|
楼主 |
发表于 2024-2-3 09:59:41
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 & V: p3 O6 N) p$ s
; n' d3 |6 P) l& s$ j2 yNDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/ w+ J- W) X! {# h8 R; Q& ?, L$ X
) |, G9 |5 P8 g! I【1】山东大学; {5 z% b/ V Z
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols' k' f+ m5 b! n* X o
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)
: c/ ?1 j& K5 i' B G/ P$ |7 @$ @
, e1 h% V7 j( j4 v5 I# w0 @7 U' B0 G【2】东南大学
1 X# Y# f. I) {& k7 J" [& G! @; cLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems
! X$ p) u" l7 v; A/ XHuaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
( f3 j7 O. K N! r2 [. v/ v+ w: b* y6 ?2 z# P: {3 r) C! c. ?
【3】浙江大学7 X& e. |. i+ k# H2 _
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards; [6 ]* `4 [* h
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)
w; N; g; e8 ~' q/ {& i8 W! n. M% j1 f( f
【4】浙江大学
* T* h+ k u' Y' ^4 H; Y2 N2 Q# pInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time C% D5 S! G6 k2 B- M2 q. T
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)3 ^ \$ v/ ]: s6 d
! ^& [$ v( L0 s3 I: K% m6 v
【5】北京航空航天大学
9 ` i" f3 n& EHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation+ o; y" M8 H0 e8 e0 t
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)8 k( [- R% Z6 _0 I& D
0 ]1 n; N+ O2 ~0 h$ G0 g, l【6】清华大学. R5 v. Y1 T. o9 W/ |
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic1 r1 G2 g- n. K. h n7 e: v+ ^ V# C0 H
Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
8 ?9 p u1 ]# y' z3 K- \3 V: w" k! w" `
【7】浙江大学
! \( N. ?" T2 B( D3 r; r3 NSymphony: Path Validation at Scale9 `8 ?8 W+ S3 C5 P1 t' h: H6 i4 y
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
7 V' _3 e* c; Z+ A) p; g% I" e, y
. A+ f: u) w" q! z3 {! e【8】清华大学6 Y4 V N" L# P; O' w! P/ H3 ?
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
. u, M/ Q5 T( p3 _ jChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)4 D' d6 u8 _2 S
. ^3 n; o5 ~8 K- c
【9】浙江大学
. |. ~1 F6 J9 xMOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
/ F- l5 o) `% d7 e' JJiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)5 F; e x4 f3 c& X
6 Z& }0 I/ m( C4 l( W; A【10】清华大学
2 I8 a% L7 X8 h3 l; OShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection5 X0 {+ r: P, Z% k( z2 Y
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)2 Z( t/ }# m0 V# Q' k5 T
) r2 ~+ N) ]0 v' I, i7 j
【11】中国海洋大学
! q# W* z$ K! d" z- M. ~3 CEnhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack+ v ]5 j+ n8 {7 @0 d
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)" n2 _4 l, L+ G' Y7 @
2 i S2 B/ Z% Y7 `
【12】浙江大学
# \9 z; e$ S3 ^3 w. D! V- bORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
) ~0 [5 O! J5 S3 p+ z% YLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)
6 d' Y5 @& Z$ R# g* Y6 `# h: `5 j
8 C, h$ K9 [- O* k6 U6 i, Q【13】北京大学
- M: k6 w9 W4 Y4 A+ e! _: UNODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
+ s; e* F( i1 x, _0 w2 T; ^4 }Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)0 p5 u1 X$ `7 ^
- \# W) D" u( j【14】浙江大学
1 A( h7 K1 y, m5 R7 S2 a/ g( kLMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors$ l" W7 _- X, s7 ^9 y% J N
Chengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University) M3 n2 \' Q% O. {6 E1 h- k
& I( i. Y4 k4 ]4 H1 D" A: o4 w1 {
【15】湖南大学
7 [0 }5 z2 H9 w% I, TEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR+ M* O d! U! z1 l$ r
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)& K4 X( w* t$ E! i8 }8 t3 n
! a Z1 P) a$ |$ A【16】上海交大7 C5 {2 T) K0 ?) N+ v" ^7 o* b2 J
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models9 Q; \ N) _; @: j1 Q
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)5 ` ?- q3 t: N# v2 c
) M+ n+ D" Z& R5 N
【17】清华大学
, f/ y. {$ e K$ J/ Q) C0 sExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks% b$ ]* A4 W0 ^$ l# Q1 x4 P/ I. K
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)9 x8 e( L/ y# G0 Y. ?
