网络空间安全领域顶级会议之NDSS 2021录取目录一览

2021年网络安全领域四大顶会的论文录用均已揭晓,InForSec特整理相关信息分享给网络安全学术社区。

NDSS 会议(全称The Network and Distributed System Security Symposium)是和CCS,USENIX SECURITY及IEEE S&P并称的计算机系统安全领域的四大顶级会议之一。

目前为CCF B 类会议,2021年共有两轮(夏季、秋季)论文征稿,NDSS 2021会议共发表87篇论文(录取比例为15.2%,2020年录取率为17.3%,2019年录取率为17%,2018录取率为21.4%,),其中共有7篇是来自中国的学人研究成果。(注:数据为人工统计,如有疏漏,还请指正。)

NDSS 2021 创新成果涉及互联网安全、移动无线网络安全、数据安全、密码、人工智能安全、硬件安全、软件安全、区块链安全、安全分析、物联网安全以及无人系统安全等众多领域。

以下为NDSS 2021年录取论文列表:

论文标题作者信息第一作者单位一作单位所在国家
All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile MessengersChristoph Hagen (University of Würzburg); Christian Weinert (TU Darmstadt); Christoph Sendner and Alexandra Dmitrienko (University of Würzburg); Thomas Schneider (TU Darmstadt)University of Würzburg德国
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC ServiceKai Li, Jiaqi Chen, Xianghong Liu, and Yuzhe Tang (Syracuse University); XiaoFeng Wang (Indiana University Bloomington); Xiapu Luo (The Hong Kong Polytechnic University)Syracuse University(雪城大学)美国
Awakening the Web’s Sleeper Agents: Misusing Service Workers for Privacy LeakageSoroush Karami, Panagiotis Ilia, and Jason Polakis (University of Illinois at Chicago)University of Illinois at Chicago美国
Bringing Balance to the Force: Dynamic Analysis of the Android Application FrameworkAbdallah Dawoud and Sven Bugiel (CISPA Helmholtz Center for Information Security)CISPA Helmholtz Center for Information Security德国
C$^2$SR: Cybercrime Scene Reconstruction for Post-mortem Forensic AnalysisYonghwi Kwon (University of Virginia); Weihang Wang (University at Buffalo, SUNY); Jinho Jung (Georgia Institute of Technology); Kyu Hyung Lee (University of Georgia); Roberto Perdisci (University of Georgia and Georgia Tech)University of Virginia美国
Deceptive Deletions for Protecting Withdrawn Posts on Social Media PlatformsMohsen Minaei (Visa Research); S Chandra Mouli (Purdue University); Mainack Mondal (IIT Kharagpur); Bruno Ribeiro and Aniket Kate (Purdue University)Visa Research美国
DOVE: A Data-Oblivious Virtual EnvironmentHyun Bin Lee (University of Illinois at Urbana-Champaign); Tushar Jois (Johns Hopkins University); Christopher Fletcher and Carl A. Gunter (University of Illinois at Urbana-Champaign)University of Illinois at Urbana-Champaign伊利诺伊大学香槟分校 美国
Evading Voltage-Based Intrusion Detection on Automotive CANRohit Bhatia (Purdue University); Vireshwar Kumar (Indian Institute of Technology Delhi); Khaled Serag and Z. Berkay Celik (Purdue University); Mathias Payer (EPFL); Dongyan Xu (Purdue University)Purdue University美国
Forward and Backward Private Conjunctive Searchable Symmetric EncryptionSikhar Patranabis (ETH Zurich); Debdeep Mukhopadhyay (IIT Kharagpur)ETH Zurich苏黎世联邦理工学院瑞士
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPRChaoyi Lu (Tsinghua University; Beijing National Research Center for Information Science and Technology); Baojun Liu (Tsinghua University; Beijing National Research Center for Information Science and Technology; Qi An Xin Group); Yiming Zhang (Tsinghua University; Beijing National Research Center for Information Science and Technology); Zhou Li (University of California, Irvine); Fenglu Zhang (Tsinghua University); Haixin Duan (Tsinghua University; Qi An Xin Group); Ying Liu (Tsinghua University); Joann Qiongna Chen (University of California, Irvine); Jinjin Liang and Zaifeng Zhang (360 Netlab); Shuang Hao (University of Texas at Dallas); Min Yang (Fudan University)Tsinghua University; Beijing National Research Center for Information Science and Technology中国
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill EcosystemChristopher Lentzsch (Ruhr-Universität Bochum); Sheel Jayesh Shah (North Carolina State University); Benjamin Andow (Google); Martin Degeling (Ruhr-Universität Bochum); Anupam Das and William Enck (North Carolina State University)Ruhr-Universität Bochum波鸿鲁尔大学德国
