NDSS 會(huì)議(全稱The Network and Distributed System Security Symposium)是和CCS腻暮,USENIX SECURITY及IEEE S&P并稱的計(jì)算機(jī)系統(tǒng)安全領(lǐng)域的四大頂級(jí)會(huì)議之一弊知。CCF B 類會(huì)議衰抑,2018年共收到331篇論文, 共錄取了71份論文蓖救,接受率為21.5%舅桩。
Session 1A: IoT(物聯(lián)網(wǎng))
1、IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing
IoTFuzzer:通過基于應(yīng)用程序的模糊測(cè)試發(fā)現(xiàn)物聯(lián)網(wǎng)中的內(nèi)存損壞
2靶草、Fear and Logging in the Internet of Things
恐懼和登錄物聯(lián)網(wǎng)
3、Decentralized Action Integrity for Trigger-Action IoT Platforms
觸發(fā)動(dòng)作物聯(lián)網(wǎng)平臺(tái)的分散動(dòng)作完整性
4岳遥、What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices
你腐敗的不是你的崩潰:模糊嵌入式設(shè)備的挑戰(zhàn)
Session 1B: Attacks and Vulnerabilities(攻擊和漏洞)
1奕翔、Didn’t You Hear Me? – Towards More Successful Web Vulnerability Notifications
你沒聽見我嗎? - 邁向更成功的Web漏洞通知
2浩蓉、Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control派继、
基于交通信號(hào)控制的新興聯(lián)網(wǎng)車輛暴露擁塞攻擊
3、Removing Secrets from Android’s TLS
從Android的TLS中刪除秘密
4捻艳、rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System
rtCaptcha:基于實(shí)時(shí)CAPTCHA的實(shí)時(shí)檢測(cè)系統(tǒng)
Session 2A: Network Security/Cellular Networks(網(wǎng)絡(luò)安全/蜂窩網(wǎng)絡(luò))
1驾窟、Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach
使用模型引導(dǎo)方法在TCP擁塞控制中自動(dòng)發(fā)現(xiàn)攻擊
2、Preventing (Network) Time Travel with Chronos
使用Chronos預(yù)防(網(wǎng)絡(luò))時(shí)間旅行
3认轨、LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
LTEInspector:用于4G LTE的對(duì)抗性測(cè)試的系統(tǒng)方法
4绅络、GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
GUTI重新分配揭秘:移動(dòng)臨時(shí)標(biāo)識(shí)符的蜂窩位置跟蹤
Session 2B: Crypto(加密)
1、Mind Your Keys? A Security Evaluation of Java Keystores
記住你的鑰匙嘁字? Java Keystore的安全評(píng)估
2恩急、A Security Analysis of Honeywords
蜜語(yǔ)的安全性分析
3、Revisiting Private Stream Aggregation: Lattice-Based PSA
重新審視私有流聚合:基于格的PSA
4纪蜒、ZeroTrace : Oblivious Memory Primitives from Intel SGX
ZeroTrace:來自英特爾SGX的不經(jīng)意的內(nèi)存基元
Session 3A: Deep Learning and Adversarial ML(深度學(xué)習(xí)和對(duì)抗性ML)
1衷恭、Automated Website Fingerprinting through Deep Learning
通過深度學(xué)習(xí)自動(dòng)化網(wǎng)站指紋識(shí)別
2、VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
VulDeePecker:基于深度學(xué)習(xí)的漏洞檢測(cè)系統(tǒng)
3纯续、Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
Kitsune:用于在線網(wǎng)絡(luò)入侵檢測(cè)的自動(dòng)編碼器集合
4随珠、Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
特征壓縮:檢測(cè)深度神經(jīng)網(wǎng)絡(luò)中的對(duì)抗性實(shí)例
5灭袁、Trojaning Attack on Neural Networks
對(duì)神經(jīng)網(wǎng)絡(luò)的木馬攻擊
Session 3B: Authentication(認(rèn)證)
1、Broken Fingers: On the Usage of the Fingerprint API in Android
Broken Fingers:關(guān)于Android中指紋API的用法
2窗看、K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All
K-means ++與行為生物識(shí)別:一個(gè)循環(huán)來統(tǒng)治它們
