NDSS·2018

NDSS 會(huì)議(全稱The Network and Distributed System Security Symposium)是和CCS腻暮,USENIX SECURITY及IEEE S&P并稱的計(jì)算機(jī)系統(tǒng)安全領(lǐng)域的四大頂級(jí)會(huì)議之一弊知。CCF B 類會(huì)議衰抑,2018年共收到331篇論文, 共錄取了71份論文蓖救,接受率為21.5%舅桩。


Session 1A: IoT(物聯(lián)網(wǎng))

1、IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing

IoTFuzzer:通過基于應(yīng)用程序的模糊測(cè)試發(fā)現(xiàn)物聯(lián)網(wǎng)中的內(nèi)存損壞

2靶草、Fear and Logging in the Internet of Things

恐懼和登錄物聯(lián)網(wǎng)

3、Decentralized Action Integrity for Trigger-Action IoT Platforms

觸發(fā)動(dòng)作物聯(lián)網(wǎng)平臺(tái)的分散動(dòng)作完整性

4岳遥、What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices

你腐敗的不是你的崩潰:模糊嵌入式設(shè)備的挑戰(zhàn)


Session 1B: Attacks and Vulnerabilities(攻擊和漏洞)

1奕翔、Didn’t You Hear Me? – Towards More Successful Web Vulnerability Notifications

你沒聽見我嗎? - 邁向更成功的Web漏洞通知

2浩蓉、Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control派继、

基于交通信號(hào)控制的新興聯(lián)網(wǎng)車輛暴露擁塞攻擊

3、Removing Secrets from Android’s TLS

從Android的TLS中刪除秘密

4捻艳、rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System

rtCaptcha:基于實(shí)時(shí)CAPTCHA的實(shí)時(shí)檢測(cè)系統(tǒng)


Session 2A: Network Security/Cellular Networks(網(wǎng)絡(luò)安全/蜂窩網(wǎng)絡(luò))

1驾窟、Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach

使用模型引導(dǎo)方法在TCP擁塞控制中自動(dòng)發(fā)現(xiàn)攻擊

2、Preventing (Network) Time Travel with Chronos

使用Chronos預(yù)防(網(wǎng)絡(luò))時(shí)間旅行

3认轨、LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE

LTEInspector:用于4G LTE的對(duì)抗性測(cè)試的系統(tǒng)方法

4绅络、GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier

GUTI重新分配揭秘:移動(dòng)臨時(shí)標(biāo)識(shí)符的蜂窩位置跟蹤


Session 2B: Crypto(加密)

1、Mind Your Keys? A Security Evaluation of Java Keystores

記住你的鑰匙嘁字? Java Keystore的安全評(píng)估

2恩急、A Security Analysis of Honeywords

蜜語(yǔ)的安全性分析

3、Revisiting Private Stream Aggregation: Lattice-Based PSA

重新審視私有流聚合:基于格的PSA

4纪蜒、ZeroTrace : Oblivious Memory Primitives from Intel SGX

ZeroTrace:來自英特爾SGX的不經(jīng)意的內(nèi)存基元


Session 3A: Deep Learning and Adversarial ML(深度學(xué)習(xí)和對(duì)抗性ML)

1衷恭、Automated Website Fingerprinting through Deep Learning

通過深度學(xué)習(xí)自動(dòng)化網(wǎng)站指紋識(shí)別

2、VulDeePecker: A Deep Learning-Based System for Vulnerability Detection

VulDeePecker:基于深度學(xué)習(xí)的漏洞檢測(cè)系統(tǒng)

3纯续、Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection

Kitsune:用于在線網(wǎng)絡(luò)入侵檢測(cè)的自動(dòng)編碼器集合

4随珠、Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks

特征壓縮:檢測(cè)深度神經(jīng)網(wǎng)絡(luò)中的對(duì)抗性實(shí)例

5灭袁、Trojaning Attack on Neural Networks

對(duì)神經(jīng)網(wǎng)絡(luò)的木馬攻擊


Session 3B: Authentication(認(rèn)證)

1、Broken Fingers: On the Usage of the Fingerprint API in Android

Broken Fingers:關(guān)于Android中指紋API的用法

2窗看、K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All

K-means ++與行為生物識(shí)別:一個(gè)循環(huán)來統(tǒng)治它們

3简卧、ABC: Enabling Smartphone Authentication with Built-in Camera

ABC:使用內(nèi)置攝像頭啟用智能手機(jī)身份驗(yàn)證

4、Device Pairing at the Touch of an Electrode

觸摸電極時(shí)的設(shè)備配對(duì)

5烤芦、Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections

面部閃爍:基于光反射的安全實(shí)時(shí)檢測(cè)協(xié)議


Session 4A: Measurements(測(cè)量)