Let’s Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees EvaluationJack P. K. Ma and Raymond K. H. Tai (The Chinese University of Hong Kong); Yongjun Zhao (Nanyang Technological University); Sherman S.M. Chow (The Chinese University of Hong Kong)The Chinese University of Hong Kong中国香港
More than a Fair Share: Network Data Remanence Attacks against Secret Sharing-based SchemesLeila Rashidi (University of Calgary); Daniel Kostecki (Northeastern University); Alexander James (University of Calgary); Anthony Peterson (Northeastern University); Majid Ghaderi (University of Calgary); Samuel Jero (MIT Lincoln Laboratory); Cristina Nita-Rotaru (Northeastern University); Hamed Okhravi (MIT Lincoln Laboratory); Reihaneh Safavi-Naini (University of Calgary)University of Calgary卡尔加里大学加拿大
Obfuscated Access and Search Patterns in Searchable EncryptionZhiwei Shang and Simon Oya (University of Waterloo); Andreas Peter (University of Twente); Florian Kerschbaum (University of Waterloo)University of Waterloo滑铁卢大学加拿大
Peerlock: Flexsealing BGPTyler McDaniel, Jared M. Smith, and Max Schuchard (University of Tennessee, Knoxville)University of Tennessee, Knoxville田纳西大学-诺克斯维尔美国
POP and PUSH: Demystifying and Defending against (Mach) Port-oriented ProgrammingMin Zheng and Xiaolong Bai (Orion Security Lab, Alibaba Group); Yajin Zhou (Zhejiang University); Chao Zhang (Institute for Network Science and Cyberspace of Tsinghua University); Fuping Qu (Orion Security Lab, Alibaba Group)Orion Security Lab, Alibaba Group阿里安全猎户座实验室中国
Processing Dangerous Paths – On Security and Privacy of the Portable Document FormatJens Müller, Dominik Noss, Christian Mainka, Vladislav Mladenov, and Jörg Schwenk (Ruhr University Bochum)Ruhr University Bochum波鸿鲁尔大学德国
Reining in the Web’s Inconsistencies with Site PolicyStefano Calzavara (Università Ca’ Foscari Venezia); Tobias Urban (Institute for Internet Security, Westphalian University of Applied Sciences and Ruhr University Bochum); Dennis Tatang (Ruhr University Bochum); Marius Steffens and Ben Stock (CISPA Helmholtz Center for Information Security)Università Ca’ Foscari Venezia意大利威尼斯大学意大利
Rosita: Towards Automatic Elimination of Power-Analysis Leakage in CiphersMadura A. Shelton (University of Adelaide); Niels Samwel and Lejla Batina (Radboud University); Francesco Regazzoni (University of Amsterdam and ALaRI – USI); Markus Wagner (University of Adelaide); Yuval Yarom (University of Adelaide and Data61)University of Adelaide阿德莱德大学澳大利亚
Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side ChannelZhuoran Liu (Radboud university); Niels Samwel, Léo Weissbart, Zhengyu Zhao, Dirk Lauret, Lejla Batina, and Martha Larson (Radboud University)Radboud university拉德堡德大学荷兰
The Abuser Inside Apps: Finding the Culprit Committing Mobile Ad FraudJoongyum Kim, Jung-hwan Park, and Sooel Son (KAIST)KAIST韩国
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted LanguagesRuian Duan, Omar Alrawi, Ranjita Pai Kasturi, Ryan Elder, Brendan Saltaformaggio, and Wenke Lee (Georgia Institute of Technology)Georgia Institute of Technology美国
XDA: Accurate, Robust Disassembly with Transfer LearningKexin Pei (Columbia University); Jonas Guan (University of Toronto); David Williams-King, Junfeng Yang, and Suman Jana (Columbia University)Columbia University美国
Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference AttacksMohd Sabra (University of Texas at San Antonio); Anindya Maiti (University of Oklahoma); Murtuza Jadliwala (University of Texas at San Antonio)University of Texas at San Antonio美国
A Devil of a Time: How Vulnerable is NTP to Malicious Timeservers?Yarin Perry, Neta Rozen-Schiff, and Michael Schapira (Hebrew University of Jerusalem)Hebrew University of Jerusalem以色列
