NDSS Symposium 2026 Accepted Posters
(Blind) Users Really Do Heed Aural Telephone Scam Warnings
Filipo Sharevski, Jennifer Vander Loop, Bill Evans, Alexander Ponticello
Abstracting and Tracking Semantic Flow among Agents for Threat Detection
Yangyang Wei, Xiangmin Shen, Yijie Xu, Zhenyuan Li
AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks
Xin’an Zhou, Juefei Pu, Zhutian Liu, Zhiyun Qian, Zhaowei Tan, Srikanth V. Krishnamurthy, Mathy Vanhoef
An Analysis of Matter IoT Security Against International Standards and Regulatory Framework
Andrew Losty, Anna Maria Mandalari
AntiBench: The Benchmarking Framework of Anti-Fuzzing Techniques
Keigo Yoshioka, Shogo Konishi, Naomasa Matsubayashi, Yuichi Sugiyama
Auditory Viewpoint Manipulation Attacks in VR: An Empirical Study
Kousei Otsuka, Shodai Kurasaki, Mayu Fujita, Akira Kanaoka
Beyond Reachability to Controllability via State Transition Entropy
Takuya Shimizu, Toshiki Takatera, Ryo Ozaki, Yudai Fujiwara, Yuichi Sugiyama
BSan: A Non-Intrusive and Comprehensive Binary-Level Memory Sanitizer
Yang Li, Yuan Li, Chenyang Li, Xinhui Han, Chao Zhang
Building Networks of Trust for Legal Preservation with TAF
Dušan Nikolić, Renata Vaderna, Patrick Zielinski, David Greisen, BJ Ard, Justin Cappos
Convergent Privacy Framework for Multi-layer GNNs through Contractive Message Passing
Yu Zheng, Chenang Li, Zhou Li, Qingsong Wang
Defeating Network Dynamics: DRL-Based Automated Attack Path Discovery in IIoT
Yifan Liu, Shancang Li, Xueyi Wang
Diffusion Based Face Generation via Image Editing and Image Morphing
Liyue Fan, Joseph Roberson
DMAArmor: Real-Time PCIe Packet Inspection for Enhanced DMA Security
Chenyang Li, Yuan Li, Wende Tan, Xinhui Han, Chao Zhang
Efficient and Dynamic Witness-Free Certificate Revocation Using And-Tree Accumulator
Jheng-Jia Huang, Guan-Yu Chen, Daisuke Inoue, Nai-Wei Lo, Yi-Fan Tseng, Yu-Hung Wang
Exploiting the Two-Phase Gap in the x402 Protocol for Autonomous AI Payments
Yoonseo Hwang, Hyoung-Kee Choi
FlyTrap: Physical Distance-Pulling Attack Towards Camera-based Autonomous Target Tracking Systems
Shaoyuan Xie, Mohamad Habib Fakih, Junchi Lu, Fayzah Alshammari, Ningfei Wang, Takami Sato, Halima Bouzidi, Mohammad Abdullah Al Faruque, Qi Alfred Chen
Frequency-Domain Chaotic Watermarking for Image Authentication Against Deepfakes
Dabbrata Das, Kaniz Fatima, Dhiman Goswami, Sanchari Das
Genomic Data Generation via Correlation-Guided and Privacy-Preserving Diffusion
You Li, Shuainan Liu, Shaojie Zhan, Zhongshuo Fang, Tianxi Ji
Harnessing Vital Sign Vibration Harmonics for Effortless and Inbuilt XR User Authentication
Tianfang Zhang, Qiufan Ji, Md Mojibur Rahman Redoy Akanda, Zhengkun Ye, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen
HIPR: Hardware IP Protection through Low-Overhead Fine-Grain Redaction
Aritra Dasgupta , Sudipta Paria , Swarup Bhunia
Hybrid Seccomp Profiling with LLM Assistance for Container Security
Jiwoo Ahn, Youyang Kim, Young-Kyoon Suh, Ashish Kundu, Byungchul Tak
