NDSS Symposium 2019 Accepted Papers

The NDSS 2019 Program was constructed from the following list of accepted papers. The papers on the list are ordered by submission number, and some of the papers are subject to shepherding.

A Systematic Framework to Generate Invariants for Anomaly...

Cheng Feng (Imperial College London & Siemens Corporate Technology), Venkata Reddy Palleti (Singapore University...

More Details

A Treasury System for Cryptocurrencies: Enabling Better Collaborative...

Bingsheng Zhang (Lancaster University), Roman Oliynykov (IOHK Ltd.), Hamed Balogun (Lancaster University)

More Details

Adversarial Attacks Against Automatic Speech Recognition Systems via...

Lea Schönherr (Ruhr University Bochum), Katharina Kohls (Ruhr University Bochum), Steffen Zeiler (Ruhr University...

More Details

Analyzing Semantic Correctness with Symbolic Execution: A Case...

Sze Yiu Chau (Purdue University), Moosa Yahyazadeh (The University of Iowa), Omar Chowdhury (The...

More Details

Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability

Giulio Malavolta (Friedrich-Alexander University Erlangen-Nürnberg), Pedro Moreno Sanchez (TU Wien), Clara Schneidewind (TU Wien),...

More Details

Automating Patching of Vulnerable Open-Source Software Versions in...

Ruian Duan (Georgia Institute of Technology), Ashish Bijlani (Georgia Institute of Technology), Yang Ji...

More Details

BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth...

Fenghao Xu (The Chinese University of Hong Kong), Wenrui Diao (Jinan University), Zhou Li...

More Details

Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption

Kimia Tajik (Oregon State University), Akshith Gunasekaran (Oregon State University), Rhea Dutta (Cornell University),...

More Details

Cleaning Up the Internet of Evil Things: Real-World...

Orcun Cetin (Delft University of Technology), Carlos Gañán (Delft University of Technology), Lisette Altena...

More Details

Coconut: Threshold Issuance Selective Disclosure Credentials with Applications...

Alberto Sonnino (University College London (UCL)), Mustafa Al-Bassam (University College London (UCL)), Shehar Bano...

More Details

CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in...

HyungSeok Han (KAIST), DongHyeon Oh (KAIST), Sang Kil Cha (KAIST)

More Details

Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and...

Cas Cremers (CISPA Helmholtz Center for Information Security), Martin Dehnel-Wild (University of Oxford)

More Details

ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM

Anrin Chakraborti (Stony Brook University), Radu Sion (Stony Brook University)

More Details

Constructing an Adversary Solver for Equihash

Xiaofei Bai (School of Computer Science, Fudan University), Jian Gao (School of Computer Science,...

More Details

Countering Malicious Processes with Process-DNS Association

Suphannee Sivakorn (Columbia University), Kangkook Jee (NEC Labs America), Yixin Sun (Princeton University), Lauri...

More Details

Cracking the Wall of Confinement: Understanding and Analyzing...

Eihal Alowaisheq (Indiana University, King Saud University), Peng Wang (Indiana University), Sumayah Alrwais (King...

More Details

CRCount: Pointer Invalidation with Reference Counting to Mitigate...

Jangseop Shin (Seoul National University and Inter-University Semiconductor Research Center), Donghyun Kwon (Seoul National...

More Details

Cybercriminal Minds: An investigative study of cryptocurrency abuses...

Seunghyeon Lee (KAIST, S2W LAB Inc.), Changhoon Yoon (S2W LAB Inc.), Heedo Kang (KAIST),...

More Details

Data Oblivious ISA Extensions for Side Channel-Resistant and...

Jiyong Yu (UIUC), Lucas Hsiung (UIUC), Mohamad El'Hajj (UIUC), Christopher W. Fletcher (UIUC)

More Details

DIAT: Data Integrity Attestation for Resilient Collaboration of...

Tigist Abera (Technische Universität Darmstadt), Raad Bahmani (Technische Universität Darmstadt), Ferdinand Brasser (Technische Universität...

More Details

Digital Healthcare-Associated Infection: A Case Study on the...

Luis Vargas (University of Florida), Logan Blue (University of Florida), Vanessa Frost (University of...

