NDSS 2017 68 papers accepted. Updated on 2023-10-06. You can find the lastest information here. IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality. ObliviSync: Practical Oblivious File Backup and Synchronization. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub. P2P Mixing and Unlinkable Bitcoin Transactions. SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. DELTA: A Security Assessment Framework for Software-Defined Networks. PSI: Precise Security Instrumentation for Enterprise Networks. On the Safety and Efficiency of Virtual Firewall Elasticity Control. Deconstructing Xen. Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web. Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots. (Cross-)Browser Fingerprinting via OS and Hardware Level Features. Fake Co-visitation Injection Attacks to Recommender Systems. Broken Hearted: How To Attack ECG Biometrics. Towards Implicit Visual Memory-Based Authentication. KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting. A Large-scale Analysis of the Mnemonic Password Advice. Cracking Android Pattern Lock in Five Attempts. Dial One for Scam: A Large-Scale Analysis of Technical Support Scams. Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. A Broad View of the Ecosystem of Socially Engineered Exploit Documents. Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent Delivery Campaigns. Measuring small subgroup attacks against Diffie-Hellman. Indiscreet Logs: Diffie-Hellman Backdoors in TLS. WireGuard: Next Generation Kernel Network Tunnel. The Security Impact of HTTPS Interception. Fast Actively Secure OT Extension for Short Secrets. Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO. Pushing the Communication Barrier in Secure Computation using Lookup Tables. Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data. Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps. Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps. WindowGuard: Systematic Protection of GUI Security in Android. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. Automated Analysis of Privacy Requirements for Mobile Apps. Dachshund: Digging for and Securing (Non-)Blinded Constants in JIT Code. Safelnit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. MARX: Uncovering Class Hierarchies in C++ Programs. PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables. Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM. Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. Dynamic Differential Location Privacy with Personalized Error Bounds. Are We There Yet? On RPKI's Deployment and Security. TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. Dissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures. The Effect of DNS on Tor's Anonymity. Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection. HisTorĪµ: Differentially Private and Robust Statistics Collection for Tor. SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments. HOP: Hardware makes Obfuscation Practical. Panoply: Low-TCB Linux Applications With SGX Enclaves. Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms. FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild. Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis. Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones. ASLR on the Line: Practical Cache Attacks on the MMU. Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. An Evil Copy: How the Loader Betrays You. Stack Bounds Protection with Low Fat Pointers. VUzzer: Application-aware Evolutionary Fuzzing. Self Destructing Exploit Executions via Input Perturbation. A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations. Ramblr: Making Reassembly Great Again.