhao Luo, Pengfei Wang, Baosheng Wang, Yong Tang, Wei Xie, Xu Zhou, Danjun Liu, Kai Lu:
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. - Runhao Li, Bin Zhang, Jiongyi Chen, Wenfeng Lin, Chao Feng, Chaojing Tang:
Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs.
ML and AI I
- Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Backdoor Attacks Against Dataset Distillation. - Wenjie Qu, Jinyuan Jia, Neil Zhenqiang Gong:
REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service. - Klim Kireev, Bogdan Kulynych, Carmela Troncoso:
Adversarial Robustness for Tabular Data through Cost and Utility Awareness. - Jiayun Fu, Xiaojing Ma, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu, Hai Jin, Dongmei Zhang:
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.
Privacy and Anonymity I
- Hussein Darir, Geir E. Dullerud, Nikita Borisov:
ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks. - Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang:
PPA: Preference Profiling Attack Against Federated Learning. - Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu:
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. - Florian Kerschbaum, Erik-Oliver Blass, Rasoul Akhavan Mahdavi:
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection.
Software Security II
- Seongil Wi, Trung Tin Nguyen, Jihwan Kim, Ben Stock, Sooel Son:
DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing. - Kazuki Nomoto, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori:
Browser Permission Mechanisms Demystified. - Nico Schiller, Merlin Chlosta, Moritz Schloegel, Nils Bars, Thorsten Eisenhofer, Tobias Scharnowski, Felix Domke, Lea Schönherr, Thorsten Holz:
Drone Security and the Mysterious Case of DJI's DroneID.
ML and AI II
- Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. - Jung-Woo Chang, Mojan Javaheripi, Seira Hidano, Farinaz Koushanfar:
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression. - Alexander Warnecke, Lukas Pirch
, Christian Wressnegger, Konrad Rieck:
Machine Unlearning of Features and Labels. - Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu:
Fusion: Efficient and Secure Inference Resilient to Malicious Servers.
Privacy and Anonymity II
- Simon Langowski, Sacha Servan-Schreiber, Srinivas Devadas:
Trellis: Robust and Scalable Metadata-private Anonymous Broadcast. - Piyush Kumar Sharma, Devashish Gosain, Claudia Díaz:
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies. - Haohuang Wen, Phillip A. Porras, Vinod Yegneswaran, Zhiqiang Lin:
Thwarting Smartphone SMS Attacks at the Radio Interface Layer. - Peng Huang, Yao Wei
, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Fan Zhang, Kui Ren:
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Fuzzing
- Samuel Groß, Simon Koch, Lukas Bernhard, Thorsten Holz, Martin Johns:
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities. - Alexander Bulekov, Bandan Das, Stefan Hajnoczi, Manuel Egele:
No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions. - Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. - Fuchen Ma, Yuanliang Chen, Meng Ren, Yuanhang Zhou, Yu Jiang, Ting Chen, Huizhong Li, Jiaguang Sun:
LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.
ML and AI III
- Tianyue Chu, Álvaro García-Recuero, Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris:
Securing Federated Sensitive Topic Classification against Poisoning Attacks. - Yanzuo Chen, Yuanyuan Yuan, Shuai Wang:
OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables. - Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin:
BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems. - Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin:
Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.
Network Protocols
- Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, Qi Li:
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation. - Konrad Yuri Gbur, Florian Tschorsch:
QUICforge: Client-side Request Forgery in QUIC. - Paul Fiterau-Brostean, Bengt Jonsson, Konstantinos Sagonas, Fredrik Tåquist:
Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations. - Carlotta Tagliaro, Florian Hahn, Riccardo Sepe, Alessio Aceti, Martina Lindorfer:
I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape. - Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu:
Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels.
Blockchains I
- Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, Ahmad-Reza Sadeghi:
POSE: Practical Off-chain Smart Contract Execution. - Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak:
OptRand: Optimistically Responsive Reconfigurable Distributed Randomness. - Hwanjo Heo, Seungwon Woo, Taeung Yoon, Min Suk Kang, Seungwon Shin:
Partitioning Ethereum without Eclipsing It. - Christoph Sendner, Huili Chen, Hossein Fereidooni, Lukas Petzi, Jan König, Jasper Stang, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Farinaz Koushanfar:
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning. - Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
Real Threshold ECDSA.
Mobile Security and Privacy
- Mark Huasong Meng, Qing Zhang, Guangshuai Xia, Yuwei Zheng, Yanjun Zhang, Guangdong Bai, Zhi Liu, Sin G. Teo, Jin Song Dong:
Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers. - Seung-Kyun Han, Jinsoo Jang:
MyTEE: Own the Trusted Execution Environment on Embedded Devices. - Ke Sun, Chunyu Xia, Songlin Xu, Xinyu Zhang:
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors. - Hossein Fereidooni, Jan König, Phillip Rieger, Marco Chilese, Bora Gökbakan, Moritz Finke, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms. - Chongqing Lei, Zhen Ling, Yue Zhang, Kai Dong, Kaizheng Liu, Junzhou Luo, Xinwen Fu:
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
Trustworthy Computing
- Baltasar Dinis, Peter Druschel, Rodrigo Rodrigues:
RR: A Fault Model for Efficient TEE Replication. - Andrea Di Dio, Koen Koning, Herbert Bos, Cristiano Giuffrida:
Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks. - Mohit Kumar Jangid, Yue Zhang, Zhiqiang Lin:
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing. - Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, Patrick Traynor:
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.
