隐私计算研习社
NDSS是网络和系统安全领域的四大顶级国际学术会议(BIG4)之一,第三十届会议于2023年2月27日到3月3日,在美国圣迭戈举办。本文将分上下两部分整理会议录取的94篇论文,并对论文进行分类,感兴趣的小伙伴可以访问论文链接,进一步研究。
Intrusion Detection
A Robust Counting Sketch for Data Plane Intrusion Detection
https://www.ndss-symposium.org/ndss-paper/a-robust-counting-sketch-for-data-plane-intrusion-detection/
Authentication and Biometrics
A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites
https://www.ndss-symposium.org/ndss-paper/a-systematic-study-of-the-consistency-of-two-factor-authentication-user-journeys-on-top-ranked-websites/
AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms
https://www.ndss-symposium.org/ndss-paper/authentisense-a-scalable-behavioral-biometrics-authentication-scheme-using-few-shot-learning-for-mobile-platforms/
Forensics
An OS-agnostic Approach to Memory Forensics
https://www.ndss-symposium.org/ndss-paper/an-os-agnostic-approach-to-memory-forensics/
Protocol Security
Automata-Based Automated Detection of State Machine Bugs in Protocol Implementations
https://www.ndss-symposium.org/ndss-paper/automata-based-automated-detection-of-state-machine-bugs-in-protocol-implementations/
Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing
https://www.ndss-symposium.org/ndss-paper/extrapolating-formal-analysis-to-uncover-attacks-in-bluetooth-passkey-entry-pairing/
Privacy and Anonymity
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies
https://www.ndss-symposium.org/ndss-paper/on-the-anonymity-of-peer-to-peer-network-anonymity-schemes-used-by-cryptocurrencies/
Trellis: Robust and Scalable Metadata-private Anonymous Broadcast
https://www.ndss-symposium.org/ndss-paper/trellis-robust-and-scalable-metadata-private-anonymous-broadcast/
Machine Learning Security
PPA: Preference Profiling Attack Against Federated Learning
https://www.ndss-symposium.org/ndss-paper/ppa-preference-profiling-attack-against-federated-learning/
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning
https://www.ndss-symposium.org/ndss-paper/smarter-contracts-detecting-vulnerabilities-in-smart-contracts-with-deep-transfer-learning/
Machine Unlearning of Features and Labels
https://www.ndss-symposium.org/ndss-paper/machine-unlearning-of-features-and-labels/
RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression
https://www.ndss-symposium.org/ndss-paper/rovisq-reduction-of-video-service-quality-via-adversarial-attacks-on-deep-learning-based-video-compression/
Securing Federated Sensitive Topic Classification against Poisoning Attacks
https://www.ndss-symposium.org/ndss-paper/securing-federated-sensitive-topic-classification-against-poisoning-attacks/
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices
https://www.ndss-symposium.org/ndss-paper/the-beatrix-resurrections-robust-backdoor-detection-via-gram-matrices/
Cyber Threats and Disinformation
Tactics, Threats & Targets: Modeling Disinformation and its Mitigation
https://www.ndss-symposium.org/ndss-paper/tactics-threats-targets-modeling-disinformation-and-its-mitigation/
Network Security
Brokenwire : Wireless Disruption of CCS Electric Vehicle Charging
https://www.ndss-symposium.org/ndss-paper/brokenwire-wireless-disruption-of-ccs-electric-vehicle-charging/
ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems
https://www.ndss-symposium.org/ndss-paper/chargeprint-a-framework-for-internet-scale-discovery-and-security-analysis-of-ev-charging-management-systems/
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis
https://www.ndss-symposium.org/ndss-paper/detecting-unknown-encrypted-malicious-traffic-in-real-time-via-flow-interaction-graph-analysis/
QUICforge: Client-side Request Forgery in QUIC
https://www.ndss-symposium.org/ndss-paper/quicforge-client-side-request-forgery-in-quic/
Miscellaneous
BinaryInferno: A Semantic-Driven Approach to Field Inference for Binary Message Formats
https://www.ndss-symposium.org/ndss-paper/binaryinferno-a-semantic-driven-approach-to-field-inference-for-binary-message-formats/
Browser Permission Mechanisms Demystified
https://www.ndss-symposium.org/ndss-paper/browser-permission-mechanisms-demystified/
DARWIN: Survival of the Fittest Fuzzing Mutators
https://www.ndss-symposium.org/ndss-paper/darwin-survival-of-the-fittest-fuzzing-mutators/
Efficient Dynamic Proof of Retrievability for Cold Storage
https://www.ndss-symposium.org/ndss-paper/efficient-dynamic-proof-of-retrievability-for-cold-storage/
Evasion Attacks and Defenses on Smart Home Physical Event Verification
https://www.ndss-symposium.org/ndss-paper/evasion-attacks-and-defenses-on-smart-home-physical-event-verification/
Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection
https://www.ndss-symposium.org/ndss-paper/faster-secure-comparisons-with-offline-phase-for-efficient-private-set-intersection/
Fusion: Efficient and Secure Inference Resilient to Malicious Servers
https://www.ndss-symposium.org/ndss-paper/fusion-efficient-and-secure-inference-resilient-to-malicious-servers/
Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation and Revocation
https://www.ndss-symposium.org/ndss-paper/ghost-domain-reloaded-vulnerable-links-in-domain-name-delegation-and-revocation/
Hope of Delivery: Extracting User Locations From Mobile Instant Messengers
https://www.ndss-symposium.org/ndss-paper/hope-of-delivery-extracting-user-locations-from-mobile-instant-messengers/
Let Me Unwind That For You: Exceptions to Backward-Edge Protection
https://www.ndss-symposium.org/ndss-paper/let-me-unwind-that-for-you-exceptions-to-backward-edge-protection/
MyTEE: Own the Trusted Execution Environment on Embedded Devices
https://www.ndss-symposium.org/ndss-paper/mytee-own-the-trusted-execution-environment-on-embedded-devices/
POSE: Practical Off-chain Smart Contract Execution
https://www.ndss-symposium.org/ndss-paper/pose-practical-off-chain-smart-contract-execution/
Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards of User-unresettable Identifiers
https://www.ndss-symposium.org/ndss-paper/post-gdpr-threat-hunting-on-android-phones-dissecting-os-level-safeguards-of-user-unresettable-identifiers/
Private Certifier Intersection
https://www.ndss-symposium.org/ndss-paper/private-certifier-intersection/
Towards Automatic and Precise Heap Layout Manipulation for General-Purpose Programs
https://www.ndss-symposium.org/ndss-paper/towards-automatic-and-precise-heap-layout-manipulation-for-general-purpose-programs/
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests
https://www.ndss-symposium.org/ndss-paper/auto-draft-336/
Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels
https://www.ndss-symposium.org/ndss-paper/your-router-is-my-prober-measuring-ipv6-networks-via-icmp-rate-limiting-side-channels/
eepfake Text Detection: Limitations and Opportunities Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy
END
往期推荐
案例分享 | 联邦学习在洗钱风险管理中的应用展望
中国密码学会2023年区块链密码学术会议 (CryptoBC 2023)通知
Diffusion扩散模型大白话讲解,看完还不懂?不可能!
问题综述 | 隐私求交(Private Set Intersection)