查看原文
其他

国际安全领域顶会NDSS 2023录稿整理 (上)

NDSS是网络和系统安全领域的四大顶级国际学术会议(BIG4)之一,第三十届会议于2023年2月27日到3月3日,在美国圣迭戈举办。本文将分上下两部分整理会议录取的94篇论文,并对论文进行分类,感兴趣的小伙伴可以访问论文链接,进一步研究。

Intrusion Detection

  • A Robust Counting Sketch for Data Plane Intrusion Detection
https://www.ndss-symposium.org/ndss-paper/a-robust-counting-sketch-for-data-plane-intrusion-detection/


Authentication and Biometrics

  • A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites

https://www.ndss-symposium.org/ndss-paper/a-systematic-study-of-the-consistency-of-two-factor-authentication-user-journeys-on-top-ranked-websites/

  • AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms

https://www.ndss-symposium.org/ndss-paper/authentisense-a-scalable-behavioral-biometrics-authentication-scheme-using-few-shot-learning-for-mobile-platforms/


Forensics

  • An OS-agnostic Approach to Memory Forensics

https://www.ndss-symposium.org/ndss-paper/an-os-agnostic-approach-to-memory-forensics/


Protocol Security

  • Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations

https://www.ndss-symposium.org/ndss-paper/automata-based-automated-detection-of-state-machine-bugs-in-protocol-implementations/

  • Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing

https://www.ndss-symposium.org/ndss-paper/extrapolating-formal-analysis-to-uncover-attacks-in-bluetooth-passkey-entry-pairing/


Privacy and Anonymity

  • On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies

https://www.ndss-symposium.org/ndss-paper/on-the-anonymity-of-peer-to-peer-network-anonymity-schemes-used-by-cryptocurrencies/

  • Trellis: Robust and Scalable Metadata-private Anonymous Broadcast

https://www.ndss-symposium.org/ndss-paper/trellis-robust-and-scalable-metadata-private-anonymous-broadcast/


Machine Learning Security

  • PPA: Preference Profiling Attack Against Federated Learning

https://www.ndss-symposium.org/ndss-paper/ppa-preference-profiling-attack-against-federated-learning/

  • Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning

https://www.ndss-symposium.org/ndss-paper/smarter-contracts-detecting-vulnerabilities-in-smart-contracts-with-deep-transfer-learning/

  • Machine Unlearning of Features and Labels

https://www.ndss-symposium.org/ndss-paper/machine-unlearning-of-features-and-labels/

  • RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression

https://www.ndss-symposium.org/ndss-paper/rovisq-reduction-of-video-service-quality-via-adversarial-attacks-on-deep-learning-based-video-compression/

  • Securing Federated Sensitive Topic Classification against Poisoning Attacks

https://www.ndss-symposium.org/ndss-paper/securing-federated-sensitive-topic-classification-against-poisoning-attacks/

  • The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices

https://www.ndss-symposium.org/ndss-paper/the-beatrix-resurrections-robust-backdoor-detection-via-gram-matrices/



Cyber Threats and Disinformation

  • Tactics, Threats & Targets: Modeling Disinformation and its Mitigation

https://www.ndss-symposium.org/ndss-paper/tactics-threats-targets-modeling-disinformation-and-its-mitigation/


Network Security

  • Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging

https://www.ndss-symposium.org/ndss-paper/brokenwire-wireless-disruption-of-ccs-electric-vehicle-charging/

  • ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems

https://www.ndss-symposium.org/ndss-paper/chargeprint-a-framework-for-internet-scale-discovery-and-security-analysis-of-ev-charging-management-systems/

  • Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis

https://www.ndss-symposium.org/ndss-paper/detecting-unknown-encrypted-malicious-traffic-in-real-time-via-flow-interaction-graph-analysis/

  • QUICforge: Client-side Request Forgery in QUIC

https://www.ndss-symposium.org/ndss-paper/quicforge-client-side-request-forgery-in-quic/


Miscellaneous

  • BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats

https://www.ndss-symposium.org/ndss-paper/binaryinferno-a-semantic-driven-approach-to-field-inference-for-binary-message-formats/

  • Browser Permission Mechanisms Demystified

https://www.ndss-symposium.org/ndss-paper/browser-permission-mechanisms-demystified/

  • DARWIN: Survival of the Fittest Fuzzing Mutators

https://www.ndss-symposium.org/ndss-paper/darwin-survival-of-the-fittest-fuzzing-mutators/

  • Efficient Dynamic Proof of Retrievability for Cold Storage

https://www.ndss-symposium.org/ndss-paper/efficient-dynamic-proof-of-retrievability-for-cold-storage/

  • Evasion Attacks and Defenses on Smart Home Physical Event Verification

https://www.ndss-symposium.org/ndss-paper/evasion-attacks-and-defenses-on-smart-home-physical-event-verification/

  • Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection

https://www.ndss-symposium.org/ndss-paper/faster-secure-comparisons-with-offline-phase-for-efficient-private-set-intersection/

  • Fusion: Efficient and Secure Inference Resilient to Malicious Servers

https://www.ndss-symposium.org/ndss-paper/fusion-efficient-and-secure-inference-resilient-to-malicious-servers/

  • Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation

https://www.ndss-symposium.org/ndss-paper/ghost-domain-reloaded-vulnerable-links-in-domain-name-delegation-and-revocation/

  • Hope of Delivery: Extracting User Locations From Mobile Instant Messengers

https://www.ndss-symposium.org/ndss-paper/hope-of-delivery-extracting-user-locations-from-mobile-instant-messengers/

  • Let Me Unwind That For You: Exceptions to Backward-Edge Protection

https://www.ndss-symposium.org/ndss-paper/let-me-unwind-that-for-you-exceptions-to-backward-edge-protection/

  • MyTEE: Own the Trusted Execution Environment on Embedded Devices

https://www.ndss-symposium.org/ndss-paper/mytee-own-the-trusted-execution-environment-on-embedded-devices/

  • POSE: Practical Off-chain Smart Contract Execution

https://www.ndss-symposium.org/ndss-paper/pose-practical-off-chain-smart-contract-execution/

  • Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers

https://www.ndss-symposium.org/ndss-paper/post-gdpr-threat-hunting-on-android-phones-dissecting-os-level-safeguards-of-user-unresettable-identifiers/

  • Private Certifier Intersection

https://www.ndss-symposium.org/ndss-paper/private-certifier-intersection/

  • Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs

https://www.ndss-symposium.org/ndss-paper/towards-automatic-and-precise-heap-layout-manipulation-for-general-purpose-programs/

  • VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests

https://www.ndss-symposium.org/ndss-paper/auto-draft-336/

  • Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels

https://www.ndss-symposium.org/ndss-paper/your-router-is-my-prober-measuring-ipv6-networks-via-icmp-rate-limiting-side-channels/


eepfake Text Detection: Limitations and Opportunities Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
END

往期推荐


案例分享 | 联邦学习在洗钱风险管理中的应用展望
中国密码学会2023年区块链密码学术会议 (CryptoBC 2023)通知
Diffusion扩散模型大白话讲解,看完还不懂?不可能!
问题综述 | 隐私求交(Private Set Intersection)
欢迎投稿
邮箱:pet@openmpc.com
参与更多讨论,请添加小编微信加入交流群


您可能也对以下帖子感兴趣

文章有问题?点此查看未经处理的缓存