3简卧、ABC: Enabling Smartphone Authentication with Built-in Camera
ABC:使用內(nèi)置攝像頭啟用智能手機(jī)身份驗(yàn)證
4、Device Pairing at the Touch of an Electrode
觸摸電極時(shí)的設(shè)備配對(duì)
5烤芦、Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
面部閃爍:基于光反射的安全實(shí)時(shí)檢測(cè)協(xié)議
Session 4A: Measurements(測(cè)量)
1举娩、A Large-scale Analysis of Content Modification by Open HTTP Proxies
Open HTTP代理對(duì)內(nèi)容修改的大規(guī)模分析
2、Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis
使用差異執(zhí)行分析來測(cè)量和中斷反Adblocker
3构罗、Towards Measuring the Effectiveness of Telephony Blacklists
測(cè)量電話黑名單的有效性
4铜涉、Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation
你可能不知道的關(guān)于Android(Un)Packers的事情:基于全系統(tǒng)仿真的系統(tǒng)研究
Session 4B: Software Attacks and Secure Architectures(軟件攻擊和安全架構(gòu))
1、KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
KeyDrown:消除基于軟件的擊鍵定時(shí)側(cè)信道攻擊
2遂唧、Securing Real-Time Microcontroller Systems through Customized Memory View Switching
通過定制的內(nèi)存視圖切換保護(hù)實(shí)時(shí)微控制器系統(tǒng)
3芙代、Automated Generation of Event-Oriented Exploits in Android Hybrid Apps
在Android混合應(yīng)用程序中自動(dòng)生成面向事件的漏洞利用
4、Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images
內(nèi)存分配器提示:Android內(nèi)存映像中的設(shè)備范圍用戶活動(dòng)排序
Session 5A: Software Security(軟件安全)
1盖彭、K-Miner: Uncovering Memory Corruption in Linux
K-Miner:揭示Linux中的內(nèi)存損壞
2纹烹、CFIXX: Object Type Integrity for C++
CFIXX:C ++的對(duì)象類型完整性
3、Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets
回到結(jié)語(yǔ):通過未對(duì)齊的目標(biāo)逃避控制流量守衛(wèi)
4召边、Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics
超集拆卸:靜態(tài)重寫x86二進(jìn)制文件而不帶啟發(fā)式算法
5铺呵、Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing
增強(qiáng)大規(guī)模應(yīng)用程序和模糊測(cè)試的內(nèi)存錯(cuò)誤檢測(cè)
Session 5B: Privacy in Mobile(移動(dòng)中的隱私)
1、Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
尋找秘密的線索:移動(dòng)應(yīng)用中基于語(yǔ)義驅(qū)動(dòng)隧熙,基于學(xué)習(xí)的隱私發(fā)現(xiàn)
2片挂、Bug Fixes, Improvements, … and Privacy Leaks – A Longitudinal Study of PII Leaks Across Android App Versions
錯(cuò)誤修復(fù),改進(jìn)贞盯,...和隱私泄漏 - 跨Android應(yīng)用程序版本的PII泄漏的縱向研究
3音念、Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem
應(yīng)用程序,跟蹤器躏敢,隱私和監(jiān)管機(jī)構(gòu):移動(dòng)跟蹤生態(tài)系統(tǒng)的全球研究
4闷愤、OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS
沒有Procfs的操作系統(tǒng)級(jí)側(cè)通道:探索iOS上的跨應(yīng)用程序信息泄漏
5、Knock Knock, Who’s There? Membership Inference on Aggregate Location Data
Knock Knock件余,誰在那里讥脐? 聚合位置數(shù)據(jù)的成員資格推斷
Session 6A: Cloud(云)
1、Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center
減少冷卻冗余:熱數(shù)據(jù)中心的新安全漏洞
2蛾扇、OBLIVIATE: A Data Oblivious Filesystem for Intel SGX
OBLIVIATE:英特爾SGX的數(shù)據(jù)遺忘文件系統(tǒng)
3攘烛、Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds
微架構(gòu)雷場(chǎng):Iaas云中的4K混疊隱蔽信道和多租戶檢測(cè)
