![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
26th NDSS 2019: San Diego, CA, USA
- 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society 2019, ISBN 1-891562-55-X
- Deborah A. Frincke:
Keynote: Modern Challenges for Cyber Defense.
Mobile Security
- Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
SANCTUARY: ARMing TrustZone with User-space Enclaves. - Min Hong Yun, Lin Zhong:
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System. - Abdallah Dawoud, Sven Bugiel:
DroidCap: OS Support for Capability-based Permissions in Android. - Meng Luo, Pierre Laperdrix, Nima Honarmand, Nick Nikiforakis:
Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. - Qingchuan Zhao, Chaoshun Zuo, Giancarlo Pellegrino, Zhiqiang Lin:
Geo-locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. - Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis:
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data.
Web Security
- Marius Steffens, Christian Rossow, Martin Johns, Ben Stock:
Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild. - Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis:
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation. - Victor Le Pochat, Tom van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczynski, Wouter Joosen:
Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. - Michael Schwarz, Florian Lackner, Daniel Gruss:
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. - Alexander Sjösten
, Steven Van Acker, Pablo Picazo-Sanchez, Andrei Sabelfeld:
Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks. - Hyunwoo Lee, Zach Smith, Junghwan Lim, Gyeongjae Choi, Selin Chun, Taejoong Chung, Ted Taekyoung Kwon:
maTLS: How to Make TLS middlebox-aware?
Blockchain I
- Maria Apostolaki, Gian Marti, Jan Müller, Laurent Vanbever:
SABRE: Protecting Bitcoin against Routing Attacks. - Bingsheng Zhang, Roman Oliynykov, Hamed Balogun:
A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence. - David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
:
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. - Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand:
YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes. - Gabriel Kaptchuk, Matthew Green, Ian Miers:
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers.
Malware and Threats
- Eihal Alowaisheq, Peng Wang, Sumayah A. Alrwais, Xiaojing Liao, XiaoFeng Wang, Tasneem Alowaisheq, Xianghang Mi, Siyuan Tang, Baojun Liu:
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs. - Orçun Çetin, Carlos Gañán, Lisette Altena, Takahiro Kasama, Daisuke Inoue, Kazuki Tamiya, Ying Tie, Katsunari Yoshioka, Michel van Eeten:
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai. - Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin:
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet. - Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pärn, Zhichun Li, Cristian Lumezanu, Zhenyu Wu, Lu-An Tang, Ding Li:
Countering Malicious Processes with Process-DNS Association. - Jack Wampler, Ian Martiny, Eric Wustrow:
ExSpectre: Hiding Malware in Speculative Execution.
Adversarial Machine Learning
- Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes:
ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. - Inken Hagestedt, Yang Zhang, Mathias Humbert, Pascal Berrang, Haixu Tang, XiaoFeng Wang, Michael Backes:
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data. - Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami:
Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems. - Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, Xiangyu Zhang:
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking. - Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang:
TextBugger: Generating Adversarial Text Against Real-world Applications.
Enterprise Security
- Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin R. B. Butler, Patrick Traynor:
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. - Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero:
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises. - Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, Adam Bates:
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
Censorship
- Sergey Frolov, Eric Wustrow:
The use of TLS in Censorship Circumvention. - Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Pöpper:
On the Challenges of Geographical Avoidance for Tor.
Fuzzing
- Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, Michael Franz:
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. - Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz:
REDQUEEN: Fuzzing with Input-to-State Correspondence. - Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert:
NAUTILUS: Fishing for Deep Bugs with Grammars. - Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li:
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification. - Lei Zhao, Yue Duan, Heng Yin, Jifeng Xuan:
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.
Privacy on the Web
- Athanasios Andreou, Márcio Silva, Fabrício Benevenuto, Oana Goga, Patrick Loiseau, Alan Mislove:
Measuring the Facebook Advertising Ecosystem. - Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, Thorsten Holz:
We Value Your Privacy ... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. - Michael Meli, Matthew R. McNiece, Bradley Reaves:
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories. - Amit Klein, Benny Pinkas:
DNS Cache-Based User Tracking. - Muhammad Ahmad Bashir, Umar Farooq, Maryam Shahid, Muhammad Fareed Zaffar, Christo Wilson:
Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers.
