Hacker News new | past | comments | ask | show | jobs | submit | from login
AI, Encryption, and the Sins of the 90s (ndss-symposium.org)
49 points by keepamovin 54 days ago | past | 27 comments
Memorizing System-Assigned Passwords: Comparison of 3 Approaches to Assist Users (ndss-symposium.org)
1 point by sipofwater 10 months ago | past
Commercial Vehicle Logging Security: Unmasking the Risk of Truck-to-Truck Worms (ndss-symposium.org)
1 point by gnabgib 10 months ago | past
PrintListener: Audio from scrolling finger can be used to unlock your phone [pdf] (ndss-symposium.org)
2 points by bookstore-romeo 11 months ago | past | 1 comment
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via t [pdf] (ndss-symposium.org)
3 points by todsacerdoti 11 months ago | past
PrintListener: Vulnerability of fingerprint authentication via friction sound (ndss-symposium.org)
3 points by T-A 11 months ago | past
A Case Study on Fuzzing Satellite Firmware [pdf] (ndss-symposium.org)
21 points by luu on July 10, 2023 | past | 1 comment
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software (ndss-symposium.org)
1 point by pjmlp on March 10, 2023 | past
Let Me Unwind That for You: Exceptions to Backward-Edge Protection (ndss-symposium.org)
2 points by pjmlp on March 10, 2023 | past
Improving Signal's Sealed Sender (2021) (ndss-symposium.org)
72 points by ementally on March 7, 2023 | past | 23 comments
Improving Signal's Sealed Sender (ndss-symposium.org)
1 point by ementally on Nov 22, 2022 | past
PHYjacking: Physical Input Hijacking for Zero-Perm Auth Attack-Android[pdf] (ndss-symposium.org)
2 points by zenincognito on Oct 14, 2022 | past | 1 comment
Let’s Authenticate: Automated Certificates for User Authentication [pdf] (ndss-symposium.org)
19 points by runningmike on April 30, 2022 | past | 4 comments
Cross-Language Attacks [pdf] (ndss-symposium.org)
1 point by todsacerdoti on April 19, 2022 | past
Cross-Language Attacks (ndss-symposium.org)
1 point by matt_d on April 12, 2022 | past
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories (ndss-symposium.org)
1 point by belter on June 28, 2021 | past | 1 comment
Awakening the Web’s Sleeper Agents:Misusing Service Workers for Privacy Leakage [pdf] (ndss-symposium.org)
1 point by godelmachine on May 15, 2021 | past
Large-Scale Abuse of Contact Discovery in Mobile Messengers [pdf] (ndss-symposium.org)
410 points by weinzierl on April 19, 2021 | past | 201 comments
Hiding and Replacing Content in Signed PDFs (ndss-symposium.org)
1 point by vinnyglennon on March 15, 2021 | past
Shadow Attacks:Hiding and Replacing Content in Signed PDFs [pdf] (ndss-symposium.org)
2 points by curmudgeon22 on March 9, 2021 | past
ExSpectre can hide malware in the “unreachable dead code of a program” [pdf] (ndss-symposium.org)
2 points by rckoepke on Nov 27, 2020 | past | 1 comment
Hyper-Cube: High-Dimensional Hypervisor Fuzzing [pdf] (ndss-symposium.org)
2 points by ingve on Nov 17, 2020 | past
NDSS Symposium 2020 Programme (ndss-symposium.org)
1 point by godelmachine on Nov 16, 2020 | past
Learning-Based Practical Smartphone Eavesdropping with Builtin Accelerometer[PDF (ndss-symposium.org)
1 point by ytch on Feb 26, 2020 | past
ML-Based Fingerprinting of Network Traffic Using Programmable Forwarding [pdf] (ndss-symposium.org)
2 points by jcbeard on Nov 6, 2019 | past
Cybercriminal Minds: An investigation of cryptocurrency abuses in the Dark Web [pdf] (ndss-symposium.org)
1 point by ArtWomb on Sept 21, 2019 | past
Automated patching of vulnerable binaries [pdf] (ndss-symposium.org)
2 points by riyakhanna1983 on July 30, 2019 | past
Researchers build an automated system to patch vulnerable binaries [pdf] (ndss-symposium.org)
1 point by riyakhanna1983 on July 22, 2019 | past
JavaScript Template Attacks (ndss-symposium.org)
60 points by lainon on June 10, 2019 | past | 11 comments
Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals (ndss-symposium.org)
3 points by lainon on May 8, 2019 | past

Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: