NDSS 2023 Accepted Papers

Note: The schedule of sessions and papers presented is now available.

Summer Cycle

Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation
Xiang Li and Baojun Liu (Tsinghua University); Xuesong Bai (University of California, Irvine); Mingming Zhang (Tsinghua University); Qifan Zhang and Zhou Li (University of California, Irvine); Haixin Duan (Tsinghua University; QI-ANXIN Technology Research Institute; Zhongguancun Laboratory); Qi Li (Tsinghua University; Zhongguancun Laboratory)

MyTEE: Own the Trusted Execution Environment on Embedded Devices
Seungkyun Han and Jinsoo Jang (Chungnam National University)

Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels
Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, and Yaozhong Liu (Tsinghua University)

Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations
Paul Fiterau-Brostean and Bengt Jonsson (Uppsala University, Sweden); Konstantinos Sagonas (Uppsala University, Sweden and National Technical University of Athens, Greece); Fredrik Tåquist (Uppsala University, Sweden)

The “Beatrix” Resurrections: Robust Backdoor Detection via Gram Matrices
Wanlun Ma (Swinburne University of Technology); Derui Wang (CSIRO‚ Data61); Ruoxi Sun (The University of Adelaide & CSIRO’s Data61); Minhui Xue (CSIRO’s Data61); Sheng Wen (Swinburne University of Technology); Yang Xiang (Digital Research & Innovation Capability Platform, Swinburne University of Technology)

Evasion Attacks and Defenses on Smart Home Physical Event Verification
Muslum Ozgur Ozmen, Ruoyu Song, Habiba Farrukh, and Z. Berkay Celik (Purdue University)

QUICforge: Client-side Request Forgery in QUIC
Yuri Gbur and Florian Tschorsch (Technische Universität Berlin)

VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests
Scott Jordan, Yoshimichi Nakatsuka, and Ercan Ozturk (University of California, Irvine); Andrew Paverd (Microsoft Research); Gene Tsudik (University of California, Irvine)

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis
Chuanpu Fu, Qi Li, and Ke Xu (Tsinghua University)

ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems
Tony Nasr (Concordia University); Sadegh Torabi (George Mason University); Elias Bou-Harb (University of Texas at San Antonio); Claude Fachkha (University of Dubai); Chadi Assi (Concordia University)

Machine Unlearning of Features and Labels
Alexander Warnecke and Lukas Pirch (TU Braunschweig); Christian Wressnegger (Karlsruhe Institute of Technology (KIT)); Konrad Rieck (TU Braunschweig)

Trellis: Robust and Scalable Metadata-private Anonymous Broadcast
Simon Langowski, Sacha Servan-Schreiber, and Srinivas Devadas (Massachusetts Institute of Technology)

A Robust Counting Sketch for Data Plane Intrusion Detection
Sian Kim and Changhun Jung (Ewha Womans University); RhongHo Jang (Wayne State University); David Mohaisen (University of Central Florida); DaeHun Nyang (Ewha Womans University)

Browser Permission Mechanisms Demystified
Kazuki Nomoto (Waseda University); Takuya Watanabe, Eitaro Shioji, and Mitsuaki Akiyama (NTT Social Informatics Laboratories); Tatsuya Mori (Waseda University/NICT/RIKEN AIP)

Securing Federated Sensitive Topic Classification against Poisoning Attacks
Tianyue Chu and Alvaro Garcia-Recuero (IMDEA Networks Institute); Costas Iordanou (Cyprus University of Technology); Georgios Smaragdakis (TU Delft); Nikolaos Laoutaris (IMDEA Networks Institute)

POSE: Practical Off-chain Smart Contract Execution
Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, and Ahmad-Reza Sadeghi (Technical University of Darmstadt)

Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing
Mohit Kumar Jangid (The Ohio State University); Yue Zhang (Computer Science & Engineering, Ohio State University); Zhiqiang Lin (The Ohio State University)

BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats
Jared Chandler (Tufts University); Adam Wick (Fastly); Kathleen Fisher (DARPA)

DARWIN: Survival of the Fittest Fuzzing Mutators
Patrick Jauernig (Technical University of Darmstadt); Domagoj Jakobovic (University of Zagreb, Croatia); Stjepan Picek (Radboud University and TU Delft); Emmanuel Stapf and Ahmad-Reza Sadeghi (Technical University of Darmstadt)

RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression
Jung-Woo Chang and Mojan Javaheripi (University of California San Diego); Seira Hidano (KDDI Research, Inc.); Farinaz Koushanfar (University of California San Diego)

