|

楼主 |
发表于 2024-2-3 09:59:41
|
显示全部楼层
本帖最后由 SmithArno 于 2024-2-3 10:06 编辑
, T7 @. _% e3 Z! R( l
; I# l$ @9 V- d7 i2 [NDSS 2024会议主页:https://www.ndss-symposium.org/ndss2024/accepted-papers/
0 @0 Y- b' K- J, @8 n% N( s/ ~8 y& c {8 N/ [( f( y$ G2 b
【1】山东大学
6 E# g' U4 N ~* oSecurity-Performance Tradeoff in DAG-based Proof-of-Work Blockchain Protocols3 R$ a% Q5 N# T1 m. b7 x: k
Shichen Wu (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Puwen Wei (1. School of Cyber Science and Technology, Shandong University 2. Quancheng Laboratory 3. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education); Ren Zhang (Cryptape Co. Ltd. and Nervos); Bowen Jiang (1. School of Cyber Science and Technology, Shandong University 2. Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education)! \, _& m! t; l3 @" i
1 ?$ u/ d' K7 ^+ {4 |
【2】东南大学 j# _+ T* c, [9 {5 o: v: v; U
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems9 v$ H6 i# f6 W2 Y
Huaiyu Yan, Zhen Ling, Haobo Li (Southeast University); Lan Luo (Anhui University of Technology); Xinhui Shao, Kai Dong, Ping Jiang, Ming Yang (Southeast University); Junzhou Luo (Southeast University, Nanjing, P.R. China); Xinwen Fu (University of Massachusetts Lowell)
( s& k- \2 I9 U- g( H/ y) V5 t7 |. S
【3】浙江大学
; o6 ]' X7 r& @5 Z- JGhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards2 i8 v* e. W5 a& k
Qinhong Jiang, Yanze Ren (Zhejiang University); Yan Long (University of Michigan); Chen Yan (Zhejiang University); Yumai Sun (University of Michigan); Xiaoyu Ji (Zhejiang University); Kevin Fu (Northeastern University); Wenyuan Xu (Zhejiang University)8 A" P0 l2 I: x8 m( B K. d2 o
/ G" Y' o3 L' E2 F/ a7 G; W【4】浙江大学3 e) x* K) D( K# [6 W/ o
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
5 W7 ]$ G! p. l9 Q: eXinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)# m. Z' W" ~ v) m5 j3 T6 a
+ ~. C5 h0 q# L/ U% L【5】北京航空航天大学( _6 O$ ]' }7 W/ w
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
/ a% R- M2 |+ {Song Bian, Zian Zhao, Zhou Zhang, Ran Mao (Beihang University); Kohei Suenaga (Kyoto University); Yier Jin (University of Science and Technology of China); Zhenyu Guan, Jianwei Liu (Beihang University) T) P) _, m- [- l9 ~6 U
. _* B# q/ J* P) r, e2 M+ w9 d
【6】清华大学" V3 h j0 q% l- j, ?
