default search action
26th NDSS 2019: San Diego, CA, USA
- 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society 2019, ISBN 1-891562-55-X
- Deborah A. Frincke:
Keynote: Modern Challenges for Cyber Defense.
Mobile Security
- Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
SANCTUARY: ARMing TrustZone with User-space Enclaves. - Min Hong Yun, Lin Zhong:
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System. - Abdallah Dawoud, Sven Bugiel:
DroidCap: OS Support for Capability-based Permissions in Android. - Meng Luo, Pierre Laperdrix, Nima Honarmand, Nick Nikiforakis:
Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. - Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin:
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. - Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis:
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data.
Web Security
- Marius Steffens, Christian Rossow, Martin Johns, Ben Stock:
Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild. - Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis:
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. - Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, Wouter Joosen:
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. - Michael Schwarz, Florian Lackner, Daniel Gruss:
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. - Alexander Sjösten, Steven Van Acker, Pablo Picazo-Sanchez, Andrei Sabelfeld:
Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks. - Hyunwoo Lee, Zach Smith, Junghwan Lim, Gyeongjae Choi, Selin Chun, Taejoong Chung, Ted Taekyoung Kwon:
maTLS: How to Make TLS middlebox-aware?
Blockchain I
- Maria Apostolaki, Gian Marti, Jan Müller, Laurent Vanbever:
SABRE: Protecting Bitcoin against Routing Attacks. - Bingsheng Zhang, Roman Oliynykov, Hamed Balogun:
A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence. - David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks:
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. - Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand:
YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes. - Gabriel Kaptchuk, Matthew Green, Ian Miers:
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers.
Malware and Threats
- Eihal Alowaisheq, Peng Wang, Sumayah A. Alrwais, Xiaojing Liao, XiaoFeng Wang, Tasneem Alowaisheq, Xianghang Mi, Siyuan Tang, Baojun Liu:
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs. - Orçun Çetin, Carlos Gañán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten:
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. - Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin:
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet. - Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pärn, Zhichun Li, Cristian Lumezanu, Zhenyu Wu, Lu-An Tang, Ding Li:
Countering Malicious Processes with Process-DNS Association. - Jack Wampler, Ian Martiny, Eric Wustrow:
ExSpectre: Hiding Malware in Speculative Execution.
Adversarial Machine Learning
- Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes:
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. - Inken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, XiaoFeng Wang, Michael Backes:
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. - Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems. - Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang:
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. - Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang:
TextBugger: Generating Adversarial Text Against Real-world Applications.
Enterprise Security
- Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin R. B. Butler, Patrick Traynor:
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. - Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero:
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises. - Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, Adam Bates:
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
Censorship
- Sergey Frolov, Eric Wustrow:
The use of TLS in Censorship Circumvention. - Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper:
On the Challenges of Geographical Avoidance for Tor.
Fuzzing
- Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, Michael Franz:
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. - Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz:
REDQUEEN: Fuzzing with Input-to-State Correspondence. - Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert:
NAUTILUS: Fishing for Deep Bugs with Grammars. - Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li:
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification. - Lei Zhao, Yue Duan, Heng Yin, Jifeng Xuan:
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.
Privacy on the Web
- Athanasios Andreou, Márcio Silva, Fabrício Benevenuto, Oana Goga, Patrick Loiseau, Alan Mislove:
Measuring the Facebook Advertising Ecosystem. - Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz:
We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. - Michael Meli, Matthew R. McNiece, Bradley Reaves:
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories. - Amit Klein, Benny Pinkas:
DNS Cache-Based User Tracking. - Muhammad Ahmad Bashir, Umar Farooq, Maryam Shahid, Muhammad Fareed Zaffar, Christo Wilson:
Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers.
Bugs and Vulnerabilities
- A. Theodore Markettos, Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals. - Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, Purui Su:
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics. - Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, Wenke Lee:
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries. - Jangseop Shin, Donghyun Kwon, Jiwon Seo, Yeongpil Cho, Yunheung Paek:
CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C++. - HyungSeok Han, DongHyeon Oh, Sang Kil Cha:
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines.
Side Channels
- Sina Faezi, Sujit Rokka Chhetri, Arnav Vaibhav Malawade, John Charles Chaput, William H. Grover, Philip Brisk, Mohammad Abdullah Al Faruque:
Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines. - Nicolás Rosner, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Profit: Detecting and Quantifying Side Channels in Networked Applications. - Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Paul L. Yu:
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. - Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher:
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. - Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino:
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Authentication
- Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis:
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. - Cormac Herley, Stuart E. Schechter:
Distinguishing Attacks from Legitimate Authentication Traffic at Scale. - Shridatt Sugrim, Can Liu, Meghan McLean, Janne Lindqvist:
Robust Performance Metrics for Authentication Systems. - Jaeho Lee, Ang Chen, Dan S. Wallach:
Total Recall: Persistence of Passwords in Android. - Ke Coby Wang, Michael K. Reiter:
How to End Password Reuse on the Web.
Protocol Security
- Cas Cremers, Martin Dehnel-Wild:
Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion. - Mridula Singh, Patrick Leu, Srdjan Capkun:
UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks. - Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android. - Fenghao Xu, Wenrui Diao, Zhou Li, Jiongyi Chen, Kehuan Zhang:
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals. - Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, Robert H. Deng:
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
IoT and CPS
- Z. Berkay Celik, Gang Tan, Patrick D. McDaniel:
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. - Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah:
RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid. - Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, Deeph Chana:
A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. - Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. - Anastasis Keliris, Michail Maniatakos:
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries.
Crypto and Privacy
- Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba, Mike Rosulek, Charles V. Wright, Wu-chi Feng:
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. - Anrin Chakraborti, Radu Sion:
ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM. - Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Statistical Privacy for Streaming Traffic. - Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion:
rORAM: Efficient Range ORAM with O(log2 N) Locality. - Victor Perrier, Hassan Jameel Asghar, Dali Kaafar:
Private Continual Release of Real-Valued Data Streams.
Attacks on Speech Recognition
- Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. - Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. - Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt:
The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection. - Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chinprutthiwong, Guofei Gu:
Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications.
Blockchain II
- Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, Seungwon Shin:
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web. - Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich:
Vault: Fast Bootstrapping for the Algorand Cryptocurrency. - Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi:
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. - Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. - Xiaofei Bai, Jian Gao, Chenglong Hu, Liang Zhang:
Constructing an Adversary Solver for Equihash.
Trusted Execution
- Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee:
OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. - Lianying Zhao, Mohammad Mannan:
TEE-aided Write Protection Against Privileged Data Tampering. - Samuel Weiser, Mario Werner, Ferdinand Brasser, Maja Malenko, Stefan Mangard, Ahmad-Reza Sadeghi:
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V. - Virgil D. Gligor, Shan Leung Maverick Woo:
Establishing Software Root of Trust Unconditionally.
Machine Learning & Game Theory Applications
- Binghui Wang, Jinyuan Jia, Neil Zhenqiang Gong:
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation. - Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. - Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, Prateek Saxena:
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints. - Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, Zhexin Zhang:
Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.