PPA: Preference Profiling Attack Against Federated Learning
Chunyi Zhou, Yansong Gao, and Anmin Fu (Nanjing University of Science and Technology); Kai Chen (Chinese Academy of Science); Zhiyang Dai (Nanjing University of Science and Technology); Zhi Zhang and Minhui Xue (CSIRO’s Data61); Yuqing Zhang (University of Chinese Academy of Science)

Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers
Mark Huasong Meng (National University of Singapore); Qing Zhang, Guangshuai Xia, and Yuwei Zheng (ByteDance); Yanjun Zhang and Guangdong Bai (The University of Queensland); Zhi Liu (ByteDance); Sin G. Teo (Agency for Science, Technology and Research); Jin Song Dong (National University of Singapore)

Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
Theodor Schnitzler (Research Center Trustworthy Data Science and Security, TU Dortmund, and Ruhr-Universität Bochum); Katharina Kohls (Radboud University); Evangelos Bitsikas (Northeastern University and New York University Abu Dhabi); Christina Pöpper (New York University Abu Dhabi)

AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms
Hossein Fereidooni (Technical University of Darmstadt); Jan Koenig (University of Wuerzburg); Phillip Rieger and Marco Chilese (Technical University of Darmstadt); Bora Goekbakan (KOBIL, Germany); Moritz Finke and Alexandra Dmitrienko (University of Wuerzburg); Ahmad-Reza Sadeghi (Technical University of Darmstadt)

Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection
Florian Kerschbaum (University of Waterloo); Erik-Oliver Blass (Airbus); Rasoul Akhavan Mahdavi (University of Waterloo)

Fusion: Efficient and Secure Inference Resilient to Malicious Servers
Caiqin Dong, Jian Weng, Jia-Nan Liu, and Yue Zhang (Jinan University); Yao Tong (Guangzhou Fongwell Data Limited Company); Anjia Yang, Yudan Cheng, and Shun Hu (Jinan University)

Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs
Runhao Li, Bin Zhang, Jiongyi Chen, Wenfeng Lin, Chao Feng, and Chaojing Tang (National University of Defense Technology)

On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies
Piyush Kumar Sharma (imec-COSIC, KU Leuven); Devashish Gosain (Max Planck Institute for Informatics); Claudia Diaz (Nym Technologies, SA and imec-COSIC, KU Leuven)

Brokenwire: Wireless Disruption of CCS Electric Vehicle Charging
Sebastian Köhler and Richard Baker (University of Oxford); Martin Strohmeier (armasuisse Science + Technology); Ivan Martinovic (University of Oxford)

Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning
Christoph Sendner (University of Wuerzburg); Huili Chen (University of California San Diego); Hossein Fereidooni (Technische Universität Darmstadt); Lukas Petzi, Jan König, Jasper Stang, and Alexandra Dmitrienko (University of Wuerzburg); Ahmad-Reza Sadeghi (Technical University of Darmstadt); Farinaz Koushanfar (University of California San Diego)

Let Me Unwind That For You: Exceptions to Backward-Edge Protection
Victor Duta (Vrije Universiteit Amsterdam); Fabian Freyer (unaffiliated); Fabio Pagani (UC Santa Barbara); Marius Muench and Cristiano Giuffrida (Vrije Universiteit Amsterdam)

Efficient Dynamic Proof of Retrievability for Cold Storage
Tung Le (Virginia Tech); Pengzhi Huang (Cornell University); Attila A. Yavuz (University of South Florida); Elaine Shi (CMU); Thang Hoang (Virginia Tech)

A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites
Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Saarland University); Michael Backes and Sven Bugiel (CISPA Helmholtz Center for Information Security)

An OS-agnostic Approach to Memory Forensics
Andrea Oliveri (EURECOM); Matteo Dell’Amico (University of Genoa); Davide Balzarotti (EURECOM)

Private Certifier Intersection
Bishakh Chandra Ghosh (Indian Institute of Technology Kharagpur); Sikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, and Krishnasuri Narayanam (IBM Research – India); Sandip Chakraborty (Indian Institute of Technology Kharagpur)

Tactics, Threats & Targets: Modeling Disinformation and its Mitigation
Shujaat Mirza (New York University); Labeeba Begum (New York University Abu Dhabi); Liang Niu (New York University); Sarah Pardo and Azza Abouzied (New York University Abu Dhabi); Paolo Papotti (EURECOM); Christina Pöpper (New York University Abu Dhabi)

Fall Cycle

RR: A Fault Model for Efficient TEE Replication
Baltasar Dinis (IST (ULisboa) / INESC-ID / MPI-SWS); Rodrigo Rodrigues (IST (ULisboa) / INESC-ID); Peter Druschel (MPI-SWS)