More Details

Distinguishing Attacks from Legitimate Authentication Traffic at Scale

Cormac Herley (Microsoft), Stuart Schechter (Unaffiliated)

More Details

DNS Cache-Based User Tracking

Amit Klein (Bar Ilan University), Benny Pinkas (Bar Ilan University)

More Details

Don't Trust The Locals: Investigating the Prevalence of...

Marius Steffens (CISPA Helmholtz Center for Information Security), Christian Rossow (CISPA Helmholtz Center for...

More Details

DroidCap: OS Support for Capability-based Permissions in Android

Abdallah Dawoud (CISPA Helmholtz Center i.G.), Sven Bugiel (CISPA Helmholtz Center i.G.)

More Details

Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using...

Milad Nasr (University of Massachusetts Amherst), Sadegh Farhang (Pennsylvania State University), Amir Houmansadr (University...

More Details

Establishing Software Root of Trust Unconditionally

Virgil D. Gligor (Carnegie Mellon University), Maverick S. L. Woo (Carnegie Mellon University)

More Details

ExSpectre: Hiding Malware in Speculative Execution

Jack Wampler (University of Colorado Boulder), Ian Martiny (University of Colorado Boulder), Eric Wustrow...

More Details

Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone...

David Derler (DFINITY), Kai Samelin (TÜV Rheinland i-sec GmbH), Daniel Slamanig (AIT Austrian Institute...

More Details

Geo-locating Drivers: A Study of Sensitive Data Leakage...

Qingchuan Zhao (The Ohio State University), Chaoshun Zuo (The Ohio State University), Giancarlo Pellegrino...

More Details

Ginseng: Keeping Secrets in Registers When You Distrust...

Min Hong Yun (Rice University), Lin Zhong (Rice University)

More Details

Giving State to the Stateless: Augmenting Trustworthy Computation...

Gabriel Kaptchuk (Johns Hopkins University), Matthew Green (Johns Hopkins University), Ian Miers (Cornell Tech)

More Details

Graph-based Security and Privacy Analytics via Collective Classification...

Binghui Wang (Iowa State University), Jinyuan Jia (Iowa State University), Neil Zhenqiang Gong (Iowa...

More Details

How Bad Can It Git? Characterizing Secret Leakage...

Michael Meli (North Carolina State University), Matthew R. McNiece (Cisco Systems and North Carolina...

More Details

How to End Password Reuse on the Web

Ke Coby Wang (UNC Chapel Hill), Michael K. Reiter (UNC Chapel Hill)

More Details

ICSREF: A Framework for Automated Reverse Engineering of...

Anastasis Keliris (NYU), Michail Maniatakos (NYU Abu Dhabi)

More Details

IoTGuard: Dynamic Enforcement of Security and Safety Policy...

Z. Berkay Celik (Penn State University), Gang Tan (Penn State University), Patrick McDaniel (Penn...

More Details

JavaScript Template Attacks: Automatically Inferring Host Information for...

Michael Schwarz (Graz University of Technology), Florian Lackner (Graz University of Technology), Daniel Gruss...

More Details

Latex Gloves: Protecting Browser Extensions from Probing and...

Alexander Sjösten (Chalmers University of Technology), Steven Van Acker (Chalmers University of Technology), Pablo...

More Details

Life after Speech Recognition: Fuzzing Semantic Misinterpretation for...

Yangyong Zhang (Texas A&M University), Lei Xu (Texas A&M University), Abner Mendoza (Texas A&M...

More Details

Master of Web Puppets: Abusing Web Browsers for...

Panagiotis Papadopoulos (FORTH-ICS, Greece), Panagiotis Ilia (FORTH-ICS), Michalis Polychronakis (Stony Brook University, USA), Evangelos...

More Details

maTLS: How to Make TLS middlebox-aware?

Hyunwoo Lee (Seoul National University), Zach Smith (University of Luxembourg), Junghwan Lim (Seoul National...

More Details

MBeacon: Privacy-Preserving Beacons for DNA Methylation Data

Inken Hagestedt (CISPA Helmholtz Center for Information Security), Yang Zhang (CISPA Helmholtz Center for...

More Details

Measurement and Analysis of Hajime, a Peer-to-peer IoT...

Stephen Herwig (University of Maryland), Katura Harvey (University of Maryland, Max Planck Institute for...

More Details

Measuring the Facebook Advertising Ecosystem

Athanasios Andreou (EURECOM), Márcio Silva (UFMG), Fabrício Benevenuto (UFMG), Oana Goga (Univ. Grenoble Alpes,...

