NDSS Symposium 2024 Accepted Papers

View the detailed program page to learn when each paper will be presented during the upcoming event.

Summer Cycle

Architecting Trigger-Action Platforms for Security, Performance and Functionality

Deepak Sirone Jegan (University of Wisconsin-Madison), Michael Swift (University of Wisconsin-Madison), Earlence Fernandes (University...

More Details

Attributions for ML-based ICS Anomaly Detection: From Theory...

Clement Fung (Carnegie Mellon University), Eric Zeng (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon...

More Details

Bernoulli Honeywords

Ke Coby Wang (Duke University), Michael K. Reiter (Duke University)

More Details

BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across...

Chuhan Wang (Tsinghua University), Yasuhiro Kuranaga (Tsinghua University), Yihang Wang (Tsinghua University), Mingming Zhang...

More Details

Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction...

Shu Wang (George Mason University), Kun Sun (George Mason University), Qi Li (Tsinghua University)

More Details

Compromising Industrial Processes using Web-Based Programmable Logic Controller...

Ryan Pickren (Georgia Institute of Technology), Tohid Shekari (Georgia Institute of Technology), Saman Zonouz...

More Details

Content Censorship in the InterPlanetary File System

Srivatsan Sridhar (Stanford University), Onur Ascigil (Lancaster University), Navin Keizer (University College London), François...

More Details

Crafter: Facial Feature Crafting against Inversion-based Identity Theft...

Shiming Wang (Shanghai Jiao Tong University), Zhe Ji (Shanghai Jiao Tong University), Liyao Xiang...

More Details

CrowdGuard: Federated Backdoor Detection in Federated Learning

Phillip Rieger (Technical University of Darmstadt), Torsten Krauß (University of Würzburg), Markus Miettinen (Technical...

More Details

Eavesdropping on Black-box Mobile Devices via Audio Amplifier's...

Huiling Chen (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China), Wenqiang...

More Details

Enhance Stealthiness and Transferability of Adversarial Attacks with...

Hui Xia (Ocean University of China), Rui Zhang (Ocean University of China), Zi Kang...

More Details

Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled...

Yuxiang Yang (Tsinghua University), Xuewei Feng (Tsinghua University), Qi Li (Tsinghua University), Kun Sun...

More Details

Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation

Jiameng Shi (University of Georgia), Wenqiang Li (Independent Researcher), Wenwen Wang (University of Georgia),...

More Details

File Hijacking Vulnerability: The Elephant in the Room

Chendong Yu (Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber...

More Details

Front-running Attack in Sharded Blockchains and Fair Cross-shard...

Jianting Zhang (Purdue University), Wuhui Chen (Sun Yat-sen University), Sifu Luo (Sun Yat-sen University),...

More Details

GhostType: The Limits of Using Contactless Electromagnetic Interference...

Qinhong Jiang (Zhejiang University), Yanze Ren (Zhejiang University), Yan Long (University of Michigan), Chen...

More Details

GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity

Qiushi Wu (University of Minnesota), Zhongshu Gu (IBM Research), Hani Jamjoom (IBM Research), Kangjie...

More Details

HEIR: A Unified Representation for Cross-Scheme Compilation of...

Song Bian (Beihang University), Zian Zhao (Beihang University), Zhou Zhang (Beihang University), Ran Mao...

More Details

IDA: Hybrid Attestation with Support for Interrupts and...

Fatemeh Arkannezhad (UCLA), Justin Feng (UCLA), Nader Sehatbakhsh (UCLA)

More Details

Inaudible Adversarial Perturbation: Manipulating the Recognition of User...

Xinfeng Li (Zhejiang University), Chen Yan (Zhejiang University), Xuancun Lu (Zhejiang University), Zihan Zeng...

More Details

LARMix: Latency-Aware Routing in Mix Networks

Mahdi Rahimi (KU Leuven), Piyush Kumar Sharma (KU Leuven), Claudia Diaz (KU Leuven)

More Details

LDR: Secure and Efficient Linux Driver Runtime for...

Huaiyu Yan (Southeast University), Zhen Ling (Southeast University), Haobo Li (Southeast University), Lan Luo...

More Details

LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken...

Takami Sato (University of California, Irvine), Yuki Hayakawa (Keio University), Ryo Suzuki (Keio University),...

More Details

LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

Chengkun Wei (Zhejiang University), Wenlong Meng (Zhejiang University), Zhikun Zhang (CISPA Helmholtz Center for...

