NDSS Symposium 2026 Accepted Posters

(Blind) Users Really Do Heed Aural Telephone Scam Warnings

Filipo Sharevski, Jennifer Vander Loop, Bill Evans, Alexander Ponticello

Abstracting and Tracking Semantic Flow among Agents for Threat Detection

Yangyang Wei, Xiangmin Shen, Yijie Xu, Zhenyuan Li

AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks

Xin’an Zhou, Juefei Pu, Zhutian Liu, Zhiyun Qian, Zhaowei Tan, Srikanth V. Krishnamurthy, Mathy Vanhoef

An Analysis of Matter IoT Security Against International Standards and Regulatory Framework

Andrew Losty, Anna Maria Mandalari

AntiBench: The Benchmarking Framework of Anti-Fuzzing Techniques

Keigo Yoshioka, Shogo Konishi, Naomasa Matsubayashi, Yuichi Sugiyama

Auditory Viewpoint Manipulation Attacks in VR: An Empirical Study

Kousei Otsuka, Shodai Kurasaki, Mayu Fujita, Akira Kanaoka

Beyond Reachability to Controllability via State Transition Entropy

Takuya Shimizu, Toshiki Takatera, Ryo Ozaki, Yudai Fujiwara, Yuichi Sugiyama

BSan: A Non-Intrusive and Comprehensive Binary-Level Memory Sanitizer

Yang Li, Yuan Li, Chenyang Li, Xinhui Han, Chao Zhang

Building Networks of Trust for Legal Preservation with TAF

Dušan Nikolić, Renata Vaderna, Patrick Zielinski, David Greisen, BJ Ard, Justin Cappos

Convergent Privacy Framework for Multi-layer GNNs through Contractive Message Passing

Yu Zheng, Chenang Li, Zhou Li, Qingsong Wang

Defeating Network Dynamics: DRL-Based Automated Attack Path Discovery in IIoT

Yifan Liu, Shancang Li, Xueyi Wang

Diffusion Based Face Generation via Image Editing and Image Morphing

Liyue Fan, Joseph Roberson

DMAArmor: Real-Time PCIe Packet Inspection for Enhanced DMA Security

Chenyang Li, Yuan Li, Wende Tan, Xinhui Han, Chao Zhang

Efficient and Dynamic Witness-Free Certificate Revocation Using And-Tree Accumulator

Jheng-Jia Huang, Guan-Yu Chen, Daisuke Inoue, Nai-Wei Lo, Yi-Fan Tseng, Yu-Hung Wang

Exploiting the Two-Phase Gap in the x402 Protocol for Autonomous AI Payments

Yoonseo Hwang, Hyoung-Kee Choi

FlyTrap: Physical Distance-Pulling Attack Towards Camera-based Autonomous Target Tracking Systems

Shaoyuan Xie, Mohamad Habib Fakih, Junchi Lu, Fayzah Alshammari, Ningfei Wang, Takami Sato, Halima Bouzidi, Mohammad Abdullah Al Faruque, Qi Alfred Chen

Frequency-Domain Chaotic Watermarking for Image Authentication Against Deepfakes

Dabbrata Das, Kaniz Fatima, Dhiman Goswami, Sanchari Das

Genomic Data Generation via Correlation-Guided and Privacy-Preserving Diffusion

You Li, Shuainan Liu, Shaojie Zhan, Zhongshuo Fang, Tianxi Ji

Harnessing Vital Sign Vibration Harmonics for Effortless and Inbuilt XR User Authentication

Tianfang Zhang, Qiufan Ji, Md Mojibur Rahman Redoy Akanda, Zhengkun Ye, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen

HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction

Aritra Dasgupta , Sudipta Paria , Swarup Bhunia

Hybrid Seccomp Profiling with LLM Assistance for Container Security

Jiwoo Ahn, Youyang Kim, Young-Kyoon Suh, Ashish Kundu, Byungchul Tak

Impact of Targeted Emails Applying Cialdini’s Principles on Personality-Tuned AI

Wataru Hatakeyama, Seiya Kajihara, Ryunosuke Harada, Toma Ogiri, Kazuki Takabayashi, Seiji Sato, Takumi Yamamoto, Tadakazu Yamanaka, Tetsushi Ohki, Masakatsu Nishigaki

Leveraging LLMs to Generate and Counter Sandbox Evasion Techniques

Anh Nguyen Van, Matsuzawa Hikaru, Ito Hikaru, Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka

Malicious Attacks against Multi-Sensor Fusion in Autonomous Driving

Zhu, Yi, Chenglin Miao, Hongfei Xue, Yunnan Yu, Lu Su, Chunming Qiao

NetCap: Data-Plane Capability-Based Defense Against Token Theft in Network Access

Osama Bajaber, Bo Ji, Peng Gao

Normal Assumption and Less Injection Lead to Higher Recovery: File Injection Attack Evolves Step by Step

Ruizhong Du, Zhendong Zhang, Mingyue Li, Chunfu Jia

PhantomMotion: Laser-Based Motion Injection Attacks on Wireless Security Surveillance Systems

Yan He, Guanchong Huang, Song Fang

PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps

Ruixuan Liu, Tianhao Wang, Yang Cao, Li Xiong

Privacy-Preserving Compliance Checks on Ethereum via Selective Disclosure

Supriya Khadka, Dhiman Goswami, Sanchari Das

Prϵϵmpt: Sanitizing Sensitive Prompts for LLMs

Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare

Reconstructing the Provenance of Android

Mingxiang Shi, Xiangmin Shen, Yuqiao Gu, Zhipeng Chen, Lingzhi Wang, Yi Jiang, Zhenyuan Li

Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE

Nirajan Koirala, Seunghun Paik, Sam Martin, Helena Berens, Tasha Januszewicz, Jonathan Takeshita, Jae Hong Seo, Taeho Jung

Side-channel Inference of User Activities in AR/VR Using GPU Profiling

Seonghun Son, Chandrika Mukherjee, Reham Mohamed Aburas, Berk Gulmezoglu, Z. Berkay Celik

SPECTRA: Smart Contract Specification Inference via Abstract Interpretation

Haoyi Zhang, Huaijin Ran, Xunzhu Tang

SPHERE: A Community Testbed for Reproducible Cybersecurity and Privacy Research

Jelena Mirkovic, David Balenson, Erik Kline, David Choffnes, Daniel Dubois, Luis Garcia, Geoff Lawler, Joe Barnes, Yuri Pradkin, Christopher Tran, Lincoln Thurlow, Terry Benzel, Alba Regalado

Time and Time Again: Leveraging TCP Timestamps to Improve Remote Timing Attacks

Vik Vanderlinden, Tom Van Goethem, Mathy Vanhoef

Towards Model Drift Resistant Website Fingerprinting with Time-Series LLMs

Yuwen Cui, Kai Wei, Kehan Shen, Guangjing Wang

Towards Real-Time Defense against Object-Based LiDAR Attacks in Autonomous Driving

Yan Zhang, Zihao Liu, Yi Zhu, Chenglin Miao

TuDoor Attack Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets

Xiang Li, Lu Sun, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li

Why Do Non-English Languages Exhibit Higher Vulnerability to Data Poisoning Attacks Against Text-to-Image Models?

Ryohei Kakebayashi, Tatsuya Mori

Your Key is Mine: LLM API Key Leakage in iOS Apps

Pinran Gao, Wang Lingxiang, Ying Zhang