A Formal Analysis of the FIDO UAF ProtocolHaonan Feng, Hui Li, and Xuesong Pan (Beijing University of Posts and Telecommunications, Beijing, China); Ziming Zhao (University at Buffalo)Beijing University of Posts and Telecommunications, Beijing, China中国
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without InstrumentationLe Yu (Purdue University); Shiqing Ma (Rutgers University); Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, and Dongyan Xu (Purdue University); Vincent E. Urias and Han Wei Lin (Sandia National Laboratories); Gabriela Ciocarlie (SRI); Vinod Yegneswaran (SRI International); Ashish Gehani (SRI)Purdue University美国
BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 ProtocolsEunsoo Kim, Dongkwan Kim, CheolJun Park, Insu Yun, and Yongdae Kim (KAIST)KAIST韩国
Bitcontracts: Supporting Smart Contracts in Legacy BlockchainsKarl Wüst, Loris Diana, and Kari Kostiainen (ETH Zurich); Ghassan Karame (NEC Laboratories Europe GmbH); Sinisa Matetic and Srdjan Capkun (ETH Zurich)ETH Zurich瑞士
CHANCEL: Efficient Multi-client Isolation Under Adversarial ProgramsAdil Ahmad (Purdue University); Juhee Kim (Seoul National University); Jaebaek Seo (Google); Insik Shin (KAIST); Pedro Fonseca (Purdue University); Byoungyoung Lee (Seoul National University)Purdue University美国
CV-Inspector: Towards Automating Detection of Adblock CircumventionHieu Le (University of California, Irvine); Athina Markopoulou (University of California, Irvine); Zubair Shafiq (University of California, Davis)University of California, Irvine美国
Data Poisoning Attacks to Deep Learning Based Recommender SystemsHai Huang and Jiaming Mu (Tsinghua University); Neil Zhenqiang Gong (Duke University); Qi Li (Tsinghua University); Bin Liu (IBM); Mingwei Xu (Tsinghua University)Tsinghua University中国
Detecting Kernel Memory Leaks in Specialized Modules with Ownership ReasoningNavid Emamdoost, Qiushi Wu, Kangjie Lu, and Stephen McCamant (University of Minnesota)University of Minnesota美国
Differential Training: A Generic Framework to Reduce Label Noises for Android Malware DetectionJiayun Xu (School of Information Systems, Singapore Management University, Singapore); Yingjiu Li (University of Oregon); Robert H. Deng (School of Information Systems, Singapore Management University, Singapore)School of Information Systems, Singapore Management University, Singapore新加坡
Does Every Second Count? Time-based Evolution of Malware Behavior in SandboxesAlexander Küchler (Fraunhofer AISEC); Alessandro Mantovani (EURECOM); Yufei Han and Leyla Bilge (NortonLifeLock Research Group); Davide Balzarotti (EURECOM)Fraunhofer AISEC德国
EarArray: Defending against DolphinAttack via Acoustic AttenuationGuoming Zhang, Xiaoyu Ji, and Xinfeng Li (Zhejiang University); Gang Qu (University of Maryland); Wenyuan Xu (Zhejing University)Zhejiang University中国
Emilia: Catching Iago in Legacy CodeRongzhen Cui (University of Toronto); Lianying Zhao (Carleton University); David Lie (University of Toronto)University of Toronto加拿大
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled DataJunjie Liang and Wenbo Guo (The Pennsylvania State University); Tongbo Luo (JD.com); Vasant Honavar (Pennsylvania State University); Gang Wang (University of Illinois at Urbana-Champaign); Xinyu Xing (Pennsylvania State University)The Pennsylvania State University美国
Favocado: Fuzzing Binding Code of JavaScript Engines Using Semantically Correct Test CasesSung Ta Dinh and Haehyun Cho (Arizona State University); Kyle Martin (North Carolina State University); Adam Oest (PayPal, Inc.); Yihui Zeng (Arizona State University); Alexandros Kapravelos (North Carolina State University); Tiffany Bao, Ruoyu “Fish” Wang, Yan Shoshitaishvili, and Adam Doupe (Arizona State University); Gail-Joon Ahn (Arizona State University and Samsung Research)Arizona State University美国