More Details

Low-Quality Training Data Only? A Robust Framework for...

Yuqi Qing (Tsinghua University), Qilei Yin (Zhongguancun Laboratory), Xinhao Deng (Tsinghua University), Yihao Chen...

More Details

MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency

Jiacheng Xu (Zhejiang University), Xuhong Zhang (Zhejiang University), Shouling Ji (Zhejiang University), Yuan Tian...

More Details

Modeling and Detecting Internet Censorship Events

Elisa Tsai (University of Michigan), Ram Sundara Raman (University of Michigan), Atul Prakash (University...

More Details

MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models

Qi Pang (Carnegie Mellon University), Yuanyuan Yuan (HKUST), Shuai Wang (HKUST)

More Details

NODLINK: An Online System for Fine-Grained APT Attack...

Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking...

More Details

On Precisely Detecting Censorship Circumvention in Real-World Networks

Ryan Wails (Georgetown University, U.S. Naval Research Laboratory), George Arnold Sullivan (University of California,...

More Details

ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning

Linkang Du (Zhejiang University), Min Chen (CISPA Helmholtz Center for Information Security), Mingyang Sun...

More Details

Overconfidence is a Dangerous Thing: Mitigating Membership Inference...

Zitao Chen (University of British Columbia), Karthik Pattabiraman (University of British Columbia)

More Details

Pisces: Private and Compliable Cryptocurrency Exchange

Ya-Nan Li (The University of Sydney), Tian Qiu (The University of Sydney), Qiang Tang...

More Details

ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection

Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University), Xiaogang Zhu (Swinburne University of Technology),...

More Details

SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing

Lian Gao (University of California Riverside), Yu Qu (University of California Riverside), Sheng Yu...

More Details

Symphony: Path Validation at Scale

Anxiao He (Zhejiang University), Jiandong Fu (Zhejiang University), Kai Bu (Zhejiang University), Ruiqi Zhou...

More Details

The Dark Side of E-Commerce: Dropshipping Abuse as...

Arjun Arunasalam (Purdue University), Andrew Chu (University of Chicago), Muslum Ozgur Ozmen (Purdue University),...

More Details

Transpose Attack: Stealing Datasets with Bidirectional Training

Guy Amit (Ben-Gurion University), Moshe Levy (Ben-Gurion University), Yisroel Mirsky (Ben-Gurion University)

More Details

TrustSketch: Trustworthy Sketch-based Telemetry on Cloud Hosts

Zhuo Cheng (Carnegie Mellon University), Maria Apostolaki (Princeton University), Zaoxing Liu (University of Maryland),...

More Details

Understanding and Analyzing Appraisal Systems in the Underground...

Zhengyi Li (Indiana University Bloomington), Xiaojing Liao (Indiana University Bloomington)

More Details

Unus pro omnibus: Multi-Client Searchable Encryption via Access...

Jiafan Wang (Data61, CSIRO), Sherman S. M. Chow (The Chinese University of Hong Kong)

More Details

Fall Cycle

50 Shades of Support: A Device-Centric Analysis of...

Abbas Acar (Florida International University), Güliz Seray Tuncay (Google), Esteban Luques (Florida International University),...

More Details

5G-Spector: An O-RAN Compliant Layer-3 Cellular Attack Detection...

Haohuang Wen (The Ohio State University), Phillip Porras (SRI International), Vinod Yegneswaran (SRI International),...

More Details

A Duty to Forget, a Right to be...

Hongsheng Hu (CSIRO's Data61), Shuo Wang (CSIRO's Data61), Jiamin Chang (University of New South...

More Details

A Security and Usability Analysis of Local Attacks...

Tarun Kumar Yadav (Brigham Young University), Kent Seamons (Brigham Young University)

More Details

A Two-Layer Blockchain Sharding Protocol Leveraging Safety and...

Yibin Xu (University of Copenhagen), Jingyi Zheng (University of Copenhagen), Boris Düdder (University of...

More Details

A Unified Symbolic Analysis of WireGuard

Pascal Lafourcade (Universite Clermont Auvergne), Dhekra Mahmoud (Universite Clermont Auvergne), Sylvain Ruhault (Agence Nationale...

More Details

AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous...

Hexuan Yu (Virginia Polytechnic Institute and State University), Changlai Du (Virginia Polytechnic Institute and...