1举娩、A Large-scale Analysis of Content Modification by Open HTTP Proxies

Open HTTP代理對(duì)內(nèi)容修改的大規(guī)模分析

2、Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis

使用差異執(zhí)行分析來測(cè)量和中斷反Adblocker

3构罗、Towards Measuring the Effectiveness of Telephony Blacklists

測(cè)量電話黑名單的有效性

4铜涉、Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation

你可能不知道的關(guān)于Android(Un)Packers的事情:基于全系統(tǒng)仿真的系統(tǒng)研究


Session 4B: Software Attacks and Secure Architectures(軟件攻擊和安全架構(gòu))

1、KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

KeyDrown:消除基于軟件的擊鍵定時(shí)側(cè)信道攻擊

2遂唧、Securing Real-Time Microcontroller Systems through Customized Memory View Switching

通過定制的內(nèi)存視圖切換保護(hù)實(shí)時(shí)微控制器系統(tǒng)

3芙代、Automated Generation of Event-Oriented Exploits in Android Hybrid Apps

在Android混合應(yīng)用程序中自動(dòng)生成面向事件的漏洞利用

4、Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images

內(nèi)存分配器提示:Android內(nèi)存映像中的設(shè)備范圍用戶活動(dòng)排序


Session 5A: Software Security(軟件安全)

1盖彭、K-Miner: Uncovering Memory Corruption in Linux

K-Miner:揭示Linux中的內(nèi)存損壞

2纹烹、CFIXX: Object Type Integrity for C++

CFIXX:C ++的對(duì)象類型完整性

3、Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets

回到結(jié)語(yǔ):通過未對(duì)齊的目標(biāo)逃避控制流量守衛(wèi)

4召边、Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics

超集拆卸:靜態(tài)重寫x86二進(jìn)制文件而不帶啟發(fā)式算法

5铺呵、Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing

增強(qiáng)大規(guī)模應(yīng)用程序和模糊測(cè)試的內(nèi)存錯(cuò)誤檢測(cè)


Session 5B: Privacy in Mobile(移動(dòng)中的隱私)

1、Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps

尋找秘密的線索:移動(dòng)應(yīng)用中基于語(yǔ)義驅(qū)動(dòng)隧熙,基于學(xué)習(xí)的隱私發(fā)現(xiàn)

2片挂、Bug Fixes, Improvements, … and Privacy Leaks – A Longitudinal Study of PII Leaks Across Android App Versions

錯(cuò)誤修復(fù),改進(jìn)贞盯,...和隱私泄漏 - 跨Android應(yīng)用程序版本的PII泄漏的縱向研究

3音念、Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem

應(yīng)用程序,跟蹤器躏敢,隱私和監(jiān)管機(jī)構(gòu):移動(dòng)跟蹤生態(tài)系統(tǒng)的全球研究

4闷愤、OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS

沒有Procfs的操作系統(tǒng)級(jí)側(cè)通道:探索iOS上的跨應(yīng)用程序信息泄漏

5、Knock Knock, Who’s There? Membership Inference on Aggregate Location Data

Knock Knock件余,誰在那里讥脐? 聚合位置數(shù)據(jù)的成員資格推斷


Session 6A: Cloud(云)

1、Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center

減少冷卻冗余:熱數(shù)據(jù)中心的新安全漏洞

2蛾扇、OBLIVIATE: A Data Oblivious Filesystem for Intel SGX

OBLIVIATE:英特爾SGX的數(shù)據(jù)遺忘文件系統(tǒng)

3攘烛、Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds

微架構(gòu)雷場(chǎng):Iaas云中的4K混疊隱蔽信道和多租戶檢測(cè)

4、Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates

Cloud Strife:降低域驗(yàn)證證書的安全風(fēng)險(xiǎn)


Session 6B: Privacy and De-Anonymization(隱私和去匿名化)

1镀首、Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data

保持共享和隱私保護(hù)共享多主題和相互依賴的數(shù)據(jù)

2坟漱、When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

當(dāng)編碼風(fēng)格生存編譯時(shí):從可執(zhí)行二進(jìn)制文件中對(duì)程序員進(jìn)行去匿名化

3、De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice

流動(dòng)軌跡的去匿名化:剖析理論與實(shí)踐之間的差距

4更哄、Veil: Private Browsing Semantics Without Browser-side Assistance

面紗:沒有瀏覽器端輔助的私有瀏覽語(yǔ)義


Session 7A: Web Security(網(wǎng)絡(luò)安全)