FlowLens: Enabling Efficient Flow Classification for ML-based Network Security ApplicationsDiogo Barradas, Nuno Santos, and Luis Rodrigues (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa); Salvatore Signorello (Faculdade de Ciências, Universidade de Lisboa); Fernando Ramos and André Madeira (INESC-ID, Instituto Superior Técnico, Universidade de Lisboa)INESC-ID, Instituto Superior Técnico, Universidade de Lisboa葡萄牙
FLTrust: Byzantine-robust Federated Learning via Trust BootstrappingXiaoyu Cao (Duke University); Minghong Fang and Jia Liu (The Ohio State University); Neil Zhenqiang Gong (Duke University)Duke University美国
From Library Portability to Para-rehosting: Natively Executing Open-source Microcontroller OSs on Commodity HardwareWenqiang Li (Institute of Information Engineering, Chinese Academy of Sciences and University of Kansas); Le Guan (University of Georgia); Jingqiang Lin (University of Science and Technology of China); Jiameng Shi (University of Georgia); Fengjun Li (University of Kansas)Institute of Information Engineering, Chinese Academy of Sciences and University of Kansas中国
GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural NetworksQiao Zhang (Old Dominion University); Chunsheng Xin and Hongyi Wu (Old Dominion University, Norfolk, VA 23529, USA)Old Dominion University美国
HERA: Hotpatching of Embedded Real-time ApplicationsChristian Niesler, Sebastian Surminski, and Lucas Davi (University of Duisburg-Essen)University of Duisburg-Essen德国
Hunting the Haunter — Efficient Relational Symbolic Execution for Spectre with HauntedRelSELesly-Ann Daniel and Sébastien Bardin (CEA, List, France); Tamara Rezk (Inria, France)CEA, List, France法国
Improving Signal’s Sealed SenderIan Martiny (University of Colorado); Gabriel Kaptchuk (Boston University); Adam Aviv (The George Washington University); Dan Roche (U.S. Naval Avademy); Eric Wustrow (University of Colorado Boulder)University of Colorado美国
IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction DiscoveryWenbo Ding (Clemson University); Hongxin Hu (University at Buffalo); Long Cheng (Clemson University)Clemson University美国
KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS KernelChangming Liu (Northeastern University); Yaohui Chen (Facebook, Inc.); Long Lu (Northeastern University)Northeastern University美国
Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated LearningVirat Shejwalkar and Amir Houmansadr (UMass Amherst)UMass Amherst美国
MINOS: A Lightweight Real-Time Cryptojacking Detection SystemFaraz Naseem, Ahmet Aris, Leonardo Babun, Selcuk Uluagac, and Ege Tekiner (Florida International University)Florida International University美国
Mondrian: Comprehensive Inter-domain Network Zoning ArchitectureJonghoon Kwon and Hähni Claude (ETH Zürich); Patrick Bamert (Zürcher Kantonalbank); Adrian Perrig (ETH Zürich)ETH Zürich瑞士
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message TracesYapeng Ye, Zhuo Zhang, Fei Wang, Xiangyu Zhang, and Dongyan Xu (Purdue University)Purdue University美国
OblivSketch: Oblivious Network Measurement as a Cloud ServiceShangqi Lai, Xingliang YUAN, and Joseph Liu (Monash University); Xun Yi (RMIT University); Qi Li (Tsinghua University); Dongxi Liu (Data61, CSIRO); Nepal Surya (Data61 CSIRO Australia)Monash University澳大利亚
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile DevicesZeyu Lei and Yuhong Nan (Purdue University); Yanick Fratantonio (EURECOM); Antonio Bianchi (Purdue University)Purdue University美国
PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation SystemsHaotian Chi (Temple University); Qiang Zeng (University of South Carolina); Xiaojiang Du (Temple University); Lannan Luo (University of South Carolina)Temple University美国
