NDSS Symposium 2023 Accepted Posters
A descriptive security alert through the outlier analysis using multi-sensor data
Abdulkabir Abdulraheem and Im Jung
A Monte Carlo Ensemble Approach to Automatically Identifying Keywords in Binary Message Formats
Jared Chandler
An Early Detection of Android Malware Using System Calls based Machine Learning Model
Xinrun Zhang, Akshay Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, Ahmad Javaid and Xiaoli Yang
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks
Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni and Ahmad-Reza Sadeghi
AUTOLYCUS: Exploiting Explainable AI (XAI) for Model Extraction Attacks against Decision Tree Models
Abdullah Caglar Oksuz, Anisa Halimi and Erman Ayday
Backdoor Attacks to Pre-trained Unified Foundation Models
Zenghui Yuan, Yixin Liu, Kai Zhang, Pan Zhou and Lichao Sun
BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT
Jiawen Shi, Yixin Liu, Pan Zhou and Lichao Sun
Client-Side Byzantine Attacks on Raft Algorithm in Blockchain
Donghee Kim and Junbeom Hur
Cybersecurity Chess Manual: A Security Concept Predicting Typical Future Confrontation Scenarios
Xingchen Wu, Jiaqi Li, Yang Yu, Jian Chang, Yang Zhao, Lvyang Zhang and Lidong Zhai
Defending malware detection models against evasion based adversarial attacks
Hemant Rathore, Animesh Sasan, Sanjay K. Sahay and Mohit Sewak
Detecting Anomalous LAN Activities under Differential Privacy
Norrathep Rattanavipanon, Donlapark Ponnoprat, Hideya Ochiai, Kuljaree Tantayakul, Touchai Angchuan and Sinchai Kamolphiwong
Diving into Robocall Content with SnorCall
Sathvik Prasad, Trevor Dunlap, Alexander Ross and Bradley Reaves
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy
Leonard Dervishi, Xinyue Wang, Wentao Li, Anisa Halimi, Jaideep Vaidya, Xiaoqian Jiang and Erman Ayday
Fixing the Foundations: Towards Generalization for Machine Learning Intrusion Detection Systems
Miel Verkerken, Laurens D’hooge, Tim Wauters, Bruno Volckaert and Filip De Turck
Geographically Distributed Management of Enterprise Network Security Policy
Iffat Anjum, Jessica Sokal, Hafiza Ramzah Rehman, Ben Weintraub, Ethan Leba, William Enck, Cristina Nitarotaru and Bradley Reaves
Hades: Practical Partitioning Attack on Cryptocurrencies
Vinay Shetty, Piyush Kumar and Devashish Gosain
He-HTLC: Revisiting Incentives in HTLC
Sarisht Wadhwa, Jannis Stöter, Fan Zhang and Kartik Nayak
Improving Legacy IoT Device Security through Open-Source Intervention
Conner Bradley and David Barrera
Local Differentially-Private Genomic Database Fingerprinting
Tianxi Ji, Erman Ayday, Emre Yilmaz and Pan Li
Looking at the landscape of SMS Phishing
Aleksandr Nahapetyan, Kevin Childs, Sathvik Prasad, Bradley Reaves and Alexandros Kapravelos
Practical Removal Attacks on LiDAR-based Object Detection in Autonomous Driving
Takami Sato, Yuki Hayakawa, Ryo Suzuki, Yohsuke Shiiki, Kentaro Yoshioka and Qi Alfred Chen
Privacy Preserving Collaborative Clustering with Hyper Parameter Recommendation
Maryam Ghasemian and Erman Ayday
Privacy Preserving Population Stratification for Collaborative Genomic Research
Leonard Dervishi, Wenbiao Li, Anisa Halimi, Xiaoqia Jiang, Jaideep Vaidya and Erman Ayday
PrivyTrace: Privacy-Preserving Rapid Traceback of Telephone calls
Dawuda Ahmed and Bradley Reaves
Reproducibility-Oriented and Privacy-Preserving Genomic Dataset Sharing
Yuzhou Jiang, Tianxi Ji and Erman Ayday
Robust Fingerprint of Location Trajectories Under Differential Privacy
Yuzhou Jiang, Emre Yilmaz and Erman Ayday
Securing Biomedical Images from Unauthorized Training with Anti-Learning Perturbation
Yixin Liu, Haohui Ye, Kai Zhang and Lichao Sun
Sleepy Channels: Bi-directional Payment Channels without Watchtowers
Lukas Aumayr, Sri Aravindakrishnan Thyagarajan, Giulio Malavolta, Pedro Moreno-Sanchez and Matteo Maffei
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
Rahul Kande, Addison Crump, Garrett Persyn, Patrick Jauernig, Ahmad-Reza Sadeghi, Dr. Aakash Tyagi and Jeyavijayan Rajendran
Thora: Atomic and Privacy-Preserving Multi-Channel Updates
Lukas Aumayr, Kasra Abbaszadeh and Matteo Maffei
Towards Simultaneous Attacks on Multiple Cellular Networks
Alexander Ross and Bradley Reaves
Unlearnable Graph: Protecting Graphs From Unauthorized Exploitation
Yixin Liu, Chenrui Fan, Pan Zhou and Lichao Sun
UnGANable: Defending Against GAN-based Face Manipulation
Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz and Yang Zhang
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests
Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd and Gene Tsudik