NDSS·2018

2018-09-25  本文已影响0人  minlover

NDSS 会议(全称The Network and Distributed System Security Symposium)是和CCS,USENIX SECURITY及IEEE S&P并称的计算机系统安全领域的四大顶级会议之一。CCF B 类会议,2018年共收到331篇论文, 共录取了71份论文,接受率为21.5%。


Session 1A: IoT(物联网)

1、IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing

IoTFuzzer:通过基于应用程序的模糊测试发现物联网中的内存损坏

2、Fear and Logging in the Internet of Things

恐惧和登录物联网

3、Decentralized Action Integrity for Trigger-Action IoT Platforms

触发动作物联网平台的分散动作完整性

4、What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices

你腐败的不是你的崩溃:模糊嵌入式设备的挑战


Session 1B: Attacks and Vulnerabilities(攻击和漏洞)

1、Didn’t You Hear Me? – Towards More Successful Web Vulnerability Notifications

你没听见我吗? - 迈向更成功的Web漏洞通知

2、Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control、

基于交通信号控制的新兴联网车辆暴露拥塞攻击

3、Removing Secrets from Android’s TLS

从Android的TLS中删除秘密

4、rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System

rtCaptcha:基于实时CAPTCHA的实时检测系统


Session 2A: Network Security/Cellular Networks(网络安全/蜂窝网络)

1、Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach

使用模型引导方法在TCP拥塞控制中自动发现攻击

2、Preventing (Network) Time Travel with Chronos

使用Chronos预防(网络)时间旅行

3、LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE

LTEInspector:用于4G LTE的对抗性测试的系统方法

4、GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier

GUTI重新分配揭秘:移动临时标识符的蜂窝位置跟踪


Session 2B: Crypto(加密)

1、Mind Your Keys? A Security Evaluation of Java Keystores

记住你的钥匙? Java Keystore的安全评估

2、A Security Analysis of Honeywords

蜜语的安全性分析

3、Revisiting Private Stream Aggregation: Lattice-Based PSA

重新审视私有流聚合:基于格的PSA

4、ZeroTrace : Oblivious Memory Primitives from Intel SGX

ZeroTrace:来自英特尔SGX的不经意的内存基元


Session 3A: Deep Learning and Adversarial ML(深度学习和对抗性ML)

1、Automated Website Fingerprinting through Deep Learning

通过深度学习自动化网站指纹识别

2、VulDeePecker: A Deep Learning-Based System for Vulnerability Detection

VulDeePecker:基于深度学习的漏洞检测系统

3、Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection

Kitsune:用于在线网络入侵检测的自动编码器集合

4、Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks

特征压缩:检测深度神经网络中的对抗性实例

5、Trojaning Attack on Neural Networks

对神经网络的木马攻击


Session 3B: Authentication(认证)

1、Broken Fingers: On the Usage of the Fingerprint API in Android

Broken Fingers:关于Android中指纹API的用法

2、K-means++ vs. Behavioral Biometrics: One Loop to Rule Them All

K-means ++与行为生物识别:一个循环来统治它们

3、ABC: Enabling Smartphone Authentication with Built-in Camera

ABC:使用内置摄像头启用智能手机身份验证

4、Device Pairing at the Touch of an Electrode

触摸电极时的设备配对

5、Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections

面部闪烁:基于光反射的安全实时检测协议


Session 4A: Measurements(测量)

1、A Large-scale Analysis of Content Modification by Open HTTP Proxies

Open HTTP代理对内容修改的大规模分析

2、Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis

使用差异执行分析来测量和中断反Adblocker

3、Towards Measuring the Effectiveness of Telephony Blacklists

测量电话黑名单的有效性

4、Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation

你可能不知道的关于Android(Un)Packers的事情:基于全系统仿真的系统研究


Session 4B: Software Attacks and Secure Architectures(软件攻击和安全架构)

1、KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

KeyDrown:消除基于软件的击键定时侧信道攻击

2、Securing Real-Time Microcontroller Systems through Customized Memory View Switching

通过定制的内存视图切换保护实时微控制器系统

3、Automated Generation of Event-Oriented Exploits in Android Hybrid Apps

在Android混合应用程序中自动生成面向事件的漏洞利用

4、Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images

内存分配器提示:Android内存映像中的设备范围用户活动排序


Session 5A: Software Security(软件安全)