More Details

Mind Your Own Business: A Longitudinal Study of...

Platon Kotzias (IMDEA Software Institute, Universidad Politécnica de Madrid), Leyla Bilge (Symantec Research Labs),...

More Details

ML-Leaks: Model and Data Independent Membership Inference Attacks...

Ahmed Salem (CISPA Helmholtz Center for Information Security), Yang Zhang (CISPA Helmholtz Center for...

More Details

NAUTILUS: Fishing for Deep Bugs with Grammars

Cornelius Aschermann (Ruhr-Universität Bochum), Tommaso Frassetto (Technische Universität Darmstadt), Thorsten Holz (Ruhr-Universität Bochum), Patrick...

More Details

Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby...

Daniele Antonioli (Singapore University of Technology and Design (SUTD)), Nils Ole Tippenhauer (CISPA), Kasper...

More Details

Neural Machine Translation Inspired Binary Code Similarity Comparison...

Fei Zuo (University of South Carolina), Xiaopeng Li (University of South Carolina), Patrick Young...

More Details

Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints

Shiqi Shen (National University of Singapore), Shweta Shinde (National University of Singapore), Soundarya Ramesh...

More Details

NIC: Detecting Adversarial Samples with Neural Network Invariant...

Shiqing Ma (Purdue University), Yingqi Liu (Purdue University), Guanhong Tao (Purdue University), Wen-Chuan Lee...

More Details

NoDoze: Combatting Threat Alert Fatigue with Automated Provenance...

Wajih Ul Hassan (NEC Laboratories America, Inc.; University of Illinois at Urbana–Champaign), Shengjian Guo...

More Details

OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX

Adil Ahmad (Purdue), Byunggill Joe (KAIST), Yuan Xiao (Ohio State University), Yinqian Zhang (Ohio...

More Details

Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA...

Sina Faezi (University of California, Irvine), Sujit Rokka Chhetri (University of California, Irvine), Arnav...

More Details

On the Challenges of Geographical Avoidance for Tor

Katharina Kohls (Ruhr-University Bochum), Kai Jansen (Ruhr-University Bochum), David Rupprecht (Ruhr-University Bochum), Thorsten Holz...

More Details

One Engine To Serve 'em All: Inferring Taint...

Zheng Leong Chua (National University of Singapore), Yanhao Wang (TCA/SKLCS, Institute of Software, Chinese...

More Details

PeriScope: An Effective Probing and Fuzzing Framework for...

Dokyung Song (University of California, Irvine), Felicitas Hetzelt (Technical University of Berlin), Dipanjan Das...

More Details

Please Forget Where I Was Last Summer: The...

Kostas Drakonakis (FORTH, Greece), Panagiotis Ilia (FORTH, Greece), Sotiris Ioannidis (FORTH, Greece), Jason Polakis...

More Details

Practical Hidden Voice Attacks against Speech and Speaker...

Hadi Abdullah (University of Florida), Washington Garcia (University of Florida), Christian Peeters (University of...

More Details

Privacy Attacks to the 4G and 5G Cellular...

Syed Rafiul Hussain (Purdue University), Mitziu Echeverria (University of Iowa), Omar Chowdhury (University of...

More Details

Private Continual Release of Real-Valued Data Streams

Victor Perrier (Data61, CSIRO and ISAE-SUPAERO), Hassan Jameel Asghar (Macquarie University and Data61, CSIRO),...

More Details

Profit: Detecting and Quantifying Side Channels in Networked...

Nicolás Rosner (University of California, Santa Barbara), Ismet Burak Kadron (University of California, Santa...

More Details

Quantity vs. Quality: Evaluating User Interest Profiles Using...

Muhammad Ahmad Bashir (Northeastern University), Umar Farooq (LUMS Pakistan), Maryam Shahid (LUMS Pakistan), Muhammad...

More Details

REDQUEEN: Fuzzing with Input-to-State Correspondence

Cornelius Aschermann (Ruhr-Universität Bochum), Sergej Schumilo (Ruhr-Universität Bochum), Tim Blazytko (Ruhr-Universität Bochum), Robert Gawlik...

More Details

RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for...

Tohid Shekari (ECE, Georgia Tech), Christian Bayens (ECE, Georgia Tech), Morris Cohen (ECE, Georgia...

