NDSS 2020 Posters
- Image-synch: a liveness detection method based on ambient image
- DEAN: A Blockchain-Inspired Consensus Protocol Enabling Trustworthy Edge Computing
- Practical Image Obfuscation with Provable Privacy
- Method for Effective Measurement, Labeling, and Classification of Botnet C2s for Predicting Attacks
- Model checking RNNs with modal μ-calculus
- Secure Logging Infrastructure Employing Heterogeneous Trusted Execution Environments
- MOAI: Multiple Origin ASes Identification for IP Prefix Hijacking and Mis-Origination
- Leveraging Locality of Reference for Certificate Revocation
- Oblivious k-Nearest Neighbors for Secure Map Applications
- Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
- Room-Scale Over-the-Air Audio Adversarial Examples
- Security of Deep Learning based Lane Keeping Assistance System under Physical-World Adversarial Attack
- Propose a defense method against Audio Adversarial Attack
- Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting
- DBB-DSE : Dynamic Backward-Bound Dynamic Symbolic Execution
- MicroFL: A Lightweight, Secure-by-Design Edge Network Fabric for Decentralized IoT Systems
- POSTER: MURS: Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
- A Machine Learning Model Performance Improvement Approach to Detection of Obfuscated JavaScript-based Attacks
- uRAI: Securing Embedded Systems with Return Address Integrity
- Automatic Detection and Prevention of Fake Key Attacks in Signal
- Towards an Architecture for Private Digital Authentication in the Physical World
- All Your Data Are Available to Us: A Need for Network Segmentation with IoT Devices
- Securing IoT services using DLTs and Verifiable Credentials
- Methodologies for Quantifying (Re-) Randomization Security and Timing under JIT-ROP
- Who’s Calling? Characterizing Robocalling Campaigns
- A Chaincode with Attribute-Based Encryption for Protecting Data in Ledgers
- SNIPPET Secure and Privacy-friendly Peer-to-Peer Electricity Trading
- Consortium Blockchain for the Assurance of Supply Chain Security
- Wireless Access Point Spoofing by Unmanned Aerial Vehicles (UAVs)
- PhotoLock: Autonomous Privacy-preserving Photo Sharing in Online Social Networks