More Details

Abusing the Ethereum Smart Contract Verification Services for...

Pengxiang Ma (Huazhong University of Science and Technology), Ningyu He (Peking University), Yuhua Huang...

More Details

Acoustic Keystroke Leakage on Smart Televisions

Tejas Kannan (University of Chicago), Synthia Qia Wang (University of Chicago), Max Sunog (University...

More Details

ActiveDaemon: Unconscious DNN Dormancy and Waking Up via...

Ge Ren (Shanghai Jiao Tong University), Gaolei Li (Shanghai Jiao Tong University), Shenghong Li...

More Details

AnonPSI: An Anonymity Assessment Framework for PSI

Bo Jiang (TikTok Inc.), Jian Du (TikTok Inc.), Qiang Yan (TikTok Inc.)

More Details

Automatic Adversarial Adaption for Stealthy Poisoning Attacks in...

Torsten Krauß (University of Würzburg), Jan König (University of Würzburg), Alexandra Dmitrienko (University of...

More Details

Automatic Policy Synthesis and Enforcement for Protecting Untrusted...

Quan Zhang (Tsinghua University), Yiwen Xu (Tsinghua University), Zijing Yin (Tsinghua University), Chijin Zhou...

More Details

Beyond the Surface: Uncovering the Unprotected Components of...

Hao Zhou (The Hong Kong Polytechnic University), Shuohan Wu (The Hong Kong Polytechnic University),...

More Details

BGP-iSec: Improved Security of Internet Routing Against Post-ROV...

Cameron Morris (University of Connecticut), Amir Herzberg (University of Connecticut), Bing Wang (University of...

More Details

BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint...

Hossam ElAtali (University of Waterloo), Lachlan J. Gunn (Aalto University), Hans Liljestrand (University of...

More Details

CAGE: Complementing Arm CCA with GPU Extensions

Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic...

More Details

CamPro: Camera-based Anti-Facial Recognition

Wenjun Zhu (Zhejiang University), Yuan Sun (Zhejiang University), Jiani Liu (Zhejiang University), Yushi Cheng...

More Details

Certificate Transparency Revisited: The Public Inspections on Third-party...

Aozhuo Sun (Institute of Information Engineering, Chinese Academy of Sciences), Jingqiang Lin (School of...

More Details

CP-IoT: A Cross-Platform Monitoring System for Smart Home

Hai Lin (Tsinghua University), Chenglong Li (Tsinghua University), Jiahai Yang (Tsinghua University), Zhiliang Wang...

More Details

Decentralized Information-Flow Control for ROS2

Nishit V. Pandya (Indian Institute of Science Bangalore), Himanshu Kumar (Indian Institute of Science...

More Details

DeepGo: Predictive Directed Greybox Fuzzing

Peihong Lin (National University of Defense Technology), Pengfei Wang (National University of Defense Technology),...

More Details

DeGPT: Optimizing Decompiler Output with LLM

Peiwei Hu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Ruigang Liang...

More Details

DEMASQ: Unmasking the ChatGPT Wordsmith

Kavita Kumari (Technical University of Darmstadt, Germany), Alessandro Pegoraro (Technical University of Darmstadt), Hossein...

More Details

Detecting Voice Cloning Attacks via Timbre Watermarking

Chang Liu (University of Science and Technology of China), Jie Zhang (Nanyang Technological University),...

More Details

Don't Interrupt Me – A Large-Scale Study of...

Marian Harbach (Google), Igor Bilogrevic (Google), Enrico Bacis (Google), Serena Chen (Google), Ravjit Uppal...

More Details

DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade...

Chaoxiang He (Huazhong University of Science and Technology), Xiaojing Ma (Huazhong University of Science...

More Details

DRAINCLoG: Detecting Rogue Accounts with Illegally-obtained NFTs using...

Hanna Kim (KAIST), Jian Cui (Indiana University Bloomington), Eugene Jang (S2W Inc.), Chanhee Lee...

More Details

dRR: A Decentralized, Scalable, and Auditable Architecture for...

Yingying Su (Tsinghua university), Dan Li (Tsinghua university), Li Chen (Zhongguancun Laboratory), Qi Li...

More Details

DynPRE: Protocol Reverse Engineering via Dynamic Inference

Zhengxiong Luo (Tsinghua University), Kai Liang (Central South University), Yanyang Zhao (Tsinghua University), Feifan...

More Details

Eavesdropping on Controller Acoustic Emanation for Keystroke Inference...

