NDSS Symposium 2021 Accepted Posters
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service
Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Tang, Xiaofeng Wang and Xiapu Luo
Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning
Hemant Rathore, Sanjay K. Sahay, Piyush Nikam and Mohit Sewak
A Pilot Study on Real-Time Fingerprinting for Tor Onion Services
Young-Ho Kim, Loc Ho, Won-gyum Kim, Donghoon Kim and Doosung Hwang
A Weak Consensus Algorithm and Its Application to High-Performance Blockchain
Qin Wang, Rujia Li and Qi Wang
Dissecting the Cryptographic Code Exchange
Jason Ly and Minhui Xue
Evaluating Cascading-VPN Performance
Sebastian Pahl, Florian Adamsky, Daniel Kaiser and Thomas Engel
Automated Vulnerability Assessment for Embedded Systems
Ulrich Lang, Holmes Chuang, Reza Fatahi, Will Swift, Jason Kramer
Cyberattack Detection for Wireless Sensor Networks with Deep Learning
Ulrich Lang, Reza Fatahi, Holmes Chuang
NATICUSdroid: A malware detection framework for Android using native and custom permissions
Akshay Mathur, Laxmi M Podila, Keyur Kulkarni, Quamar Niyaz and Ahmad Y Javaid
Demystifying Resource Management Risks in Emerging Mobile App-in-app Ecosystems
Haoran Lu, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, Xiaofeng Wang and Xueqiang Wang
An Offline Delegatable Cryptocurrency System
Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo and Yang Xiang
Verifiable Homomorphic Tallying for the Schulze Vote Counting Scheme
Mukesh Tiwari, Dirk Pattinson and Thomas Haines
A Framework for Effective Corporate Communication after Cyber Security Incidents
Jason Nurse and Richard Knight
Limiting Damage Spread in the Internet of Things Using Features-based Immunisation Techniques
Farell Folly
Can the Exposure Notification Framework Expose Personal Information
Kazuki Nomoto, Mitsuaki Akiyama, Masashi Eto, Atsuo Inomata and Tatsuya Mori
Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH)
Terry Benzel, Jelena Mirkovic, Laura Tinnel, David Balenson, Eric Eide, Tim Yardley
Real ORNL Automotive Dynamometer (ROAD) CAN Intrusion Dataset
Samuel Hollifield, Miki Verma, Michael Iannacone, Robert Bridges, Bill Kay and Frank Combs
DynUnlock: Unlocking Scan Chains Obfuscated using Dynamic Keys
Nimisha Limaye and Ozgur Sinanoglu
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing
Georgia Tsaloli, Gustavo Banegas and Aikaterini Mitrokotsa