1芋齿、Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations

Missuggestions游戲:搜索 - 自動(dòng)完成操作的語(yǔ)義分析

2腥寇、SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS

SYNODE:了解并自動(dòng)防止NODE.JS上的注入攻擊

3、JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

JavaScript Zero:真正的JavaScript和零邊通道攻擊

4觅捆、Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting

淘汰DOMsday:探索和防止DOM跨站點(diǎn)腳本


Session 7B: Audit Logs(審核日志)

1赦役、Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs

通過源圖的語(yǔ)法推理實(shí)現(xiàn)可擴(kuò)展的集群審計(jì)

2、MCI : Modeling-based Causality Inference in Audit Logging for Attack InvestigationcTowards a Timely Causality Analysis for Enterprise Security

MCI:攻擊調(diào)查審計(jì)日志中基于建模的因果關(guān)系推斷栅炒,及時(shí)為企業(yè)安全提供因果關(guān)系分析

3掂摔、Towards a Timely Causality Analysis for Enterprise Security

走向企業(yè)安全的及時(shí)因果分析

4、JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions

JSgraph:通過有效跟蹤實(shí)時(shí)瀏覽器中的JavaScript執(zhí)行來實(shí)現(xiàn)Web攻擊的重建


Session 8: Android

1赢赊、AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection

AceDroid:規(guī)范化多樣化的Android訪問控制檢查不一致性檢測(cè)

2乙漓、InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android

InstaGuard:Android上易受攻擊的系統(tǒng)程序的即時(shí)可部署熱補(bǔ)丁

3、BreakApp: Automated, Flexible Application Compartmentalization

BreakApp:自動(dòng)化释移,靈活的應(yīng)用程序劃分

4叭披、Resolving the Predicament of Android Custom Permissions

解決Android自定義權(quán)限的困境


Session 9: Blockchain and Smart Contracts(區(qū)塊鏈和智能合約)

1、ZEUS: Analyzing Safety of Smart Contracts

ZEUS:分析智能合約的安全性

2玩讳、Chainspace: A Sharded Smart Contracts Platform

Chainspace:一個(gè)破碎的智能合約平臺(tái)

3涩蜘、Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions

快速和私密結(jié)算付款:基于路徑的交易的高效分散路由

4、TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing

TLS-N:對(duì)TLS Enablign無處不在內(nèi)容簽名的不可否認(rèn)性


Session 10: Social Networks and Anonymity(社交網(wǎng)絡(luò)和匿名)

