NDSS 会议(全称The Network and Distributed System Security Symposium)是和CCS,USENIX SECURITY及IEEE S&P并称的计算机系统安全领域的四大顶级会议之一。CCF A类会议,2023年共有两轮(夏季、秋季)论文征稿,2023年共收到591篇论文(2020:506篇,2019:521篇, 2018:331篇), 共录取了94篇论文(2021:87, 2020:88, 2019:89篇,2018:71篇),国内高校主要有:国防科技大学、华中科技大学、南京理工大学、上海交通大学、暨南大学、浙江大学、香港理工大学、清华大学、香港中文大学
等,清华大学、国防科技大学、华中科技大学
等都发了多篇论文
,录用论文标题如下(标红论文为本课题组关注论文 ):
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software
Let Me Unwind That For You: Exceptions to Backward-Edge Protection
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs
Backdoor Attacks Against Dataset Distillation
REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service
Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes
ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks
PPA: Preference Profiling Attack Against Federated Learning
RAI2: Responsible Identity Audit Governing the Artificial Intelligence
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection
DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing
Browser Permission Mechanisms Demystified
Drone Security and the Mysterious Case of DJI's DroneID
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression
Machine Unlearning of Features and Labels
Fusion: Efficient and Secure Inference Resilient to Malicious Servers
Trellis: Robust and Scalable Metadata-private Anonymous Broadcast
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies
Thwarting Smartphone SMS Attacks at the Radio Interface Layer
InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities
No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions
DARWIN: Survival of the Fittest Fuzzing Mutators
LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols
Securing Federated Sensitive Topic Classification against Poisoning Attacks
OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables
BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems
Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation
QUICforge: Client-side Request Forgery in QUIC
Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations
I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape
Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels
POSE: Practical Off-chain Smart Contract Execution
OptRand: Optimistically Responsive Reconfigurable Distributed Randomness
Partitioning Ethereum without Eclipsing It
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning
Real Threshold ECDSA
Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers
MyTEE: Own the Trusted Execution Environment on Embedded Devices
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks
RR: A Fault Model for Efficient TEE Replication
Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing
Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Cryptographic Oracle-based Conditional Payments
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
Breaking and Fixing Virtual Channels: Domino Attack and Donner
He-HTLC: Revisiting Incentives in HTLC
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
Private Certifier Intersection
OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption
Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems
Evasion Attacks and Defenses on Smart Home Physical Event Verification
SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response
Accountable Javascript Code Delivery
ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning
Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites
A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities
An OS-agnostic Approach to Memory Forensics
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams
Preventing SIM Box Fraud Using Device Model Fingerprinting
Access Your Tesla without Your Awareness: Compromising Keyless Entry System of Model 3
MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags
Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph
SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
Tactics, Threats & Targets: Modeling Disinformation and its Mitigation
How to Count Bots in Longitudinal Datasets of IP Addresses
Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis
Efficient Dynamic Proof of Retrievability for Cold Storage
HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity
A Robust Counting Sketch for Data Plane Intrusion Detection
REDsec: Running Encrypted Discretized Neural Networks in Seconds
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning
VICEROY: GDPR-CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests
Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites
Privacy-Preserving Database Fingerprinting
Folk Models of Misinformation on Social Media
Fine-Grained Trackability in Protocol Executions
所有论文均可下载:https://www.ndss-symposium.org/ndss-program/symposium-2023/
历年会议
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...