|

楼主 |
发表于 2024-2-3 09:59:41
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 $ [" Y1 |# N, E7 _' q) w3 X
) n, h# }1 Q- R' a7 v- mNDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
$ R$ I7 Y( z. F K9 ]8 o' r' x3 q$ f: o! U* n( a) l
【1】山东大学
9 X! b! c. d# Z9 y& @1 z1 tSecurity-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols
; ~2 q6 ]( C$ V. Y# G7 w5 PShichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)
, r7 w8 E* m& e! G! M( F# Y6 W/ G# g2 K; Z4 h8 v, I
【2】东南大学
; \5 _, O. q" D, S0 m- _$ SLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems) \! V# W* [+ |# U9 J
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
" T$ U4 C' U7 M+ L& u* C9 f5 ?+ [' z$ ^7 D; b
【3】浙江大学# V7 m$ Y3 D# W8 C* z
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
& k M( H7 P2 AQinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)
0 G! I3 l2 N) O; C, T; r# O: v. ?; ~$ ]$ I
【4】浙江大学
+ h- U! H* M2 g. n. ?* t& lInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time8 X6 e2 [. c8 L3 O' ? Q
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
0 f- y$ I/ Z* @9 ~5 Y! B' D, l; t
【5】北京航空航天大学
/ F, j& l) @' r: CHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation" E' n% A2 D/ ?
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)
9 M8 a3 Y3 s. [* J
+ D9 d! L6 `( G7 y& X, s* a【6】清华大学
4 _$ m" u% I7 P* H+ K8 q3 gLow-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
U, Y$ I h5 R! HYuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University); D `- C9 V6 V/ E
8 @. a k# L C% ~
【7】浙江大学
: ]% A A& G+ n, U! p% m; a5 rSymphony: Path Validation at Scale, |" W+ ? S/ k8 J4 A* w: F( q- S4 v0 F6 S
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)6 K2 A3 O$ U: y! f' |( V. m1 U
; ^/ R9 V: p7 D9 U/ M7 b& T
【8】清华大学2 x7 D" D* \; K
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet" W. P3 E- o* {( r) Z( j3 a/ w
Chuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)
J: M/ P* }/ Y$ T
; }2 B3 t( q* o【9】浙江大学1 _/ v; h4 |. j0 N; Z5 Z
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency+ [7 d. [7 f, I R ?4 \0 u
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)
5 k! I! E, m" B7 a0 O2 ], C
9 f$ c2 K/ g9 X: g【10】清华大学
/ p4 _% X8 g- I( c8 t2 mShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection9 q# Y. K0 _6 F6 z
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)+ U, p% n1 a% y5 v, K
# W' Q: L. w6 c$ M
【11】中国海洋大学
, X, x3 P0 x. A' B3 HEnhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack: M' K: C, p' {/ Z8 u2 K) s
Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
8 e9 H9 i1 S' }
4 f4 X3 g. y; p2 ~* w【12】浙江大学+ u" x0 ?7 q) R1 p4 t- d
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
6 W; D! z' k! T0 i- b% QLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)1 U2 M6 ?; B5 @1 M X6 a) K6 N
8 e/ s2 C6 g. ?! n& w5 U i【13】北京大学% A# y1 G! u! a/ N2 {5 l. X9 w- C
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
6 Y, p8 }2 _2 i- v2 mShaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
# \ V5 `) R& v$ M, u' b
3 c* e7 C- A' y; e' i【14】浙江大学
6 p3 Y" g5 I4 b% ~( X6 ^LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors, O1 A* ]; x" t o0 q) _
Chengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)% C7 I7 j# ]4 N$ q$ t
& {& [6 H4 s. S2 k6 `【15】湖南大学
! A9 J" K8 v; M0 QEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR' M* Z& R9 I" x
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)* z# j" x" d8 ?; ` L; @9 K
" ^" ]6 I# {; E# O【16】上海交大" u) Y# Q& q% A: S( J
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models$ X1 |5 ]/ G8 s0 g. f8 \9 T
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)
* C1 H5 u% c2 U) E/ N2 o3 w2 _0 l: x) |4 O' Q7 K" J- s' t, }
【17】清华大学0 Y8 |; [5 `8 `- Y( t- h% X
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks4 R; q* _% q/ H3 b' @
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)
3 Y6 U0 i7 Q, k
- I( R4 b9 L# O* C2 P3 w# i6 k【18】清华大学
0 {9 H( G- u) Q9 U: g; VCP-IoT: A Cross-Platform Monitoring System for Smart Home* q" F. }, }1 c& Z2 S. C
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)" O- X ^# N- s; l* N
- R' A0 B2 a! j& [% j' S
【19】清华大学
& x! {" U. Z; g, w1 F, f3 P7 lLoRDMA: A New Low-Rate DoS Attack in RDMA Networks1 F. P9 G2 x+ c/ H
Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
7 O/ W( R( l8 O( W8 G( j& R/ {/ L: n
【20】清华大学2 X7 H8 u( V* w( P6 M
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
h% Q2 ^& X0 T$ r2 JLinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
