NDSS Symposium 2021 Accepted Papers

Summer Cycle

All the Numbers are US: Large-scale Abuse of...

Christoph Hagen (University of Würzburg), Christian Weinert (TU Darmstadt), Christoph Sendner (University of Würzburg),...

More Details

As Strong As Its Weakest Link: How to...

Kai Li (Syracuse University), Jiaqi Chen (Syracuse University), Xianghong Liu (Syracuse University), Yuzhe Tang...

More Details

Awakening the Web's Sleeper Agents: Misusing Service Workers...

Soroush Karami (University of Illinois at Chicago), Panagiotis Ilia (University of Illinois at Chicago),...

More Details

Bringing Balance to the Force: Dynamic Analysis of...

Abdallah Dawoud (CISPA Helmholtz Center for Information Security), Sven Bugiel (CISPA Helmholtz Center for...

More Details

C^2SR: Cybercrime Scene Reconstruction for Post-mortem Forensic Analysis

Yonghwi Kwon (University of Virginia), Weihang Wang (University at Buffalo, SUNY), Jinho Jung (Georgia...

More Details

Deceptive Deletions for Protecting Withdrawn Posts on Social...

Mohsen Minaei (Visa Research), S Chandra Mouli (Purdue University), Mainack Mondal (IIT Kharagpur), Bruno...

More Details

DOVE: A Data-Oblivious Virtual Environment

Hyun Bin Lee (University of Illinois at Urbana-Champaign), Tushar M. Jois (Johns Hopkins University),...

More Details

Evading Voltage-Based Intrusion Detection on Automotive CAN

Rohit Bhatia (Purdue University), Vireshwar Kumar (Indian Institute of Technology Delhi), Khaled Serag (Purdue...

More Details

Flexsealing BGP Against Route Leaks: Peerlock Active Measurement...

Tyler McDaniel (University of Tennessee, Knoxville), Jared M. Smith (University of Tennessee, Knoxville), Max...

More Details

Forward and Backward Private Conjunctive Searchable Symmetric Encryption

Sikhar Patranabis (ETH Zurich), Debdeep Mukhopadhyay (IIT Kharagpur)

More Details

From WHOIS to WHOWAS: A Large-Scale Measurement Study...

Chaoyi Lu (Tsinghua University; Beijing National Research Center for Information Science and Technology), Baojun...

More Details

Hey Alexa, is this Skill Safe?: Taking a...

Christopher Lentzsch (Ruhr-Universität Bochum), Sheel Jayesh Shah (North Carolina State University), Benjamin Andow (Google),...

More Details

Let’s Stride Blindfolded in a Forest: Sublinear Multi-Client...

Jack P. K. Ma (The Chinese University of Hong Kong), Raymond K. H. Tai...

More Details

More than a Fair Share: Network Data Remanence...

Leila Rashidi (University of Calgary), Daniel Kostecki (Northeastern University), Alexander James (University of Calgary),...

More Details

Obfuscated Access and Search Patterns in Searchable Encryption

Zhiwei Shang (University of Waterloo), Simon Oya (University of Waterloo), Andreas Peter (University of...

More Details

POP and PUSH: Demystifying and Defending against (Mach)...

Min Zheng (Orion Security Lab, Alibaba Group), Xiaolong Bai (Orion Security Lab, Alibaba Group),...

More Details

Processing Dangerous Paths – On Security and Privacy...

Jens Müller (Ruhr University Bochum), Dominik Noss (Ruhr University Bochum), Christian Mainka (Ruhr University...

More Details

Reining in the Web's Inconsistencies with Site Policy

Stefano Calzavara (Università Ca' Foscari Venezia), Tobias Urban (Institute for Internet Security and Ruhr...

More Details

Rosita: Towards Automatic Elimination of Power-Analysis Leakage in...

Madura A. Shelton (University of Adelaide), Niels Samwel (Radboud University), Lejla Batina (Radboud University),...

More Details

Screen Gleaning: A Screen Reading TEMPEST Attack on...

Zhuoran Liu (Radboud university), Niels Samwel (Radboud University), Léo Weissbart (Radboud University), Zhengyu Zhao...

More Details

The Abuser Inside Apps: Finding the Culprit Committing...

Joongyum Kim (KAIST), Jung-hwan Park (KAIST), Sooel Son (KAIST)

More Details

Towards Measuring Supply Chain Attacks on Package Managers...