Shiqing Luo (George Mason University), Anh Nguyen (George Mason University), Hafsa Farooq (Georgia State...

More Details

Efficient and Timely Revocation of V2X Credentials

Gianluca Scopelliti (Ericsson & KU Leuven), Christoph Baumann (Ericsson), Fritz Alder (KU Leuven), Eddy...

More Details

Efficient Use-After-Free Prevention with Opportunistic Page-Level Sweeping

Chanyoung Park (UNIST), Hyungon Moon (UNIST)

More Details

EM Eye: Characterizing Electromagnetic Side-channel Eavesdropping on Embedded...

Yan Long (University of Michigan), Qinhong Jiang (Zhejiang University), Chen Yan (Zhejiang University), Tobias...

More Details

EnclaveFuzz: Finding Vulnerabilities in SGX Applications

Liheng Chen (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security,...

More Details

Experimental Analyses of the Physical Surveillance Risks in...

Ashish Hooda (University of Wisconsin-Madison), Andrey Labunets (UC San Diego), Tadayoshi Kohno (University of...

More Details

Faster and Better: Detecting Vulnerabilities in Linux-based IoT...

Zicong Gao (State Key Laboratory of Mathematical Engineering and Advanced Computing), Chao Zhang (Tsinghua...

More Details

Faults in Our Bus: Novel Bus Fault Attack...

Nimish Mishra (Department of Computer Science and Engineering, IIT Kharagpur), Anirban Chakraborty (Department of...

More Details

Flow Correlation Attacks on Tor Onion Service Sessions...

Daniela Lopes (INESC-ID / IST, Universidade de Lisboa), Jin-Dong Dong (Carnegie Mellon University), Pedro...

More Details

FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting

Meenatchi Sundaram Muthu Selva Annamalai (University College London), Igor Bilogrevic (Google), Emiliano De Cristofaro...

More Details

FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning...

Hossein Fereidooni (Technical University of Darmstadt), Alessandro Pegoraro (Technical University of Darmstadt), Phillip Rieger...

More Details

From Hardware Fingerprint to Access Token: Enhancing the...

Yue Xiao (Wuhan University), Yi He (Tsinghua University), Xiaoli Zhang (Zhejiang University of Technology),...

More Details

From Interaction to Independence: zkSNARKs for Transparent and...

Shahriar Ebrahimi (IDEAS-NCBR), Parisa Hassanizadeh (IDEAS-NCBR)

More Details

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering

Rui Zhu (Indiana University Bloominton), Di Tang (Indiana University Bloomington), Siyuan Tang (Indiana University...

More Details

GraphGuard: Detecting and Counteracting Training Data Misuse in...

Bang Wu (CSIRO's Data61/Monash University), He Zhang (Monash University), Xiangwen Yang (Monash University), Shuo...

More Details

Group-based Robustness: A General Framework for Customized Robustness...

Weiran Lin (Carnegie Mellon University), Keane Lucas (Carnegie Mellon University), Neo Eyal (Tel Aviv...

More Details

IdleLeak: Exploiting Idle State Side Effects for Information...

Fabian Rauscher (Graz University of Technology), Andreas Kogler (Graz University of Technology), Jonas Juffinger...

More Details

Improving the Robustness of Transformer-based Large Language Models...

Lujia Shen (Zhejiang University), Yuwen Pu (Zhejiang University), Shouling Ji (Zhejiang University), Changjiang Li...

More Details

Information Based Heavy Hitters for Real-Time DNS Data...

Yarin Ozery (Ben-Gurion University of the Negev, Akamai Technologies inc.), Asaf Nadler (Ben-Gurion University...

More Details

Invisible Reflections: Leveraging Infrared Laser Reflections to Target...

Takami Sato (University of California Irvine), Sri Hrushikesh Varma Bhupathiraju (University of Florida), Michael...

More Details

IRRedicator: Pruning IRR with RPKI-Valid BGP Insights

Minhyeok Kang (Seoul National University), Weitong Li (Virginia Tech), Roland van Rijswijk-Deij (University of...

More Details

K-LEAK: Towards Automating the Generation of Multi-Step Infoleak...

Zhengchuan Liang (UC Riverside), Xiaochen Zou (UC Riverside), Chengyu Song (UC Riverside), Zhiyun Qian...

