NDSS Symposium 2024 Accepted Posters

‘False negative – that one is going to kill you’: Understanding Industry Perspectives of Static Analysis based Security Testing

Amit Seal Ami, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni

A Novel Attack Exploiting the Vulnerabilities of LiDAR Point Cloud Pre-Processing Filters

Yuna Tanaka, Kazuki Nomoto, Ryunosuke Kobayashi, Go Tsuruoka, Tatsuya Mori

A Two-Stage Encrypted Cryptomining Traffic Detection Mechanism in Campus Network

Ruisheng Shi, Haoran Sun, Lina Lan, Zhiyuan Peng, Chenfeng Wang

Adversarial Retroreflective Patches: A Novel Stealthy Attack on Traffic Sign Recognition at Night

Go Tsuruoka, Takami Sato, Qi Alfred Chen, Kazuki Nomoto, Ryunosuke Kobayashi, Yuna Tanaka, Tatsuya Mori

An Adaptive High Frequency Removal Attack to Bypass Pulse Fingerprinting in New-Gen LiDARs

Yuki Hayakawa, Takami Sato, Ryo Suzuki, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Qi Alfred Chen, Kentaro Yoshioka

Attacking and Improving the Tor Directory Protocol

Zhongtang Luo, Adithya Bhat, Kartik Nayak, Aniket Kate

Bypassing Control Invariants-Based Defenses in Autonomous Vehicles

Yinan Zhao, Ziling He, Tatsuya Mori

Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats

Daniel Timko, Muhammad Lutfor Rahman

Discovering Authentication Bypass Vulnerabilities in IoT Devices through Guided Concolic Execution

Jr-Wei Huang, Nien-Jen Tsai, Shin-Ming Cheng

Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack

Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen

DScope: A Cloud-Native Internet Telescope

Eric Pauley, Paul Barford, Patrick McDaniel

Ensuring Memory Safety for the Transition from C/C++ to Rust

Oliver Braunsdorf, Konrad Hohentanner, Johannes Kinder

Federated Multimodal Medical Data Generation

Hajar Homayouni, Maryam Mary Pourebadi, Hossein Shirazi

Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy

Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage

HyPFuzz: Formal-Assisted Processor Fuzzing

Chen Chen, Jeyavijayan Rajendran

In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes

Aniketh Girish, Tianrui Hu, Vijay Prakash, Daniel J. Dubois, Srdjan Matic, Danny Yuxing Huang, Serge Egelman, Joel Reardon, Juan Tapiador, David Choffnes, Narseo Vallina-Rodriguez

Intensity-Aware Chosen Pattern Injection LiDAR Spoofing Attack

Ozora Sako, Takami Sato, Yuki Hayakawa, Ryo Suzuki, Kazuma Ikeda, Rokuto Nagata, Qi Alfred Chen, Kentaro Yoshioka

Monogamous relationships with short-term commitment are the best (for certificate management)

Carl Magnus Bruhner, Oscar Linnarsson, Matus Nemec, Martin Arlitt, Niklas Carlsson

MORPH: Towards Automated Concept Drift Adaptation for Malware Detection

Md Tanvirul Alam, Romy Fieblinger, Ashim Mahara, Nidhi Rastogi

Multi-Observed Authentication: A secure and usable authentication / authorization based on multi-point observation of physical events

Shinnosuke Nozaki, Takumi Takaiwa, Masahiro Fujita, Ayako Yoshimura, Tetsushi Ohki, Masakatsu Nishigaki

On the (In)Security of Government Web and Mail Infrastructure

Evan Lam, Richard Anderson, Kurtis Heimerl, Yurie Ito, Jonathan Joseph de Koning, Adam Lange, Jarrod O’Malley, Adam Shostack, Arastoo Taslim, Sudheesh Singanamalla

On the Cyber-Physical Security of Commercial Indoor Delivery Robot Systems

Fayzah Alshammari, Yunpeng Luo, Qi Alfred Chen

ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing

Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li

Retrofit — Enabling Interoperable E2EE Communication Through 6G Cellular Architectures

Sudheesh Singanamalla, Richard Anderson, Kurtis Heimerl

Robustness of Reinforcement-Learning-Based Autonomous Driving to Adversarial Inputs

Ziling He, Yinan Zhao, Tatsuya Mori

Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE)

Jelena Mirkovic, David Balenson, Brian Kocoloski, David Choffnes, Daniel Dubois, Geoff Lawler, Chris Tran, Joseph Barnes, Yuri Pradkin, Terry Benzel, Srivatsan Ravi, Ganesh Sankaran, Luis Garcia

Shadow Hack: Adversarial Shadow Attack Against LiDAR Object Detection

Ryunosuke Kobayashi, Kazuki Nomoto, Yuna Tanaka, Go Tsuruoka, Tatsuya Mori

Sharding SMR with Optimal-size Shards for Highly Scalable Blockchains

Jianting Zhang, Zhongtang Luo, Raghavendra Ramesh, Aniket Kate

SlowTrack: Increasing the Latency of Camera-Based Perception in Autonomous Driving Using Adversarial Examples

Chen Ma, Ningfei Wang, Qi Alfred Chen, Chao Shen

SoK: Pitfalls in Evaluating Black-Box Attacks

Fnu Suya, Anshuman Suri, Tingwei Zhang, Jingtao Hong, Yuan Tian, David Evans

Towards Practical LiDAR Spoofing Attack against Vehicles Driving at Cruising Speeds

Ryo Suzuki, Takami Sato, Yuki Hayakawa, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Qi Alfred Chen, Kentaro Yoshioka

Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites

Kaushal Kafle, Prianka Mandal, Kapil Singh, Benjamin Andow, Adwait Nadkarni

Users Really Do Respond To Smishing

Daniel Timko, Muhammad Lutfor Rahman, Hamid Wali, Ajaya Neupane