More Details

Robust Performance Metrics for Authentication Systems

Shridatt Sugrim (Rutgers University), Can Liu (Rutgers University), Meghan McLean (Rutgers University), Janne Lindqvist...

More Details

rORAM: Efficient Range ORAM with O(log2 N) Locality

Anrin Chakraborti (Stony Brook University), Adam J. Aviv (United States Naval Academy), Seung Geol...

More Details

SABRE: Protecting Bitcoin against Routing Attacks

Maria Apostolaki (ETH Zurich), Gian Marti (ETH Zurich), Jan Müller (ETH Zurich), Laurent Vanbever...

More Details

SANCTUARY: ARMing TrustZone with User-space Enclaves

Ferdinand Brasser (Technische Universität Darmstadt), David Gens (Technische Universität Darmstadt), Patrick Jauernig (Technische Universität...

More Details

Send Hardest Problems My Way: Probabilistic Path Prioritization...

Lei Zhao (Wuhan University), Yue Duan (University of California, Riverside), Heng Yin (University of...

More Details

Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks

Michael Rodler (University of Duisburg-Essen), Wenting Li (NEC Laboratories, Germany), Ghassan O. Karame (NEC...

More Details

Statistical Privacy for Streaming Traffic

Xiaokuan Zhang (The Ohio State University), Jihun Hamm (The Ohio State University), Michael K....

More Details

Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems

Shasha Li (University of California Riverside), Ajaya Neupane (University of California Riverside), Sujoy Paul...

More Details

TEE-aided Write Protection Against Privileged Data Tampering

Lianying Zhao (Concordia University), Mohammad Mannan (Concordia University)

More Details

TextBugger: Generating Adversarial Text Against Real-world Applications

Jinfeng Li (Zhejiang University), Shouling Ji (Zhejiang University), Tianyu Du (Zhejiang University), Bo Li...

More Details

The Crux of Voice (In)Security: A Brain Study...

Ajaya Neupane (University of California Riverside), Nitesh Saxena (University of Alabama at Birmingham), Leanne...

More Details

The use of TLS in Censorship Circumvention

Sergey Frolov (University of Colorado Boulder), Eric Wustrow (University of Colorado Boulder)

More Details

Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection...

A. Theodore Markettos (University of Cambridge), Colin Rothwell (University of Cambridge), Brett F. Gutstein...

More Details

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Samuel Weiser (Graz University of Technology), Mario Werner (Graz University of Technology), Ferdinand Brasser...

More Details

Time Does Not Heal All Wounds: A Longitudinal...

Meng Luo (Stony Brook University), Pierre Laperdrix (Stony Brook University), Nima Honarmand (Stony Brook...

More Details

Total Recall: Persistence of Passwords in Android

Jaeho Lee (Rice University), Ang Chen (Rice University), Dan S. Wallach (Rice University)

More Details

Tranco: A Research-Oriented Top Sites Ranking Hardened Against...

Victor Le Pochat (imec-DistriNet, KU Leuven), Tom Van Goethem (imec-DistriNet, KU Leuven), Samaneh Tajalizadehkhoob...

More Details

Understanding Open Ports in Android Applications: Discovery, Diagnosis,...

Daoyuan Wu (Singapore Management University), Debin Gao (Singapore Management University), Rocky K. C. Chang...

More Details

Unveiling your keystrokes: A Cache-based Side-channel Attack on...

Daimeng Wang (University of California Riverside), Ajaya Neupane (University of California Riverside), Zhiyun Qian...

More Details

UWB with Pulse Reordering: Securing Ranging against Relay...

Mridula Singh (ETH Zurich, Switzerland), Patrick Leu (ETH Zurich, Switzerland), Srdjan Capkun (ETH Zurich,...

More Details

Vault: Fast Bootstrapping for the Algorand Cryptocurrency

Derek Leung (MIT CSAIL), Adam Suhl (MIT CSAIL), Yossi Gilad (MIT CSAIL), Nickolai Zeldovich...

More Details

We Value Your Privacy ... Now Take Some...

Martin Degeling (Ruhr-Universität Bochum), Christine Utz (Ruhr-Universität Bochum), Christopher Lentzsch (Ruhr-Universität Bochum), Henry Hosseini...

More Details

YODA: Enabling computationally intensive contracts on blockchains with...

Sourav Das (Department of Computer Science and Engineering, Indian Institute of Technology Delhi), Vinay...

More Details