NDSS 2020 Accepted Posters

Image-synch: a liveness detection method based on ambient image

Yuan Sun, Huiping Sun and Xixin Cao

DEAN: A Blockchain-Inspired Consensus Protocol Enabling Trustworthy Edge Computing

Abdullah Al-Mamun, Jun Dai, Xiaohua Xu, Mohammad Sadoghi, Haoting Shen and Dongfang Zhao

Practical Image Obfuscation with Provable Privacy

Liyue Fan

Method for Effective Measurement, Labeling, and Classification of Botnet C2s for Predicting Attacks

Mitsuhiro Hatada and Matthew Scholl

Model checking RNNs with modal μ-calculus

Tatsuhiro Aoshima and Toshinori Usui

Secure Logging Infrastructure Employing Heterogeneous Trusted Execution Environments

Seungho Lee, Wonsuk Choi, Hyo Jin Jo and Dong Hoon Lee

MOAI: Multiple Origin ASes Identification for IP Prefix Hijacking and Mis-Origination

Hironori Imai, Masayuki Okada and Akira Kanaoka

Leveraging Locality of Reference for Certificate Revocation

Luke Dickinson, Trevor Smith and Kent Seamons

Oblivious k-Nearest Neighbors for Secure Map Applications

Jamie W. Lee, Adam J. Aviv, Travis Mayberry and Daniel S. Roche

Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks

Yuming Wu, Phuong Cao, Alexander Withers, Zbigniew T. Kalbarczyk and Ravishankar K. Iyer

Room-Scale Over-the-Air Audio Adversarial Examples

Tao Chen, Longfei Shangguan, Zhenjiang Li and Kyle Jamieson

Security of Deep Learning based Lane Keeping Assistance System under Physical-World Adversarial Attack

Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jack Jia, Xue Lin and Qi Alfred Chen

Propose a defense method against Audio Adversarial Attack

Yuya Tarutani, Kensuke Ueda and Yoshiaki Kato

Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting

Esha Sarkar, Yousif Alkindi and Michail Maniatakos

DBB-DSE : Dynamic Backward-Bound Dynamic Symbolic Execution

Jonghwan Yang, Seokwoo Choi and Eun-Sun Cho

MicroFL: A Lightweight, Secure-by-Design Edge Network Fabric for Decentralized IoT Systems

Ronghua Xu, Yu Chen and Jian Li

POSTER: MURS: Practical and Robust Privacy Amplification with Multi-Party Differential Privacy

Tianhao Wang, Min Xu, Bolin Ding, Jingren Zhou, Cheng Hong, Zhicong Huang, Ninghui Li and Somesh Jha

A Machine Learning Model Performance Improvement Approach to Detection of Obfuscated JavaScript-based Attacks

Samuel Ndichu, Sangwook Kim and Seiichi Ozawa

uRAI: Securing Embedded Systems with Return Address Integrity

Naif Saleh Almakhdhub, Abraham A. Clements and Saurabh Bagchi

Automatic Detection and Prevention of Fake Key Attacks in Signal

Tarun Kumar Yadav, Devashish Gosain, Daniel Zappala and Kent Seamons

Towards an Architecture for Private Digital Authentication in the Physical World

Rene Mayrhofer, Michael Roland and Tobias Holler

All Your Data Are Available to Us: A Need for Network Segmentation with IoT Devices

Karl Olson and Nolen Scaife

Securing IoT services using DLTs and Verifiable Credentials

Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, Spyros Voulgaris and George C. Polyzos

Methodologies for Quantifying (Re-) Randomization Security and Timing under JIT-ROP

Md Salman Ahmed, Ya Xiao, Gang Tan, Kevin Snow, Fabian Monrose and Danfeng (Daphne) Yao

Who’s Calling? Characterizing Robocalling Campaigns

Sathvik Prasad, Athishay Kiran, Elijah Bouma-Sims and Bradley Reaves

A Chaincode with Attribute-Based Encryption for Protecting Data in Ledgers

Mio Saiki, Hideharu Kojima, Naoto Yanai and Tatsuhiro Tsuchiya

SNIPPET Secure and Privacy-friendly Peer-to-Peer Electricity Trading

Aysajan Abidin, Raf Callaerts, Geert Deconinck, Shenja van der Graaf, Akash Madhusudan, Mehdi Montakhabi, Mustafa A. Mustafak, Svetla Nikova, Domenico Orlando, Jessica Schroers, Simon Vanhove and Fairouz Zobiri

Consortium Blockchain for the Assurance of Supply Chain Security

Haoting Shen, Shahriar Badsha and Dongfang Zhao

Wireless Access Point Spoofing by Unmanned Aerial Vehicles (UAVs)

Ryota Kawakami, Atsuo Inomata, Naoto Yanai and Toru Fujiwara

PhotoLock: Autonomous Privacy-preserving Photo Sharing in Online Social Networks

Edwin Yang, Song Fang, Christan Grant and Le Gruenwald