5 c$ s! p' d7 S- |
【18】清华大学
2 t* u1 S8 W( vCP-IoT: A Cross-Platform Monitoring System for Smart Home& h! t* J. Z" Y
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)
4 E1 U5 A3 }0 s2 n
& J# N+ d: y/ A, f【19】清华大学' i. P' P! I7 u9 U: ], b
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks. ?# ?' V9 U d4 M2 X5 Q# z
Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
2 ?4 l2 w7 o2 W$ m; {% B# f: R
【20】清华大学9 _0 o' T& ~) h) @5 @
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing9 o. k6 |0 Y K9 |
Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
* o; d/ B$ ~0 {! r5 ^- s
T7 K. o$ ^/ ^2 e" D5 Q【21】清华大学 w; W, o. a! w3 N4 c' \4 T; J
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization1 e+ ]& U: y" z, q% Q7 H
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
, h7 g" |7 x; {7 p+ e
5 q# r' o& {" K4 W. e; y. h ~【22】清华大学! R0 k* w4 o: |5 z6 V
DynPRE: Protocol Reverse Engineering via Dynamic Inference
* G8 K$ X/ h( L6 }; Z5 P+ wZhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)
% u8 H5 T% P7 ^- t$ ]
6 E2 j* D8 g6 S- i9 x* ~【23】浙江大学
' J+ K! |+ p! J9 y+ A6 Z$ W# m- |8 ZImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention
) Q0 D1 U3 Y( \( u7 I; Z% {Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)
7 R$ @ P& h* W( \% \( a7 ~, \9 F
3 c4 e4 o" B( S" v【24】中山大学, R# }* p# o( A
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem" U7 H! \- @9 G' E' f% [, V
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)4 g# E( ?6 G9 {
$ E" M4 Z! |- Q7 l3 l【25】浙江大学8 {, a$ H3 E) }$ V6 K+ `
CamPro: Camera-based Anti-Facial Recognition$ k) [( A, T' P7 J2 p4 z
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)& Q) b) }+ [0 }3 Y4 W8 h# _
9 ]& L6 ~* s# [6 g2 g- A: r M, c【26】中国科学技术大学0 [6 j( s5 j. |# F: V
Detecting Voice Cloning Attacks via Timbre Watermarking
- K7 h6 F0 v( ]: MChang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)# {# V$ ~' a+ ~+ y; F6 K
" F2 j& Q% t$ j4 p% @) P( m【27】清华大学& I1 ?8 O1 b" i1 O
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed
/ L4 p6 w4 F' r/ wLancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)
/ q3 X, E$ Y, d8 w3 ?3 x
1 c& X$ M8 Q* E2 @) l. @【28】清华大学8 d! y( z% u! t# S6 C+ H
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository( z5 H' K+ V* \, r' E+ i) N
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)6 K/ E& H- C7 S
: i8 m) ^: V+ t7 v5 p& H1 S
【29】清华大学% k5 A/ N5 t" f
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
% T8 v3 w* [2 WXuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)
, }/ F P8 @% j, Z+ B; `) i+ Q6 p* H( D3 [# q6 D
【30】NUDT# N1 m0 ^6 M) s7 ~2 l
DeepGo: Predictive Directed Greybox Fuzzing/ I: D# b' L& r, ?* V. b
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)& P3 j3 O* I# y7 x5 a1 P
0 H) o; C7 D; y R3 l+ u0 q
【31】上海交大' k# @ X! P [, t" M
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token3 z/ @. m2 U! h& d/ E! _
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)" I9 R7 G6 ~# c: T1 `
# I3 |3 i3 u+ f( t" n9 D【32】华中科技大学
" p$ b4 Z) W+ K9 v1 M* CPrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
/ |, u( {0 e) [4 H: u3 QMan Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)
' n$ u6 H7 \1 ^) l: D3 k
( f; m* _! F; U7 h- A【33】南方科技大学" [2 w% w4 V6 Z2 D9 _! V! [4 I
Separation is Good: A Faster Order-Fairness Byzantine Consensus
5 B% l5 y) u8 E6 S6 _Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
% z' U4 o0 e: j
: h' |2 d* q2 H0 i5 F5 v【34】南方科技大学& c" q/ Y# G3 W. O4 G
CAGE: Complementing Arm CCA with GPU Extensions
, ?5 e, z7 T& ]6 nChenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)7 G3 r5 e# X% }+ r4 E
$ C- u; ?) T, J【35】华中科技大学% h+ B$ W% i& v9 h; L+ p
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses4 K, N j5 G9 a5 w: J
Chaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
. {; a6 M7 p( Q: @) r& q7 ^" a+ A$ t* t/ |, i
【36】华中科技大学3 b5 Y0 c& }# v/ I( P
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit' ^! b+ y% ~" p' X9 g2 M# Y6 F
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
# Z- b# j1 O' U, |% M* r& Q
" w @7 O, A9 s$ J9 K( z/ g. H" B【37】浙江大学
, Y! f5 ? c& D& ?1 eUniID: Spoofing Face Authentication System by Universal Identity
% G2 \6 V% e' o5 C/ ~0 D8 QZhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
9 t: M: r. p, `( V, g: q* ^* S* Y: @: v7 }, r
【38】武汉大学) m" f9 l$ L& {/ \& W
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
- t, Q- ^# V! Q$ l8 {Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)4 i: r0 g9 ?( h/ _7 ^8 u# H
8 ~* J: @7 f2 n0 N$ m1 f【39】上海科技大学
, S- b1 H+ `% }, q3 N, DSLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems0 }1 o. p0 x5 X& O% P+ J0 V
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)* {* R- Z$ g) T5 @2 g
! z& d( w2 G6 L【40】清华大学
" ?. {& Y6 Z/ j) V7 R" |- TYou Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks: l9 v0 R. U5 }1 U' z# K
Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
# M2 V4 T3 Y# q: d" v3 R/ v3 j |
|