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic
% K0 d" G9 I+ P, Z* r/ s- |Yuqi Qing (Tsinghua University); Qilei Yin (Zhongguancun Laboratory); Xinhao Deng, Yihao Chen, Zhuotao Liu (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Jia Zhang, Qi Li (Tsinghua University); N% V* E5 |5 P4 z0 \4 e3 U" p/ d
" _, B3 q& Q/ m9 N' G
【7】浙江大学0 i0 J" O& B `# S
Symphony: Path Validation at Scale
6 ^& @, Y4 Z: o: `7 G$ m" ?Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren (Zhejiang University)
& Q9 V# r8 c" x7 K& N7 J: G' u y' B6 Y+ J& Q+ {
【8】清华大学) p! f- G& p2 R* e3 c; j; h
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
' i- ]( ]" W8 @3 tChuhan Wang, Yasuhiro Kuranaga, Yihang Wang (Tsinghua University); Mingming Zhang (Zhongguancun Laboratory); Linkai Zheng, Xiang Li (Tsinghua University); Jianjun Chen (Tsinghua University; Zhongguancun Laboratory); Haixin Duan (Tsinghua University; Quan Cheng Lab; Zhongguancun Laboratory); Yanzhong Lin, Qingfeng Pan (Coremail Technology Co. Ltd)$ f8 L( i4 [1 e$ U
E5 S2 \% f0 ]【9】浙江大学0 R: F0 Y( V* G( ^! e4 p# ?0 |5 G
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
+ j& i: r) N% Q8 ~/ `1 pJiacheng Xu, Xuhong Zhang, Shouling Ji (Zhejiang University); Yuan Tian (UCLA); Binbin Zhao (Georgia Institute of Technology); Qinying Wang, Peng Cheng, Jiming Chen (Zhejiang University)
; I2 R7 u8 M$ F( v+ _- l/ C# E; z0 m6 k* Z$ W2 |$ T, y' {; h
【10】清华大学
& N( E. {/ Z" ?& E8 o4 K0 rShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
/ r' f6 c: Q5 S2 o3 _& hKunpeng Zhang (Shenzhen International Graduate School, Tsinghua University); Xiaogang Zhu (Swinburne University of Technology); Xi Xiao (Shenzhen International Graduate School, Tsinghua University); Minhui Xue (CSIRO’s Data61); Chao Zhang (Tsinghua University); Sheng Wen (Swinburne University of Technology)
6 y6 T7 I$ D9 T" K# N
. {+ T7 S/ y5 X, L+ K3 Q【11】中国海洋大学
) [ O: R8 M0 Y' Q' ~Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
$ g5 Z$ V; O- H' O q# _Hui Xia, Rui Zhang, Zi Kang, Shuliang Jiang, Shuo Xu (Ocean University of China)
/ ?3 { A5 ?( i( }$ R" L7 J, G7 L5 @; p i9 m2 Q9 |! e7 F1 G
【12】浙江大学
. Q* K, Q+ Q+ s3 ^ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
; Y- ]1 N& L& D) V( x# Y9 t8 T4 KLinkang Du (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen (Zhejiang University); Zhikun Zhang (Stanford University)
! W3 x, \$ \0 [4 R" ?- k x, S+ r1 M3 J1 d5 i) Q! v% \0 E
【13】北京大学
; [) \, Y5 Y, H, ?: l; b$ ANODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation: z5 } O( b( ^& [6 Q
Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Feng Dong (Huazhong University of Science and Technology); Xusheng Xiao (Arizona State University); Haoyu Wang (Huazhong University of Science and Technology); Fei Shao (Case Western Reserve University); Jiedong Chen (Sangfor Technologies Inc.); Yao Guo, Xiangqun Chen (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University); Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University)
" `7 q- e; a1 \" k9 b5 l3 ]8 N8 ]' P
【14】浙江大学
* R( W5 Q; D; H5 S* _: rLMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors2 e6 B% P. _, f) I8 N
