default search action
25th NDSS 2018: San Diego, CA, USA
- 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society 2018
Session 1A: IoT
- Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang:
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. - Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter:
Fear and Logging in the Internet of Things. - Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Decentralized Action Integrity for Trigger-Action IoT Platforms. - Marius Muench, Jan Stijohann, Frank Kargl, Aurélien Francillon, Davide Balzarotti:
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
Session 1B: Attacks and Vulnerabilities
- Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow:
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications. - Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu:
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control. - Jaeho Lee, Dan S. Wallach:
Removing Secrets from Android's TLS. - Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, Wenke Lee:
rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.
Session 2A: Network Security/Cellular Networks
- Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru:
Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. - Omer Deutsch, Neta Rozen Schiff, Danny Dolev, Michael Schapira:
Preventing (Network) Time Travel with Chronos. - Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, Elisa Bertino:
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE. - Byeongdo Hong, Sangwook Bae, Yongdae Kim:
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.
Session 2B: Crypto
- Riccardo Focardi, Francesco Palmarini, Marco Squarcina, Graham Steel, Mauro Tempesta:
Mind Your Keys? A Security Evaluation of Java Keystores. - Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang:
A Security Analysis of Honeywords. - Daniela Becker, Jorge Guajardo, Karl-Heinz Zimmermann:
Revisiting Private Stream Aggregation: Lattice-Based PSA. - Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher:
ZeroTrace : Oblivious Memory Primitives from Intel SGX.
Session 3A: Deep Learning and Adversarial ML
- Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen:
Automated Website Fingerprinting through Deep Learning. - Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:
VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. - Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. - Weilin Xu, David Evans, Yanjun Qi:
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. - Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang:
Trojaning Attack on Neural Networks.
Session 3B: Authentication
- Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee:
Broken Fingers: On the Usage of the Fingerprint API in Android. - Parimarjan Negi, Prafull Sharma, Vivek Jain, Bahman Bahmani:
K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All. - Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren:
ABC: Enabling Smartphone Authentication with Built-in Camera. - Marc Roeschlin, Ivan Martinovic, Kasper Bonne Rasmussen:
Device Pairing at the Touch of an Electrode. - Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang:
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
Session 4A: Measurements
- Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis:
A Large-scale Analysis of Content Modification by Open HTTP Proxies. - Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin:
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. - Sharbani Pandit, Roberto Perdisci, Mustaque Ahamad, Payas Gupta:
Towards Measuring the Effectiveness of Telephony Blacklists. - Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, XiaoFeng Wang:
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Session 4B: Software Attacks and Secure Architectures
- Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. - Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu:
Securing Real-Time Microcontroller Systems through Customized Memory View Switching. - Guangliang Yang, Jeff Huang, Guofei Gu:
Automated Generation of Event-Oriented Exploits in Android Hybrid Apps. - Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Session 5A: Software Security
- David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi:
K-Miner: Uncovering Memory Corruption in Linux. - Nathan Burow, Derrick Paul McKee, Scott A. Carr, Mathias Payer:
CFIXX: Object Type Integrity for C++. - Andrea Biondo, Mauro Conti, Daniele Lain:
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets. - Erick Bauman, Zhiqiang Lin, Kevin W. Hamlen:
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. - Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, Insik Shin:
Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing.
Session 5B: Privacy in Mobile
- Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang:
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. - Jingjing Ren, Martina Lindorfer, Daniel J. Dubois, Ashwin Rao, David R. Choffnes, Narseo Vallina-Rodriguez:
Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. - Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, Phillipa Gill:
Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem. - Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, XiaoFeng Wang:
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. - Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro:
Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Session 6A: Cloud
- Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang:
Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center. - Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee:
OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. - Dean Sullivan, Orlando Arias, Travis Meade, Yier Jin:
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds. - Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Session 6B: Privacy and De-Anonymization
- Alexandra-Mihaela Olteanu, Kévin Huguenin, Italo Dacosta, Jean-Pierre Hubaux:
Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data. - Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan:
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. - Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun:
De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice. - Frank Wang, James Mickens, Nickolai Zeldovich:
Veil: Private Browsing Semantics Without Browser-side Assistance.
Session 7A: Web Security
- Peng Wang, Xianghang Mi, Xiaojing Liao, XiaoFeng Wang, Kan Yuan, Feng Qian, Raheem A. Beyah:
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. - Cristian-Alexandru Staicu, Michael Pradel, Benjamin Livshits:
SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS. - Michael Schwarz, Moritz Lipp, Daniel Gruss:
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. - William Melicher, Anupam Das, Mahmood Sharif, Lujo Bauer, Limin Jia:
Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Session 7B: Audit Logs
- Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, Thomas Moyer:
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. - Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:
MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. - Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal:
Towards a Timely Causality Analysis for Enterprise Security. - Bo Li, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci:
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
Session 8: Android
- Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian:
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. - Yaohui Chen, Yuping Li, Long Lu, Yueh-Hsun Lin, Hayawardh Vijayakumar, Zhi Wang, Xinming Ou:
InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android. - Nikos Vasilakis, Ben Karel, Nick Roessler, Nathan Dautenhahn, André DeHon, Jonathan M. Smith:
BreakApp: Automated, Flexible Application Compartmentalization. - Güliz Seray Tuncay, Soteris Demetriou, Karan Ganju, Carl A. Gunter:
Resolving the Predicament of Android Custom Permissions.
Session 9: Blockchain and Smart Contracts
- Sukrit Kalra, Seep Goel, Mohan Dhawan, Subodh Sharma:
ZEUS: Analyzing Safety of Smart Contracts. - Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis:
Chainspace: A Sharded Smart Contracts Platform. - Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. - Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:
TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing.
Session 10: Social Networks and Anonymity
- Athanasios Andreou, Giridhari Venkatadri, Oana Goga, Krishna P. Gummadi, Patrick Loiseau, Alan Mislove:
Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations. - Rob Jansen, Marc Juarez, Rafa Gálvez, Tariq Elahi, Claudia Díaz:
Inside Job: Applying Traffic Analysis to Measure Tor from Within. - Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.