{"id":18736,"date":"2024-10-02T11:48:40","date_gmt":"2024-10-02T11:48:40","guid":{"rendered":"https:\/\/www.ndss-symposium.org\/?page_id=18736"},"modified":"2025-03-27T13:04:03","modified_gmt":"2025-03-27T13:04:03","slug":"accepted-papers","status":"publish","type":"page","link":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/","title":{"rendered":"NDSS Symposium 2025 Accepted Papers"},"content":{"rendered":"\n<div class=\"wp-block-group page-heading green-heading is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h1 class=\"wp-block-heading\">NDSS Symposium 2025 Accepted Papers<\/h1>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-width fixed-1110 section-padding section-title-h summer-circle is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<p class=\"advgb-dyn-fb1b0746\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-program\/symposium-2025\/\">View the detailed program page<\/a> to learn when each paper will be presented during the upcoming event.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Summer Cycle<\/strong><\/h2>\n\n\n<div class=\"paper-list rel-wrap\">\n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-key-driven-framework-for-identity-preserving-face-anonymization\/\">A Key-Driven Framework for Identity-Preserving Face Anonymization<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">A Key-Driven Framework for Identity-Preserving Face Anonymization<\/h3>\n    <p>Miaomiao Wang (Shanghai University), Guang Hua (Singapore Institute of Technology), Sheng Li (Fudan University),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-key-driven-framework-for-identity-preserving-face-anonymization\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-method-to-facilitate-membership-inference-attacks-in-deep-learning-models\/\">A Method to Facilitate Membership Inference Attacks in...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">A Method to Facilitate Membership Inference Attacks in...<\/h3>\n    <p>Zitao Chen (University of British Columbia), Karthik Pattabiraman (University of British Columbia)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-method-to-facilitate-membership-inference-attacks-in-deep-learning-models\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-systematic-evaluation-of-novel-and-existing-cache-side-channels\/\">A Systematic Evaluation of Novel and Existing Cache...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">A Systematic Evaluation of Novel and Existing Cache...<\/h3>\n    <p>Fabian Rauscher (Graz University of Technology), Carina Fiedler (Graz University of Technology), Andreas Kogler...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-systematic-evaluation-of-novel-and-existing-cache-side-channels\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/alphadog-no-box-camouflage-attacks-via-alpha-channel-oversight\/\">AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight<\/h3>\n    <p>Qi Xia (University of Texas at San Antonio), Qian Chen (University of Texas at...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/alphadog-no-box-camouflage-attacks-via-alpha-channel-oversight\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/an-empirical-study-on-fingerprint-api-misuse-with-lifecycle-analysis-in-real-world-android-apps\/\">An Empirical Study on Fingerprint API Misuse with...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">An Empirical Study on Fingerprint API Misuse with...<\/h3>\n    <p>Xin Zhang (Fudan University), Xiaohan Zhang (Fudan University), Zhichen Liu (Fudan University), Bo Zhao...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/an-empirical-study-on-fingerprint-api-misuse-with-lifecycle-analysis-in-real-world-android-apps\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/automated-expansion-of-privacy-data-taxonomy-for-compliant-data-breach-notification\/\">Automated Expansion of Privacy Data Taxonomy for Compliant...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Automated Expansion of Privacy Data Taxonomy for Compliant...<\/h3>\n    <p>Yue Qin (Indiana University Bloomington & Central University of Finance and Economics), Yue Xiao...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/automated-expansion-of-privacy-data-taxonomy-for-compliant-data-breach-notification\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/be-careful-of-what-you-embed-demystifying-ole-vulnerabilities\/\">Be Careful of What You Embed: Demystifying OLE...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Be Careful of What You Embed: Demystifying OLE...<\/h3>\n    <p>Yunpeng Tian (Huazhong University of Science and Technology), Feng Dong (Huazhong University of Science...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/be-careful-of-what-you-embed-demystifying-ole-vulnerabilities\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/black-box-membership-inference-attacks-against-fine-tuned-diffusion-models\/\">Black-box Membership Inference Attacks against Fine-tuned Diffusion Models<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Black-box Membership Inference Attacks against Fine-tuned Diffusion Models<\/h3>\n    <p>Yan Pang (University of Virginia), Tianhao Wang (University of Virginia)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/black-box-membership-inference-attacks-against-fine-tuned-diffusion-models\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/bulkhead-secure-scalable-and-efficient-kernel-compartmentalization-with-pks\/\">BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">BULKHEAD: Secure, Scalable, and Efficient Kernel Compartmentalization with...