


default search action
28th NDSS 2021
- 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021. The Internet Society 2021

Network Security
- Tyler McDaniel, Jared M. Smith, Max Schuchard:

Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis. - Yarin Perry, Neta Rozen Schiff, Michael Schapira:

A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers? - Shangqi Lai, Xingliang Yuan, Joseph K. Liu, Xun Yi, Qi Li, Dongxi Liu, Surya Nepal:

OblivSketch: Oblivious Network Measurement as a Cloud Service. - Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, Bing Wang:

ROV++: Improved Deployable Defense against BGP Hijacking. - Kai Jansen, Liang Niu, Nian Xue, Ivan Martinovic, Christina Pöpper:

Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic Surveillance.
Program Analysis 1
- Ruian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, Wenke Lee:

Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages. - Jens Müller, Dominik Noss, Christian Mainka, Vladislav Mladenov, Jörg Schwenk:

Processing Dangerous Paths - On Security and Privacy of the Portable Document Format. - Kexin Pei, Jonas Guan, David Williams-King, Junfeng Yang, Suman Jana:

XDA: Accurate, Robust Disassembly with Transfer Learning. - Christian Mainka, Vladislav Mladenov, Simon Rohlmann:

Shadow Attacks: Hiding and Replacing Content in Signed PDFs. - Changming Liu, Yaohui Chen, Long Lu:

KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel.
Privacy
- Soroush Karami, Panagiotis Ilia, Jason Polakis:

Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage. - Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:

All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers. - Ian Martiny, Gabriel Kaptchuk, Adam J. Aviv

, Daniel S. Roche, Eric Wustrow:
Improving Signal's Sealed Sender. - Konstantinos Solomos, John Kristoff, Chris Kanich, Jason Polakis:

Tales of Favicons and Caches: Persistent Tracking in Modern Browsers.
Network Policies
- Stefano Calzavara, Tobias Urban, Dennis Tatang, Marius Steffens, Ben Stock:

Reining in the Web's Inconsistencies with Site Policy. - Chaoyi Lu, Baojun Liu, Yiming Zhang, Zhou Li, Fenglu Zhang, Haixin Duan, Ying Liu, Joann Qiongna Chen, Jinjin Liang, Zaifeng Zhang, Shuang Hao, Min Yang:

From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR. - Athanasios Kountouras, Panagiotis Kintis, Athanasios Avgetidis, Thomas Papastergiou, Charles Lever, Michalis Polychronakis, Manos Antonakakis:

Understanding the Growth and Security Considerations of ECS. - Jonghoon Kwon, Claude Hähni, Patrick Bamert, Adrian Perrig:

Mondrian: Comprehensive Inter-domain Network Zoning Architecture.
Program Analysis 2
- Abdallah Dawoud, Sven Bugiel:

Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework. - Sebastian Poeplau, Aurélien Francillon:

SymQEMU: Compilation-based symbolic execution for binaries. - Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:

TASE: Reducing Latency of Symbolic Execution with Transactional Memory. - Sun Hyoung Kim, Cong Sun, Dongrui Zeng, Gang Tan:

Refining Indirect Call Targets at the Binary Level.
Crypto
- Zhiwei Shang, Simon Oya, Andreas Peter, Florian Kerschbaum:

Obfuscated Access and Search Patterns in Searchable Encryption. - Leila Rashidi, Daniel Kostecki, Alexander James, Anthony Peterson, Majid Ghaderi, Samuel Jero, Cristina Nita-Rotaru, Hamed Okhravi, Reihaneh Safavi-Naini:

More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based Schemes. - Sikhar Patranabis, Debdeep Mukhopadhyay:

Forward and Backward Private Conjunctive Searchable Symmetric Encryption. - Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Web Security
- Mohd Sabra, Anindya Maiti, Murtuza Jadliwala:

Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks. - Mohsen Minaei, S. Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate:

Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms. - Marius Steffens, Marius Musch, Martin Johns, Ben Stock:

Who's Hosting the Block Party? Studying Third-Party Blockage of CSP and SRI. - Beliz Kaleli, Brian Kondracki, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini:

To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media. - Mikhail Shcherbakov, Musard Balliu:

SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web.
Mobile Security
- Joongyum Kim, Junghwan Park, Sooel Son:

The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad Fraud. - Xianghang Mi, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, XiaoFeng Wang:

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks. - Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini:

Understanding Worldwide Private Information Collection on Android. - Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi:

On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices. - Andrea Possemato, Dario Nisi, Yanick Fratantonio:

Preventing and Detecting State Inference Attacks on Android.
Blockchains
- Kai Li

, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, XiaoFeng Wang, Xiapu Luo:
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service. - Philipp Schindler, Aljosha Judmayer, Markus Hittmeir, Nicholas Stifter, Edgar R. Weippl:

RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness. - Daniël Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, Jianying Zhou:

LaKSA: A Probabilistic Proof-of-Stake Protocol. - Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramèr

, Giulia Fanti, Ari Juels:
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. - Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:

Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.
Network Protocols
- James Pavur, Martin Strohmeier, Vincent Lenders, Ivan Martinovic:

QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary Orbit. - Haonan Feng, Hui Li, Xuesong Pan, Ziming Zhao:

A Formal Analysis of the FIDO UAF Protocol. - Mitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, M. Fareed Arif, Syed Rafiul Hussain, Omar Chowdhury:

PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime Verification. - Michael Troncoso, Britta Hale:

The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol. - Yapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, Dongyan Xu:

NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces.
Side-channels and Speculation
- Zhuoran Liu, Niels Samwel, Leo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, Martha A. Larson:

Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel. - Madura A. Shelton, Niels Samwel, Lejla Batina, Francesco Regazzoni, Markus Wagner

, Yuval Yarom:
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers. - Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk:

Hunting the Haunter - Efficient Relational Symbolic Execution for Spectre with Haunted RelSE. - Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin

, Tao Wei:
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets.
Malware and Cyber-crime
- Merve Sahin, Aurélien Francillon:

Understanding and Detecting International Revenue Share Fraud. - Jiayun Xu, Yingjiu Li, Robert H. Deng:

Differential Training: A Generic Framework to Reduce Label Noises for Android Malware Detection. - Faraz Naseem Naseem, Ahmet Aris, Leonardo Babun, Ege Tekiner, A. Selcuk Uluagac:

MINOS: A Lightweight Real-Time Cryptojacking Detection System. - Alexander Küchler, Alessandro Mantovani, Yufei Han, Leyla Bilge, Davide Balzarotti:

Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes.
"Smart" Home
- Christopher Lentzsch, Sheel Jayesh Shah, Benjamin Andow, Martin Degeling, Anupam Das, William Enck:

Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem. - Wenbo Ding, Hongxin Hu, Long Cheng:

IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery. - Haotian Chi, Qiang Zeng, Xiaojiang Du, Lannan Luo:

PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection. - Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu:

EarArray: Defending against DolphinAttack via Acoustic Attenuation.
Software Defenses
- Min Zheng, Xiaolong Bai, Yajin Zhou, Chao Zhang, Fuping Qu:

POP and PUSH: Demystifying and Defending against (Mach) Port-oriented Programming. - Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Fraser Brown, Sorin Lerner, Tyler McMullen, Stefan Savage, Deian Stefan:

Доверя'й, но проверя'й: SFI safety for native-compiled Wasm. - Navid Emamdoost, Qiushi Wu, Kangjie Lu, Stephen McCamant:

Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning.
Machine Learning
- Jack P. K. Ma, Raymond K. H. Tai, Yongjun Zhao, Sherman S. M. Chow:

Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation. - Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, Yinzhi Cao:

Practical Blind Membership Inference Attack via Differential Comparisons. - Qiao Zhang, Chunsheng Xin, Hongyi Wu:

GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks. - Junjie Liang, Wenbo Guo, Tongbo Luo, Vasant G. Honavar

, Gang Wang, Xinyu Xing:
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
Fuzzing
- Hyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, Dongyan Xu:

PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. - Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos, Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, Adam Doupé, Yan Shoshitaishvili:

Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases. - Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, Taesoo Kim:

WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning. - Jinghan Wang, Chengyu Song, Heng Yin:

Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing.
Embedded Security
- Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, Dongyan Xu:

Evading Voltage-Based Intrusion Detection on Automotive CAN. - Christian Niesler, Sebastian Surminski, Lucas Davi:

HERA: Hotpatching of Embedded Real-time Applications. - Wenqiang Li, Le Guan, Jingqiang Lin, Jiameng Shi, Fengjun Li:

From Library Portability to Para-rehosting: Natively Executing Microcontroller Software on Commodity Hardware. - Eunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, Yongdae Kim:

BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols.
Federated Learning and Poisoning attacks
- Sinem Sav, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao Sa Sousa, Jean-Pierre Hubaux:

POSEIDON: Privacy-Preserving Federated Neural Network Learning. - Xiaoyu Cao, Minghong Fang, Jia Liu, Neil Zhenqiang Gong:

FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping. - Virat Shejwalkar, Amir Houmansadr:

Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning. - Hai Huang, Jiaming Mu, Neil Zhenqiang Gong, Qi Li, Bin Liu, Mingwei Xu:

Data Poisoning Attacks to Deep Learning Based Recommender Systems.
Forensics and Audits
- Yonghwi Kwon, Weihang Wang, Jinho Jung, Kyu Hyung Lee, Roberto Perdisci

:
C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis. - Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela F. Ciocarlie, Vinod Yegneswaran, Ashish Gehani:

ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. - Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao:

WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
Trusted Computing
- Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:

DOVE: A Data-Oblivious Virtual Environment. - Adil Ahmad, Juhee Kim, Jaebaek Seo, Insik Shin, Pedro Fonseca, Byoungyoung Lee:

CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs. - Rongzhen Cui, Lianying Zhao, David Lie:

Emilia: Catching Iago in Legacy Code.
Machine Learning Applications
- Hieu Le, Athina Markopoulou, Zubair Shafiq:

CV-Inspector: Towards Automating Detection of Adblock Circumvention. - Diogo Barradas, Nuno Santos, Luís Rodrigues, Salvatore Signorello, Fernando M. V. Ramos, André Madeira:

FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications. - Sebastian Zimmeck, Rafael Goldstein, David Baraka:

PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile Apps. - Nishant Vishwamitra, Hongxin Hu, Feng Luo, Long Cheng:

Towards Understanding and Detecting Cyberbullying in Real-world Images.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