Ruian Duan (Georgia Institute of Technology), Omar Alrawi (Georgia Institute of Technology), Ranjita Pai...

More Details

XDA: Accurate, Robust Disassembly with Transfer Learning

Kexin Pei (Columbia University), Jonas Guan (University of Toronto), David Williams-King (Columbia University), Junfeng...

More Details

Zoom on the Keystrokes: Exploiting Video Calls for...

Mohd Sabra (University of Texas at San Antonio), Anindya Maiti (University of Oklahoma), Murtuza...

More Details

Fall Cycle

A Devil of a Time: How Vulnerable is...

Yarin Perry (The Hebrew University of Jerusalem), Neta Rozen-Schiff (The Hebrew University of Jerusalem),...

More Details

A Formal Analysis of the FIDO UAF Protocol

Haonan Feng (Beijing University of Posts and Telecommunications), Hui Li (Beijing University of Posts...

More Details

ALchemist: Fusing Application and Audit Logs for Precise...

Le Yu (Purdue University), Shiqing Ma (Rutgers University), Zhuo Zhang (Purdue University), Guanhong Tao...

More Details

BaseSpec: Comparative Analysis of Baseband Software and Cellular...

Eunsoo Kim (KAIST), Dongkwan Kim (KAIST), CheolJun Park (KAIST), Insu Yun (KAIST), Yongdae Kim...

More Details

Bitcontracts: Supporting Smart Contracts in Legacy Blockchains

Karl Wüst (ETH Zurich), Loris Diana (ETH Zurich), Kari Kostiainen (ETH Zurich), Ghassan Karame...

More Details

CHANCEL: Efficient Multi-client Isolation Under Adversarial Programs

Adil Ahmad (Purdue University), Juhee Kim (Seoul National University), Jaebaek Seo (Google), Insik Shin...

More Details

CV-Inspector: Towards Automating Detection of Adblock Circumvention

Hieu Le (University of California, Irvine), Athina Markopoulou (University of California, Irvine), Zubair Shafiq...

More Details

Data Poisoning Attacks to Deep Learning Based Recommender...

Hai Huang (Tsinghua University), Jiaming Mu (Tsinghua University), Neil Zhenqiang Gong (Duke University), Qi...

More Details

Detecting Kernel Memory Leaks in Specialized Modules with...

Navid Emamdoost (University of Minnesota), Qiushi Wu (University of Minnesota), Kangjie Lu (University of...

More Details

Differential Training: A Generic Framework to Reduce Label...

Jiayun Xu (Singapore Management University), Yingjiu Li (University of Oregon), Robert H. Deng (Singapore...

More Details

Does Every Second Count? Time-based Evolution of Malware...

Alexander Küchler (Fraunhofer AISEC), Alessandro Mantovani (EURECOM), Yufei Han (NortonLifeLock Research Group), Leyla Bilge...

More Details

EarArray: Defending against DolphinAttack via Acoustic Attenuation

Guoming Zhang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Xinfeng Li (Zhejiang University), Gang Qu...

More Details

Emilia: Catching Iago in Legacy Code

Rongzhen Cui (University of Toronto), Lianying Zhao (Carleton University), David Lie (University of Toronto)

More Details

FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled...

Junjie Liang (The Pennsylvania State University), Wenbo Guo (The Pennsylvania State University), Tongbo Luo...

More Details

Favocado: Fuzzing the Binding Code of JavaScript Engines...

Sung Ta Dinh (Arizona State University), Haehyun Cho (Arizona State University), Kyle Martin (North...

More Details

FlowLens: Enabling Efficient Flow Classification for ML-based Network...

Diogo Barradas (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa), Nuno Santos (INESC-ID, Instituto Superior...

More Details

FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping

Xiaoyu Cao (Duke University), Minghong Fang (The Ohio State University), Jia Liu (The Ohio...

More Details

From Library Portability to Para-rehosting: Natively Executing Microcontroller...

Wenqiang Li (State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy...

More Details

GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved...

Qiao Zhang (Old Dominion University), Chunsheng Xin (Old Dominion University), Hongyi Wu (Old Dominion...

More Details

HERA: Hotpatching of Embedded Real-time Applications

Christian Niesler (University of Duisburg-Essen), Sebastian Surminski (University of Duisburg-Essen), Lucas Davi (University of...

More Details

Hunting the Haunter — Efficient Relational Symbolic Execution...

