NDSS Symposium 2023 Accepted Papers

Summer Cycle

A Robust Counting Sketch for Data Plane Intrusion...

Sian Kim (Ewha Womans University), Changhun Jung (Ewha Womans University), RhongHo Jang (Wayne State...

More Details

A Systematic Study of the Consistency of Two-Factor...

Sanam Ghorbani Lyastani (CISPA Helmholtz Center for Information Security, Saarland University), Michael Backes (CISPA...

More Details

An OS-agnostic Approach to Memory Forensics

Andrea Oliveri (EURECOM), Matteo Dell'Amico (University of Genoa), Davide Balzarotti (EURECOM)

More Details

AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using...

Hossein Fereidooni (Technical University of Darmstadt), Jan Koenig (University of Wuerzburg), Phillip Rieger (Technical...

More Details

Automata-Based Automated Detection of State Machine Bugs in...

Paul Fiterau-Brostean (Uppsala University, Sweden), Bengt Jonsson (Uppsala University, Sweden), Konstantinos Sagonas (Uppsala University,...

More Details

BinaryInferno: A Semantic-Driven Approach to Field Inference for...

Jared Chandler (Tufts University), Adam Wick (Fastly), Kathleen Fisher (DARPA)

More Details

Brokenwire : Wireless Disruption of CCS Electric Vehicle...

Sebastian Köhler (University of Oxford), Richard Baker (University of Oxford), Martin Strohmeier (armasuisse Science...

More Details

Browser Permission Mechanisms Demystified

Kazuki Nomoto (Waseda University), Takuya Watanabe (NTT Social Informatics Laboratories), Eitaro Shioji (NTT Social...

More Details

ChargePrint: A Framework for Internet-Scale Discovery and Security...

Tony Nasr (Concordia University), Sadegh Torabi (George Mason University), Elias Bou-Harb (University of Texas...

More Details

DARWIN: Survival of the Fittest Fuzzing Mutators

Patrick Jauernig (Technical University of Darmstadt), Domagoj Jakobovic (University of Zagreb, Croatia), Stjepan Picek...

More Details

Detecting Unknown Encrypted Malicious Traffic in Real Time...

Chuanpu Fu (Tsinghua University), Qi Li (Tsinghua University), Ke Xu (Tsinghua University)

More Details

Efficient Dynamic Proof of Retrievability for Cold Storage

Tung Le (Virginia Tech), Pengzhi Huang (Cornell University), Attila A. Yavuz (University of South...

More Details

Evasion Attacks and Defenses on Smart Home Physical...

Muslum Ozgur Ozmen (Purdue University), Ruoyu Song (Purdue University), Habiba Farrukh (Purdue University), Z....

More Details

Extrapolating Formal Analysis to Uncover Attacks in Bluetooth...

Mohit Kumar Jangid (The Ohio State University), Yue Zhang (Computer Science & Engineering, Ohio...

More Details

Faster Secure Comparisons with Offline Phase for Efficient...

Florian Kerschbaum (University of Waterloo), Erik-Oliver Blass (Airbus), Rasoul Akhavan Mahdavi (University of Waterloo)

More Details

Fusion: Efficient and Secure Inference Resilient to Malicious...

Caiqin Dong (Jinan University), Jian Weng (Jinan University), Jia-Nan Liu (Jinan University), Yue Zhang...

More Details

Ghost Domain Reloaded: Vulnerable Links in Domain Name...

Xiang Li (Tsinghua University), Baojun Liu (Tsinghua University), Xuesong Bai (University of California, Irvine),...

More Details

Hope of Delivery: Extracting User Locations From Mobile...

Theodor Schnitzler (Research Center Trustworthy Data Science and Security, TU Dortmund, and Ruhr-Universität Bochum),...

More Details

Let Me Unwind That For You: Exceptions to...

Victor Duta (Vrije Universiteit Amsterdam), Fabian Freyer (University of California San Diego), Fabio Pagani...

More Details

Machine Unlearning of Features and Labels

Alexander Warnecke (TU Braunschweig), Lukas Pirch (TU Braunschweig), Christian Wressnegger (Karlsruhe Institute of Technology...

More Details

MyTEE: Own the Trusted Execution Environment on Embedded...

Seungkyun Han (Chungnam National University), Jinsoo Jang (Chungnam National University)

More Details

On the Anonymity of Peer-To-Peer Network Anonymity Schemes...

Piyush Kumar Sharma (imec-COSIC, KU Leuven), Devashish Gosain (Max Planck Institute for Informatics), Claudia...