1熏纯、Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations

調(diào)查社交媒體中的廣告透明度機(jī)制:Facebook解釋的案例研究

2同诫、Inside Job: Applying Traffic Analysis to Measure Tor from Within

內(nèi)部工作:從內(nèi)部分析應(yīng)用流量來測(cè)量Tor

3、Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks

煙霧篩選器或直射手:在用戶評(píng)論社交網(wǎng)絡(luò)中檢測(cè)精英Sybil攻擊

最后編輯于
?著作權(quán)歸作者所有,轉(zhuǎn)載或內(nèi)容合作請(qǐng)聯(lián)系作者
  • 序言:七十年代末豆巨,一起剝皮案震驚了整個(gè)濱河市剩辟,隨后出現(xiàn)的幾起案子,更是在濱河造成了極大的恐慌往扔,老刑警劉巖,帶你破解...
    沈念sama閱讀 207,113評(píng)論 6 481
  • 序言:濱河連續(xù)發(fā)生了三起死亡事件熊户,死亡現(xiàn)場(chǎng)離奇詭異萍膛,居然都是意外死亡,警方通過查閱死者的電腦和手機(jī)嚷堡,發(fā)現(xiàn)死者居然都...
    沈念sama閱讀 88,644評(píng)論 2 381
  • 文/潘曉璐 我一進(jìn)店門蝗罗,熙熙樓的掌柜王于貴愁眉苦臉地迎上來,“玉大人蝌戒,你說我怎么就攤上這事串塑。” “怎么了北苟?”我有些...
    開封第一講書人閱讀 153,340評(píng)論 0 344
  • 文/不壞的土叔 我叫張陵桩匪,是天一觀的道長(zhǎng)。 經(jīng)常有香客問我友鼻,道長(zhǎng)傻昙,這世上最難降的妖魔是什么闺骚? 我笑而不...
    開封第一講書人閱讀 55,449評(píng)論 1 279
  • 正文 為了忘掉前任,我火速辦了婚禮妆档,結(jié)果婚禮上僻爽,老公的妹妹穿的比我還像新娘。我一直安慰自己贾惦,他們只是感情好胸梆,可當(dāng)我...
    茶點(diǎn)故事閱讀 64,445評(píng)論 5 374
  • 文/花漫 我一把揭開白布。 她就那樣靜靜地躺著须板,像睡著了一般碰镜。 火紅的嫁衣襯著肌膚如雪。 梳的紋絲不亂的頭發(fā)上逼纸,一...
    開封第一講書人閱讀 49,166評(píng)論 1 284
  • 那天洋措,我揣著相機(jī)與錄音,去河邊找鬼杰刽。 笑死菠发,一個(gè)胖子當(dāng)著我的面吹牛,可吹牛的內(nèi)容都是我干的贺嫂。 我是一名探鬼主播滓鸠,決...
    沈念sama閱讀 38,442評(píng)論 3 401
  • 文/蒼蘭香墨 我猛地睜開眼,長(zhǎng)吁一口氣:“原來是場(chǎng)噩夢(mèng)啊……” “哼第喳!你這毒婦竟也來了糜俗?” 一聲冷哼從身側(cè)響起,我...
    開封第一講書人閱讀 37,105評(píng)論 0 261
  • 序言:老撾萬榮一對(duì)情侶失蹤曲饱,失蹤者是張志新(化名)和其女友劉穎悠抹,沒想到半個(gè)月后,有當(dāng)?shù)厝嗽跇淞掷锇l(fā)現(xiàn)了一具尸體扩淀,經(jīng)...
    沈念sama閱讀 43,601評(píng)論 1 300
  • 正文 獨(dú)居荒郊野嶺守林人離奇死亡楔敌,尸身上長(zhǎng)有42處帶血的膿包…… 初始之章·張勛 以下內(nèi)容為張勛視角 年9月15日...
    茶點(diǎn)故事閱讀 36,066評(píng)論 2 325
  • 正文 我和宋清朗相戀三年,在試婚紗的時(shí)候發(fā)現(xiàn)自己被綠了驻谆。 大學(xué)時(shí)的朋友給我發(fā)了我未婚夫和他白月光在一起吃飯的照片卵凑。...
    茶點(diǎn)故事閱讀 38,161評(píng)論 1 334
  • 序言:一個(gè)原本活蹦亂跳的男人離奇死亡,死狀恐怖胜臊,靈堂內(nèi)的尸體忽然破棺而出勺卢,到底是詐尸還是另有隱情,我是刑警寧澤象对,帶...
    沈念sama閱讀 33,792評(píng)論 4 323
  • 正文 年R本政府宣布黑忱,位于F島的核電站,受9級(jí)特大地震影響,放射性物質(zhì)發(fā)生泄漏杨何。R本人自食惡果不足惜酱塔,卻給世界環(huán)境...
    茶點(diǎn)故事閱讀 39,351評(píng)論 3 307
  • 文/蒙蒙 一、第九天 我趴在偏房一處隱蔽的房頂上張望危虱。 院中可真熱鬧羊娃,春花似錦、人聲如沸埃跷。這莊子的主人今日做“春日...
    開封第一講書人閱讀 30,352評(píng)論 0 19
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽(yáng)弥雹。三九已至垃帅,卻和暖如春,著一層夾襖步出監(jiān)牢的瞬間剪勿,已是汗流浹背贸诚。 一陣腳步聲響...
    開封第一講書人閱讀 31,584評(píng)論 1 261
  • 我被黑心中介騙來泰國(guó)打工, 沒想到剛下飛機(jī)就差點(diǎn)兒被人妖公主榨干…… 1. 我叫王不留厕吉,地道東北人酱固。 一個(gè)月前我還...
    沈念sama閱讀 45,618評(píng)論 2 355
  • 正文 我出身青樓,卻偏偏與公主長(zhǎng)得像头朱,于是被迫代替她去往敵國(guó)和親运悲。 傳聞我的和親對(duì)象是個(gè)殘疾皇子,可洞房花燭夜當(dāng)晚...
    茶點(diǎn)故事閱讀 42,916評(píng)論 2 344

推薦閱讀更多精彩內(nèi)容

  • rljs by sennchi Timeline of History Part One The Cognitiv...
    sennchi閱讀 7,294評(píng)論 0 10
  • 美國(guó)總統(tǒng)大選今天開票项钮,歐巴馬連任成功班眯,成為全球注目的焦點(diǎn),這個(gè)系列烁巫,將帶你見證美國(guó)是如何誕生署隘,其過程高潮迭起,精彩...
    茸小呆閱讀 4,598評(píng)論 0 6
  • 1.pacify: to cause (someone who is angry or upset) to bec...
    Mr_Oldman閱讀 256評(píng)論 0 1
  • 本來想過可能今天的一首《你瞞我瞞》會(huì)變成以后的回憶沒想到如今就已經(jīng)回不去亚隙。 感覺生命里的每一次相逢都是際遇定踱,那...
    Anfy閱讀 794評(píng)論 1 3