|

楼主 |
发表于 2024-2-3 09:59:41
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 6 }3 B+ {2 ~/ c. S- E' Y$ b9 @# d
# {- {$ x1 e; M V% C" v9 _6 sNDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
" N3 N: S7 m2 _: r- f( |' b: F7 D# r4 R5 N* }0 Q4 L
【1】山东大学
/ g j1 ^' i9 h) r# F1 iSecurity-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols" J: @# _5 M, _+ G( g8 s( H
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)
, v& p& c3 D- |5 `9 n
! y; x0 s5 d" y' u: j7 R' _【2】东南大学& L+ g) t( w1 V# e6 D
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems/ K- C0 x6 A$ s7 k/ K$ Q* l0 U
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
' t9 B1 b1 L6 k3 S) e( w' T9 c) m9 x# `+ |
【3】浙江大学
6 W3 d* a2 j1 ^! d0 ^2 k8 ]GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards7 q9 R/ ]8 I% ~& }% g0 w! d& V2 d# C
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)8 F, J) ^- i+ ?& q0 T& c
$ E; T: ^* o$ T9 w( i5 g& q【4】浙江大学
2 \3 r9 W/ y* E: @& b; M' mInaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
0 ]+ J. V1 s1 L1 cXinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)" K; Z3 w% s$ V
2 e: q' g6 M- Y" [0 q【5】北京航空航天大学
3 o3 }, t6 E/ EHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
3 g8 f* m" A1 ?5 b2 U$ |Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)+ I9 f; X j" J
1 G1 ^6 t+ {2 y2 [9 \
【6】清华大学
~$ Z$ q5 Y; |$ b/ f1 G% c5 sLow-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
( p; L" @1 @" q% yYuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
; A' C3 S7 W; u/ W3 [ L
5 R7 I1 Y5 Z: R5 e7 g【7】浙江大学
M# K& }( W: Z, |+ SSymphony: Path Validation at Scale
# ^+ D% O9 X1 }" t2 kAnxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)- S- l9 M# \9 A+ L
4 j$ _3 m Z7 P% H8 S+ P( |6 `: u【8】清华大学 O, p X ]! b, S
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
0 W G, t4 [) N" z& }+ ]3 fChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)3 d- ^- c0 K5 d, m
3 ]$ h5 A Z. s& A+ c( `+ w
【9】浙江大学4 W; \8 z# F$ V9 f, h$ [; \4 S" U K
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency# ?- r, b' K! g4 G( ^( t5 n
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)- m# u7 o5 V& a' R- Y# R% d
# B7 ^( ^: {- b+ T+ Y7 }: J【10】清华大学
# L1 f! A6 I: P7 wShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection0 o' W' \8 e" A8 p) \& G% M
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
6 K$ h3 r- `# d2 [" a7 N5 W) E! g! H9 F
【11】中国海洋大学' e5 k* x9 r$ G' A* ~3 s7 g
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
! F% c4 O4 S$ C0 J. @Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)6 l7 g9 d( U7 z; {# p# |
; K6 `/ a+ A2 b* j# g3 d- y3 ]
【12】浙江大学
0 J% ~% b5 G$ b. V, I. ?: vORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning i/ q6 A ^& K( Q/ l) L' `0 l; ~, ?/ h
Linkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University), c- g- \$ q, b6 K% d, b
3 H5 [, x: }% p0 d6 t【13】北京大学
/ A$ z/ @; H) c4 b0 x/ uNODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
9 ~) C5 {; n/ {! @Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University). p' s; u! P! n# a, j) H) M( N4 V
* m- G. l# q, L( T5 T7 W$ N2 [% C
【14】浙江大学& U. L, p3 [5 ?. R6 ~ p
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
3 |+ C. T- b0 l. j% p& e! [% r8 rChengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)
' d: `$ |$ z8 C' [8 d; ~4 A" r: n
【15】湖南大学
7 A) Q6 ^6 h# A6 ]& g1 V5 L1 QEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
+ L& S& y# G+ f9 G4 tHuiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)! B0 X, a0 N! ?, u4 }5 x
/ }4 D$ Q( E. v* z+ s【16】上海交大
6 e" r8 h: H2 }6 pCrafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
" n' ^* f9 g; `3 M1 Q2 d2 ^Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)) F5 G& x+ L% ?$ K' a, J m
& x+ ~# |/ {# Z- w5 J. ^, [. F& v【17】清华大学
) q! {4 A* ]% V7 LExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks' C% ~3 l) j. N0 }
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)7 G: C$ j+ ~9 w& s: c) v
, A3 } Y# z$ M) ?6 }0 R
【18】清华大学
@! X6 B7 N7 F8 n- B$ O' BCP-IoT: A Cross-Platform Monitoring System for Smart Home/ c% L Y' q# b8 A0 X7 v
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)
% \2 `9 x4 h2 e; `1 X' m) x$ B( T/ _2 J& U7 Q& U% \
【19】清华大学2 R u0 }9 y+ _9 a) ?