Chengkun Wei, Wenlong Meng (Zhejiang University); Zhikun Zhang (Stanford University); Min Chen (CISPA Helmholtz Center for Information Security); Minghu Zhao (Zhejiang University); Wenjing Fang, Lei Wang (Ant Group); Zihui Zhang, Wenzhi Chen (Zhejiang University)& u; D! D2 x9 w! v7 c4 Z2 t
/ v& [7 g/ _" h: L: P8 f/ m+ d
【15】湖南大学# j! ]5 u6 }, B' i% g R6 [3 o, ^' U
Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
9 v3 g3 F U, Y4 g" W- KHuiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Kenli Li (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Zheng Qin (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Mingxing Duan (College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, Hunan University); Yong Xie (Nanjing University of Posts and Telecommunications, Nanjing, China); Daibo Liu (College of Computer Science and Electronic Engineering, Hunan University, Changsha, China); Ming Li (The University of Texas at Arlington, USA)6 z* p3 g# P+ N) `
7 O- e7 ?+ u4 A4 n: d+ v
【16】上海交大
, w$ u E1 ^/ ?8 SCrafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
4 F( i* x9 A) P" i5 uShiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang (Shanghai Jiao Tong University); Chenghu Zhou (Chinese Academy of Sciences); Bo Li (Hong Kong University of Science and Technology), w, Q# r. e! K3 D( I
# b7 ^2 ^$ j+ V4 F【17】清华大学
, ?+ W6 d) i: f T/ Q; KExploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks& R4 f8 H# m( E- [
Yuxiang Yang, Xuewei Feng, Qi Li (Tsinghua University); Kun Sun (George Mason University); Ziqiang Wang (Southeast University); Ke Xu (Tsinghua University)
" y* T& H) K' f, l
5 F, _% M1 E; Z6 i* i【18】清华大学, @) t7 V& n9 I/ d2 q0 G2 D
CP-IoT: A Cross-Platform Monitoring System for Smart Home: R* m( d6 G, ~
Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang (Tsinghua University); Linna Fan (National University of Defense Technology); Chenxin Duan (Tsinghua University)5 H0 v. W$ [# E- p h& O# y
& d/ {; p5 V( c2 z. I【19】清华大学
* K8 n9 ^6 M3 pLoRDMA: A New Low-Rate DoS Attack in RDMA Networks
; @8 K4 Y6 n6 b! zShicheng Wang (Tsinghua University); Menghao Zhang (Beihang University & Infrawaves); Yuying Du (Information Engineering University); Ziteng Chen (Southeast University); Zhiliang Wang, Mingwei Xu (Tsinghua University & Zhongguancun Laboratory); Renjie Xie (Tsinghua University); Jiahai Yang (Tsinghua University & Zhongguancun Laboratory)
- e' @/ D; }$ d; |, ]8 T3 Z5 z; f5 k( }( P* w2 |( j
【20】清华大学1 T+ U3 X' u+ h. d# j5 ~) h2 i* l
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing8 S6 F/ D% w$ Z- e# s7 q, I* j2 P
Linkai Zheng, Xiang Li, Chuhan Wang, Run Guo (Tsinghua University); Haixin Duan (Tsinghua University; Quancheng Laboratory); Jianjun Chen, Chao Zhang (Tsinghua University; Zhongguancun Laboratory); Kaiwen Shen (Tsinghua University)* f5 y9 J* L: `2 {# \
0 t: h- W+ C. h) ~7 d
【21】清华大学 i) H$ S) S( S7 d6 ~9 b
Automatic Policy Synthesis and Enforcement for Protecting Untrusted Deserialization ?# t7 |7 q9 N' C2 i6 D
Quan Zhang, Yiwen Xu, Zijing Yin, Chijin Zhou, Yu Jiang (Tsinghua University)" ?; }; L0 m# L, y
2 E# e; w& s# F7 ?! o- N【22】清华大学' A# c2 h" P: L. _( T0 C
DynPRE: Protocol Reverse Engineering via Dynamic Inference
5 B: }6 a! y/ G. R. |Zhengxiong Luo (Tsinghua University); Kai Liang (Central South University); Yanyang Zhao, Feifan Wu, Junze Yu (Tsinghua University); Heyuan Shi (Central South University); Yu Jiang (Tsinghua University). |* P, b* P8 ^3 B5 m$ W