More Details

Large Language Model guided Protocol Fuzzing

Ruijie Meng (National University of Singapore, Singapore), Martin Mirchev (National University of Singapore), Marcel...

More Details

Leaking the Privacy of Groups and More: Understanding...

Jiangrong Wu (Sun Yat-sen University), Yuhong Nan (Sun Yat-sen University), Luyi Xing (Indiana University...

More Details

Like, Comment, Get Scammed: Characterizing Comment Scams on...

Xigao Li (Stony Brook University), Amir Rahmati (Stony Brook University), Nick Nikiforakis (Stony Brook...

More Details

LoRDMA: A New Low-Rate DoS Attack in RDMA...

Shicheng Wang (Tsinghua University), Menghao Zhang (Beihang University & Infrawaves), Yuying Du (Information Engineering...

More Details

MadRadar: A Black-Box Physical Layer Attack Framework on...

David Hunt (Duke University), Kristen Angell (Duke University), Zhenzhou Qi (Duke University), Tingjun Chen...

More Details

Maginot Line: Assessing a New Cross-app Threat to...

Fannv He (National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences,...

More Details

MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots

Gelei Deng (Nanyang Technological University), Yi Liu (Nanyang Technological University), Yuekang Li (University of...

More Details

MirageFlow: A New Bandwidth Inflation Attack on Tor

Christoph Sendner (University of Würzburg), Jasper Stang (University of Würzburg), Alexandra Dmitrienko (University of...

More Details

Not your Type! Detecting Storage Collision Vulnerabilities in...

Nicola Ruaro (University of California, Santa Barbara), Fabio Gritti (University of California, Santa Barbara),...

More Details

Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box...

Rui Duan (University of South Florida), Zhe Qu (Central South University), Leah Ding (American...

More Details

Pencil: Private and Extensible Collaborative Learning without the...

Xuanqi Liu (Tsinghua University), Zhuotao Liu (Tsinghua University), Qi Li (Tsinghua University), Ke Xu...

More Details

Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient...

Hugo Kermabon-Bobinnec (Concordia University), Yosr Jarraya (Ericsson Security Research), Lingyu Wang (Concordia University), Suryadipta...

More Details

Powers of Tau in Asynchrony

Sourav Das (University of Illinois at Urbana-Champaign), Zhuolun Xiang (Aptos), Ling Ren (University of...

More Details

Predictive Context-sensitive Fuzzing

Pietro Borrello (Sapienza University of Rome), Andrea Fioraldi (EURECOM), Daniele Cono D'Elia (Sapienza University...

More Details

PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via...

Man Zhou (Huazhong University of Science and Technology), Shuao Su (Huazhong University of Science...

More Details

PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in...

Yang Yang (School of Computing and Information Systems, Singapore Management University, Singapore), Robert H....

More Details

Private Aggregate Queries to Untrusted Databases

Syed Mahbub Hafiz (University of California, Davis), Chitrabhanu Gupta (University of California, Davis), Warren...

More Details

Proof of Backhaul: Trustfree Measurement of Broadband Bandwidth

Peiyao Sheng (Kaleidoscope Blockchain Inc.), Nikita Yadav (Indian Institute of Science), Vishal Sevani (Kaleidoscope...

More Details

QUACK: Hindering Deserialization Attacks via Static Duck Typing

Yaniv David (Columbia University), Neophytos Christou (Brown University), Andreas D. Kellas (Columbia University), Vasileios...

More Details

REPLICAWATCHER: Training-less Anomaly Detection in Containerized Microservices

Asbat El Khairi (University of Twente), Marco Caselli (Siemens AG), Andreas Peter (University of...

More Details

ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies...

Linkai Zheng (Tsinghua University), Xiang Li (Tsinghua University), Chuhan Wang (Tsinghua University), Run Guo...

More Details

Scrappy: SeCure Rate Assuring Protocol with PrivacY

Kosei Akama (Keio University), Yoshimichi Nakatsuka (ETH Zurich), Masaaki Sato (Tokai University), Keisuke Uehara...

More Details

Secret-Shared Shuffle with Malicious Security

Xiangfu Song (National University of Singapore), Dong Yin (Ant Group), Jianli Bai (The University...

More Details

Secure Multiparty Computation of Threshold Signatures Made More...

Harry W. H. Wong (The Chinese University of Hong Kong), Jack P. K. Ma...

More Details

Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols

Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory...

More Details

SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based...

