|
|

楼主 |
发表于 2024-2-3 09:59:41
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 : i( u. X" Q/ ?
0 [* t) R$ B. J! x ^/ t
NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
" h; A; d+ u5 B3 e/ S( ^; L, Z# s% z N
【1】山东大学, C5 E; p5 a5 U- @: `- Q/ A" g
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols
4 g$ b; P8 L m, bShichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)
/ w- f$ i% a0 t$ h+ u/ p
+ t4 G, @3 Y6 c. J- Y【2】东南大学1 }1 m% Z2 n8 [9 l! f3 g
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems
8 W; E3 R+ z+ [; Z5 f O, O5 yHuaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)4 ^- n; g& i) z
; g5 g0 C) |/ s% ^' W【3】浙江大学8 _ z! Z& b6 H+ m4 Y4 g( l9 p
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
@2 B; x% s$ R; }8 Y, |9 \$ n" RQinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)
* n# [) ~9 R$ z7 c6 x& \4 }/ A
8 x5 d @' }" ~% t% X8 Y【4】浙江大学
: \9 C- y. c. q9 G, bInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time! p. Q* i: q+ G6 G
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University) ~2 d! V, t* \8 a7 M, \/ r- S1 b+ `3 p
; C& W+ D& ]4 }" H
【5】北京航空航天大学
# Q8 s& g6 u0 D9 CHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation' I3 J2 @$ m1 e: i- h
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)
" H: J. s1 W7 X/ ~
I) S% ]$ h2 x9 W+ O( p【6】清华大学
: I& T0 C0 Z8 F+ H2 g" N8 GLow-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic4 L6 Z. A* ]/ T$ `; i3 k
Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
5 o1 B5 r" E' Y q5 n: Z+ w3 {1 H- f# D" \+ s
【7】浙江大学
# E8 k/ ~7 P1 @5 w KSymphony: Path Validation at Scale
* M: ?) {9 e$ N M8 e& Q1 I4 rAnxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
- F- {6 ]( o2 E' v3 R( A9 `6 e0 p6 ?- H, O; K
【8】清华大学
% Y+ P# |; c1 Z f5 mBreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
% Y& O5 ^4 c% x, ?; X- YChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)
. ?. Z- l" {' t5 `" ]2 i+ ^3 \# ]1 A5 ] E- E$ n6 |; u: W% p: V
【9】浙江大学' n6 E) V& z7 N
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
! I2 K n- k0 {( j* Z; L' K* `7 zJiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)4 ]# T+ V1 T5 z
. O# {5 Y1 b- o- I【10】清华大学+ A5 L: }$ W4 d# l3 d
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
+ A0 d7 a8 M$ g. o, |& o# L8 FKunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
, z2 B& x6 V/ j' \. m/ O( I! K: U, O7 K5 Z% f A
【11】中国海洋大学 r3 i; ?& O+ F9 I/ q' e
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack$ N, h* q2 s$ O: t, j* V
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
2 H% R7 _. A+ S% g& n T+ ], r9 u! Y% {" B
【12】浙江大学
3 p q* @" ~3 n0 t. GORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
; A' y& z5 t- m. e3 YLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University); A' j* d: N; n5 k6 E
' F' w' @8 C8 d: D( A) t2 q1 D( ~
【13】北京大学* e) r" j3 Q/ Z4 F& S9 t7 h
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
7 C7 l: n8 j, N# c, K7 q- X" DShaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
* z$ b* g% k1 ?4 z s" N
1 a8 s n; W- j" O【14】浙江大学% i8 X* c2 Z! s& y( J7 f5 g4 R C
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
& B. K: {9 z& x% sChengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)8 ] o, O- h5 |) I/ d
6 \' Z2 h( G% o8 f8 m
【15】湖南大学
- \, T' Q; A, N& T) [# ^2 v# uEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
6 @/ Z) {# I4 ?! V2 ^" C' `' |Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)
- X! b) J* l5 {) f2 z" c9 D8 N8 l) O; _1 g" B% b X3 Z# R S
【16】上海交大; ]+ O; P6 h5 v. r
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models( ^% N8 M) e+ p7 a9 z6 n
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)) w+ C$ n$ }& Y% D1 I0 ^
, }' P' X! C9 U, W1 r8 `【17】清华大学
' W# q( T' g; E* \+ E2 p3 h& nExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks! m5 {1 j# E& y2 f$ D3 k8 N
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)) c9 ^' {$ _1 \( \4 p% s
' X: a) T2 E% ~2 S* g* g& B
【18】清华大学' q, O+ ~) c: [' V- n
CP-IoT: A Cross-Platform Monitoring System for Smart Home8 \5 G+ B+ H* r8 R* d
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)' \# @+ c% q: {. P T% H% m7 o4 f
+ _1 w3 d* G9 ?( H9 y+ b: d0 }: r【19】清华大学
: ?; E& F- x' ^$ G/ J; aLoRDMA: A New Low-Rate DoS Attack in RDMA Networks
e% O3 B P4 CShicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
* n% |+ V# q2 q! R M* _4 T% F6 Z
【20】清华大学
2 ?4 \3 ?/ i3 [! k9 e9 K, ]- QReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
( `, \2 G: [5 p8 M1 L: K# ALinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
/ f8 A1 w5 B0 L3 U& w" }& a( d! G$ }& k: h- h y
【21】清华大学# l8 h' n5 G$ n' ?0 b9 t
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization4 m/ B- g ]6 B" J% j
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)' {- @9 @( z' P. j
- Z3 o3 m7 R! b: z# A
【22】清华大学/ r, E1 \+ M* ]
DynPRE: Protocol Reverse Engineering via Dynamic Inference
' M6 ^% t: u1 e6 ]Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)
) C, I, ]- R7 S! \% Z) I- J6 T
, S- s, W2 ?+ Y7 K; o+ a; S【23】浙江大学+ D& A; S, T1 d; t+ c6 W/ ^
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention
+ b! s9 g2 m) D7 ~) v) m& |Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)4 ]! k, y& U5 p2 n4 m
0 \ W1 w k3 k: G) y: K【24】中山大学7 X- j2 I6 |, {/ H: i4 q ?
