NDSS 2019 Posters
-
- SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
- TEXTBUGGER: Generating Adversarial Text Against Real-world Applications
- A Realizable Framework for Intrusion Detection in Additive Manufacturing Systems Using Analog Side-Channels
- Securing Distributed System Configuration through Optimization and Reasoning on Graphs
- Automated Evaluation of Fuzzers
- Collaborative Trustworthy Security and Privacy Framework for Social Media
- Security Analysis of Multi-Sensor Fusion based Localization in Autonomous Vehicles
- PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques Against Browser Phishing Blacklists
- A Privacy Risk Arising from Communication with TV: Consideration from Attribute Inference for Users
- On the Feasibility of Training Neural Networks with Visibly Watermarked Dataset
- Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy
- Membership Inference Against DNA Methylation Databases: Attacks and Defenses
- Tagvisor: A Privacy Advisor for Sharing Hashtags
- Analysis of Reused Private Keys in the Code Signing PKI
- Privacy-Preserving Similar Patient Queries for Combined Biomedical Data
- Take it with a pinch of harmless—studying the robustness of static malware classifiers in the presence of benign code
- Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement
- Large-Scale and Language-Oblivious Code Authorship Identification
- TGX: Secure SGX enclave management using TPM
- Examining Adversarial Learning against Graph-based IoT Malware Detection Systems
- Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table
- Analyzing Endpoints in the Internet of Things Malware
- Exploring Spatial, Temporal, and Logical Attacks on the Bitcoin Network
- Forgetting the Forgotten, Concealing Content Deletion from Persistent Observers
- Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach
- SIMD: A SDN-based IP and MAC Dynamic Method against Reconnaissance
- Analyzing Semantic Correctness of Security-critical Algorithm Implementations with Symbolic Execution
- Blacklists Assemble – Aggregating Blacklists for Accuracy
- FLUSH+RELOAD Cache Side-Channel Attack on Mail User Agent
- LEADER (Low-Rate Denial-of-Service Attacks Defense)
- Securing Operating System Audit Logs
- Physical Layer Key Generation Protocol for Secure V2X Communication Architecture
- EchoAuth: Gait-based Smart Home Intrusion Detection through Acoustic Sensing
- A Large Scale Investigation of Obfuscation Use in Google Play
- Project Leine – A Virtualized Study Infrastructure
- Towards Plausible Graph Anonymization