Fan Sang (Georgia Institute of Technology), Jaehyuk Lee (Georgia Institute of Technology), Xiaokuan Zhang...

More Details

Separation is Good: A Faster Order-Fairness Byzantine Consensus

Ke Mu (Southern University of Science and Technology, China), Bo Yin (Changsha University of...

More Details

Sharing cyber threat intelligence: Does it really help?

Beomjin Jin (Sungkyunkwan University), Eunsoo Kim (Sungkyunkwan University), Hyunwoo Lee (KENTECH), Elisa Bertino (Purdue...

More Details

SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition...

Guangke Chen (ShanghaiTech University), Yedi Zhang (National University of Singapore), Fu Song (Institute of...

More Details

Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking...

Gorka Abad (Radboud University & Ikerlan Technology Research Centre), Oguzhan Ersoy (Radboud University), Stjepan...

More Details

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained...

Peizhuo Lv (Institute of Information Engineering, Chinese Academy of Sciences, China; School of Cyber...

More Details

SyzBridge: Bridging the Gap in Exploitability Assessment of...

Xiaochen Zou (UC Riverside), Yu Hao (UC Riverside), Zheng Zhang (UC RIverside), Juefei Pu...

More Details

TALISMAN: Tamper Analysis for Reference Monitors

Frank Capobianco (The Pennsylvania State University), Quan Zhou (The Pennsylvania State University), Aditya Basu...

More Details

TEE-SHirT: Scalable Leakage-Free Cache Hierarchies for TEEs

Kerem Arikan (Binghamton University), Abraham Farrell (Binghamton University), Williams Zhang Cen (Binghamton University), Jack...

More Details

TextGuard: Provable Defense against Backdoor Attacks on Text...

Hengzhi Pei (UIUC), Jinyuan Jia (UIUC, Penn State), Wenbo Guo (UC Berkeley, Purdue University),...

More Details

The CURE to Vulnerabilities in RPKI Validation

Donika Mirdita (Technische Universität Darmstadt), Haya Shulman (Goethe-Universität Frankfurt), Niklas Vogel (Goethe-Universität Frankfurt), Michael...

More Details

Timing Channels in Adaptive Neural Networks

Ayomide Akinsanya (Stevens Institute of Technology), Tegan Brennan (Stevens Institute of Technology)

More Details

Towards Automated Regulation Analysis for Effective Privacy Compliance

Sunil Manandhar (IBM T.J. Watson Research Center), Kapil Singh (IBM T.J. Watson Research Center),...

More Details

Towards Precise Reporting of Cryptographic Misuses

Yikang Chen (The Chinese University of Hong Kong), Yibo Liu (Arizona State University), Ka...

More Details

Understanding Route Origin Validation (ROV) Deployment in the...

Lancheng Qin (Tsinghua University, BNRist), Li Chen (Zhongguancun Laboratory), Dan Li (Tsinghua University, Zhongguancun...

More Details

Understanding the Implementation and Security Implications of Protective...

Mingxuan Liu (Zhongguancun Laboratory; Tsinghua University), Yiming Zhang (Tsinghua University), Xiang Li (Tsinghua University),...

More Details

UniID: Spoofing Face Authentication System by Universal Identity

Zhihao Wu (Zhejiang University), Yushi Cheng (Zhejiang University), Shibo Zhang (Zhejiang University), Xiaoyu Ji...

More Details

Untangle: Multi-Layer Web Server Fingerprinting

Cem Topcuoglu (Northeastern University), Kaan Onarlioglu (Akamai Technologies), Bahruz Jabiyev (Northeastern University), Engin Kirda...

More Details

UntrustIDE: Exploiting Weaknesses in VS Code Extensions

Elizabeth Lin (North Carolina State University), Igibek Koishybayev (North Carolina State University), Trevor Dunlap...

More Details

VETEOS: Statically Vetting EOSIO Contracts for the “Groundhog...

Levi Taiji Li (University of Utah), Ningyu He (Peking University), Haoyu Wang (Huazhong University...

More Details

When Cryptography Needs a Hand: Practical Post-Quantum Authentication...

Geoff Twardokus (Rochester Institute of Technology), Nina Bindel (SandboxAQ), Hanif Rahbari (Rochester Institute of...

More Details

You Can Use But Cannot Recognize: Preserving Visual...

Qiushi Li (Tsinghua University), Yan Zhang (Tsinghua University), Ju Ren (Tsinghua University), Qi Li...

More Details