NDSS Test of Time Awards

1996SKEME: A Versatile Secure Key Exchange Mechanism for Internet, Hugo Krawczyk

SKEME was an integral component of early versions of the Internet Key Exchange (IKE) protocol used with IPsec and is the basis for many of the cryptographic design choices in the current IKEv2 Internet Standard. IPsec and IKE are the de facto Internet standards for protection of IP communications including Virtual Private Networks (VPNs) and are widely deployed in numerous commercial products.

1999: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks, Ari Juels and John Brainard

The paper introduced the use of “client puzzles” to protect against connection depletion attacks (a form of denial of service) in connection-oriented protocols, such as TCP Syn flooding. The paper led to a number of other efforts to develop different forms of client puzzles and to apply them to various other protocols and systems. The paper is the 6th most highly cited NDSS paper (792) from the period 1995-2009.

2003: A Virtual Machine Introspection Based Architecture for Intrusion Detection, Tal Garfinkel and Mendel Rosenblum

This paper introduced the use of VMI for cybersecurity and opened the floodgates on a tremendous amount of research and derivative tools that took VM technology beyond simple resource multiplexing and leveraged it for intrusion detection, intrusion prevention, forensics, isolation, and other cybersecurity protections. The paper is the most highly cited NDSS paper (1751) from the period 1995-2009.

NDSS 2019 Distinguished Paper Awards

MBeacon: Privacy-Preserving Beacons for DNA Methylation Data

Inken Hagestedt (CISPA Helmholtz Center for Information Security), Yang Zhang (CISPA Helmholtz Center for Information Security), Mathias Humbert (Swiss Data Science Center, ETH Zurich/EPFL), Pascal Berrang (CISPA Helmholtz Center for Information Security), Haixu Tang (Indiana University Bloomington), XiaoFeng Wang (Indiana University Bloomington), Michael Backes (CISPA Helmholtz Center for Information Security)

Establishing Software Root of Trust Unconditionally

Virgil D. Gligor (Carnegie Mellon University), Maverick S. L. Woo (Carnegie Mellon University)

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs

Eihal Alowaisheq (Indiana University, King Saud University), Peng Wang (Indiana University), Sumayah Alrwais (King Saud University), Xiaojing Liao (Indiana University), XiaoFeng Wang (Indiana University), Tasneem Alowaisheq (Indiana University, King Saud University), Xianghang Mi (Indiana University), Siyuan Tang (Indiana University), Baojun Liu (Tsinghua University)

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai

Orcun Cetin (Delft University of Technology), Carlos Ganan (Delft University of Technology), Lisette Altena (Delft University of Technology), Takahiro Kasama (National Institute of Information and Communications Technology), Daisuke Inoue (National Institute of Information and Communications Technology), Kazuki Tamiya (Yokohama National University), Ying Tie (Yokohama National University), Katsunari Yoshioka (Yokohama National University), Michel van Eeten (Delft University of Technology)

NDSS 2019 Distinguished Paper Award Honorable Mentions

Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing

Jiyong Yu, Lucas Hsiung, Mohamad El’Hajj, Christopher W. Fletcher (UIUC)

Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation

Binghui Wang, Jinyuan Jia, Neil Zhenqiang Gong (Iowa State University)

ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries

Anastasis Keliris (NYU); Michail Maniatakos (NYU Abu Dhabi)

Ginseng: Keeping Secrets in Registers When You Distrust the Operating System

Min Hong Yun, Lin Zhong (Rice University)

One Engine To Serve ’em All: Inferring Taint Rules Without Architectural Semantics

Zheng Leong Chua (National University of Singapore); Yanhao Wang  (TCA/SKLCS, Institute of Software, Chinese Academy of Sciences); Teodora Baluta, Prateek Saxena, Zhenkai Liang (National University of Singapore); Purui Su (TCA/SKLCS, Institute of Software, Chinese Academy of Sciences)

On the Challenges of Geographical Avoidance for Tor

Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz (Ruhr-University Bochum); Christina Ppper (New York University Abu Dhabi)

Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information

Syed Rafiul Hussain (Purdue University); Mitziu Echeverria, Omar Chowdhury (University of Iowa); Ninghui Li, Elisa Bertino (Purdue University)

NDSS 2019 Distinguished Technical Poster Awards

Award for prior work

PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques Against Browser Phishing Blacklists
Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman and Kvein Tyers

Award for new work

Poster: Automated Evaluation of Fuzzers
Sebastian Surminski, Michael Rodler and Lucas Davi

NDSS 2019 Distinguished Poster Presentation

Award for prior work

Poster: Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
Mariam Nouh, Jason Nurse, Helena Webb and Michael Goldsmith.

Award for new work

Poster: Security Analysis of Multi-Sensor Fusion based Localization in Autonomous Vehicles
Junjie Shen, Jun Yeon Won, Shinan Liu, Qi Alfred Chen and Alexander Veidenbaum.

2019 Event Sponsors

Baidu logo Checkpoint logo Cisco logo Google logo
Internet Society logo Qualcomm logo SPICE logo

Follow Us

Join the mailing list.

On social media? Use #NDSS19 to tag your posts, and follow us!