+ _* A9 E) k& g* L! C% U# c( L! L
e- o. g. j5 x+ V9 E【21】清华大学
- W \/ @& |3 t |8 L1 u( }Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization' W1 A+ O5 N) O9 D' S
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)& r) C6 G9 a: w4 k0 g
5 x: `! ~5 }4 h0 E- O7 W8 L【22】清华大学$ {4 u! z# f( b; |. E9 }1 v$ w
DynPRE: Protocol Reverse Engineering via Dynamic Inference
. N% x4 t6 ~& q9 ^: C1 o# }. JZhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)
- d$ _8 K; H) C8 p: H
9 a8 u3 H1 P! p7 A; h7 u) c5 v( v" v; x【23】浙江大学
2 I& Q7 ]! T! X( |9 Z$ sImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention
" {3 R/ w. }0 T4 _! N- yLujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)- _) {( C9 q8 Z3 h/ ]+ |. R% L) Y# n
/ P+ J6 A# N" M1 k5 k
【24】中山大学9 _" a U% @( ]& i8 A
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem/ j0 L$ \3 k0 u! G- }: Q# E) C
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)
+ p$ |% ]8 }# m. `7 y. g( S) y% Q0 U4 }3 |- W7 b: X1 \1 l
【25】浙江大学5 w% w1 R8 _+ ?. O3 A% t& d% s
CamPro: Camera-based Anti-Facial Recognition
- \# ]+ b5 ^# y, iWenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)+ k# ~ g# x5 J) [
* Q2 h$ W' ]+ _5 r8 V) ~1 y【26】中国科学技术大学
y* K3 e' }* y' ]8 QDetecting Voice Cloning Attacks via Timbre Watermarking5 c$ M$ {9 i4 }1 D1 m2 l
Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)
; o7 L6 t' ~& b1 n9 P- g# N) L% m1 y7 F) P# B a) k$ J* @ C4 u
【27】清华大学
; a0 R' C$ R$ H3 MUnderstanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed
; N; {6 F: {4 ^/ B6 `4 ]5 }) ]Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)( O) o$ ^% d+ S4 V; s U
# p) R) s. L: i1 p4 ~【28】清华大学# r& R4 z. p" S1 d# T9 i
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository
* l: x3 ?: B) r j' ]. {7 tYingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)
3 {7 ]$ S( @( q0 N/ B7 B0 Y$ L; ?) ?" M) i- ~- |3 j3 M
【29】清华大学, |: k4 I" Y, ]0 T1 L3 _. P
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
4 j6 w; G+ C. T, S7 ?0 rXuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)
6 m: W+ t' z5 L9 n+ Y; V; q; ~ _( o/ o, g4 r
【30】NUDT# @; b! c$ w4 b: C% Q
DeepGo: Predictive Directed Greybox Fuzzing
5 r% R; A8 u O% L4 H" yPeihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)
5 o/ B9 G, ?& m
( @2 u# F3 @$ v8 ?& r% n7 d9 Y% `9 j- K2 Q【31】上海交大
$ m$ A" Z1 Z6 {3 }0 ]ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token9 i# L1 \* a" A' f: K6 \% t6 k w7 [( L
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)1 F' M% b& M; R# m- O4 X
$ c* d7 i, C9 M9 B" H
【32】华中科技大学
) T( O* M" {9 V1 ?' s2 ?PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
& A8 l9 S1 \9 Z4 g) Q0 pMan Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)
' G- v4 \0 U/ G, |& J2 P7 i) X+ T
* o: M5 \' l3 p+ t4 q5 i【33】南方科技大学1 z3 i% W; c: Y+ } u4 p% ]
Separation is Good: A Faster Order-Fairness Byzantine Consensus% T: u" x1 Z2 m K" l% p5 t0 v* J _
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
# \! U1 X( J7 X% s
: \0 [' `3 f6 F6 k* z6 a【34】南方科技大学- y: `$ C& E1 H8 D3 h
CAGE: Complementing Arm CCA with GPU Extensions$ T& t+ q, [% |6 C B
Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)9 j6 `- S- F& b6 m$ @4 `
8 Y# h. B- k& t* t b/ O
【35】华中科技大学: V# M0 p+ i/ x5 S M) k
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
6 h- p: K! Z$ L, h) ^" v5 V6 lChaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
1 f6 C" \, w p6 t0 ~# Q. k9 o0 r3 e% d
【36】华中科技大学
g$ q Y0 K( _ {Abusing the Ethereum Smart Contract Verification Services for Fun and Profit# ^+ u. Y+ A1 q5 z
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)$ z0 C9 a5 }% ]+ X+ k6 W' B6 p5 @
, z R5 k' q$ |* R. v* v9 \【37】浙江大学( n) ]" ~3 e" J9 t/ C/ s& Q! t% X
UniID: Spoofing Face Authentication System by Universal Identity
. J4 z& ]/ Z% `Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
! K w5 {" a8 k. a
* r7 i% J& b, }9 B, ]【38】武汉大学
. C0 M/ h( d) V% l" rFrom Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
! E& }- R1 f9 q9 n7 {" j5 q1 x* ?Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)# Z* F) a: F0 `
' a: j. u, i2 p* R' ]【39】上海科技大学1 s" c0 [1 G r f" g
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems9 S! s1 B& x: r% r6 P
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)& h0 L- G! h j! V4 N% W/ V: O6 R
& g7 F' Q0 n `1 n g【40】清华大学
$ {0 n7 `' O9 m8 x' r/ jYou Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
; D" z% K& e7 a5 d' L5 oQiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)7 k; E5 T, J6 P5 b# \
|
|