Blockchains II
- Varun Madathil, Sri Aravinda Krishnan Thyagarajan, Dimitrios Vasilopoulos, Lloyd Fournier, Giulio Malavolta, Pedro Moreno-Sanchez:
Cryptographic Oracle-based Conditional Payments. - Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang:
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects. - Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Breaking and Fixing Virtual Channels: Domino Attack and Donner. - Sarisht Wadhwa, Jannis Stoeter, Fan Zhang, Kartik Nayak:
He-HTLC: Revisiting Incentives in HTLC.
Keys and Certification
- Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean F. Lawlor:
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging. - Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. - Bishakh Chandra Ghosh, Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty:
Private Certifier Intersection. - Zhiqiang Wu, Rui Li:
OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption.
Cyber-Physical Systems Security I
- Jinseob Jeong, Dongkwan Kim, Joon-Ha Jang, Juhwan Noh, Changhun Song, Yongdae Kim:
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof. - Marc Roeschlin, Giovanni Camurati, Pascal Brunner, Mridula Singh, Srdjan Capkun:
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems. - Muslum Ozgur Ozmen, Ruoyu Song, Habiba Farrukh, Z. Berkay Celik:
Evasion Attacks and Defenses on Smart Home Physical Event Verification. - Huadi Zhu, Mingyan Xiao, Demoria Sherman, Ming Li:
SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response.
Web Security I
- Ilkan Esiyok, Pascal Berrang, Katriel Cohn-Gordon, Robert Künnemann:
Accountable Javascript Code Delivery. - Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis:
ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning. - Shujiang Wu, Pengfei Sun, Yao Zhao, Yinzhi Cao:
Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites. - Zihao Jin, Shuo Chen, Yang Chen, Haixin Duan, Jianjun Chen, Jianping Wu:
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.
Cyber-Crime and Forensics
- Andrea Oliveri, Matteo Dell'Amico, Davide Balzarotti:
An OS-agnostic Approach to Memory Forensics. - Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, Qiuling Xu, Shiqing Ma, Xiangyu Zhang:
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense. - Xigao Li, Anurag Yepuri, Nick Nikiforakis:
Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams. - Beomseok Oh, Junho Ahn, Sangwook Bae, Mincheol Son, Yonghwa Lee, Min Suk Kang, Yongdae Kim:
Preventing SIM Box Fraud Using Device Model Fingerprinting.
Cyber-Physical Systems Security II
- Xinyi Xie, Kun Jiang, Rui Dai, Jun Lu, Lihui Wang, Qing Li, Jun Yu:
Access Your Tesla without Your Awareness: Compromising Keyless Entry System of Model 3. - Xingyu Chen, Zhengxiong Li, Baicheng Chen, Yi Zhu, Chris Xiaoxuan Lu, Zhengyu Peng, Feng Lin, Wenyao Xu, Kui Ren, Chunming Qiao:
MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags. - Joon-Ha Jang, ManGi Cho, Jaehoon Kim, Dongkwan Kim, Yongdae Kim:
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels. - Sebastian Köhler, Richard Baker, Martin Strohmeier, Ivan Martinovic:
Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging.
Web Security II
- Faysal Hossain Shezan, Zihao Su, Mingqing Kang, Nicholas Phair, Patrick William Thomas, Michelangelo van Dam, Yinzhi Cao, Yuan Tian:
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph. - An Chen, Jiho Lee, Basanta Chaulagain, Yonghwi Kwon, Kyu Hyung Lee:
SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications. - Theodor Schnitzler, Katharina Kohls, Evangelos Bitsikas, Christina Pöpper:
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers. - Muhammad Shujaat Mirza, Labeeba Begum, Liang Niu, Sarah Pardo, Azza Abouzied, Paolo Papotti, Christina Pöpper:
Tactics, Threats & Targets: Modeling Disinformation and its Mitigation.
Cyber Attacks
- Leon Böck, Dave Levin, Ramakrishna Padmanabhan, Christian Doerr, Max Mühlhäuser:
How to Count Bots in Longitudinal Datasets of IP Addresses. - Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates:
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems. - Jared Chandler, Adam Wick, Kathleen Fisher:
BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats. - Chuanpu Fu, Qi Li, Ke Xu:
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.
Cloud and Edge Computing
- Tung Le, Pengzhi Huang, Attila A. Yavuz
, Elaine Shi, Thang Hoang:
Efficient Dynamic Proof of Retrievability for Cold Storage. - Chongzhou Fang, Najmeh Nazari, Behnam Omidi, Han Wang, Aditya Puri, Manish Arora, Setareh Rafatirad, Houman Homayoun, Khaled N. Khasawneh:
HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity. - Sian Kim, Changhun Jung, RhongHo Jang
, David Mohaisen, DaeHun Nyang:
A Robust Counting Sketch for Data Plane Intrusion Detection. - Lars Folkerts, Charles Gouert, Nektarios Georgios Tsoutsos:
REDsec: Running Encrypted Discretized Neural Networks in Seconds.
Web Security III
- Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe:
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. - Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik:
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests. - Mir Masood Ali, Binoy Chitale, Mohammad Ghasemisharif, Chris Kanich, Nick Nikiforakis, Jason Polakis:
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors. - Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, Chadi Assi:
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.
Usable Security and Privacy
- Sanam Ghorbani Lyastani, Michael Backes, Sven Bugiel:
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites. - Tianxi Ji, Erman Ayday, Emre Yilmaz, Ming Li, Pan Li:
Privacy-Preserving Database Fingerprinting. - Ksenia Budykho, Ioana Boureanu, Stephan Wesemeyer, Daniel Romero, Matt Lewis, Yogaratnam Rahulan, Fortunat Rajaona, Steve Schneider:
Fine-Grained Trackability in Protocol Executions.
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.