4、Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
Cloud Strife:降低域驗(yàn)證證書的安全風(fēng)險(xiǎn)
Session 6B: Privacy and De-Anonymization(隱私和去匿名化)
1镀首、Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data
保持共享和隱私保護(hù)共享多主題和相互依賴的數(shù)據(jù)
2坟漱、When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
當(dāng)編碼風(fēng)格生存編譯時(shí):從可執(zhí)行二進(jìn)制文件中對(duì)程序員進(jìn)行去匿名化
3、De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice
流動(dòng)軌跡的去匿名化:剖析理論與實(shí)踐之間的差距
4更哄、Veil: Private Browsing Semantics Without Browser-side Assistance
面紗:沒有瀏覽器端輔助的私有瀏覽語(yǔ)義
Session 7A: Web Security(網(wǎng)絡(luò)安全)
1芋齿、Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations
Missuggestions游戲:搜索 - 自動(dòng)完成操作的語(yǔ)義分析
2腥寇、SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS
SYNODE:了解并自動(dòng)防止NODE.JS上的注入攻擊
3、JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks
JavaScript Zero:真正的JavaScript和零邊通道攻擊
4觅捆、Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting
淘汰DOMsday:探索和防止DOM跨站點(diǎn)腳本
Session 7B: Audit Logs(審核日志)
1赦役、Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs
通過源圖的語(yǔ)法推理實(shí)現(xiàn)可擴(kuò)展的集群審計(jì)
2、MCI : Modeling-based Causality Inference in Audit Logging for Attack InvestigationcTowards a Timely Causality Analysis for Enterprise Security
MCI:攻擊調(diào)查審計(jì)日志中基于建模的因果關(guān)系推斷栅炒,及時(shí)為企業(yè)安全提供因果關(guān)系分析
3掂摔、Towards a Timely Causality Analysis for Enterprise Security
走向企業(yè)安全的及時(shí)因果分析
4、JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions
JSgraph:通過有效跟蹤實(shí)時(shí)瀏覽器中的JavaScript執(zhí)行來實(shí)現(xiàn)Web攻擊的重建
Session 8: Android
1赢赊、AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection
AceDroid:規(guī)范化多樣化的Android訪問控制檢查不一致性檢測(cè)
2乙漓、InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android
InstaGuard:Android上易受攻擊的系統(tǒng)程序的即時(shí)可部署熱補(bǔ)丁
3、BreakApp: Automated, Flexible Application Compartmentalization
BreakApp:自動(dòng)化释移,靈活的應(yīng)用程序劃分
4叭披、Resolving the Predicament of Android Custom Permissions
解決Android自定義權(quán)限的困境
Session 9: Blockchain and Smart Contracts(區(qū)塊鏈和智能合約)
1、ZEUS: Analyzing Safety of Smart Contracts
ZEUS:分析智能合約的安全性
2玩讳、Chainspace: A Sharded Smart Contracts Platform
Chainspace:一個(gè)破碎的智能合約平臺(tái)
3涩蜘、Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
快速和私密結(jié)算付款:基于路徑的交易的高效分散路由
4、TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing
TLS-N:對(duì)TLS Enablign無處不在內(nèi)容簽名的不可否認(rèn)性
Session 10: Social Networks and Anonymity(社交網(wǎng)絡(luò)和匿名)
1熏纯、Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations
調(diào)查社交媒體中的廣告透明度機(jī)制:Facebook解釋的案例研究
2同诫、Inside Job: Applying Traffic Analysis to Measure Tor from Within
內(nèi)部工作:從內(nèi)部分析應(yīng)用流量來測(cè)量Tor
3、Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
煙霧篩選器或直射手:在用戶評(píng)論社交網(wǎng)絡(luò)中檢測(cè)精英Sybil攻擊