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks
* [( ~( v+ H3 _5 UShicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
+ K& ]. d0 w% C& Z8 }1 p, P: A! x0 Y& i
【20】清华大学& @3 Q( X- v! d2 F" d* T, X% o
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
- z$ Z& v: V; A7 E/ ILinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)* h0 C' E; R1 ]% {4 b) `
1 m: z/ g: j2 }# P9 o
【21】清华大学! u8 q# ]0 g( x* Q, i9 V
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization
, o- M) y7 m4 a+ I5 ~; b; LQuan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
9 v7 i! w3 Y! O u5 q
; y% u7 F I1 ~/ N( B# i* q; A【22】清华大学& N- Z* G+ [ N% g( e
DynPRE: Protocol Reverse Engineering via Dynamic Inference8 Q3 {! M* B5 h" P. O9 u
Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University), z4 }. \2 `. d! r3 K
7 J7 F4 L7 L+ j: c- r# j e
【23】浙江大学. D6 Y, c8 R5 o5 `
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention( g9 f7 A& ?5 R; h0 L+ x+ a% }
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)
, w9 T- j5 N" j) A/ I b6 d8 G/ r" ]$ O( C4 D% N
【24】中山大学, W. P/ O, k8 @5 O0 t
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem; v" [3 ~* g& C# U4 Y: Z
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)
2 @1 E) g$ q# X) g, i3 w$ H1 U1 [ j' X- Q4 \9 @: }
【25】浙江大学2 O5 ^1 M( n$ U }3 t/ j; K
CamPro: Camera-based Anti-Facial Recognition/ T4 A' r. l; H1 h' `
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
8 S0 u+ G) i1 k" J
& O9 y" ^* \" Z; E/ [【26】中国科学技术大学
P% \4 w+ J/ Q$ tDetecting Voice Cloning Attacks via Timbre Watermarking% d2 E z$ E0 c9 c, v3 D
Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)3 y9 O: J) {) O3 W
) W' O, L" m: ^ M
【27】清华大学
) A8 j6 M; D. X6 }7 U, B) [. dUnderstanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed
% k5 C7 k8 i" \+ u/ i s5 DLancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University); v# E! `: s7 W9 x. \
; I7 p$ U7 ^/ b* ?* g
【28】清华大学! Z( T5 B% b9 p$ S9 K- o
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository! n' j! i9 u5 G/ h( a9 {
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)7 w' ]5 }/ f, ?. h& f
: D4 y, V4 x$ e7 }9 L; n, E. w: E【29】清华大学
" y* l/ v& K, Z+ dPencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption; b/ Z# a2 x- z/ w5 A( I
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)3 X5 G \% n1 }" g5 O: u
2 j% W* [( Z" Y
【30】NUDT
$ l' { ]3 X x1 UDeepGo: Predictive Directed Greybox Fuzzing# T+ Z4 a( L( v: |2 J
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)- B! D( G s! P/ S+ b
% [ s3 E) @" P- `' R
【31】上海交大' Z" u1 v6 r) d7 R
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token
3 l1 O5 C, @: f, LGe Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)
6 Z: O5 B( t6 I/ d- X$ o0 ^% O
+ S8 S# D5 F% y6 p s% B【32】华中科技大学
* Z6 M A: e4 E1 W' j3 RPrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound! U$ f: V# O" A/ B" R- N- I; B
Man Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)" L+ W4 r/ C( G: v
. l8 Z5 m2 v. F5 g9 L( K. x【33】南方科技大学- c! A; }- X3 l3 g. p
Separation is Good: A Faster Order-Fairness Byzantine Consensus
& h- N, _9 h/ l* O; Z: tKe Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
; k5 }5 Y. ]# v o' X' x) ~# H: J$ I5 y- y
【34】南方科技大学
0 c& l+ y, Y( X+ m, ], q9 hCAGE: Complementing Arm CCA with GPU Extensions
& X- f& K9 b3 |% k6 CChenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group): u6 o, ?2 N, ~
3 f$ a7 ^! ^% c3 _! ?【35】华中科技大学
! } O# T$ {1 k; L8 m) SDorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses9 t; V1 A4 c2 a5 C
Chaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
! {' G+ R, d% r( g$ B; r2 I9 t; j r3 d# W7 Q6 G
【36】华中科技大学
% a8 x& i- C( @- p7 lAbusing the Ethereum Smart Contract Verification Services for Fun and Profit
/ R2 P0 n/ F% uPengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)% ?- l/ h+ E! N4 ?2 ~6 s
, Y% L9 }& K4 C2 u$ c" s
【37】浙江大学
$ z! |+ C5 D5 X6 U! H$ k Q4 \UniID: Spoofing Face Authentication System by Universal Identity
+ K' D& ~/ s. ]Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)1 q) G. q( n# ~4 Z2 ^
; @0 Y) {6 A8 s( |/ W
【38】武汉大学8 u$ t* z0 B/ O
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices, r+ z. t) p5 b$ E
Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
2 @: a( U9 k, g O
+ \' F; j0 Y$ P* T【39】上海科技大学- K7 H5 V3 W" ^3 w
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems- ^9 @8 s" h+ d. T
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)1 x6 V. G0 y& _5 o0 _ u8 m
" ?# ?( w" Q/ ~" @4 o5 ^
【40】清华大学" m9 D3 N) u- u) h- g
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
+ x5 \+ I3 I) p4 V! y2 eQiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
" e& [+ h5 f. L, [; M& s& F' ? |
|