NDSS Symposium 2025 Accepted Posters
50 Shades of Deceptive Patterns: A Unified Taxonomy, Multimodal Detection, and Security Implications
Zewei Shi, Ruoxi Sun, Jieshan Chen, Jiamou Sun, Jason Xue, Yansong Gao, Feng Liu, Xingliang Yuan
AGORA: Trust Less and Open More in Verification for Confidential Computing
Hongbo Chen, Quan Zhou, Sen Yang, Sixuan Dang, Xing Han, Danfeng Zhang, Fan Zhang, XiaoFeng Wang
An Analysis of IoT Device Manufacturer’s Security Advice to Users Through Companion Apps
Ryota Honda, Junnosuke Kushibiki, Takayuki Sasaki, Simon Parkin, Carlos H. Gan ̃a ́n, Michel van Eeten, Katsunari Yoshioka
An Empirical Study of Backdoor Attacks on Ethereum Smart Contracts
Naoto Yanai, Naohisa Nishida, Yuji Unagami
Automatizing Cybersecurity via LLMs
Burak Hasırcıog ̆lu, Vasilios Mavroudis, Chris Hicks
Can We Trust PUF Manufacturers? Robust PUF-Based Authentication via Combiners
Edoardo Liberati, Pierpaolo Della Monica, Riccardo Lazzeretti, Ivan Visconti
DarkWrt: Towards Building a Dataset of Potentially Unwanted Functions in IoT Devices
Daichi Uezono, Junnosuke Kushibiki, Takayuki Sasaki, Satoshi Hara, Yury Zhauniarovich, Carlos H. Gan ̃a ́n, Michel van Eeten, Katsunari Yoshioka
Decoupling the Device and Identity in Cellular Networks with vSIM
Shirin Ebadi, Zach Moolman, Eric Keller, Tamara Lehman
Discovering Sensor-Fusion-Vulnerabilities in autonomous driving systems against LiDAR attacks
Ryo Yoshida, Takumi Sato, Yuki Hayakawa, Ryo Suzuki, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Kentaro Yoshioka
Do You Sell This? Utilizing Product Searches to Find SEO-driven Fake Shopping Sites
Mizuho Hasegawa, Akihide Saino, Akira Fujita, Kazuki Takada, Rui Tanabe, Carlos H. Gan ̃a ́n, Michel Van Eeten, Katsunari Yoshioka
Enabling Reproducibility through the SPHERE Research Infrastructure
Jelena Mirkovic, Brian Kocoloski, David Balenson
Enhanced Device Identification in Cellular IoT Using IPFIX Records
Ryuta Ohishi, Norihiro Okui, Masataka Nakahara, Masakatsu Nishigaki, Tetsushi Ohki
Enhancing LLM4Decompile with Obfuscated Source Code for Optimized Assembly
Ryota Saito, Takuya Kataiwa, Tetsushi Ohki
Evaluation of Radio Jamming Countermeasures in IoT Thread Networks
Poonam Yadav, Anthony Moulds, Peter Gillingham
Exploring the Impact of Dark Patterns in VR: A Comparison with the Real World
Toi Kojima, Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki, Tetsushi Ohki
Fingerprinting IoT Devices Using Latent Physical Side-Channels
Justin Feng, Tianyi Zhao, Shamik Sarkar, Dominic Konrad, Timothy Jacques, Danijela Cabric, Nader Sehatbakhsh
Flexible Remote Attestation System for Trusted Execution Environment using Delegating Verification
Takashi Yagawa, Tadanori Teruya, Kuniyasu Suzaki, Hirotake Abe
FuzzLGen: Logical Seed Generation for Smart Contract Fuzzing via LLM-based Agents and Program Analysis
Songyan Ji, Mingyue Xu, Jin Wu, Jian Dong
GSIT: A Geometric Space-based Information Tree for Hierarchical Certificate Management in Vehicular Networks
Jheng-Jia Huang, Wei-Hsueh Wang, Guan-Yu Chen, Nai-Wei Lo
Harmful Terms and Where to Find Them: Measuring and Modeling Unfavorable Financial Terms and Conditions in Shopping Websites at Scale
Elisa Tsai, Neal Mangaokar, Boyuan Zheng, Haizhong Zheng, Atul Prakash
HoneyOrg: Towards Attracting Targeted ICS Attacks with Standalone Honeypots
Matthew Rodda , Vasilios Mavroudis , Chris Hicks
Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication
Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki
JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models
Delong Ran, Jinyuan Liu, Yichen Gong, Jingyi Zheng, Xinlei He, Tianshuo Cong, Anyu Wang
Leveraging In-Sensor Computing to Preserve Privacy in Remote Health Monitoring
Mashrafi Kajol, Nishanth Chennagouni, Andrew Lu, Wei Lu, Dean Sullivan, Qiaoyan Yu
Leveraging Isolation and Adaptive Resource Management for Secure Virtualized ORAN
Lam D. Nguyen, Wei Shao, Hajime Suzuki, Shiping Chen, Wei Ni
LLM-Driven Automated Exploit Assessment for Penetration Testing
Xiangmin Shen, Wenyuan Cheng, Yan Chen, Zhenyuan LI, Wencheng Zhao, Dawei Sun
Long PHP webshell files detection based on sliding window attention
Zhiqiang Wang, Haoyu Wang, Lu Hao
MAZU: Zero Trust Architecture for Service Mesh Control Planes
Aashutosh Poudel, Pankaj Niroula, Collin MacDonald, Lily Gloudemans, Stephen Herwig
NETDPSYN: Synthesizing Network Traces under Differential Privacy
Danyu Sun, Joann Chen, Chen GONG, Tianhao Wang, Zhou Li
Post-Deployment Privacy Enhancement for Smart Contracts
Tongqi Wang, Jin Wu, Jian Dong
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel
Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel
Rethink: A Personalized Regret Analyzer for Social Media Posts
William Namgyal, Tianshi Li
Rhythm Tap: Inclusive Personal Authentication Method Based on Rhythmic Variation
Yuri Takase, Yuto Toshikawa, Kazuki Nomoto, Ryo Iijima, Masataka Kakinouchi, Tatsuya Mori
Towards a Lightweight Key-Enforced Race Detector for Commodity Kernels
Rahul Priolkar, Chuqi Zhang, Adil Ahmad, Rahul Priolkar
Towards SBOM-based Access Control for Transparent and Explicit Program Execution
Yuta Shimamoto, Hiroyuki Uekawa, Mitsuaki Akiyama, Toshihiro Yamauchi
Utilizing Large Language Models to Create Context-Aware Spear-Phishing Attacks Using Social Media Data
Xinyao Ma, Ankith Veldandi, Zitao Zhang, Peter Caven, Ambarish Gurjar, Jean Camp
Utilizing Large Language Models to Create Context-Aware Spear-Phishing Attacks Using Social Media Data
Elham Pourabbas Vafa, Sayak Saha Roy, Shirin Nilizadeh