* t- b4 u( D+ H+ V! ~ e
【23】浙江大学
8 B6 \9 j1 H+ w! LImproving the Robustness of Transformer-based Large Language Models with Dynamic Attention7 Z7 o/ m. M% p# N G
Lujia Shen, Yuwen Pu, Shouling Ji (Zhejiang University); Changjiang Li (Penn State); Xuhong Zhang (Zhejiang University); Chunpeng Ge (Shandong University); Ting Wang (Penn State)* F W) i3 @7 W" V8 @8 Y
; Y; e' r" v; [7 @8 o【24】中山大学
: p& ?/ X9 w2 _ M8 GLeaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem! T/ t" X' P; m! t0 G1 O5 _( t$ ~, l
Jiangrong Wu, Yuhong Nan (Sun Yat-sen University); Luyi Xing (Indiana University Bloomington); Jiatao Cheng (Sun Yat-sen University); Zimin Lin (Alibaba Group); Zibin Zheng (Sun Yat-sen University); Min Yang (Fudan University)2 x; L4 ]" O9 v" F' ^
% ~3 \, A4 |6 L) a1 X" B
【25】浙江大学1 f* t! y8 j+ A' T6 Y. M- K, Y6 u
CamPro: Camera-based Anti-Facial Recognition" L5 h8 A6 _; ?4 n
Wenjun Zhu, Yuan Sun, Jiani Liu, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu (Zhejiang University)) t, P9 W3 U6 i; M
2 u9 E/ `% _# n' @5 X( O
【26】中国科学技术大学: @0 F4 _" g. ?8 Y' P0 B* ^0 O6 E
Detecting Voice Cloning Attacks via Timbre Watermarking
8 N- C8 w; S/ ` }2 i- RChang Liu (University of Science and Technology of China); Jie Zhang, Tianwei Zhang (Nanyang Technological University); Xi Yang, Weiming Zhang, NengHai Yu (University of Science and Technology of China)/ b" X6 y7 T9 X0 `
# \& Y# h, s" O5 n/ k* W
【27】清华大学
, ^* k% j3 c/ [: |0 _* W4 z$ RUnderstanding Route Origin Validation (ROV) Deployment in the Real World and Why MANRS Action 1 Is Not Followed
( B" m L2 R; h& @. o4 WLancheng Qin (Tsinghua University, BNRist); Li Chen (Zhongguancun Laboratory); Dan Li (Tsinghua University, Zhongguancun Laboratory); Honglin Ye, Yutian Wang (Tsinghua University)
# E0 O: R' {( T9 U, x. i8 Y% S
, I, ` S( F" _6 W! a【28】清华大学
0 T+ L3 e O0 f+ x1 udRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository
0 Z% x% O: m% ~" h3 I- G; n% F, b2 z( gYingying Su, Dan Li (Tsinghua University); Li Chen (Zhongguancun Laboratory); Qi Li (Tsinghua university); Sitong Ling (Tsinghua University)) Y7 N' q+ L5 s. S8 n# U
2 _5 X: d6 L9 r8 l% Y& b# f8 G5 N
【29】清华大学; O; I7 g8 G7 ?; T' `3 V1 F
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
9 ~( O% _" y7 MXuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu (Tsinghua University)
5 a& q3 G3 ]2 u1 A8 G& |) `9 `' ]7 i8 X6 L( ]
【30】NUDT/ U) K5 O3 V% I2 {
DeepGo: Predictive Directed Greybox Fuzzing; x0 y m6 W, \9 T/ }
Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang (National University of Defense Technology)
+ f( G M+ `9 c5 ?2 v% N0 l; g. t
% r7 ~3 N. ^) n8 u0 B2 h" B4 M) v【31】上海交大& t6 T- n1 ?! f
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token- b2 w! a. l) h0 }5 l
Ge Ren, Gaolei Li, Shenghong Li, Libo Chen (Shanghai Jiao Tong University); Kui Ren (Zhejiang University)! _7 `& G/ m+ s
' ?5 f" p6 o' o( w【32】华中科技大学
$ U' Q: e+ m8 O2 @PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
5 b8 o& _! f, ^9 uMan Zhou, Shuao Su (Huazhong University of Science and Technology); Qian Wang (Wuhan University); Qi Li (Tsinghua University); Yuting Zhou, Xiaojing Ma (Huazhong University of Science and Technology); Zhengxiong Li (University of Colorado Denver)0 C- |" ]/ G, Q8 p