How to Count Bots in Longitudinal Datasets of IP Addresses
Leon Böck (Technische Universität Darmstadt); Dave Levin (University of Maryland); Ramakrishna Padmanabhan (Amazon); Christian Doerr (Hasso Plattner Institute); Max Mühlhäuser (Technical University of Darmstadt)

Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks
Chongqing Lei and Zhen Ling (Southeast University); Yue Zhang (Jinan University); Kai Dong, Kaizheng Liu, and Junzhou Luo (Southeast University); Xinwen Fu (University of Massachusetts Lowell)

Cryptographic Oracle-based Conditional Payments
Varun Madathil (NCSU); Sri Aravinda Krishnan Thyagarajan (Carnegie Mellon University); Dimitrios Vasilopoulos (IMDEA Software Institute); Lloyd Fournier (None); Giulio Malavolta (Max Planck Institute for Security and Privacy); Pedro Moreno-Sanchez (IMDEA Software Institute)

REDsec: Running Encrypted Discretized Neural Networks in Seconds
Lars Wolfgang Folkerts, Charles Gouert, and Nektarios Georgios Tsoutsos (University of Delaware)

Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors
Mir Masood Ali (University of Illinois at Chicago); Binoy Chitale (Stony Brook University); Mohammad Ghasemisharif and Chris Kanich (University of Illinois at Chicago); Nick Nikiforakis (Stony Brook University); Jason Polakis (University of Illinois at Chicago)

StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors
Ke Sun, Chunyu Xia, Songlin Xu, and Xinyu Zhang (University of California San Diego)

LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols
Fuchen Ma, Yuanliang Chen, Meng Ren, Yuanhang Zhou, and Yu Jiang (Tsinghua University); Ting Chen (University of Electronic Science and Technology of China); Huizhong Li (WeBank); Jiaguang Sun (School of Software, Tsinghua University)

Access Your Tesla without Your Awareness: Compromising Keyless Entry System of Model 3
Xinyi Xie, Kun Jiang, Rui Dai, Jun Lu, and Lihui Wang (Shanghai Fudan Microelectronics Group Co., Ltd.); Qing Li and Jun Yu (State Key Laboratory of ASIC & System, Fudan University)

Accountable Javascript Code Delivery
Ilkan Esiyok and Robert Künnemann (CISPA Helmholtz Center for Information Security); Pascal Berrang (University of Birmingham & Nimiq); Katriel Cohn-Gordon (Independent Scholar)

I Still Know What You Watched Last Sunday: Security and Privacy of the HbbTV Protocol in the European Smart TV Landscape
Carlotta Tagliaro (TU Wien); Florian Hahn (University of Twente); Riccardo Sepe (Guess Europe Sagl); Alessio Aceti (Sababa Security SpA); Martina Lindorfer (TU Wien)

OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables
Yanzuo Chen, Yuanyuan Yuan, and Shuai Wang (The Hong Kong University of Science and Technology)

Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof
Jinseob Jeong, Dongkwan Kim, Joonha Jang, Juhwan Noh, Changhun Song, and Yongdae Kim (KAIST)

Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software
Hugo Lefeuvre (The University of Manchester); Vlad-Andrei Bădoiu (University Politehnica of Bucharest); Yi Chen (Rice University); Felipe Huici (Unikraft.io); Nathan Dautenhahn (Rice University); Pierre Olivier (The University of Manchester)

ProbFlow: Using Probabilistic Programming in Anonymous Communication Networks
Hussein Darir, Geir Dullerud, and Nikita Borisov (University of Illinois at Urbana-Champaign)

ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning
Kostas Drakonakis (FORTH); Sotiris Ioannidis (Technical University of Crete); Jason Polakis (University of Illinois at Chicago)

DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing
Seongil Wi (KAIST); Trung Tin Nguyen (CISPA Helmholtz Center for Information Security, Saarland University); Jihwan Kim (KAIST); Ben Stock (CISPA Helmholtz Center for Information Security); Sooel Son (KAIST)

Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems
Akul Goyal (University of Illinois at Urbana-Champaign); Xueyuan Han (Wake Forest University); Adam Bates and Gang Wang (University of Illinois at Urbana-Champaign)

Drone Security and the Mysterious Case of DJI’s DroneID
Nico Schiller (Ruhr-Universität Bochum); Merlin Chlosta (CISPA Helmholtz Center for Information Security); Moritz Schloegel (Ruhr-Universität Bochum); Nils Bars and Thorsten Eisenhofer (Ruhr University Bochum); Tobias Scharnowski (Ruhr-University Bochum); Felix Domke (Independent); Lea Schönherrr and Thorsten Holz (CISPA Helmholtz Center for Information Security)

BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects
Xiao Yi, Yuzhou Fang, and Daoyuan Wu (The Chinese University of Hong Kong); Lingxiao Jiang (Singapore Management University)

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Hadi Abdullah, Aditya Karlekar, Saurabh Prasad, Muhammad Sajidur Rahman, Logan Blue, Luke A. Bauer, Vincent Bindschaedler, and Patrick Traynor (University of Florida)

EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems
Marc Roeschlin, Giovanni Camurati, and Pascal Brunner (ETH Zurich, Switzerland); Mridula Singh (CISPA Helmholtz Center for Information Security); Srdjan Capkun (ETH Zurich, Switzerland)

Backdoor Attacks Against Dataset Distillation
Yugeng Liu, Zheng Li, and Michael Backes (CISPA Helmholtz Center for Information Security); Yun Shen (Netapp); Yang Zhang (CISPA Helmholtz Center for Information Security)

Fine-Grained Trackability in Protocol Executions
Ksenia Budykho, Ioana Boureanu, Steve Wesemeyer, and Fortunat Rajaona (Surrey Centre for Cyber Security, University of Surrey, UK); Daniel Romero and Matt Lewis (NCC Group); Yogaratnam Rahulan (5G Innovation Centre – 5GIC, University of Surrey, UK); Steve Schneider (Surrey Centre for Cyber Security, University of Surrey, UK)

FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities
Samuel Groß (Google); Simon Koch (Institute for Application Security (TU-Braunschweig)); Lukas Bernhard (Ruhr-University Bochum); Thorsten Holz (CISPA Helmholtz Center for Information Security); Martin Johns (Institute for Application Security (TU-Braunschweig))

Folk Models of Misinformation on Social Media
Filipo Sharevski, Amy Devine, Emma Pieroni, and Peter Jachim (DePaul University)

SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response
Huadi Zhu, Mingyan Xiao, Demoria Sherman, and Ming Li (The University of Texas at Arlington)

Securing Chromium-Based Desktop Applications by Preventing DOM-Tree Gain-of-Function Mutations
Zihao Jin (Microsoft Research Asia and Tsinghua University); Shuo Chen and Yang Chen (Microsoft Research); Haixin Duan, Jianjun Chen, and Jianping Wu (Tsinghua University)

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning
Shuo Wang, Mahathir Almashor, and Alsharif Abuadbba (CSIRO’s Data61 & Cybersecurity CRC, Australia); Ruoxi Sun, Minhui Xue, and Calvin Wang (CSIRO’s Data61); Raj Gaire, Seyit Camtepe, and Surya Nepal (CSIRO’s Data61 & Cybersecurity CRC, Australia)

Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks
Andrea Di Dio, Koen Koning, Herbert Bos, and Cristiano Giuffrida (Vrije Universiteit Amsterdam)

MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags
Xingyu Chen and Zhengxiong Li (University of Colorado Denver); Baicheng Chen (University of California San Diego); Yi Zhu (SUNY at Buffalo); Chris Xiaoxuan Lu (University of Edinburgh); Zhengyu Peng (Aptiv); Feng Lin (Zhejiang University); Wenyao Xu (SUNY Buffalo); Kui Ren (Zhejiang University); Chunming Qiao (SUNY at Buffalo)

Breaking And Fixing UTXO-Based Virtual Channels
Lukas Aumayr (TU Wien); Pedro Moreno-Sanchez (IMDEA Software Institute); Aniket Kate (Purdue University); Matteo Maffei (TU Wien)

Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites
Shujiang Wu (Johns Hopkins University); Pengfei Sun and Yao Zhao (F5, Inc.); Yinzhi Cao (Johns Hopkins University)

VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
Zhenhao Luo (College of Computer, National University of Defense Technology); Pengfei Wang and Baosheng Wang (National University of Defense Technology); Yong Tang (College of Computer, National University of Defense Technology); Xu Zhou (National University of Defense Techonology); Wei Xie (College of Computer, National University of Defense Technology); Danjun Liu (National University of Defense Techonology); Kai Lu (National University of Defense Technology)

Preventing SIM Box Fraud Using Device Fingerprinting
BeomSeok Oh, Junho Ahn, Sangwook Bae, Mincheol Son, Yonghwa Lee, Min Suk Kang, and Yongdae Kim (KAIST)

OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption
Zhiqiang Wu (Changsha University of Science and Technology); Rui Li (Dongguan University of Technology)