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem" A6 E" Z0 {/ a
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)9 F2 I! ~! I8 M% P2 w$ n" H
6 B3 e) l8 W/ `+ g
【25】浙江大学
4 J7 X+ d9 V9 B4 t3 c6 w( B5 mCamPro: Camera-based Anti-Facial Recognition
0 m* A9 [( g$ L) N9 rWenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
6 U$ [! f9 H; P2 p6 a9 W* g! n9 k( l& x) z3 i h7 p# G
【26】中国科学技术大学7 v3 p( L7 r f f; J' T/ F
Detecting Voice Cloning Attacks via Timbre Watermarking ]/ l# J7 ?% |
Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)8 O) V/ D/ x C
* p7 o1 ?0 s& i【27】清华大学. [% e% |4 S4 Z. N* A
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed& o" o5 ^: x B4 y4 u0 m( q4 R2 ]
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University). v$ G7 V$ D, e+ t( c6 R9 W* D
2 A2 P6 w! u6 f! {6 P; g
【28】清华大学 U9 x# x; H7 b# k! m
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository9 v; N0 g( x I& ]% X6 g1 B" ]
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)- u" N" f2 c1 ?, s( ~
$ I! ?% h( n, \【29】清华大学
( c9 O8 l! u" w, z$ { I9 h1 Q ^Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
% O& f G# b3 D4 J! KXuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)6 Y/ N/ l1 N; Z9 |) e: {# s
+ i. J' X! s$ n( u【30】NUDT9 q3 G) j9 T. o& q/ U+ K m/ ^* o
DeepGo: Predictive Directed Greybox Fuzzing( E( B4 F& y- ]- x
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)
1 u! Q2 b8 R8 k1 l6 d" W, [' E9 {2 _" y' D' f$ ^$ @( _6 V/ E; F
【31】上海交大5 d2 r4 J5 I" G5 N* i
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token
+ V" j$ d! Z6 e3 s+ WGe Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)* ?( _- B# V* ^) }- g6 {/ S9 H) N5 M, l
, a+ D) q! K9 F& @/ `【32】华中科技大学
- q. Z% ]4 c* k7 X% oPrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound6 _8 c" r& H2 u
Man Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)
$ Y' r3 ?5 t5 J
+ ^, b# [$ ~/ a【33】南方科技大学
3 a4 P" u0 b) R) C2 H4 ySeparation is Good: A Faster Order-Fairness Byzantine Consensus- k, ]8 Y% [! ^% C
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)- [3 O% U$ e- S+ S
8 U; h* Y+ a) Y7 s, X【34】南方科技大学
$ y {! N0 Q1 {# N4 j+ a0 ~6 iCAGE: Complementing Arm CCA with GPU Extensions, ~% ~ L$ @& j/ {4 b; K: c
Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)2 O- \2 y. A& I! T6 J W( h [
# ?9 F' E% c- o. m
【35】华中科技大学
4 Y! w* h! S0 O4 VDorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
9 C1 Z) Y; C8 K1 HChaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
. P( K4 U6 D( Z
$ @9 V) e# c) @6 z# }! G% ~【36】华中科技大学# k: g) y1 L W' c
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit4 \, J- M+ q5 D
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
; ?" B; [1 L4 W) l; Z4 @- E6 l8 c- {# S, x6 d# T0 B @, c
【37】浙江大学
# f& [2 ?% v @1 x1 _; NUniID: Spoofing Face Authentication System by Universal Identity9 W! [& p' v* Z7 x+ n
Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
: R/ d a/ e8 l& J, a0 e
- o+ n) j* w. D6 c/ c& ^【38】武汉大学
: }; X6 C5 c. @2 Z2 s) |From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
/ g" c" ]+ V$ O# `% j1 oYue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)% O7 f- I* x' Q5 w2 \
5 _! K, r8 H. ^
【39】上海科技大学9 q* m+ n% R# c `* ^8 E
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
) J# r% f8 z, S4 W& `Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)4 R9 E8 h! n3 F" |% s" B' s
% S4 ?8 i; a" J2 G
【40】清华大学5 j" `2 P4 b) v9 g1 H
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
# o, x' s7 A9 k" wQiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
( ~( n5 V$ z" Y1 j U |
|