NDSS Symposium 2025 Accepted Posters

50 Shades of Deceptive Patterns: A Unified Taxonomy, Multimodal Detection, and Security Implications

Zewei Shi, Ruoxi Sun, Jieshan Chen, Jiamou Sun, Jason Xue, Yansong Gao, Feng Liu, Xingliang Yuan

AGORA: Trust Less and Open More in Verification for Confidential Computing

Hongbo Chen, Quan Zhou, Sen Yang, Sixuan Dang, Xing Han, Danfeng Zhang, Fan Zhang, XiaoFeng Wang

An Analysis of IoT Device Manufacturer’s Security Advice to Users Through Companion Apps

Ryota Honda, Junnosuke Kushibiki, Takayuki Sasaki, Simon Parkin, Carlos H. Gan ̃a ́n, Michel van Eeten, Katsunari Yoshioka

An Empirical Study of Backdoor Attacks on Ethereum Smart Contracts

Naoto Yanai, Naohisa Nishida, Yuji Unagami

Automatizing Cybersecurity via LLMs

Burak Hasırcıog ̆lu, Vasilios Mavroudis, Chris Hicks

Can We Trust PUF Manufacturers? Robust PUF-Based Authentication via Combiners

Edoardo Liberati, Pierpaolo Della Monica, Riccardo Lazzeretti, Ivan Visconti

DarkWrt: Towards Building a Dataset of Potentially Unwanted Functions in IoT Devices

Daichi Uezono, Junnosuke Kushibiki, Takayuki Sasaki, Satoshi Hara, Yury Zhauniarovich, Carlos H. Gan ̃a ́n, Michel van Eeten, Katsunari Yoshioka

Decoupling the Device and Identity in Cellular Networks with vSIM

Shirin Ebadi, Zach Moolman, Eric Keller, Tamara Lehman

Discovering Sensor-Fusion-Vulnerabilities in autonomous driving systems against LiDAR attacks

Ryo Yoshida, Takumi Sato, Yuki Hayakawa, Ryo Suzuki, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Kentaro Yoshioka

Do You Sell This? Utilizing Product Searches to Find SEO-driven Fake Shopping Sites

Mizuho Hasegawa, Akihide Saino, Akira Fujita, Kazuki Takada, Rui Tanabe, Carlos H. Gan ̃a ́n, Michel Van Eeten, Katsunari Yoshioka

Enabling Reproducibility through the SPHERE Research Infrastructure

Jelena Mirkovic, Brian Kocoloski, David Balenson

Enhanced Device Identification in Cellular IoT Using IPFIX Records

Ryuta Ohishi, Norihiro Okui, Masataka Nakahara, Masakatsu Nishigaki, Tetsushi Ohki

Enhancing LLM4Decompile with Obfuscated Source Code for Optimized Assembly

Ryota Saito, Takuya Kataiwa, Tetsushi Ohki

Evaluation of Radio Jamming Countermeasures in IoT Thread Networks

Poonam Yadav, Anthony Moulds, Peter Gillingham

Exploring the Impact of Dark Patterns in VR: A Comparison with the Real World

Toi Kojima, Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki, Tetsushi Ohki

Fingerprinting IoT Devices Using Latent Physical Side-Channels

Justin Feng, Tianyi Zhao, Shamik Sarkar, Dominic Konrad, Timothy Jacques, Danijela Cabric, Nader Sehatbakhsh

Flexible Remote Attestation System for Trusted Execution Environment using Delegating Verification

Takashi Yagawa, Tadanori Teruya, Kuniyasu Suzaki, Hirotake Abe

FuzzLGen: Logical Seed Generation for Smart Contract Fuzzing via LLM-based Agents and Program Analysis

Songyan Ji, Mingyue Xu, Jin Wu, Jian Dong

GSIT: A Geometric Space-based Information Tree for Hierarchical Certificate Management in Vehicular Networks

Jheng-Jia Huang, Wei-Hsueh Wang, Guan-Yu Chen, Nai-Wei Lo

Harmful Terms and Where to Find Them: Measuring and Modeling Unfavorable Financial Terms and Conditions in Shopping Websites at Scale

Elisa Tsai, Neal Mangaokar, Boyuan Zheng, Haizhong Zheng, Atul Prakash

HoneyOrg: Towards Attracting Targeted ICS Attacks with Standalone Honeypots

Matthew Rodda , Vasilios Mavroudis , Chris Hicks

Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication

Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki

JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models

Delong Ran, Jinyuan Liu, Yichen Gong, Jingyi Zheng, Xinlei He, Tianshuo Cong, Anyu Wang

Leveraging In-Sensor Computing to Preserve Privacy in Remote Health Monitoring

Mashrafi Kajol, Nishanth Chennagouni, Andrew Lu, Wei Lu, Dean Sullivan, Qiaoyan Yu

Leveraging Isolation and Adaptive Resource Management for Secure Virtualized ORAN

Lam D. Nguyen, Wei Shao, Hajime Suzuki, Shiping Chen, Wei Ni

LLM-Driven Automated Exploit Assessment for Penetration Testing

Xiangmin Shen, Wenyuan Cheng, Yan Chen, Zhenyuan LI, Wencheng Zhao, Dawei Sun

Long PHP webshell files detection based on sliding window attention

Zhiqiang Wang, Haoyu Wang, Lu Hao

MAZU: Zero Trust Architecture for Service Mesh Control Planes

Aashutosh Poudel, Pankaj Niroula, Collin MacDonald, Lily Gloudemans, Stephen Herwig

NETDPSYN: Synthesizing Network Traces under Differential Privacy

Danyu Sun, Joann Chen, Chen GONG, Tianhao Wang, Zhou Li

Post-Deployment Privacy Enhancement for Smart Contracts

Tongqi Wang, Jin Wu, Jian Dong

Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel

Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel

Rethink: A Personalized Regret Analyzer for Social Media Posts

William Namgyal, Tianshi Li

Rhythm Tap: Inclusive Personal Authentication Method Based on Rhythmic Variation

Yuri Takase, Yuto Toshikawa, Kazuki Nomoto, Ryo Iijima, Masataka Kakinouchi, Tatsuya Mori

Towards a Lightweight Key-Enforced Race Detector for Commodity Kernels

Rahul Priolkar, Chuqi Zhang, Adil Ahmad, Rahul Priolkar

Towards SBOM-based Access Control for Transparent and Explicit Program Execution

Yuta Shimamoto, Hiroyuki Uekawa, Mitsuaki Akiyama, Toshihiro Yamauchi

Utilizing Large Language Models to Create Context-Aware Spear-Phishing Attacks Using Social Media Data

Xinyao Ma, Ankith Veldandi, Zitao Zhang, Peter Caven, Ambarish Gurjar, Jean Camp

Utilizing Large Language Models to Create Context-Aware Spear-Phishing Attacks Using Social Media Data

Elham Pourabbas Vafa, Sayak Saha Roy, Shirin Nilizadeh