More Details

POSE: Practical Off-chain Smart Contract Execution

Tommaso Frassetto (Technical University of Darmstadt), Patrick Jauernig (Technical University of Darmstadt), David Koisser...

More Details

Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level...

Mark Huasong Meng (National University of Singapore), Qing Zhang (ByteDance), Guangshuai Xia (ByteDance), Yuwei...

More Details

PPA: Preference Profiling Attack Against Federated Learning

Chunyi Zhou (Nanjing University of Science and Technology), Yansong Gao (Nanjing University of Science...

More Details

Private Certifier Intersection

Bishakh Chandra Ghosh (Indian Institute of Technology Kharagpur), Sikhar Patranabis (IBM Research - India),...

More Details

QUICforge: Client-side Request Forgery in QUIC

Yuri Gbur (Technische Universität Berlin), Florian Tschorsch (Technische Universität Berlin)

More Details

RoVISQ: Reduction of Video Service Quality via Adversarial...

Jung-Woo Chang (University of California San Diego), Mojan Javaheripi (University of California San Diego),...

More Details

Securing Federated Sensitive Topic Classification against Poisoning Attacks

Tianyue Chu (IMDEA Networks Institute), Alvaro Garcia-Recuero (IMDEA Networks Institute), Costas Iordanou (Cyprus University...

More Details

Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with...

Christoph Sendner (University of Wuerzburg), Huili Chen (University of California San Diego), Hossein Fereidooni...

More Details

Tactics, Threats & Targets: Modeling Disinformation and its...

Shujaat Mirza (New York University), Labeeba Begum (New York University Abu Dhabi), Liang Niu...

More Details

The “Beatrix” Resurrections: Robust Backdoor Detection via Gram...

Wanlun Ma (Swinburne University of Technology), Derui Wang (CSIRO’s Data61), Ruoxi Sun (The University...

More Details

Towards Automatic and Precise Heap Layout Manipulation for...

Runhao Li (National University of Defense Technology), Bin Zhang (National University of Defense Technology),...

More Details

Trellis: Robust and Scalable Metadata-private Anonymous Broadcast

Simon Langowski (Massachusetts Institute of Technology), Sacha Servan-Schreiber (Massachusetts Institute of Technology), Srinivas Devadas...

More Details

VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests

Scott Jordan (University of California, Irvine), Yoshimichi Nakatsuka (University of California, Irvine), Ercan Ozturk...

More Details

Your Router is My Prober: Measuring IPv6 Networks...

Long Pan (Tsinghua University), Jiahai Yang (Tsinghua University), Lin He (Tsinghua University), Zhiliang Wang...

More Details

Fall Cycle

A Security Study about Electron Applications and a...

Zihao Jin (Microsoft Research and Tsinghua University), Shuo Chen (Microsoft Research), Yang Chen (Microsoft...

More Details

Access Your Tesla without Your Awareness: Compromising Keyless...

Xinyi Xie (Shanghai Fudan Microelectronics Group Co., Ltd.), Kun Jiang (Shanghai Fudan Microelectronics Group...

More Details

Accountable Javascript Code Delivery

Ilkan Esiyok (CISPA Helmholtz Center for Information Security), Pascal Berrang (University of Birmingham &...

More Details

Adversarial Robustness for Tabular Data through Cost and...

Klim Kireev (EPFL), Bogdan Kulynych (EPFL), Carmela Troncoso (EPFL)

More Details

Anomaly Detection in the Open World: Normality Shift...

Dongqi Han (Tsinghua University), Zhiliang Wang (Tsinghua University), Wenqi Chen (Tsinghua University), Kai Wang...

More Details

Assessing the Impact of Interface Vulnerabilities in Compartmentalized...

Hugo Lefeuvre (The University of Manchester), Vlad-Andrei Bădoiu (University Politehnica of Bucharest), Yi Chen...

More Details

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using...

Hadi Abdullah (Visa Research), Aditya Karlekar (University of Florida), Saurabh Prasad (University of Florida),...

More Details

Backdoor Attacks Against Dataset Distillation

Yugeng Liu (CISPA Helmholtz Center for Information Security), Zheng Li (CISPA Helmholtz Center for...

More Details

BARS: Local Robustness Certification for Deep Learning based...

Kai Wang (Tsinghua University), Zhiliang Wang (Tsinghua University), Dongqi Han (Tsinghua University), Wenqi Chen...

More Details

BEAGLE: Forensics of Deep Learning Backdoor Attack for...

Siyuan Cheng (Purdue University), Guanhong Tao (Purdue University), Yingqi Liu (Purdue University), Shengwei An...

More Details

BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked...