1、K-Miner: Uncovering Memory Corruption in Linux

K-Miner:揭示Linux中的内存损坏

2、CFIXX: Object Type Integrity for C++

CFIXX:C ++的对象类型完整性

3、Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets

回到结语:通过未对齐的目标逃避控制流量守卫

4、Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics

超集拆卸:静态重写x86二进制文件而不带启发式算法

5、Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing

增强大规模应用程序和模糊测试的内存错误检测


Session 5B: Privacy in Mobile(移动中的隐私)

1、Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps

寻找秘密的线索:移动应用中基于语义驱动,基于学习的隐私发现

2、Bug Fixes, Improvements, … and Privacy Leaks – A Longitudinal Study of PII Leaks Across Android App Versions

错误修复,改进,...和隐私泄漏 - 跨Android应用程序版本的PII泄漏的纵向研究

3、Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem

应用程序,跟踪器,隐私和监管机构:移动跟踪生态系统的全球研究

4、OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS

没有Procfs的操作系统级侧通道:探索iOS上的跨应用程序信息泄漏

5、Knock Knock, Who’s There? Membership Inference on Aggregate Location Data

Knock Knock,谁在那里? 聚合位置数据的成员资格推断


Session 6A: Cloud(云)

1、Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center

减少冷却冗余:热数据中心的新安全漏洞

2、OBLIVIATE: A Data Oblivious Filesystem for Intel SGX

OBLIVIATE:英特尔SGX的数据遗忘文件系统

3、Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds

微架构雷场:Iaas云中的4K混叠隐蔽信道和多租户检测

4、Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates

Cloud Strife:降低域验证证书的安全风险


Session 6B: Privacy and De-Anonymization(隐私和去匿名化)

1、Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data

保持共享和隐私保护共享多主题和相互依赖的数据

2、When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

当编码风格生存编译时:从可执行二进制文件中对程序员进行去匿名化

3、De-anonymization of Mobility Trajectories: Dissecting the Gaps between Theory and Practice

流动轨迹的去匿名化:剖析理论与实践之间的差距

4、Veil: Private Browsing Semantics Without Browser-side Assistance

面纱:没有浏览器端辅助的私有浏览语义


Session 7A: Web Security(网络安全)

1、Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations

Missuggestions游戏:搜索 - 自动完成操作的语义分析

2、SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS

SYNODE:了解并自动防止NODE.JS上的注入攻击

3、JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

JavaScript Zero:真正的JavaScript和零边通道攻击

4、Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting

淘汰DOMsday:探索和防止DOM跨站点脚本


Session 7B: Audit Logs(审核日志)

1、Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs

通过源图的语法推理实现可扩展的集群审计

2、MCI : Modeling-based Causality Inference in Audit Logging for Attack InvestigationcTowards a Timely Causality Analysis for Enterprise Security

MCI:攻击调查审计日志中基于建模的因果关系推断,及时为企业安全提供因果关系分析

3、Towards a Timely Causality Analysis for Enterprise Security

走向企业安全的及时因果分析

4、JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions

JSgraph:通过有效跟踪实时浏览器中的JavaScript执行来实现Web攻击的重建


Session 8: Android

1、AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection

AceDroid:规范化多样化的Android访问控制检查不一致性检测

2、InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android

InstaGuard:Android上易受攻击的系统程序的即时可部署热补丁

3、BreakApp: Automated, Flexible Application Compartmentalization

BreakApp:自动化,灵活的应用程序划分

4、Resolving the Predicament of Android Custom Permissions

解决Android自定义权限的困境


Session 9: Blockchain and Smart Contracts(区块链和智能合约)

1、ZEUS: Analyzing Safety of Smart Contracts

ZEUS:分析智能合约的安全性

2、Chainspace: A Sharded Smart Contracts Platform

Chainspace:一个破碎的智能合约平台

3、Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions

快速和私密结算付款:基于路径的交易的高效分散路由

4、TLS-N: Non-repudiation over TLS Enablign Ubiquitous Content Signing

TLS-N:对TLS Enablign无处不在内容签名的不可否认性


Session 10: Social Networks and Anonymity(社交网络和匿名)

1、Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations

调查社交媒体中的广告透明度机制:Facebook解释的案例研究

2、Inside Job: Applying Traffic Analysis to Measure Tor from Within

内部工作:从内部分析应用流量来测量Tor

3、Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks

烟雾筛选器或直射手:在用户评论社交网络中检测精英Sybil攻击

上一篇下一篇

猜你喜欢

热点阅读