NDSS Symposium 2024 Accepted Posters
‘False negative – that one is going to kill you’: Understanding Industry Perspectives of Static Analysis based Security Testing
Amit Seal Ami, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni
A Novel Attack Exploiting the Vulnerabilities of LiDAR Point Cloud Pre-Processing Filters
Yuna Tanaka, Kazuki Nomoto, Ryunosuke Kobayashi, Go Tsuruoka, Tatsuya Mori
A Two-Stage Encrypted Cryptomining Traffic Detection Mechanism in Campus Network
Ruisheng Shi, Haoran Sun, Lina Lan, Zhiyuan Peng, Chenfeng Wang
Adversarial Retroreflective Patches: A Novel Stealthy Attack on Traffic Sign Recognition at Night
Go Tsuruoka, Takami Sato, Qi Alfred Chen, Kazuki Nomoto, Ryunosuke Kobayashi, Yuna Tanaka, Tatsuya Mori
An Adaptive High Frequency Removal Attack to Bypass Pulse Fingerprinting in New-Gen LiDARs
Yuki Hayakawa, Takami Sato, Ryo Suzuki, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Qi Alfred Chen, Kentaro Yoshioka
Attacking and Improving the Tor Directory Protocol
Zhongtang Luo, Adithya Bhat, Kartik Nayak, Aniket Kate
Bypassing Control Invariants-Based Defenses in Autonomous Vehicles
Yinan Zhao, Ziling He, Tatsuya Mori
Commercial Anti-Smishing Tools and Their Comparative Effectiveness Against Modern Threats
Daniel Timko, Muhammad Lutfor Rahman
Discovering Authentication Bypass Vulnerabilities in IoT Devices through Guided Concolic Execution
Jr-Wei Huang, Nien-Jen Tsai, Shin-Ming Cheng
Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack
Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen
DScope: A Cloud-Native Internet Telescope
Eric Pauley, Paul Barford, Patrick McDaniel
Ensuring Memory Safety for the Transition from C/C++ to Rust
Oliver Braunsdorf, Konrad Hohentanner, Johannes Kinder
Federated Multimodal Medical Data Generation
Hajar Homayouni, Maryam Mary Pourebadi, Hossein Shirazi
Forward Pass: On the Security Implications of Email Forwarding Mechanism and Policy
Enze Liu, Gautam Akiwate, Mattijs Jonker, Ariana Mirian, Grant Ho, Geoffrey M. Voelker, Stefan Savage
HyPFuzz: Formal-Assisted Processor Fuzzing
Chen Chen, Jeyavijayan Rajendran
In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes
Aniketh Girish, Tianrui Hu, Vijay Prakash, Daniel J. Dubois, Srdjan Matic, Danny Yuxing Huang, Serge Egelman, Joel Reardon, Juan Tapiador, David Choffnes, Narseo Vallina-Rodriguez
Intensity-Aware Chosen Pattern Injection LiDAR Spoofing Attack
Ozora Sako, Takami Sato, Yuki Hayakawa, Ryo Suzuki, Kazuma Ikeda, Rokuto Nagata, Qi Alfred Chen, Kentaro Yoshioka
Monogamous relationships with short-term commitment are the best (for certificate management)
Carl Magnus Bruhner, Oscar Linnarsson, Matus Nemec, Martin Arlitt, Niklas Carlsson
MORPH: Towards Automated Concept Drift Adaptation for Malware Detection
Md Tanvirul Alam, Romy Fieblinger, Ashim Mahara, Nidhi Rastogi
Multi-Observed Authentication: A secure and usable authentication / authorization based on multi-point observation of physical events
Shinnosuke Nozaki, Takumi Takaiwa, Masahiro Fujita, Ayako Yoshimura, Tetsushi Ohki, Masakatsu Nishigaki
On the (In)Security of Government Web and Mail Infrastructure
Evan Lam, Richard Anderson, Kurtis Heimerl, Yurie Ito, Jonathan Joseph de Koning, Adam Lange, Jarrod O’Malley, Adam Shostack, Arastoo Taslim, Sudheesh Singanamalla
On the Cyber-Physical Security of Commercial Indoor Delivery Robot Systems
Fayzah Alshammari, Yunpeng Luo, Qi Alfred Chen
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing
Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li
Retrofit — Enabling Interoperable E2EE Communication Through 6G Cellular Architectures
Sudheesh Singanamalla, Richard Anderson, Kurtis Heimerl
Robustness of Reinforcement-Learning-Based Autonomous Driving to Adversarial Inputs
Ziling He, Yinan Zhao, Tatsuya Mori
Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE)
Jelena Mirkovic, David Balenson, Brian Kocoloski, David Choffnes, Daniel Dubois, Geoff Lawler, Chris Tran, Joseph Barnes, Yuri Pradkin, Terry Benzel, Srivatsan Ravi, Ganesh Sankaran, Luis Garcia
Shadow Hack: Adversarial Shadow Attack Against LiDAR Object Detection
Ryunosuke Kobayashi, Kazuki Nomoto, Yuna Tanaka, Go Tsuruoka, Tatsuya Mori
Sharding SMR with Optimal-size Shards for Highly Scalable Blockchains
Jianting Zhang, Zhongtang Luo, Raghavendra Ramesh, Aniket Kate
SlowTrack: Increasing the Latency of Camera-Based Perception in Autonomous Driving Using Adversarial Examples
Chen Ma, Ningfei Wang, Qi Alfred Chen, Chao Shen
SoK: Pitfalls in Evaluating Black-Box Attacks
Fnu Suya, Anshuman Suri, Tingwei Zhang, Jingtao Hong, Yuan Tian, David Evans
Towards Practical LiDAR Spoofing Attack against Vehicles Driving at Cruising Speeds
Ryo Suzuki, Takami Sato, Yuki Hayakawa, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Qi Alfred Chen, Kentaro Yoshioka
Understanding the Privacy Practices of Political Campaigns: A Perspective from the 2020 US Election Websites
Kaushal Kafle, Prianka Mandal, Kapil Singh, Benjamin Andow, Adwait Nadkarni
Users Really Do Respond To Smishing
Daniel Timko, Muhammad Lutfor Rahman, Hamid Wali, Ajaya Neupane