Impact of Targeted Emails Applying Cialdini’s Principles on Personality-Tuned AI
Wataru Hatakeyama, Seiya Kajihara, Ryunosuke Harada, Toma Ogiri, Kazuki Takabayashi, Seiji Sato, Takumi Yamamoto, Tadakazu Yamanaka, Tetsushi Ohki, Masakatsu Nishigaki
Leveraging LLMs to Generate and Counter Sandbox Evasion Techniques
Anh Nguyen Van, Matsuzawa Hikaru, Ito Hikaru, Yin Minn Pa Pa, Rui Tanabe, Katsunari Yoshioka
Malicious Attacks against Multi-Sensor Fusion in Autonomous Driving
Zhu, Yi, Chenglin Miao, Hongfei Xue, Yunnan Yu, Lu Su, Chunming Qiao
NetCap: Data-Plane Capability-Based Defense Against Token Theft in Network Access
Osama Bajaber, Bo Ji, Peng Gao
Normal Assumption and Less Injection Lead to Higher Recovery: File Injection Attack Evolves Step by Step
Ruizhong Du, Zhendong Zhang, Mingyue Li, Chunfu Jia
PhantomMotion: Laser-Based Motion Injection Attacks on Wireless Security Surveillance Systems
Yan He, Guanchong Huang, Song Fang
PreCurious: How Innocent Pre-Trained Language Models Turn into Privacy Traps
Ruixuan Liu, Tianhao Wang, Yang Cao, Li Xiong
Privacy-Preserving Compliance Checks on Ethereum via Selective Disclosure
Supriya Khadka, Dhiman Goswami, Sanchari Das
Prϵϵmpt: Sanitizing Sensitive Prompts for LLMs
Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare
Reconstructing the Provenance of Android
Mingxiang Shi, Xiangmin Shen, Yuqiao Gu, Zhipeng Chen, Lingzhi Wang, Yi Jiang, Zhenyuan Li
Select-Then-Compute: Encrypted Label Selection and Analytics over Distributed Datasets using FHE
Nirajan Koirala, Seunghun Paik, Sam Martin, Helena Berens, Tasha Januszewicz, Jonathan Takeshita, Jae Hong Seo, Taeho Jung
Side-channel Inference of User Activities in AR/VR Using GPU Profiling
Seonghun Son, Chandrika Mukherjee, Reham Mohamed Aburas, Berk Gulmezoglu, Z. Berkay Celik
SPECTRA: Smart Contract Specification Inference via Abstract Interpretation
Haoyi Zhang, Huaijin Ran, Xunzhu Tang
SPHERE: A Community Testbed for Reproducible Cybersecurity and Privacy Research
Jelena Mirkovic, David Balenson, Erik Kline, David Choffnes, Daniel Dubois, Luis Garcia, Geoff Lawler, Joe Barnes, Yuri Pradkin, Christopher Tran, Lincoln Thurlow, Terry Benzel, Alba Regalado
Time and Time Again: Leveraging TCP Timestamps to Improve Remote Timing Attacks
Vik Vanderlinden, Tom Van Goethem, Mathy Vanhoef
Towards Model Drift Resistant Website Fingerprinting with Time-Series LLMs
Yuwen Cui, Kai Wei, Kehan Shen, Guangjing Wang
Towards Real-Time Defense against Object-Based LiDAR Attacks in Autonomous Driving
Yan Zhang, Zihao Liu, Yi Zhu, Chenglin Miao
TuDoor Attack Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets
Xiang Li, Lu Sun, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li
Why Do Non-English Languages Exhibit Higher Vulnerability to Data Poisoning Attacks Against Text-to-Image Models?
Ryohei Kakebayashi, Tatsuya Mori
Your Key is Mine: LLM API Key Leakage in iOS Apps
Pinran Gao, Wang Lingxiang, Ying Zhang