Xiao Yi (The Chinese University of Hong Kong), Yuzhou Fang (The Chinese University of...

More Details

Breaking and Fixing Virtual Channels: Domino Attack and...

Lukas Aumayr (TU Wien), Pedro Moreno-Sanchez (IMDEA Software Institute), Aniket Kate (Purdue University /...

More Details

CHKPLUG: Checking GDPR Compliance of WordPress Plugins via...

Faysal Hossain Shezan (University of Virginia), Zihao Su (University of Virginia), Mingqing Kang (Johns...

More Details

Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks

Andrea Di Dio (Vrije Universiteit Amsterdam), Koen Koning (Intel), Herbert Bos (Vrije Universiteit Amsterdam),...

More Details

Cryptographic Oracle-based Conditional Payments

Varun Madathil (North Carolina State University), Sri Aravinda Krishnan Thyagarajan (NTT Research), Dimitrios Vasilopoulos...

More Details

DiffCSP: Finding Browser Bugs in Content Security Policy...

Seongil Wi (KAIST), Trung Tin Nguyen (CISPA Helmholtz Center for Information Security, Saarland University),...

More Details

Do Not Give a Dog Bread Every Time...

Chongqing Lei (Southeast University), Zhen Ling (Southeast University), Yue Zhang (Jinan University), Kai Dong...

More Details

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph...

Shuo Wang (CSIRO's Data61 & Cybersecurity CRC, Australia), Mahathir Almashor (CSIRO's Data61 & Cybersecurity...

More Details

Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway...

Xigao Li (Stony Brook University), Anurag Yepuri (Stony Brook University), Nick Nikiforakis (Stony Brook...

More Details

Drone Security and the Mysterious Case of DJI's...

Nico Schiller (Ruhr-Universität Bochum), Merlin Chlosta (CISPA Helmholtz Center for Information Security), Moritz Schloegel...

More Details

EdgeTDC: On the Security of Time Difference of...

Marc Roeschlin (ETH Zurich, Switzerland), Giovanni Camurati (ETH Zurich, Switzerland), Pascal Brunner (ETH Zurich,...

More Details

Fine-Grained Trackability in Protocol Executions

Ksenia Budykho (Surrey Centre for Cyber Security, University of Surrey, UK), Ioana Boureanu (Surrey...

More Details

Focusing on Pinocchio's Nose: A Gradients Scrutinizer to...

Jiayun Fu (Huazhong University of Science and Technology), Xiaojing Ma (Huazhong University of Science...

More Details

Folk Models of Misinformation on Social Media

Filipo Sharevski (DePaul University), Amy Devine (DePaul University), Emma Pieroni (DePaul University), Peter Jachim...

More Details

FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities

Samuel Groß (Google), Simon Koch (TU Braunschweig), Lukas Bernhard (Ruhr-University Bochum), Thorsten Holz (CISPA...

More Details

He-HTLC: Revisiting Incentives in HTLC

Sarisht Wadhwa (Duke University), Jannis Stoeter (Duke University), Fan Zhang (Duke University, Yale University),...

More Details

HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought...

Chongzhou Fang (University of California, Davis), Najmeh Nazari (University of California, Davis), Behnam Omidi...

More Details

Him of Many Faces: Characterizing Billion-scale Adversarial and...

Shujiang Wu (Johns Hopkins University), Pengfei Sun (F5, Inc.), Yao Zhao (F5, Inc.), Yinzhi...

More Details

How to Count Bots in Longitudinal Datasets of...

Leon Böck (Technische Universität Darmstadt), Dave Levin (University of Maryland), Ramakrishna Padmanabhan (CAIDA), Christian...

More Details

I Still Know What You Watched Last Sunday:...

Carlotta Tagliaro (TU Wien), Florian Hahn (University of Twente), Riccardo Sepe (Guess Europe Sagl),...

More Details

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise

Peng Huang (Zhejiang University), Yao Wei (Zhejiang University), Peng Cheng (Zhejiang University), Zhongjie Ba...

More Details

LOKI: State-Aware Fuzzing Framework for the Implementation of...

Fuchen Ma (Tsinghua University), Yuanliang Chen (Tsinghua University), Meng Ren (Tsinghua University), Yuanhang Zhou...

More Details

MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags

Xingyu Chen (University of Colorado Denver), Zhengxiong Li (University of Colorado Denver), Baicheng Chen...

More Details

Navigating Murky Waters: Automated Browser Feature Testing for...

Mir Masood Ali (University of Illinois Chicago), Binoy Chitale (Stony Brook University), Mohammad Ghasemisharif...

