NDSS 2017

68 papers accepted.

Updated on 2023-10-06.

You can find the lastest information here.


IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality.

ObliviSync: Practical Oblivious File Backup and Synchronization.

TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub.

P2P Mixing and Unlinkable Bitcoin Transactions.

SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.

DELTA: A Security Assessment Framework for Software-Defined Networks.

PSI: Precise Security Instrumentation for Enterprise Networks.

On the Safety and Efficiency of Virtual Firewall Elasticity Control.

Deconstructing Xen.

Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.

Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots.

(Cross-)Browser Fingerprinting via OS and Hardware Level Features.

Fake Co-visitation Injection Attacks to Recommender Systems.

Broken Hearted: How To Attack ECG Biometrics.

Towards Implicit Visual Memory-Based Authentication.

KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting.

A Large-scale Analysis of the Mnemonic Password Advice.

Cracking Android Pattern Lock in Five Attempts.

Dial One for Scam: A Large-Scale Analysis of Technical Support Scams.

Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability.

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.

A Broad View of the Ecosystem of Socially Engineered Exploit Documents.

Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns.

Measuring small subgroup attacks against Diffie-Hellman.

Indiscreet Logs: Diffie-Hellman Backdoors in TLS.

WireGuard: Next Generation Kernel Network Tunnel.

The Security Impact of HTTPS Interception.

Fast Actively Secure OT Extension for Short Secrets.

Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO.

Pushing the Communication Barrier in Secure Computation using Lookup Tables.

Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data.

Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.

Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.

WindowGuard: Systematic Protection of GUI Security in Android.

Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis.

Automated Analysis of Privacy Requirements for Mobile Apps.

Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code.

Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities.

MARX: Uncovering Class Hierarchies in C++ Programs.

PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables.

Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM.

Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.

Dynamic Differential Location Privacy with Personalized Error Bounds.

Are We There Yet? On RPKI's Deployment and Security.

TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.

Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures.

The Effect of DNS on Tor's Anonymity.

Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection.

HisTorĪµ: Differentially Private and Robust Statistics Collection for Tor.

SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.

T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.

HOP: Hardware makes Obfuscation Practical.

Panoply: Low-TCB Linux Applications With SGX Enclaves.

Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit.

ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.

FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.

Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis.

Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones.

ASLR on the Line: Practical Cache Attacks on the MMU.

Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying.

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.

An Evil Copy: How the Loader Betrays You.

Stack Bounds Protection with Low Fat Pointers.

VUzzer: Application-aware Evolutionary Fuzzing.

Self Destructing Exploit Executions via Input Perturbation.

A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations.

Ramblr: Making Reassembly Great Again.