|

楼主 |
发表于 2024-2-3 09:59:41
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑 ' R3 z; a. v% \
0 z5 w3 v* j" j6 i) F3 B' wNDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
, ^1 E! T$ k! j/ y$ b# u! f
. b2 \. i8 Z) i, S" g0 l【1】山东大学& w5 I# G9 t5 `8 ^0 C0 c, F
Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols+ d: M0 R% R# a! Z
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)1 r( N- n+ |1 @1 J& k+ R
2 w" m& L3 v# v3 {0 z【2】东南大学* K( l6 L" I- L
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems' y) b. p/ M% f1 N; ]
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)! T1 P7 w- t8 ] ~; D, B
& P4 Y8 l7 d8 ?7 W2 _ Z4 i
【3】浙江大学
. I/ A0 W$ X4 G u9 F5 \GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
- [( {5 T0 L$ E2 |* r8 Z/ `4 ~6 hQinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)0 D% `! x- a+ n+ B1 h
1 M& U+ P# b _& t6 p4 c2 \
【4】浙江大学: m. a* d$ `; s
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time# G# i; w1 j; l. S
Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)
9 s0 b1 V" c; Z
1 k& m" F# U3 ~# s; b! f" k- G/ v! Z【5】北京航空航天大学
2 h8 |6 S3 }" I# E. |0 G+ vHEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation8 q) T$ c, i7 c1 }& S
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)9 Y5 s. o& O z R* ^
9 |8 m5 r0 e9 {( o" `, F H
【6】清华大学4 ^ D. y0 q8 n0 N6 d
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
3 g$ Z, p, T( H, S, ?/ t& xYuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)
3 C/ i. |+ V$ A8 E' k- f3 _0 Z+ d* b$ z c
【7】浙江大学6 U2 ]1 O$ }6 q- ~ g; b) z! u* z. `
Symphony: Path Validation at Scale3 F6 L8 G/ F& m) ?5 x& u! _
Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
6 p5 Y. `, {) D* M/ b" S
X& P# F ]+ O$ d8 n【8】清华大学; I' o. }" l8 `; ]- \. n8 ?
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
& y# p. c+ @1 e+ c2 c$ F6 VChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)
/ M8 e6 U0 a+ R( B8 y) f! O) e$ z6 r% W6 z+ S" q& f
【9】浙江大学
# |- ^+ y0 Z' x/ A- ]MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency1 x. p1 m8 o4 D* U- W
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University) ]6 I# j' Q, r; b& Y- ~# O6 S. `
& x+ G( m- I7 k- z; J. S6 \【10】清华大学1 E. [: Z5 b% {9 K V- u7 e
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
4 M( c1 W" j, t7 y" d( }# DKunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
; b, I$ ^' U, S+ M4 W+ A) f4 m0 Q/ s5 |( ~2 Z5 F% |+ U2 v
【11】中国海洋大学
7 W- ^8 j# t1 `Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
( `3 Q5 O' e; g* ~- j- p% ?Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
2 M! ]4 S% {; {6 L6 b0 `2 w/ j9 O4 c% J, h% S# k: k
【12】浙江大学
5 o; p4 ]2 v4 m0 fORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. E7 }: C( L, Y; S% `# I
Linkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)4 z- Y3 z' ?5 t* j+ R
0 \; L8 B+ Y/ s5 Q0 ?
【13】北京大学9 Y5 c! m% [3 H5 C
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
4 ^8 Y2 A0 L0 i1 ^' fShaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
5 F" r( l+ A M; @- A, W# s
, Y R/ c8 t! X8 e【14】浙江大学: `, r% _% w5 x S4 X2 B6 G
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
. @% Y0 I, `1 H! f6 ~; Q. d3 {; jChengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)# z0 { z- e$ W M# O. m/ t
7 \ M$ [, M( z- R' K6 n- L8 H
【15】湖南大学
- X) F$ @2 D- o) Y8 SEavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR, Z: X$ S, e, H6 Q9 W0 _9 H8 ^) T
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)' O t8 b8 ~1 x6 h
/ E V7 t( q' P7 D4 E1 R( t" t【16】上海交大
- S) E- X5 E6 iCrafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
) [& q/ g0 K4 s, ? L QShiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)* o) |/ m! C0 y. k7 h' c7 O3 r: p
/ j% X8 @1 k2 L【17】清华大学
- D+ y( W; x. c% V YExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks b, C% w. ?2 M; Q: q8 f
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)
& V3 M& }9 W9 u. f, R" Z8 ?; f |; n; U3 u4 |
【18】清华大学4 w+ {$ Q1 H& N4 m5 G! x
CP-IoT: A Cross-Platform Monitoring System for Smart Home+ T* ?) T: f6 r
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)2 h! S' y6 F, F8 g: l
1 N( [2 F4 ?) g4 y4 c【19】清华大学, J7 R9 e: ~$ V- H
LoRDMA: A New Low-Rate DoS Attack in RDMA Networks
8 R# r9 ]1 z8 h; D) h) ~9 i" BShicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)+ k) J# U/ b# A8 o
% R9 a0 w; T2 s【20】清华大学* b0 h: r2 M: F
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