More Details

No Grammar, No Problem: Towards Fuzzing the Linux...

Alexander Bulekov (Boston University), Bandan Das (Red Hat), Stefan Hajnoczi (Red Hat), Manuel Egele...

More Details

OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable...

Zhiqiang Wu (Changsha University of Science and Technology), Rui Li (Dongguan University of Technology)

More Details

OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables

Yanzuo Chen (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong...

More Details

OptRand: Optimistically Responsive Reconfigurable Distributed Randomness

Adithya Bhat (Purdue University), Nibesh Shrestha (Rochester Institute of Technology), Aniket Kate (Purdue University),...

More Details

Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging

Harjasleen Malvai (UIUC/IC3), Lefteris Kokoris-Kogias (IST Austria), Alberto Sonnino (Mysten Labs), Esha Ghosh (Microsoft...

More Details

Paralyzing Drones via EMI Signal Injection on Sensory...

Joonha Jang (KAIST), ManGi Cho (KAIST), Jaehoon Kim (KAIST), Dongkwan Kim (Samsung SDS), Yongdae...

More Details

Partitioning Ethereum without Eclipsing It

Hwanjo Heo (ETRI), Seungwon Woo (ETRI/KAIST), Taeung Yoon (KAIST), Min Suk Kang (KAIST), Seungwon...

More Details

Preventing SIM Box Fraud Using Device Model Fingerprinting

BeomSeok Oh (KAIST), Junho Ahn (KAIST), Sangwook Bae (KAIST), Mincheol Son (KAIST), Yonghwa Lee...

More Details

Privacy-Preserving Database Fingerprinting

Tianxi Ji (Texas Tech University), Erman Ayday (Case Western Reserve University), Emre Yilmaz (University...

More Details

ProbFlow : Using Probabilistic Programming in Anonymous Communication...

Hussein Darir (University of Illinois Urbana-Champaign), Geir Dullerud (University of Illinois Urbana-Champaign), Nikita Borisov...

More Details

RAI2: Responsible Identity Audit Governing the Artificial Intelligence

Tian Dong (Shanghai Jiao Tong University), Shaofeng Li (Shanghai Jiao Tong University), Guoxing Chen...

More Details

REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust...

Wenjie Qu (Huazhong University of Science and Technology), Jinyuan Jia (University of Illinois Urbana-Champaign),...

More Details

Real Threshold ECDSA

Harry W. H. Wong (The Chinese University of Hong Kong), Jack P. K. Ma...

More Details

REDsec: Running Encrypted Discretized Neural Networks in Seconds

Lars Wolfgang Folkerts (University of Delaware), Charles Gouert (University of Delaware), Nektarios Georgios Tsoutsos...

More Details

ReScan: A Middleware Framework for Realistic and Robust...

Kostas Drakonakis (FORTH), Sotiris Ioannidis (Technical University of Crete), Jason Polakis (University of Illinois...

More Details

RR: A Fault Model for Efficient TEE Replication

Baltasar Dinis (Instituto Superior Técnico (IST-ULisboa) / INESC-ID / MPI-SWS), Peter Druschel (MPI-SWS), Rodrigo...

More Details

Sometimes, You Aren’t What You Do: Mimicry Attacks...

Akul Goyal (University of Illinois at Urbana-Champaign), Xueyuan Han (Wake Forest University), Gang Wang...

More Details

SoundLock: A Novel User Authentication Scheme for VR...

Huadi Zhu (The University of Texas at Arlington), Mingyan Xiao (The University of Texas...

More Details

StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice...

Ke Sun (University of California San Diego), Chunyu Xia (University of California San Diego),...

More Details

SynthDB: Synthesizing Database via Program Analysis for Security...

An Chen (University of Georgia), Jiho Lee (University of Virginia), Basanta Chaulagain (University of...

More Details

The Power of Bamboo: On the Post-Compromise Security...

Tianyang Chen (Huazhong University of Science and Technology), Peng Xu (Huazhong University of Science...

More Details

Thwarting Smartphone SMS Attacks at the Radio Interface...

Haohuang Wen (Ohio State University), Phillip Porras (SRI International), Vinod Yegneswaran (SRI International), Zhiqiang...

More Details

Un-Rocking Drones: Foundations of Acoustic Injection Attacks and...

Jinseob Jeong (KAIST, Agency for Defense Development), Dongkwan Kim (Samsung SDS), Joonha Jang (KAIST),...

More Details

VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code...

Zhenhao Luo (College of Computer, National University of Defense Technology), Pengfei Wang (College of...

More Details