NDSS 2015

50 papers accepted.

Updated on 2023-10-06.

You can find the lastest information here.


Identifying Cross-origin Resource Status Using Application Cache.

Parking Sensors: Analyzing and Detecting Parked Domains.

Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse.

Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning.

I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser.

Information Flow Analysis of Android Applications in DroidSafe.

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.

EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.

CopperDroid: Automatic Reconstruction of Android Malware Behaviors.

DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.

VTint: Protecting Virtual Function Tables' Integrity.

Phoneypot: Data-driven Understanding of Telephony Threats.

SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment.

FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers.

EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration.

Machine Learning Classification over Encrypted Data.

Gracewipe: Secure and Verifiable Deletion under Coercion.

Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces.

Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.

DEFY: A Deniable, Encrypted File System for Log-Structured Storage.

Preventing Use-after-free with Dangling Pointers Nullification.

StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.

Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.

Principled Sampling for Anomaly Detection.

Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes.

Opaque Control-Flow Integrity.

Bloom Cookies: Web Search Personalization without User Tracking.

NSEC5: Provably Preventing DNSSEC Zone Enumeration.

Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.

Efficient RAM and control flow in verifiable outsourced computation.

Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.

Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics.

Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords.

Verified Contributive Channel Bindings for Compound Authentication.

The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines.

Exploiting and Protecting Dynamic Code Generation.

Too LeJIT to Quit: Extending JIT Spraying to ARM.

Run-time Monitoring and Formal Analysis of Information Flows in Chromium.

Mind Your Blocks: On the Stealthiness of Malicious BGP Hijacks.

SPHINX: Detecting Security Attacks in Software-Defined Networks.

Securing the Software Defined Network Control Layer.

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.

Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.

vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries.

P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.

No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.