, C u5 O! O6 l9 U- M: b( u# tLinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University) F; M4 S% g; S$ p. `6 ^3 b$ t( j
: _ t' `. m4 V; b& Q( r, r【21】清华大学! Q% ?' z( X- ^* N3 a3 k. }
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization$ S! f5 }3 V: i# {- i
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
1 Y5 m+ c8 F9 q5 k
3 J' x7 k2 L7 o `- c Q$ k【22】清华大学8 \$ ]# k1 n b, A. M5 M3 t
DynPRE: Protocol Reverse Engineering via Dynamic Inference: [* m8 u6 m% |2 L a5 v
Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University) x" n `8 P- c* J* u1 z
2 S# D. f+ _! H2 h) I8 L6 [9 V- B' p
【23】浙江大学% d4 d3 K& I; w
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention
$ r% F- u+ W2 V' ?" lLujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)
2 Q3 s* a" v* {, g$ n# f" ]" U, e4 g* q" z/ a
【24】中山大学
/ m. L& B" ]2 M: i( g8 ~Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem2 {5 S6 t) m# r
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)9 U! i% h, ?9 b5 }
2 Q' x4 O# ~, L9 ~4 q* \; ?2 \2 z$ v
【25】浙江大学# d. ^0 s; ?4 _- Y a: F% [
CamPro: Camera-based Anti-Facial Recognition% W: {1 b* N3 H3 u, y6 r% L
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)! N( y/ c O% q' O9 j* c
: W9 y) q7 N5 A& b& `【26】中国科学技术大学
" ~ y$ S3 G2 n- ^ yDetecting Voice Cloning Attacks via Timbre Watermarking
; j5 p2 X& @& Q+ L& ]8 k. R/ W" `Chang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)
/ V6 {' X- |( s( m1 k, n2 y8 @- z4 ?9 X }7 Y$ i
【27】清华大学8 L$ F7 w. T- D* Z- O1 [$ J
Understanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed2 d1 G' c# C4 _2 O" ~
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)
: _: T/ Q: [ N2 X; k; I' M
1 j, \* p3 A$ q0 d【28】清华大学
- H/ {/ {( k( I9 bdRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository/ ]! a. I, ?9 V* w* K0 ?
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)
2 z( ^& B# O, L* T
% I* e: I+ |- c8 n5 A' Y9 W【29】清华大学
7 F7 \7 q* [0 e8 F* D. UPencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption" f1 e& K5 m: O$ e. s
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)
9 k# c9 }% _9 p9 ` b; z* Q. U3 `
- r& I4 d/ F6 u【30】NUDT
7 ?% w( C( r! p: ~& iDeepGo: Predictive Directed Greybox Fuzzing
; j+ T' p" i9 r2 ~* ^% p( D1 ^Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)
) b9 c; C2 C, t* t2 C3 w! S, T; E5 B
【31】上海交大& z! x0 w) A5 Q. p6 Q
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token# M* x1 h8 M. V+ z1 N
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)
, O1 `' J$ n& f" V
. ]/ I4 U4 N, o& |0 l' ?【32】华中科技大学1 V! H+ O+ }, ?$ H9 J
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound# p( W& b' L3 `
Man Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)4 M$ U D* ^6 s+ H* B& \" r9 H
4 ?+ }- y& o+ c- x【33】南方科技大学) P/ d9 N. D) I9 m0 } z
Separation is Good: A Faster Order-Fairness Byzantine Consensus8 p6 U6 v2 \6 p6 m
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
8 l( o0 ~9 x# w' e V& ]0 ^! u$ o, _' Q9 N9 }; a# L# ^( w* n
【34】南方科技大学
' ?! x7 W/ B1 q6 xCAGE: Complementing Arm CCA with GPU Extensions
, D# d2 x4 t2 v5 c+ ZChenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)
9 G; T$ X3 b) t& {% C! u: u [9 c0 V* y6 j6 s$ }- ]
【35】华中科技大学; p0 F5 ]' j% ^: \3 a' i) z% x
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
5 j8 \- N$ a# u. X; C+ XChaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
7 u+ O, l5 G: |
/ I5 j/ B* P) p9 ~- `! w* x# T. o& V. O【36】华中科技大学. n$ ^3 p$ Y: ~; Q3 A
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit
! o5 @- W f* G4 c( S8 ^# _Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
' b, s9 x( z. H2 t! m/ T4 I0 b$ L P( [# B3 b# O
【37】浙江大学
K# R& H2 ?# o- jUniID: Spoofing Face Authentication System by Universal Identity
7 r q5 g) V# g- k( ?9 B- _Zhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
; r/ D" Q Z G! Q$ k% f2 Y7 v) y
【38】武汉大学
: y x* b) S" c& Z3 ]! `From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
6 o' J' S6 ] D5 v: W4 k. T$ @; cYue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
/ o: S& r4 }6 M! G5 Q% V
! A2 v! l1 s5 c9 p c* S【39】上海科技大学
1 x4 e2 w# L+ p# FSLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
: t/ d3 k8 f6 iGuangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)
) M/ [$ o. O9 K+ B' g5 k7 q0 `1 {3 ` R) O5 P, |' G3 g
【40】清华大学
1 [2 I6 w8 } e1 dYou Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks& A! \! u' B7 r; D7 U8 H: n* f
Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)2 I* e+ Q+ _& o+ H1 u, T1 K2 [
|
|