


default search action
25th NDSS 2018: San Diego, CA, USA
- 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018. The Internet Society 2018

Session 1A: IoT
- Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, Kehuan Zhang:

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. - Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter:

Fear and Logging in the Internet of Things. - Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:

Decentralized Action Integrity for Trigger-Action IoT Platforms. - Marius Muench, Jan Stijohann, Frank Kargl, Aurélien Francillon, Davide Balzarotti:

What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.
Session 1B: Attacks and Vulnerabilities
- Ben Stock, Giancarlo Pellegrino, Frank Li, Michael Backes, Christian Rossow:

Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications. - Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu:

Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control. - Jaeho Lee, Dan S. Wallach:

Removing Secrets from Android's TLS. - Erkam Uzun, Simon Pak Ho Chung, Irfan Essa, Wenke Lee:

rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.
Session 2A: Network Security/Cellular Networks
- Samuel Jero, Md. Endadul Hoque, David R. Choffnes, Alan Mislove, Cristina Nita-Rotaru:

Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach. - Omer Deutsch, Neta Rozen Schiff, Danny Dolev, Michael Schapira:

Preventing (Network) Time Travel with Chronos. - Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, Elisa Bertino:

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE. - Byeongdo Hong, Sangwook Bae, Yongdae Kim:

GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier.
Session 2B: Crypto
- Riccardo Focardi, Francesco Palmarini, Marco Squarcina, Graham Steel, Mauro Tempesta:

Mind Your Keys? A Security Evaluation of Java Keystores. - Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang:

A Security Analysis of Honeywords. - Daniela Becker, Jorge Guajardo, Karl-Heinz Zimmermann:

Revisiting Private Stream Aggregation: Lattice-Based PSA. - Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher:

ZeroTrace : Oblivious Memory Primitives from Intel SGX.
Session 3A: Deep Learning and Adversarial ML
- Vera Rimmer, Davy Preuveneers, Marc Juarez, Tom van Goethem, Wouter Joosen:

Automated Website Fingerprinting through Deep Learning. - Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, Yuyi Zhong:

VulDeePecker: A Deep Learning-Based System for Vulnerability Detection. - Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai:

Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. - Weilin Xu, David Evans, Yanjun Qi:

Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. - Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang:

Trojaning Attack on Neural Networks.
Session 3B: Authentication
- Antonio Bianchi, Yanick Fratantonio, Aravind Machiry, Christopher Kruegel, Giovanni Vigna, Simon Pak Ho Chung, Wenke Lee:

Broken Fingers: On the Usage of the Fingerprint API in Android. - Parimarjan Negi, Prafull Sharma, Vivek Jain, Bahman Bahmani:

K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All. - Zhongjie Ba, Sixu Piao, Xinwen Fu, Dimitrios Koutsonikolas, Aziz Mohaisen, Kui Ren:

ABC: Enabling Smartphone Authentication with Built-in Camera. - Marc Roeschlin, Ivan Martinovic, Kasper Bonne Rasmussen:

Device Pairing at the Touch of an Electrode. - Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang:

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
Session 4A: Measurements
- Giorgos Tsirantonakis, Panagiotis Ilia, Sotiris Ioannidis, Elias Athanasopoulos, Michalis Polychronakis:

A Large-scale Analysis of Content Modification by Open HTTP Proxies. - Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin:

Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. - Sharbani Pandit, Roberto Perdisci, Mustaque Ahamad, Payas Gupta:

Towards Measuring the Effectiveness of Telephony Blacklists. - Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, XiaoFeng Wang:

Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Session 4B: Software Attacks and Secure Architectures
- Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. - Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu:

Securing Real-Time Microcontroller Systems through Customized Memory View Switching. - Guangliang Yang, Jeff Huang, Guofei Gu:

Automated Generation of Event-Oriented Exploits in Android Hybrid Apps. - Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:

Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Session 5A: Software Security
- David Gens, Simon Schmitt, Lucas Davi, Ahmad-Reza Sadeghi:

K-Miner: Uncovering Memory Corruption in Linux. - Nathan Burow, Derrick Paul McKee, Scott A. Carr, Mathias Payer:

