|
楼主 |
发表于 2024-2-3 09:59:41
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑
/ Q+ {2 u! S) ^6 y3 }0 E! O! J% _) m4 ~, U4 w3 \8 Y
NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/2 F9 \ S( }8 W- ~9 i: d
: r! \0 M7 F' {
【1】山东大学
' M" Z7 f s0 k& [Security-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols. x. G6 T. ~ D: l2 j7 b- D+ m
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)2 o$ V& u1 u/ _: ]# i) ?& B
1 u, _& g' e7 B. ~) @
【2】东南大学
, i& {( R' R0 R6 R& hLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems2 i" B7 t: f) s p
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
- s6 K1 }( d; {! K% m. k+ Y: N; A$ {
【3】浙江大学/ G9 s( q3 q. V
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards6 t& D+ ?, R) m- t6 E, E# H4 [
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)1 h7 S3 }2 L- J2 V& Q& V7 ?
. X A( G9 s2 z/ U: G; i* ?
【4】浙江大学- K% w+ O Z' x J
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
5 g2 ]* q& p% y# SXinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)) d6 ^/ s X2 x4 u1 L
" H1 g W- W, i【5】北京航空航天大学7 C g/ Z/ C/ Q/ N" n( w4 {
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation( N7 `1 ?0 [, _. B s
Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University)0 X* X8 ^5 i# z" P6 H: f
1 M- w: X9 {& F8 d【6】清华大学 h' }1 h3 m: a8 C
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic% ?7 C6 l, K# Y$ O8 M0 c
Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University)7 N6 E. G- F J) [: e
$ R+ E; C- V3 t' l【7】浙江大学
. {% w* r- ~9 |. @% bSymphony: Path Validation at Scale
- u" K7 N) d& B! J1 {0 XAnxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
. z! v; M7 S4 V% m J9 h/ K3 Q
p" K6 \' W1 V) ~( t$ C【8】清华大学
7 {3 P9 |& g& UBreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
7 h2 |0 i; ?3 o0 bChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)/ @" Q1 k: I, Q
9 u8 o7 p1 {& a0 ?! c
【9】浙江大学( P0 D6 Y$ D, N* B* p
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. `, F8 f( ~! g: z+ Y2 G
Jiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)
- A, h0 A$ I8 A8 `8 O% X
) J2 F0 B2 c& J【10】清华大学3 n! n4 x: |! X( I
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection, Z8 F& Y2 q0 n; i: r
Kunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
) e0 @5 q w) ]5 B9 E0 g3 i
, J" Y& w( n! _& V6 i z【11】中国海洋大学
6 |8 {4 ]4 ]; y! A/ X3 N( ~Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
. M( {6 ]8 D% r: G& ~Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)/ @1 @+ ~ Q) L* B% E
( ~# ?+ ?" E# u4 S0 m; u【12】浙江大学
. m; D/ {3 l0 O% v( s$ Y: PORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
! ^9 t$ t$ X. Q/ \5 f/ @& t! mLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University): @, c/ t9 Y2 c. b5 Z
+ k. w, |1 E" R" Q" `, a: W
【13】北京大学3 q9 ^. L& L2 M
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation7 q# n, w% u2 O+ p! r" T8 L$ c. S
Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
4 R4 i+ E; N \. w8 u8 }: Q& U
9 P, S6 p* X! }' q【14】浙江大学% |5 T3 E# \, U6 ~; `1 @
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
( e8 G- {/ P; `7 TChengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)' i1 d3 p5 D$ J) {: ^9 n7 w
% r. U+ N+ K5 M s' j0 \) a
【15】湖南大学1 V0 l- ] _& [ D+ L
Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR" D6 M- _$ r2 d1 f# O
Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)' ^1 a0 ^3 W: e
/ x w; H! G" _% J
【16】上海交大
1 ?; B; { ~2 B: YCrafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models5 K- w( x8 y& s# W" F( z) M6 B
Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology)
! h% U9 t: z3 n5 R- G' p9 F
( |! o/ _2 C$ _, s# \8 Z6 ?【17】清华大学
/ ~, ^) I* c# r. o" MExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks
o& ^. o0 u+ g& U, s9 X v2 fYuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)
, B9 h3 Z" b1 x$ x7 S7 i- i* [& j9 _2 \& Z! T6 A* ~, H
【18】清华大学
' ]- Q5 J' Q7 z# k# |CP-IoT: A Cross-Platform Monitoring System for Smart Home
& ^# n5 W, u; d# t2 r; uHai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University); A2 d( p' k) j" \: t7 ~6 y ]
; l2 A3 D Y) F# ]7 d【19】清华大学
* v& n" L9 e( x9 w" Y; Y6 E5 {LoRDMA: A New Low-Rate DoS Attack in RDMA Networks8 v+ e7 ^. | L. E: Y/ _' M f: t
Shicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
3 Q/ W6 S( m0 s
( k# U7 B! t5 ^. {- p【20】清华大学
1 C7 H2 m3 b2 U& c0 [! V UReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing
6 ?! W! p- c6 dLinkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)
; {3 A! y4 ~- N" J) m) R
0 r ~) G4 z+ R【21】清华大学
0 l Q+ w u$ t, V5 U: ^) mAutomatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization1 d0 f2 R3 x6 @! V, U2 F
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)
9 E' k& z3 U( O/ @: [( N, ^' U% ~; r6 z. ?$ n
【22】清华大学
7 b2 @: ]2 W% R$ L2 }DynPRE: Protocol Reverse Engineering via Dynamic Inference# M+ i) B! U g5 ^$ M
Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University)
/ n3 k( R# U$ {2 { t0 x5 y
% u' S, }4 h1 G4 z3 [【23】浙江大学
& C5 N; E9 Q1 u# C! n% zImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention' w: P1 x O* {0 y, N* q! \
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)
2 ]; [4 {! G# s) v: M" i$ R2 X- q8 i7 @, K
【24】中山大学+ l6 q9 W3 ?1 i! J! B
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem* g3 k3 b% G+ ^ |3 X! n
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)" J' H _' E: j9 j3 l0 G
. V% k% W' u: g- V3 P
【25】浙江大学
6 b3 q6 s) H, @; {( LCamPro: Camera-based Anti-Facial Recognition
, P5 N0 f' N$ v: r) RWenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)" c9 S" G% k) Y! e/ u; M; |4 B
$ D, Y* |& B8 L" [【26】中国科学技术大学
% l( |. _! A9 @: p! vDetecting Voice Cloning Attacks via Timbre Watermarking
2 U1 ?7 w% O* p! k! iChang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)
/ D( i3 W1 n, n, Z+ N
& J7 p6 f, V: B& r" n: J【27】清华大学
' A, {* ]9 x0 P7 rUnderstanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed( h) m' r% A: D+ s
Lancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)- p4 O, R1 C2 ?9 a
+ X# B2 D& H4 R7 W3 f z8 Y【28】清华大学0 p# ?8 F F1 G# U; w, v
dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository' s& R5 T" _) N
Yingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)
1 x; F/ A7 o* F+ p' _ `5 I" k' |; X5 a9 ?/ k
【29】清华大学
+ Y% D6 b8 j7 T& \8 y& APencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption8 }/ B5 ?9 [+ \/ L
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)( Z! E8 r$ x* j4 U( ?0 Y
9 Q1 t. S+ H q
【30】NUDT
( L* b# C9 w3 mDeepGo: Predictive Directed Greybox Fuzzing
6 M+ Z1 S4 H; J0 [: Z5 ^Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)" e3 o( j2 [3 B5 m" s" {
6 u/ q% {6 \, h- J2 p X+ `6 p7 X【31】上海交大
1 O6 ~! z- z) t, [+ oActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token! x) Y6 r7 L0 i q" V9 j9 o3 d2 |
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)- d4 E$ b. m2 X, V1 O
2 W0 U. V; j# O1 Y) E/ f【32】华中科技大学
0 ?% k( n2 i( D& R; t) n; iPrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
0 U. Q$ \. k& u5 f1 xMan Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)
' m% |1 Q. _' }! q, h) U4 A! @, D. c1 p
【33】南方科技大学& S/ t8 W' |% D8 M; |4 @7 B T2 f5 ]
Separation is Good: A Faster Order-Fairness Byzantine Consensus
( Y' q! Q' k) a1 YKe Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)6 ~$ {# t3 `& e0 s" L. ?
+ t/ F# u$ H# x; i7 B# d& _
【34】南方科技大学
% C% t, l; S9 l. \0 xCAGE: Complementing Arm CCA with GPU Extensions2 A6 G7 k! j6 ?* o9 K c$ ~
Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)
9 S! y2 h. i+ T+ t% ]* |/ Y' b
【35】华中科技大学2 H5 z" ^2 J+ x% b9 T) C) v
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses
K% J; ~3 b9 Y9 }; F" g! wChaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
, d" _. A& c# t; H3 k8 k) b1 S# p7 p6 Y
【36】华中科技大学
7 D& j+ \) d+ Z7 C/ m/ ]0 LAbusing the Ethereum Smart Contract Verification Services for Fun and Profit! J5 ]# ]" P! ?- w/ c
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
+ k d/ v; r9 r
# _5 R( S/ y6 d" b. l' b( ^【37】浙江大学) c/ y& E9 `( C
UniID: Spoofing Face Authentication System by Universal Identity
: ^+ L( P5 |# h" J! vZhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)
/ p$ G, a, [* p) e( @8 c2 g* X* k+ {$ n3 T
【38】武汉大学) ?# g- T/ f8 Z/ R
From Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
& l2 f3 P X& o( L u( AYue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
8 h# S1 K( a/ m# b
7 e+ K( S- H0 w" P6 G( b. f【39】上海科技大学
4 M4 z4 \2 E! H" O4 M WSLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems5 c4 l' C- L9 l1 ~
Guangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)
! w' [3 ~) B8 z8 k# ^0 y. P) d- R4 j& I: z0 B- L
【40】清华大学
K" Q! `( J% JYou Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks
d: ^$ U- Z% [! {& f6 PQiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
" |7 {9 U" b5 v7 p$ A* `+ J |
|