PGFUZZ: Policy-Guided Fuzzing for Robotic VehiclesHyungsub Kim, Muslum Ozgur Ozmen, Antonio Bianchi, Z. Berkay Celik, and Dongyan Xu (Purdue University)Purdue University美国
PHOENIX: Device-Centric Cellular Network Protocol Monitoring using Runtime VerificationMitziu Echeverria, Zeeshan Ahmed, Bincheng Wang, and M. Fareed Arif (The University of Iowa); Syed Rafiul Hussain (Pennsylvania State University); Omar Chowdhury (The University of Iowa)The University of Iowa美国
POSEIDON: Privacy-Preserving Federated Neural Network LearningSinem Sav, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, David Froelicher, Jean-Philippe Bossuat, Joao André Gomes de Sá E Sousa, and Jean-Pierre Hubaux (EPFL)EPFL瑞士
Practical Blind Membership Inference Attack via Differential ComparisonsBo Hui, Yuchen Yang, and Haolin Yuan (Johns Hopkins University); Philippe Burlina (The Johns Hopkins University Applied Physics Laboratory); Neil Zhenqiang Gong (Duke University); Yinzhi Cao (Johns Hopkins University)Johns Hopkins University美国
Practical Non-Interactive Searchable Encryption with Forward and Backward PrivacyShi-Feng Sun, Ron Steinfeld, and Shangqi Lai (Monash University, Australia); Xingliang YUAN (Monash University); Amin Sakzad and Joseph Liu (Monash University, Australia); ‪Surya Nepal‬ (Data61 CSIRO, Australia); Dawu Gu (Shanghai Jiao Tong University, China)Monash University, Australia澳大利亚
Preventing and Detecting State Inference Attacks on AndroidAndrea Possemato (EURECOM / IDEMIA); Dario Nisi and Yanick Fratantonio (EURECOM)EURECOM / IDEMIA法国
PrivacyFlash Pro: Automating Privacy Policy Generation for Mobile AppsSebastian Zimmeck, Rafael Goldstein, and David Baraka (Wesleyan University)Wesleyan University美国
ProPoS: A Probabilistic Proof-of-Stake ProtocolDaniel Reijsbergen, Pawel Szalachowski, Junming Ke, Zengpeng Li, and Jianying Zhou (Singapore University of Technology and Design)Singapore University of Technology and Design新加坡
QPEP: An Actionable Approach to Secure and Performant Broadband From Geostationary OrbitJames Pavur (Oxford University); Martin Strohmeier and Vincent Lenders (armasuisse); Ivan Martinovic (Oxford University)Oxford University英国
RandRunner: Distributed Randomness from Trapdoor VDFs with Strong UniquenessPhilipp Schindler, Aljosha Judmayer, and Markus Hittmeir (SBA Research); Nicholas Stifter (SBA Research, TU Wien); Edgar Weippl (Universität Wien)SBA Research奥地利
Refining Indirect Call Targets at the Binary LevelSun Hyoung Kim (Penn State); Cong Sun (Xidian University); Dongrui Zeng and Gang Tan (Penn State)Penn State美国
Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox FuzzingJinghan Wang, Chengyu Song, and Heng Yin (University of California, Riverside)University of California, Riverside美国
ROV++: Improved Deployable Defense against BGP HijackingReynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, and Bing Wang (University of Connecticut)University of Connecticut美国
SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the WebMikhail Shcherbakov and Musard Balliu (KTH Royal Institute of Technology)KTH Royal Institute of Technology瑞典
Shadow Attacks: Hiding and Replacing Content in Signed PDFsChristian Mainka, Vladislav Mladenov, and Simon RohlmannRuhr-Universität Bochum德国
SpecTaint: Speculative Taint Analysis for Discovering Spectre GadgetsZhenxiao Qi (UC Riverside); Qian Feng (Baidu USA); Yueqiang Cheng (Baidu Security); Mengjia Yan (UIUC); Peng Li (Baidu X-Lab); Heng Yin (UC Riverside); Tao Wei (Baidu X-Lab)UC Riverside美国
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement LearningCharlie Hou (CMU, IC3); Mingxun Zhou (Peking University); Yan Ji and Phil Daian (Cornell Tech, IC3); Florian Tramèr (Stanford University); Giulia Fanti (CMU, IC3); Ari Juels (Cornell Tech, IC3)CMU, IC3美国