Lesly-Ann Daniel (CEA, List, France), Sébastien Bardin (CEA, List, France), Tamara Rezk (Inria, France)

More Details

Improving Signal's Sealed Sender

Ian Martiny (University of Colorado Boulder), Gabriel Kaptchuk (Boston University), Adam Aviv (The George...

More Details

IoTSafe: Enforcing Safety and Security Policy with Real...

Wenbo Ding (Clemson University), Hongxin Hu (University at Buffalo), Long Cheng (Clemson University)

More Details

KUBO: Precise and Scalable Detection of User-triggerable Undefined...

Changming Liu (Northeastern University), Yaohui Chen (Facebook Inc.), Long Lu (Northeastern University)

More Details

LaKSA: A Probabilistic Proof-of-Stake Protocol

Daniel Reijsbergen (Singapore University of Technology and Design), Pawel Szalachowski (Singapore University of Technology...

More Details

Manipulating the Byzantine: Optimizing Model Poisoning Attacks and...

Virat Shejwalkar (UMass Amherst), Amir Houmansadr (UMass Amherst)

More Details

MINOS: A Lightweight Real-Time Cryptojacking Detection System

Faraz Naseem (Florida International University), Ahmet Aris (Florida International University), Leonardo Babun (Florida International...

More Details

Mondrian: Comprehensive Inter-domain Network Zoning Architecture

Jonghoon Kwon (ETH Zürich), Claude Hähni (ETH Zürich), Patrick Bamert (Zürcher Kantonalbank), Adrian Perrig...

More Details

NetPlier: Probabilistic Network Protocol Reverse Engineering from Message...

Yapeng Ye (Purdue University), Zhuo Zhang (Purdue University), Fei Wang (Purdue University), Xiangyu Zhang...

More Details

OblivSketch: Oblivious Network Measurement as a Cloud Service

Shangqi Lai (Monash University), Xingliang Yuan (Monash University), Joseph K. Liu (Monash University), Xun...

More Details

On the Insecurity of SMS One-Time Password Messages...

Zeyu Lei (Purdue University), Yuhong Nan (Purdue University), Yanick Fratantonio (Eurecom & Cisco Talos),...

More Details

PFirewall: Semantics-Aware Customizable Data Flow Control for Smart...

Haotian Chi (Temple University), Qiang Zeng (University of South Carolina), Xiaojiang Du (Temple University),...

More Details

PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles

Hyungsub Kim (Purdue University), Muslum Ozgur Ozmen (Purdue University), Antonio Bianchi (Purdue University), Z....

More Details

PhantomCache: Obfuscating Cache Conflicts with Localized Randomization

Qinhan Tan (Zhejiang University), Zhihua Zeng (Zhejiang University), Kai Bu (Zhejiang University), Kui Ren...

More Details

PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime...

Mitziu Echeverria (The University of Iowa), Zeeshan Ahmed (The University of Iowa), Bincheng Wang...

More Details

POSEIDON: Privacy-Preserving Federated Neural Network Learning

Sinem Sav (EPFL), Apostolos Pyrgelis (EPFL), Juan Ramón Troncoso-Pastoriza (EPFL), David Froelicher (EPFL), Jean-Philippe...

More Details

Practical Blind Membership Inference Attack via Differential Comparisons

Bo Hui (The Johns Hopkins University), Yuchen Yang (The Johns Hopkins University), Haolin Yuan...

More Details

Practical Non-Interactive Searchable Encryption with Forward and Backward...

Shi-Feng Sun (Monash University, Australia), Ron Steinfeld (Monash University, Australia), Shangqi Lai (Monash University,...

More Details

Preventing and Detecting State Inference Attacks on Android

Andrea Possemato (IDEMIA and EURECOM), Dario Nisi (EURECOM), Yanick Fratantonio (EURECOM and Cisco Talos)

More Details

PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile...

Sebastian Zimmeck (Wesleyan University), Rafael Goldstein (Wesleyan University), David Baraka (Wesleyan University)

More Details

QPEP: An Actionable Approach to Secure and Performant...

James Pavur (Oxford University), Martin Strohmeier (armasuisse), Vincent Lenders (armasuisse), Ivan Martinovic (Oxford University)

More Details

RandRunner: Distributed Randomness from Trapdoor VDFs with Strong...

Philipp Schindler (SBA Research), Aljosha Judmayer (SBA Research), Markus Hittmeir (SBA Research), Nicholas Stifter...