Bugs and Vulnerabilities
- A. Theodore Markettos, Colin Rothwell, Brett F. Gutstein, Allison Pearce, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson:
Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals. - Zheng Leong Chua, Yanhao Wang, Teodora Baluta, Prateek Saxena, Zhenkai Liang, Purui Su:
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics. - Ruian Duan, Ashish Bijlani, Yang Ji, Omar Alrawi, Yiyuan Xiong, Moses Ike, Brendan Saltaformaggio, Wenke Lee:
Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries. - Jangseop Shin, Donghyun Kwon, Jiwon Seo, Yeongpil Cho, Yunheung Paek:
CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C++. - HyungSeok Han, DongHyeon Oh, Sang Kil Cha:
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines.
Side Channels
- Sina Faezi, Sujit Rokka Chhetri, Arnav Vaibhav Malawade, John Charles Chaput, William H. Grover, Philip Brisk, Mohammad Abdullah Al Faruque:
Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines. - Nicolás Rosner, Ismet Burak Kadron, Lucas Bang, Tevfik Bultan:
Profit: Detecting and Quantifying Side Channels in Networked Applications. - Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B. Abu-Ghazaleh, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Paul L. Yu:
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries. - Jiyong Yu, Lucas Hsiung, Mohamad El Hajj, Christopher W. Fletcher:
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing. - Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino:
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information.
Authentication
- Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis:
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. - Cormac Herley, Stuart E. Schechter:
Distinguishing Attacks from Legitimate Authentication Traffic at Scale. - Shridatt Sugrim, Can Liu, Meghan McLean, Janne Lindqvist:
Robust Performance Metrics for Authentication Systems. - Jaeho Lee, Ang Chen, Dan S. Wallach:
Total Recall: Persistence of Passwords in Android. - Ke Coby Wang, Michael K. Reiter:
How to End Password Reuse on the Web.
Protocol Security
- Cas Cremers, Martin Dehnel-Wild:
Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion. - Mridula Singh, Patrick Leu, Srdjan Capkun:
UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks. - Daniele Antonioli, Nils Ole Tippenhauer, Kasper Bonne Rasmussen:
Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android. - Fenghao Xu, Wenrui Diao, Zhou Li
, Jiongyi Chen, Kehuan Zhang:
BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals. - Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, Eric K. T. Cheng, Robert H. Deng:
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment.
IoT and CPS
- Z. Berkay Celik, Gang Tan, Patrick D. McDaniel:
IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT. - Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, Raheem Beyah:
RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid. - Cheng Feng, Venkata Reddy Palleti, Aditya Mathur, Deeph Chana:
A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems. - Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. - Anastasis Keliris, Michail Maniatakos:
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries.
Crypto and Privacy
- Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, Brandon Ellis, Rakesh B. Bobba
, Mike Rosulek, Charles V. Wright, Wu-chi Feng:
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. - Anrin Chakraborti, Radu Sion:
ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM. - Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Statistical Privacy for Streaming Traffic. - Anrin Chakraborti, Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche, Radu Sion:
rORAM: Efficient Range ORAM with O(log2 N) Locality. - Victor Perrier, Hassan Jameel Asghar, Dali Kaafar:
Private Continual Release of Real-Valued Data Streams.
Attacks on Speech Recognition
- Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. - Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding. - Ajaya Neupane, Nitesh Saxena, Leanne M. Hirshfield, Sarah E. Bratt:
The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection. - Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chinprutthiwong, Guofei Gu:
Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications.
Blockchain II
- Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, Seungwon Shin:
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web. - Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich:
Vault: Fast Bootstrapping for the Algorand Cryptocurrency. - Michael Rodler, Wenting Li
, Ghassan O. Karame, Lucas Davi:
Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks. - Giulio Malavolta, Pedro Moreno-Sanchez
, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. - Xiaofei Bai, Jian Gao, Chenglong Hu, Liang Zhang:
Constructing an Adversary Solver for Equihash.
Trusted Execution
- Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee:
OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. - Lianying Zhao, Mohammad Mannan:
TEE-aided Write Protection Against Privileged Data Tampering. - Samuel Weiser, Mario Werner, Ferdinand Brasser, Maja Malenko, Stefan Mangard, Ahmad-Reza Sadeghi:
TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V. - Virgil D. Gligor, Shan Leung Maverick Woo:
Establishing Software Root of Trust Unconditionally.
Machine Learning & Game Theory Applications
- Binghui Wang, Jinyuan Jia, Neil Zhenqiang Gong:
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation. - Milad Nasr, Sadegh Farhang, Amir Houmansadr, Jens Grossklags:
Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory. - Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, Prateek Saxena:
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints. - Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, Zhexin Zhang:
Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.