<\/h3>\n    <p>Yinggang Guo (State Key Laboratory for Novel Software Technology, Nanjing University; University of Minnesota),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/bulkhead-secure-scalable-and-efficient-kernel-compartmentalization-with-pks\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/bumblebee-secure-two-party-inference-framework-for-large-transformers\/\">BumbleBee: Secure Two-party Inference Framework for Large Transformers<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">BumbleBee: Secure Two-party Inference Framework for Large Transformers<\/h3>\n    <p>Wen-jie Lu (Ant Group), Zhicong Huang (Ant Group), Zhen Gu (Alibaba Group), Jingyu Li...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/bumblebee-secure-two-party-inference-framework-for-large-transformers\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/careful-about-what-app-promotion-ads-recommend-detecting-and-explaining-malware-promotion-via-app-promotion-graph\/\">Careful About What App Promotion Ads Recommend! Detecting...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Careful About What App Promotion Ads Recommend! Detecting...<\/h3>\n    <p>Shang Ma (University of Notre Dame), Chaoran Chen (University of Notre Dame), Shao Yang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/careful-about-what-app-promotion-ads-recommend-detecting-and-explaining-malware-promotion-via-app-promotion-graph\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/cascading-spy-sheets-exploiting-the-complexity-of-modern-css-for-email-and-browser-fingerprinting\/\">Cascading Spy Sheets: Exploiting the Complexity of Modern...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Cascading Spy Sheets: Exploiting the Complexity of Modern...<\/h3>\n    <p>Leon Trampert (CISPA Helmholtz Center for Information Security), Daniel Weber (CISPA Helmholtz Center for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/cascading-spy-sheets-exploiting-the-complexity-of-modern-css-for-email-and-browser-fingerprinting\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/censor-defense-against-gradient-inversion-via-orthogonal-subspace-bayesian-sampling\/\">CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">CENSOR: Defense Against Gradient Inversion via Orthogonal Subspace...<\/h3>\n    <p>Kaiyuan Zhang (Purdue University), Siyuan Cheng (Purdue University), Guangyu Shen (Purdue University), Bruno Ribeiro...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/censor-defense-against-gradient-inversion-via-orthogonal-subspace-bayesian-sampling\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/chaos-exploiting-station-time-synchronization-in-802-11-networks\/\">CHAOS: Exploiting Station Time Synchronization in 802.11 Networks<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">CHAOS: Exploiting Station Time Synchronization in 802.11 Networks<\/h3>\n    <p>Sirus Shahini (University of Utah), Robert Ricci (University of Utah)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/chaos-exploiting-station-time-synchronization-in-802-11-networks\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/clibe-detecting-dynamic-backdoors-in-transformer-based-nlp-models\/\">CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models<\/h3>\n    <p>Rui Zeng (Zhejiang University), Xi Chen (Zhejiang University), Yuwen Pu (Zhejiang University), Xuhong Zhang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/clibe-detecting-dynamic-backdoors-in-transformer-based-nlp-models\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/compiled-models-built-in-exploits-uncovering-pervasive-bit-flip-attack-surfaces-in-dnn-executables\/\">Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack...<\/h3>\n    <p>Yanzuo Chen (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/compiled-models-built-in-exploits-uncovering-pervasive-bit-flip-attack-surfaces-in-dnn-executables\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/cross-origin-web-attacks-via-http-2-server-push-and-signed-http-exchange\/\">Cross-Origin Web Attacks via HTTP\/2 Server Push and...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Cross-Origin Web Attacks via HTTP\/2 Server Push and...<\/h3>\n    <p>Pinji Chen (Tsinghua University), Jianjun Chen (Tsinghua University & Zhongguancun Laboratory), Mingming Zhang (Zhongguancun...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/cross-origin-web-attacks-via-http-2-server-push-and-signed-http-exchange\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/delay-allowed-differentially-private-data-stream-release\/\">Delay-allowed Differentially Private Data Stream Release<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Delay-allowed Differentially Private Data Stream Release<\/h3>\n    <p>Xiaochen Li (University of Virginia), Zhan Qin (Zhejiang University), Kui Ren (Zhejiang University), Chen...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/delay-allowed-differentially-private-data-stream-release\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/diffence-fencing-membership-privacy-with-diffusion-models\/\">Diffence: Fencing Membership Privacy With Diffusion Models<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Diffence: Fencing Membership Privacy With Diffusion Models<\/h3>\n    <p>Yuefeng Peng (University of Massachusetts Amherst), Ali Naseh (University of Massachusetts Amherst), Amir Houmansadr...