Thwarting Smartphone SMS Attacks at the Radio Interface Layer
Wen (Ohio State University); Phil Porras and Vinod Yegneswaran (SRI International); Zhiqiang Lin (Ohio State University)

REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service
Wenjie Qu (Huazhong University of Science and Technology); Jinyuan Jia (University of Illinois Urbana-Champaign); Neil Zhenqiang Gong (Duke University)

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise
Peng Huang, Yao Wei, Zhongjie Ba, Peng Cheng, Li Lu, Feng Lin, Fan Zhang, and Kui Ren (Zhejiang University)

Partitioning Ethereum without Eclipsing It
Hwanjo Heo and Seungwon Woo (ETRI); Tae Ung Yoon (Yonsei University); Min Suk Kang and Seungwon Shin (KAIST)

BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems
Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, and Xingang Shi (Institute for Network Sciences and Cyberspace, Tsinghua University); Xia Yin (Department of Computer Science and Technology, Tsinghua University)

Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging
Harjasleen Malvai (UIUC/IC3); Lefteris Kokoris-Kogias (IST Austria); Alberto Sonnino (Mysten Labs); Esha Ghosh (Microsoft Research); Ercan Oztürk, Kevin Lewi, and Sean Lawlor (Meta)

Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams
Xigao Li, Anurag Yepuri, and Nick Nikiforakis (Stony Brook University)

CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph
Faysal Hossain Shezan and Zihao Su (University of Virginia); Mingqing Kang (Johns Hopkins University); Nicholas Phair and Patrick William Thomas (University of Virginia); Michelangelo van Dam (in2it); Yinzhi Cao (Johns Hopkins University); Yuan Tian (UCLA)

Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels
Joonha Jang, ManGi Cho, Jaehoon Kim, Dongkwan Kim, and Yongdae Kim (KAIST)

SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications           
An Chen (University of Georgia); Jiho Lee (University of Virginia); Basanta Chaulagain (University of Georgia); Yonghwi Kwon (University of Virginia); Kyu Hyung Lee (University of Georgia)

No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions
Alexander Bulekov (Boston University); Bandan Das and Stefan Hajnoczi (Red Hat); Manuel Egele (Boston University)

Privacy-Preserving Database Fingerprinting
Tianxi Ji (Texas Tech University); Erman Ayday (Case Western Reserve University); Emre Yilmaz (University of Houston-Downtown); Ming Li (CSE Department The University of Texas at Arlington); Pan Li (Case Western Reserve University)

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
Tianyang Chen and Peng Xu (Huazhong University of Science and Technology); Stjepan Picek (Radboud University); Bo Luo (The University of Kansas); Willy Susilo (University of Wollongong); Hai Jin (Huazhong University of Science and Technology); Kaitai Liang (TU Delft)

He-HTLC: Revisiting Incentives in HTLC
Sarisht Wadhwa and Jannis Stoeter (Duke University); Fan Zhang (Duke University, Yale University); Kartik Nayak (Duke University)

Real Threshold ECDSA
Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, and Sherman S. M. Chow (The Chinese University of Hong Kong)

Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation
Dongqi Han, Zhiliang Wang, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, and Han Zhang (Tsinghua University); Zhihua Wang and Minghui Jin (State Grid Shanghai Municipal Electric Power Company); Jiahai Yang, Xingang Shi, and Xia Yin (Tsinghua University)

OptRand: Optimistically Responsive Reconfigurable Distributed Randomness
Adithya Bhat (Purdue University); Nibesh Shrestha (Rochester Institute of Technology); Aniket Kate (Purdue University); Kartik Nayak (Duke University)

Focusing on Pinocchio’s Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes
Jiayun Fu and Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu, and Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)

Adversarial Robustness for Tabular Data through Cost and Utility Awareness
Klim Kireev, Bogdan Kulynych, and Carmela Troncoso (EPFL)

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Zhang, and Qiuling Xu (Purdue University); Shiqing Ma (Rutgers University); Xiangyu Zhang (Purdue University)

HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity
Chongzhou Fang and Najmeh Nazari (University of California, Davis); Behnam Omidi (George Mason University); Han Wang (University of California, Davis); Aditya Puri (Foothill High School, Pleasanton, CA); Manish Arora (LearnDesk); Setareh Rafatirad (University of California, Davis); Houman Homayoun (UC Davis); Khaled N. Khasawneh (George Mason University)

RAI2: Responsible Identity Audit Governing the Artificial Intelligence
Tian Dong, Shaofeng Li, and Guoxing Chen (Shanghai Jiao Tong University); Minhui Xue (CSIRO’s Data61); Haojin Zhu and Zhen Liu (Shanghai Jiao Tong University)