NDSS Symposium 2019
NDSS Symposium 2019 took place from 24-27 February 2019 at Catamaran Resort Hotel & Spa in San Diego, California.
NDSS Test of Time Awards
1996: SKEME: A Versatile Secure Key Exchange Mechanism for Internet
SKEME was an integral component of early versions of the Internet Key Exchange (IKE) protocol used with IPsec and is the basis for many of the cryptographic design choices in the current IKEv2 Internet Standard. IPsec and IKE are the de facto Internet standards for protection of IP communications including Virtual Private Networks (VPNs) and are widely deployed in numerous commercial products.
1999: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks
Ari Juels and John Brainard
The paper introduced the use of “client puzzles” to protect against connection depletion attacks (a form of denial of service) in connection-oriented protocols, such as TCP Syn flooding. The paper led to a number of other efforts to develop different forms of client puzzles and to apply them to various other protocols and systems. The paper is the 6th most highly cited NDSS paper (792) from the period 1995-2009.
2003: A Virtual Machine Introspection Based Architecture for Intrusion Detection
Tal Garfinkel and Mendel Rosenblum
This paper introduced the use of VMI for cybersecurity and opened the floodgates on a tremendous amount of research and derivative tools that took VM technology beyond simple resource multiplexing and leveraged it for intrusion detection, intrusion prevention, forensics, isolation, and other cybersecurity protections. The paper is the most highly cited NDSS paper (1751) from the period 1995-2009.
NDSS 2019 Distinguished Paper Awards
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data
Inken Hagestedt (CISPA Helmholtz Center for Information Security), Yang Zhang (CISPA Helmholtz Center for Information Security), Mathias Humbert (Swiss Data Science Center, ETH Zurich/EPFL), Pascal Berrang (CISPA Helmholtz Center for Information Security), Haixu Tang (Indiana University Bloomington), XiaoFeng Wang (Indiana University Bloomington), Michael Backes (CISPA Helmholtz Center for Information Security)
Establishing Software Root of Trust Unconditionally
Virgil D. Gligor (Carnegie Mellon University), Maverick S. L. Woo (Carnegie Mellon University)
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs
Eihal Alowaisheq (Indiana University, King Saud University), Peng Wang (Indiana University), Sumayah Alrwais (King Saud University), Xiaojing Liao (Indiana University), XiaoFeng Wang (Indiana University), Tasneem Alowaisheq (Indiana University, King Saud University), Xianghang Mi (Indiana University), Siyuan Tang (Indiana University), Baojun Liu (Tsinghua University)
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai
Orcun Cetin (Delft University of Technology), Carlos Ganan (Delft University of Technology), Lisette Altena (Delft University of Technology), Takahiro Kasama (National Institute of Information and Communications Technology), Daisuke Inoue (National Institute of Information and Communications Technology), Kazuki Tamiya (Yokohama National University), Ying Tie (Yokohama National University), Katsunari Yoshioka (Yokohama National University), Michel van Eeten (Delft University of Technology)
NDSS 2019 Distinguished Paper Award Honorable Mentions
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing
Jiyong Yu, Lucas Hsiung, Mohamad El’Hajj, Christopher W. Fletcher (UIUC)
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation
Binghui Wang, Jinyuan Jia, Neil Zhenqiang Gong (Iowa State University)
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries
Anastasis Keliris (NYU); Michail Maniatakos (NYU Abu Dhabi)
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System
Min Hong Yun, Lin Zhong (Rice University)
One Engine To Serve ’em All: Inferring Taint Rules Without Architectural Semantics
Zheng Leong Chua (National University of Singapore); Yanhao Wang (TCA/SKLCS, Institute of Software, Chinese Academy of Sciences); Teodora Baluta, Prateek Saxena, Zhenkai Liang (National University of Singapore); Purui Su (TCA/SKLCS, Institute of Software, Chinese Academy of Sciences)
On the Challenges of Geographical Avoidance for Tor
Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz (Ruhr-University Bochum); Christina Ppper (New York University Abu Dhabi)
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information
Syed Rafiul Hussain (Purdue University); Mitziu Echeverria, Omar Chowdhury (University of Iowa); Ninghui Li, Elisa Bertino (Purdue University)
NDSS 2019 Distinguished Technical Poster Awards
Award for prior work
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques Against Browser Phishing Blacklists
Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman and Kvein Tyers
Award for new work
Poster: Automated Evaluation of Fuzzers
Sebastian Surminski, Michael Rodler and Lucas Davi
NDSS 2019 Distinguished Poster Presentation
Award for prior work
Poster: Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
Mariam Nouh, Jason Nurse, Helena Webb and Michael Goldsmith.
Award for new work
Poster: Security Analysis of Multi-Sensor Fusion based Localization in Autonomous Vehicles
Junjie Shen, Jun Yeon Won, Shinan Liu, Qi Alfred Chen and Alexander Veidenbaum.
View the NDSS Symposium 2019 accepted papers.
Sessions, keynotes, accepted papers and posters, co-located event programs.
Information on co-located workshops and symposium.
Program Committee, Steering Group, and Organizing Committee.
Calls for papers, posters and workshops.