SymQEMU: Compilation-based symbolic execution for binariesSebastian Poeplau (EURECOM and Code Intelligence); Aurélien Francillon (EURECOM)EURECOM and Code Intelligence法国
Tales of Favicons and Caches: Persistent Tracking in Modern BrowsersKonstantinos Solomos, John Kristoff, Chris Kanich, and Jason Polakis (University of Illinois at Chicago)University of Illinois at Chicago美国
TASE: Reducing Latency of Symbolic Execution with Transactional MemoryAdam Humphries (University of North Carolina); Kartik Cating-Subramanian (University of Colorado); Michael K. Reiter (Duke University)University of North Carolina美国
The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE ProtocolMichael Troncoso and Britta Hale (Naval Postgraduate School)Naval Postgraduate School美国
To Err.Is Human: Characterizing the Threat of Unintended URLs in Social MediaBeliz Kaleli (Boston University); Brian Kondracki (Stony Brook University); Manuel Egele (Boston University); Nick Nikiforakis (Stony Brook University); Gianluca Stringhini (Boston University)Boston University美国
Towards Understanding and Detecting Cyberbullying in Real-world ImagesNishant Vishwamitra and Hongxin Hu (University at Buffalo); Feng Luo and Long Cheng (Clemson University)University at Buffalo美国
Trust the Crowd: Wireless Witnessing to Detect Attacks on ADS-B-Based Air-Traffic SurveillanceKai Jansen (Ruhr University Bochum); Liang Niu and Nian Xue (New York University Abu Dhabi); Ivan Martinovic (University of Oxford); Christina Pöpper (New York University Abu Dhabi)Ruhr University Bochum德国
Understanding and Detecting International Revenue Share FraudMerve Sahin (SAP Security Research); Aurélien Francillon (EURECOM)SAP Security Research法国
Understanding the Growth and Security Considerations of ECSAthanasios Kountouras, Panagiotis Kintis, Athanasios Avgetidis, Thomas Papastergiou, and Charles Lever (Georgia Institute of Technology); Michalis Polychronakis (Stony Brook University); Manos Antonakakis (Georgia Institute of Technology)Georgia Institute of Technology美国
Understanding Worldwide Private Information Collection on AndroidYun Shen and Pierre-Antoine Vervier (NortonLifeLock Research Group); Gianluca Stringhini (Boston University)NortonLifeLock Research Group美国
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual SemanticsJun Zeng (National University of Singapore); Zheng Leong Chua (Independent Researcher); Kaihang Ji and Zhenkai Liang (National University of Singapore); Jian Mao (Beihang University)National University of Singapore新加坡
Who’s Hosting the Block Party? Studying Third-Party Blockage of CSP and SRIMarius Steffens (CISPA Helmholtz Center for Information Security); Marius Musch and Martin Johns (TU Braunschweig); Ben Stock (CISPA Helmholtz Center for Information Security)CISPA Helmholtz Center for Information Security德国
WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast CloningJinho Jung and Stephen Tong (Georgia Institute of Technology); Hong Hu (Pennsylvania State University); Jungwon Lim, Yonghwi Jin, and Taesoo Kim (Georgia Institute of Technology)Georgia Institute of Technology美国
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy NetworksXianghang Mi (University at Buffalo); Siyuan Tang, Zhengyi Li, and Xiaojing Liao (Indiana University Bloomington); Feng Qian (University of Minnesota – Twin Cities); XiaoFeng Wang (Indiana University Bloomington)University at Buffalo美国
Доверя́й, но проверя́й: SFI safety for native-compiled WasmEvan Johnson, David Thien, and Yousef Alhessi (University of California San Diego); Shravan Narayan (University Of California San Diego); Fraser Brown (Stanford University); Sorin Lerner (University of California San Diego); Tyler McMullen (Fastly Labs); Stefan Savage and Deian Stefan (University of California San Diego)University of California San Diego美国
Bookmark the permalink.

Comments are closed.