NDSS 2023

94 papers accepted.

Updated on 2023-09-08.

You can find the lastest information here.


Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software.

Let Me Unwind That For You: Exceptions to Backward-Edge Protection.

Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs.

Backdoor Attacks Against Dataset Distillation.

REaaS: Enabling Adversarially Robust Downstream Classifiers via Robust Encoder as a Service.

Adversarial Robustness for Tabular Data through Cost and Utility Awareness.

Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes.

ProbFlow : Using Probabilistic Programming in Anonymous Communication Networks.

PPA: Preference Profiling Attack Against Federated Learning.

RAI2: Responsible Identity Audit Governing the Artificial Intelligence.

Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection.

DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing.

Browser Permission Mechanisms Demystified.

Drone Security and the Mysterious Case of DJI's DroneID.

The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.

RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression.

Machine Unlearning of Features and Labels.

Fusion: Efficient and Secure Inference Resilient to Malicious Servers.

Trellis: Robust and Scalable Metadata-private Anonymous Broadcast.

On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies.

Thwarting Smartphone SMS Attacks at the Radio Interface Layer.

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.

FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities.

No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions.

DARWIN: Survival of the Fittest Fuzzing Mutators.

LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.

Securing Federated Sensitive Topic Classification against Poisoning Attacks.

OBSan: An Out-Of-Bound Sanitizer to Harden DNN Executables.

BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems.

Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation.

QUICforge: Client-side Request Forgery in QUIC.

Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations.

I Still Know What You Watched Last Sunday: Privacy of the HbbTV Protocol in the European Smart TV Landscape.

Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels.

POSE: Practical Off-chain Smart Contract Execution.

OptRand: Optimistically Responsive Reconfigurable Distributed Randomness.

Partitioning Ethereum without Eclipsing It.

Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.

Real Threshold ECDSA.

Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers.

MyTEE: Own the Trusted Execution Environment on Embedded Devices.

StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors.

AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms.

Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.

RR: A Fault Model for Efficient TEE Replication.

Copy-on-Flip: Hardening ECC Memory Against Rowhammer Attacks.

Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems.

Cryptographic Oracle-based Conditional Payments.

BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects.

Breaking and Fixing Virtual Channels: Domino Attack and Donner.

He-HTLC: Revisiting Incentives in HTLC.

Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging.

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.

Private Certifier Intersection.

OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption.

Un-Rocking Drones: Foundations of Acoustic Injection Attacks and Recovery Thereof.

EdgeTDC: On the Security of Time Difference of Arrival Measurements in CAN Bus Systems.

Evasion Attacks and Defenses on Smart Home Physical Event Verification.

SoundLock: A Novel User Authentication Scheme for VR Devices Using Auditory-Pupillary Response.

Accountable Javascript Code Delivery.

ReScan: A Middleware Framework for Realistic and Robust Black-box Web Application Scanning.

Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites.

A Security Study about Electron Applications and a Programming Methodology to Tame DOM Functionalities.

An OS-agnostic Approach to Memory Forensics.

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.

Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams.

Preventing SIM Box Fraud Using Device Model Fingerprinting.

Access Your Tesla without Your Awareness: Compromising Keyless Entry System of Model 3.

MetaWave: Attacking mmWave Sensing with Meta-material-enhanced Tags.

Paralyzing Drones via EMI Signal Injection on Sensory Communication Channels.

Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging.

CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph.

SynthDB: Synthesizing Database via Program Analysis for Security Testing of Web Applications.

Hope of Delivery: Extracting User Locations From Mobile Instant Messengers.

Tactics, Threats & Targets: Modeling Disinformation and its Mitigation.

How to Count Bots in Longitudinal Datasets of IP Addresses.

Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.

BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats.

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis.

Efficient Dynamic Proof of Retrievability for Cold Storage.

HeteroScore: Evaluating and Mitigating Cloud Security Threats Brought by Heterogeneity.

A Robust Counting Sketch for Data Plane Intrusion Detection.

REDsec: Running Encrypted Discretized Neural Networks in Seconds.

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.

VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests.

ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems.

A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites.

Privacy-Preserving Database Fingerprinting.

Folk Models of Misinformation on Social Media.

Fine-Grained Trackability in Protocol Executions.