. G1 w) A$ G/ j
【33】南方科技大学
5 g. n* s" n) j" XSeparation is Good: A Faster Order-Fairness Byzantine Consensus3 Q4 j$ m) y3 E
Ke Mu (Southern University of Science and Technology, China); Bo Yin (Changsha University of Science and Technology, China); Alia Asheralieva (Loughborough University, UK); Xuetao Wei (Southern University of Science and Technology, China & Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, SUSTech, China)
, {# ~( T Q! u+ K" R
0 x2 h* O l- K {% k/ j& j【34】南方科技大学, C3 U9 ~8 ?6 }
CAGE: Complementing Arm CCA with GPU Extensions
. x2 Q$ J8 T3 _( W4 `Chenxu Wang (Southern University of Science and Technology (SUSTech) and The Hong Kong Polytechnic University); Fengwei Zhang, Yunjie Deng (Southern University of Science and Technology (SUSTech)); Kevin Leach (Vanderbilt University); Jiannong Cao (The Hong Kong Polytechnic University); Zhenyu Ning (Hunan University); Shoumeng Yan, Zhengyu He (Ant Group)' t; W& J+ _, f; E& u' |0 `
. O1 o9 _( C" J: s9 x! L* T5 Y2 r' Z【35】华中科技大学8 S( r; c* L5 n* ], n) ^! j1 P
DorPatch: Distributed and Occlusion-Robust Adversarial Patch to Evade Certifiable Defenses! L! z4 V- x( N3 X
Chaoxiang He, Xiaojing Ma (Huazhong University of Science and Technology); Bin Benjamin Zhu (Microsoft Research Asia); Yimiao Zeng, Hanqing Hu, Xiaofan Bai, Hai Jin (Huazhong University of Science and Technology); Dongmei Zhang (Microsoft Research)
( d3 v" N8 e" V- |+ L F" h( v; d% a
+ G5 y; P y+ V3 c+ b4 t2 J( A【36】华中科技大学
$ c' v' o' o! n* g1 B+ J5 XAbusing the Ethereum Smart Contract Verification Services for Fun and Profit9 {" k# Q5 H( o4 u9 u% \ `- Y
Pengxiang Ma (Huazhong University of Science and Technology); Ningyu He (Peking University); Yuhua Huang, Haoyu Wang (Huazhong University of Science and Technology); Xiapu Luo (The Hong Kong Polytechnic University)
) _- q6 _+ K* f3 i
) |+ j3 X. M3 w; z7 K/ x【37】浙江大学
3 a5 k& F5 z7 x5 JUniID: Spoofing Face Authentication System by Universal Identity
8 _+ f/ w" y; HZhihao Wu, Yushi Cheng, Shibo Zhang, Xiaoyu Ji (Zhejiang University); Wenyuan Xu (Zhejing University)4 H8 ?9 ^3 J" @6 Q$ V6 z9 {
6 R+ L5 b6 y7 h
【38】武汉大学
# P, g8 u+ y1 f/ p4 U0 P/ `8 J6 YFrom Hardware Fingerprint to Access Token: Enhancing the Authentication on IoT Devices
. f- W& l# ~5 e% ]Yue Xiao (Wuhan University); Yi He (Tsinghua University); Xiaoli Zhang (Zhejiang University of Technology); Qian Wang (Wuhan University); Renjie Xie (Tsinghua University); Kun Sun (George Mason University); Ke Xu, Qi Li (Tsinghua University)
) n1 r6 x7 b- o T9 U' c
/ Z, X7 T% \& l% g3 z+ h+ a【39】上海科技大学" n) D0 w) O' [" E }& y+ i
SLMIA-SR: Speaker-Level Membership Inference Attacks against Speaker Recognition Systems
3 w9 O) d: e1 z' \3 l7 EGuangke Chen (ShanghaiTech University); Yedi Zhang (National University of Singapore); Fu Song (Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences)
& M% ~- l: b+ h! J) Q2 t' }$ S6 w
! J' A* L9 A0 l6 t【40】清华大学7 R }- d5 ? f8 k Q$ [' F
You Can Use But Cannot Recognize: Preserving Visual Privacy in Deep Neural Networks0 A* T5 j& [' B: c3 Y9 L
Qiushi Li (Tsinghua University); Yan Zhang (China Agricultural University); Ju Ren, Qi Li, Yaoxue Zhang (Tsinghua University)
, v+ j3 }) Q. }# ]# B |
|