NDSS 2019 Accepted Posters

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems

Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang and Raheem Beyah

TEXTBUGGER: Generating Adversarial Text Against Real-world Applications

Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li and Ting Wang

A Realizable Framework for Intrusion Detection in Additive Manufacturing Systems Using Analog Side-Channels

Sizhuang Liang and Raheem Beyah

Securing Distributed System Configuration through Optimization and Reasoning on Graphs

Hamed Soroush, Shantanu Rane and Massimiliano Albanese

Automated Evaluation of Fuzzers

Sebastian Surminski, Michael Rodler and Lucas Davi

Collaborative Trustworthy Security and Privacy Framework for Social Media

Hardik A. Gohel, Himanshu Upadhyay and Leonel Lagos

Security Analysis of Multi-Sensor Fusion based Localization in Autonomous Vehicles

Junjie Shen, Jun Yeon Won, Shinan Liu, Qi Alfred Chen and Alexander Veidenbaum

PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques Against Browser Phishing Blacklists

Adam Oest, Yeganeh Safaei, Adam Doupé, Gail-Joon Ahn, Brad Wardman and Kvein Tyers

A Privacy Risk Arising from Communication with TV: Consideration from Attribute Inference for Users

Takahiro Higuchi, Naoto Yanai, Kensuke Ueda, Yasunori Ishihara and Toru Fujiwara

On the Feasibility of Training Neural Networks with Visibly Watermarked Dataset

Sanghyun Hong, Tae-hoon Kim, Tudor Dumitras and Jonghyun Choi

Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy

Duc Cuong Nguyen, Erik Derr, Michael Backes and Sven Bugiel

Membership Inference Against DNA Methylation Databases: Attacks and Defenses

Inken Hagestedt, Mathias Humbert, Pascal Berrang, Irina Lehmann, Roland Eils, Michael Backes and Yang Zhang

Tagvisor: A Privacy Advisor for Sharing Hashtags

Yang Zhang, Mathias Humbert, Tahleen Rahman, Cheng-Te Li, Jun Pang and Michael Backes

Analysis of Reused Private Keys in the Code Signing PKI

Doowon Kim, S. Gokberk Karaca and Tudor Dumitras

Privacy-Preserving Similar Patient Queries for Combined Biomedical Data

Ahmed Salem, Pascal Berrang, Mathias Humbert and Michael Backes

Take it with a pinch of harmless—studying the robustness of static malware classifiers in the presence of benign code

David Pfaff and Michael Backes

Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement

Mariam Nouh, Jason R.C. Nurse, Helena Webb and Michael Goldsmith

Large-Scale and Language-Oblivious Code Authorship Identification

Mohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen and DaeHun Nyang

TGX: Secure SGX enclave management using TPM

Dhiman Chakraborty, Atul Anand Jha and Sven Bugiel

Examining Adversarial Learning against Graph-based IoT Malware Detection Systems

Ahmed Abusnaina, Aminollah Khormali, Hisham Alasmary, Jeman Park, Afsah Anwar, Ulku Meteriz and Aziz Mohaisen

Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table

Rhongho Jang, Seongkwang Moon, Youngtae Noh, Aziz Mohaisen and Daehun Nyang

Analyzing Endpoints in the Internet of Things Malware

Jinchun Choi, Afsah Anwar, Hisham Alasmary, Jeffrey Spaulding, DaeHun Nyang and Aziz Mohaisen

Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network

Muhammad Saad, Victor Cook, Lan Nguyen, My T. Thai and Aziz Mohaisen

Forgetting the Forgotten, Concealing Content Deletion from Persistent Observers

M. Minaei, M. Mondal, P. Loiseau, K. Gummadi and A. Kate

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang and Aziz Mohaisen

SIMD: A SDN-based IP and MAC Dynamic Method against Reconnaissance

Pengchao Wang, Fucai Chen, Guozhen Cheng and Liren Miao

Analyzing Semantic Correctness of Security-critical Algorithm Implementations with Symbolic Execution

Sze Yiu Chau

Blacklists Assemble – Aggregating Blacklists for Accuracy

Sivaramakrishnan Ramanthan, Jelena Mirkovic and Minlan Yu

FLUSH+RELOAD Cache Side-Channel Attack on Mail User Agent

Hodong Kim, Hyundo Yoon, Hyundo Yoon and Junbeom Hur

LEADER (Low-Rate Denial-of-Service Attacks Defense)

Rajat Tandon, Haoda Wang, Nicolaas Weideman, Christophe Hauser and Jelena Mirkovic

Securing Operating System Audit Logs

Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher Fletcher and Andrew Miller

Physical Layer Key Generation Protocol for Secure V2X Communication Architecture

Kelvin Phan, Arnav Malawade, Anthony Lopez, Anomadarshi Barua, Preston Rogers, Ken Tran and Mohammad Al Faruque

EchoAuth: Gait-based Smart Home Intrusion Detection through Acoustic Sensing

Changlai Du and Xu Yuan

A Large Scale Investigation of Obfuscation Use in Google Play

Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor and Sascha
Fahl

Project Leine – A Virtualized Study Infrastructure

Dominik Wermke, Nicolas Huaman, Christian Stransky, Yasemin Acar and Sascha Fahl

Towards Plausible Graph Anonymization

Yang Zhang, Mathias Humbert, Bartlomiej Surma, Praveen Manoharan, Jilles Vreeken and Jilles Vreeken