More Details

Refining Indirect Call Targets at the Binary Level

Sun Hyoung Kim (Penn State), Cong Sun (Xidian University), Dongrui Zeng (Penn State), Gang...

More Details

Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing

Jinghan Wang (University of California, Riverside), Chengyu Song (University of California, Riverside), Heng Yin...

More Details

ROV++: Improved Deployable Defense against BGP Hijacking

Reynaldo Morillo (University of Connecticut), Justin Furuness (University of Connecticut), Cameron Morris (University of...

More Details

SerialDetector: Principled and Practical Exploration of Object Injection...

Mikhail Shcherbakov (KTH Royal Institute of Technology), Musard Balliu (KTH Royal Institute of Technology)

More Details

Shadow Attacks: Hiding and Replacing Content in Signed...

Christian Mainka (Ruhr University Bochum), Vladislav Mladenov (Ruhr University Bochum), Simon Rohlmann (Ruhr University...

More Details

SODA: A Generic Online Detection Framework for Smart...

Ting Chen (University of Electronic Science and Technology of China), Rong Cao (University of...

More Details

SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets

Zhenxiao Qi (UC Riverside), Qian Feng (Baidu USA), Yueqiang Cheng (NIO Security Research), Mengjia...

More Details

SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms...

Charlie Hou (CMU, IC3), Mingxun Zhou (Peking University), Yan Ji (Cornell Tech, IC3), Phil...

More Details

SymQEMU: Compilation-based symbolic execution for binaries

Sebastian Poeplau (EURECOM and Code Intelligence), Aurélien Francillon (EURECOM)

More Details

Tales of Favicons and Caches: Persistent Tracking in...

Konstantinos Solomos (University of Illinois at Chicago), John Kristoff (University of Illinois at Chicago),...

More Details

TASE: Reducing Latency of Symbolic Execution with Transactional...

Adam Humphries (University of North Carolina), Kartik Cating-Subramanian (University of Colorado), Michael K. Reiter...

More Details

The Bluetooth CYBORG: Analysis of the Full Human-Machine...

Michael Troncoso (Naval Postgraduate School), Britta Hale (Naval Postgraduate School)

More Details

To Err.Is Human: Characterizing the Threat of Unintended...

Beliz Kaleli (Boston University), Brian Kondracki (Stony Brook University), Manuel Egele (Boston University), Nick...

More Details

Towards Understanding and Detecting Cyberbullying in Real-world Images

Nishant Vishwamitra (University at Buffalo), Hongxin Hu (University at Buffalo), Feng Luo (Clemson University),...

More Details

Trust the Crowd: Wireless Witnessing to Detect Attacks...

Kai Jansen (Ruhr University Bochum), Liang Niu (New York University), Nian Xue (New York...

More Details

UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for...

Runqing Yang (Zhejiang University), Shiqing Ma (Rutgers University), Haitao Xu (Arizona State University), Xiangyu...

More Details

Understanding and Detecting International Revenue Share Fraud

Merve Sahin (SAP Security Research), Aurélien Francillon (EURECOM)

More Details

Understanding the Growth and Security Considerations of ECS

Athanasios Kountouras (Georgia Institute of Technology), Panagiotis Kintis (Georgia Institute of Technology), Athanasios Avgetidis...

More Details

Understanding Worldwide Private Information Collection on Android

Yun Shen (NortonLifeLock Research Group), Pierre-Antoine Vervier (NortonLifeLock Research Group), Gianluca Stringhini (Boston University)

More Details

WATSON: Abstracting Behaviors from Audit Logs via Aggregation...

Jun Zeng (National University of Singapore), Zheng Leong Chua (Independent Researcher), Yinfang Chen (National...

More Details

Who's Hosting the Block Party? Studying Third-Party Blockage...

Marius Steffens (CISPA Helmholtz Center for Information Security), Marius Musch (TU Braunschweig), Martin Johns...

More Details

WINNIE : Fuzzing Windows Applications with Harness Synthesis...

Jinho Jung (Georgia Institute of Technology), Stephen Tong (Georgia Institute of Technology), Hong Hu...

More Details

Your Phone is My Proxy: Detecting and Understanding...

Xianghang Mi (University at Buffalo), Siyuan Tang (Indiana University Bloomington), Zhengyi Li (Indiana University...

More Details

Доверя́й, но проверя́й: SFI safety for native-compiled Wasm

Evan Johnson (University of California San Diego), David Thien (University of California San Diego),...

More Details