NDSS 2020 Accepted Posters
Image-synch: a liveness detection method based on ambient image
Yuan Sun, Huiping Sun and Xixin Cao
DEAN: A Blockchain-Inspired Consensus Protocol Enabling Trustworthy Edge Computing
Abdullah Al-Mamun, Jun Dai, Xiaohua Xu, Mohammad Sadoghi, Haoting Shen and Dongfang Zhao
Practical Image Obfuscation with Provable Privacy
Liyue Fan
Method for Effective Measurement, Labeling, and Classification of Botnet C2s for Predicting Attacks
Mitsuhiro Hatada and Matthew Scholl
Model checking RNNs with modal μ-calculus
Tatsuhiro Aoshima and Toshinori Usui
Secure Logging Infrastructure Employing Heterogeneous Trusted Execution Environments
Seungho Lee, Wonsuk Choi, Hyo Jin Jo and Dong Hoon Lee
MOAI: Multiple Origin ASes Identification for IP Prefix Hijacking and Mis-Origination
Hironori Imai, Masayuki Okada and Akira Kanaoka
Leveraging Locality of Reference for Certificate Revocation
Luke Dickinson, Trevor Smith and Kent Seamons
Oblivious k-Nearest Neighbors for Secure Map Applications
Jamie W. Lee, Adam J. Aviv, Travis Mayberry and Daniel S. Roche
Mining Threat Intelligence from Billion-scale SSH Brute-Force Attacks
Yuming Wu, Phuong Cao, Alexander Withers, Zbigniew T. Kalbarczyk and Ravishankar K. Iyer
Room-Scale Over-the-Air Audio Adversarial Examples
Tao Chen, Longfei Shangguan, Zhenjiang Li and Kyle Jamieson
Security of Deep Learning based Lane Keeping Assistance System under Physical-World Adversarial Attack
Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jack Jia, Xue Lin and Qi Alfred Chen
Propose a defense method against Audio Adversarial Attack
Yuya Tarutani, Kensuke Ueda and Yoshiaki Kato
Backdoor Suppression in Neural Networks using Input Fuzzing and Majority Voting
Esha Sarkar, Yousif Alkindi and Michail Maniatakos
DBB-DSE : Dynamic Backward-Bound Dynamic Symbolic Execution
Jonghwan Yang, Seokwoo Choi and Eun-Sun Cho
MicroFL: A Lightweight, Secure-by-Design Edge Network Fabric for Decentralized IoT Systems
Ronghua Xu, Yu Chen and Jian Li
POSTER: MURS: Practical and Robust Privacy Amplification with Multi-Party Differential Privacy
Tianhao Wang, Min Xu, Bolin Ding, Jingren Zhou, Cheng Hong, Zhicong Huang, Ninghui Li and Somesh Jha
A Machine Learning Model Performance Improvement Approach to Detection of Obfuscated JavaScript-based Attacks
Samuel Ndichu, Sangwook Kim and Seiichi Ozawa
uRAI: Securing Embedded Systems with Return Address Integrity
Naif Saleh Almakhdhub, Abraham A. Clements and Saurabh Bagchi
Automatic Detection and Prevention of Fake Key Attacks in Signal
Tarun Kumar Yadav, Devashish Gosain, Daniel Zappala and Kent Seamons
Towards an Architecture for Private Digital Authentication in the Physical World
Rene Mayrhofer, Michael Roland and Tobias Holler
All Your Data Are Available to Us: A Need for Network Segmentation with IoT Devices
Karl Olson and Nolen Scaife
Securing IoT services using DLTs and Verifiable Credentials
Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, Spyros Voulgaris and George C. Polyzos
Methodologies for Quantifying (Re-) Randomization Security and Timing under JIT-ROP
Md Salman Ahmed, Ya Xiao, Gang Tan, Kevin Snow, Fabian Monrose and Danfeng (Daphne) Yao
Who’s Calling? Characterizing Robocalling Campaigns
Sathvik Prasad, Athishay Kiran, Elijah Bouma-Sims and Bradley Reaves
A Chaincode with Attribute-Based Encryption for Protecting Data in Ledgers
Mio Saiki, Hideharu Kojima, Naoto Yanai and Tatsuhiro Tsuchiya
SNIPPET Secure and Privacy-friendly Peer-to-Peer Electricity Trading
Aysajan Abidin, Raf Callaerts, Geert Deconinck, Shenja van der Graaf, Akash Madhusudan, Mehdi Montakhabi, Mustafa A. Mustafak, Svetla Nikova, Domenico Orlando, Jessica Schroers, Simon Vanhove and Fairouz Zobiri
Consortium Blockchain for the Assurance of Supply Chain Security
Haoting Shen, Shahriar Badsha and Dongfang Zhao
Wireless Access Point Spoofing by Unmanned Aerial Vehicles (UAVs)
Ryota Kawakami, Atsuo Inomata, Naoto Yanai and Toru Fujiwara
PhotoLock: Autonomous Privacy-preserving Photo Sharing in Online Social Networks
Edwin Yang, Song Fang, Christan Grant and Le Gruenwald