CFIXX: Object Type Integrity for C++. - Andrea Biondo, Mauro Conti, Daniele Lain:

Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets. - Erick Bauman, Zhiqiang Lin, Kevin W. Hamlen:

Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. - Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, Insik Shin:

Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing.
Session 5B: Privacy in Mobile
- Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang:

Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. - Jingjing Ren, Martina Lindorfer, Daniel J. Dubois, Ashwin Rao, David R. Choffnes, Narseo Vallina-Rodriguez:

Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. - Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, Phillipa Gill:

Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem. - Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, XiaoFeng Wang:

OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. - Apostolos Pyrgelis, Carmela Troncoso, Emiliano De Cristofaro:

Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Session 6A: Cloud
- Xing Gao, Zhang Xu, Haining Wang, Li Li, Xiaorui Wang:

Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center. - Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee:

OBLIVIATE: A Data Oblivious Filesystem for Intel SGX. - Dean Sullivan, Orlando Arias, Travis Meade, Yier Jin:

Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds. - Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna:

Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates.
Session 6B: Privacy and De-Anonymization
- Alexandra-Mihaela Olteanu, Kévin Huguenin, Italo Dacosta, Jean-Pierre Hubaux:

Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data. - Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan:

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. - Huandong Wang, Chen Gao, Yong Li, Gang Wang, Depeng Jin, Jingbo Sun:

De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice. - Frank Wang, James Mickens, Nickolai Zeldovich:

Veil: Private Browsing Semantics Without Browser-side Assistance.
Session 7A: Web Security
- Peng Wang, Xianghang Mi, Xiaojing Liao, XiaoFeng Wang, Kan Yuan, Feng Qian, Raheem A. Beyah:

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. - Cristian-Alexandru Staicu, Michael Pradel, Benjamin Livshits:

SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS. - Michael Schwarz, Moritz Lipp, Daniel Gruss:

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. - William Melicher, Anupam Das, Mahmood Sharif, Lujo Bauer, Limin Jia:

Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Session 7B: Audit Logs
- Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, Thomas Moyer:

Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. - Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela F. Ciocarlie, Ashish Gehani, Vinod Yegneswaran:

MCI : Modeling-based Causality Inference in Audit Logging for Attack Investigation. - Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Prateek Mittal:

Towards a Timely Causality Analysis for Enterprise Security. - Bo Li, Phani Vadrevu, Kyu Hyung Lee, Roberto Perdisci:

JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions.
Session 8: Android
- Yousra Aafer, Jianjun Huang, Yi Sun, Xiangyu Zhang, Ninghui Li, Chen Tian:

AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection. - Yaohui Chen, Yuping Li, Long Lu, Yueh-Hsun Lin, Hayawardh Vijayakumar, Zhi Wang, Xinming Ou:

InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android. - Nikos Vasilakis, Ben Karel, Nick Roessler, Nathan Dautenhahn, André DeHon, Jonathan M. Smith:

BreakApp: Automated, Flexible Application Compartmentalization. - Güliz Seray Tuncay, Soteris Demetriou, Karan Ganju, Carl A. Gunter:

Resolving the Predicament of Android Custom Permissions.
Session 9: Blockchain and Smart Contracts
- Sukrit Kalra, Seep Goel, Mohan Dhawan, Subodh Sharma:

ZEUS: Analyzing Safety of Smart Contracts. - Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, George Danezis:

Chainspace: A Sharded Smart Contracts Platform. - Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:

Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. - Hubert Ritzdorf, Karl Wüst, Arthur Gervais, Guillaume Felley, Srdjan Capkun:

TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing.
Session 10: Social Networks and Anonymity
- Athanasios Andreou, Giridhari Venkatadri, Oana Goga, Krishna P. Gummadi, Patrick Loiseau, Alan Mislove:

Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations. - Rob Jansen, Marc Juarez, Rafa Gálvez, Tariq Elahi, Claudia Díaz:

Inside Job: Applying Traffic Analysis to Measure Tor from Within. - Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, Keith W. Ross:

Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-04-12 23:21 CEST by the 







