| | AI, Encryption, and the Sins of the 90s (ndss-symposium.org) |
|
49 points by keepamovin 54 days ago | past | 27 comments
|
| | Memorizing System-Assigned Passwords: Comparison of 3 Approaches to Assist Users (ndss-symposium.org) |
|
1 point by sipofwater 10 months ago | past
|
| | Commercial Vehicle Logging Security: Unmasking the Risk of Truck-to-Truck Worms (ndss-symposium.org) |
|
1 point by gnabgib 10 months ago | past
|
| | PrintListener: Audio from scrolling finger can be used to unlock your phone [pdf] (ndss-symposium.org) |
|
2 points by bookstore-romeo 11 months ago | past | 1 comment
|
| | PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via t [pdf] (ndss-symposium.org) |
|
3 points by todsacerdoti 11 months ago | past
|
| | PrintListener: Vulnerability of fingerprint authentication via friction sound (ndss-symposium.org) |
|
3 points by T-A 11 months ago | past
|
| | A Case Study on Fuzzing Satellite Firmware [pdf] (ndss-symposium.org) |
|
21 points by luu on July 10, 2023 | past | 1 comment
|
| | Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software (ndss-symposium.org) |
|
1 point by pjmlp on March 10, 2023 | past
|
| | Let Me Unwind That for You: Exceptions to Backward-Edge Protection (ndss-symposium.org) |
|
2 points by pjmlp on March 10, 2023 | past
|
| | Improving Signal's Sealed Sender (2021) (ndss-symposium.org) |
|
72 points by ementally on March 7, 2023 | past | 23 comments
|
| | Improving Signal's Sealed Sender (ndss-symposium.org) |
|
1 point by ementally on Nov 22, 2022 | past
|
| | PHYjacking: Physical Input Hijacking for Zero-Perm Auth Attack-Android[pdf] (ndss-symposium.org) |
|
2 points by zenincognito on Oct 14, 2022 | past | 1 comment
|
| | Let’s Authenticate: Automated Certificates for User Authentication [pdf] (ndss-symposium.org) |
|
19 points by runningmike on April 30, 2022 | past | 4 comments
|
| | Cross-Language Attacks [pdf] (ndss-symposium.org) |
|
1 point by todsacerdoti on April 19, 2022 | past
|
| | Cross-Language Attacks (ndss-symposium.org) |
|
1 point by matt_d on April 12, 2022 | past
|
| | How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories (ndss-symposium.org) |
|
1 point by belter on June 28, 2021 | past | 1 comment
|
| | Awakening the Web’s Sleeper Agents:Misusing Service Workers for Privacy Leakage [pdf] (ndss-symposium.org) |
|
1 point by godelmachine on May 15, 2021 | past
|
| | Large-Scale Abuse of Contact Discovery in Mobile Messengers [pdf] (ndss-symposium.org) |
|
410 points by weinzierl on April 19, 2021 | past | 201 comments
|
| | Hiding and Replacing Content in Signed PDFs (ndss-symposium.org) |
|
1 point by vinnyglennon on March 15, 2021 | past
|
| | Shadow Attacks:Hiding and Replacing Content in Signed PDFs [pdf] (ndss-symposium.org) |
|
2 points by curmudgeon22 on March 9, 2021 | past
|
| | ExSpectre can hide malware in the “unreachable dead code of a program” [pdf] (ndss-symposium.org) |
|
2 points by rckoepke on Nov 27, 2020 | past | 1 comment
|
| | Hyper-Cube: High-Dimensional Hypervisor Fuzzing [pdf] (ndss-symposium.org) |
|
2 points by ingve on Nov 17, 2020 | past
|
| | NDSS Symposium 2020 Programme (ndss-symposium.org) |
|
1 point by godelmachine on Nov 16, 2020 | past
|
| | Learning-Based Practical Smartphone Eavesdropping with Builtin Accelerometer[PDF (ndss-symposium.org) |
|
1 point by ytch on Feb 26, 2020 | past
|
| | ML-Based Fingerprinting of Network Traffic Using Programmable Forwarding [pdf] (ndss-symposium.org) |
|
2 points by jcbeard on Nov 6, 2019 | past
|
| | Cybercriminal Minds: An investigation of cryptocurrency abuses in the Dark Web [pdf] (ndss-symposium.org) |
|
1 point by ArtWomb on Sept 21, 2019 | past
|
| | Automated patching of vulnerable binaries [pdf] (ndss-symposium.org) |
|
2 points by riyakhanna1983 on July 30, 2019 | past
|
| | Researchers build an automated system to patch vulnerable binaries [pdf] (ndss-symposium.org) |
|
1 point by riyakhanna1983 on July 22, 2019 | past
|
| | JavaScript Template Attacks (ndss-symposium.org) |
|
60 points by lainon on June 10, 2019 | past | 11 comments
|
| | Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals (ndss-symposium.org) |
|
3 points by lainon on May 8, 2019 | past
|
|
|
More |