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/diffence-fencing-membership-privacy-with-diffusion-models\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/dissecting-payload-based-transaction-phishing-on-ethereum\/\">Dissecting Payload-based Transaction Phishing on Ethereum<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Dissecting Payload-based Transaction Phishing on Ethereum<\/h3>\n    <p>Zhuo Chen (Zhejiang University), Yufeng Hu (Zhejiang University), Bowen He (Zhejiang University), Dong Luo...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/dissecting-payload-based-transaction-phishing-on-ethereum\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/duumviri-detecting-trackers-and-mixed-trackers-with-a-breakage-detector\/\">Duumviri: Detecting Trackers and Mixed Trackers with a...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Duumviri: Detecting Trackers and Mixed Trackers with a...<\/h3>\n    <p>He Shuang (University of Toronto), Lianying Zhao (Carleton University and University of Toronto), David...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/duumviri-detecting-trackers-and-mixed-trackers-with-a-breakage-detector\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/erw-radar-an-adaptive-detection-system-against-evasive-ransomware-by-contextual-behavior-detection-and-fine-grained-content-analysis\/\">ERW-Radar: An Adaptive Detection System against Evasive Ransomware...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">ERW-Radar: An Adaptive Detection System against Evasive Ransomware...<\/h3>\n    <p>Lingbo Zhao (Institute of Information Engineering, Chinese Academy of Sciences), Yuhui Zhang (Institute of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/erw-radar-an-adaptive-detection-system-against-evasive-ransomware-by-contextual-behavior-detection-and-fine-grained-content-analysis\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/evocrawl-exploring-web-application-code-and-state-using-evolutionary-search\/\">EvoCrawl: Exploring Web Application Code and State using...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">EvoCrawl: Exploring Web Application Code and State using...<\/h3>\n    <p>Xiangyu Guo (University of Toronto), Akshay Kawlay (University of Toronto), Eric Liu (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/evocrawl-exploring-web-application-code-and-state-using-evolutionary-search\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/explanation-as-a-watermark-towards-harmless-and-multi-bit-model-ownership-verification-via-watermarking-feature-attribution\/\">Explanation as a Watermark: Towards Harmless and Multi-bit...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Explanation as a Watermark: Towards Harmless and Multi-bit...<\/h3>\n    <p>Shuo Shao (Zhejiang University), Yiming Li (Zhejiang University), Hongwei Yao (Zhejiang University), Yiling He...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/explanation-as-a-watermark-towards-harmless-and-multi-bit-model-ownership-verification-via-watermarking-feature-attribution\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/generating-api-parameter-security-rules-with-llm-for-api-misuse-detection\/\">Generating API Parameter Security Rules with LLM for...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Generating API Parameter Security Rules with LLM for...<\/h3>\n    <p>Jinghua Liu (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/generating-api-parameter-security-rules-with-llm-for-api-misuse-detection\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/heimdall-towards-risk-aware-network-management-outsourcing\/\">Heimdall: Towards Risk-Aware Network Management Outsourcing<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Heimdall: Towards Risk-Aware Network Management Outsourcing<\/h3>\n    <p>Yuejie Wang (Peking University), Qiutong Men (New York University), Yongting Chen (New York University...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/heimdall-towards-risk-aware-network-management-outsourcing\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/horcrux-synthesize-split-shift-and-stay-alive-preventing-channel-depletion-via-universal-and-enhanced-multi-hop-payments\/\">Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing...<\/h3>\n    <p>Anqi Tian (Institute of Software, Chinese Academy of Sciences; School of Computer Science and...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/horcrux-synthesize-split-shift-and-stay-alive-preventing-channel-depletion-via-universal-and-enhanced-multi-hop-payments\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/incorporating-gradients-to-rules-towards-lightweight-adaptive-provenance-based-intrusion-detection\/\">Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based...<\/h3>\n    <p>Lingzhi Wang (Northwestern University), Xiangmin Shen (Northwestern University), Weijian Li (Northwestern University), Zhenyuan LI...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/incorporating-gradients-to-rules-towards-lightweight-adaptive-provenance-based-intrusion-detection\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/kronos-a-secure-and-generic-sharding-blockchain-consensus-with-optimized-overhead\/\">Kronos: A Secure and Generic Sharding Blockchain Consensus...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Kronos: A Secure and Generic Sharding Blockchain Consensus...<\/h3>\n    <p>Yizhong Liu (Beihang University), Andi Liu (Beihang University), Yuan Lu (Institute of Software Chinese...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/kronos-a-secure-and-generic-sharding-blockchain-consensus-with-optimized-overhead\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/leakless-selective-data-protection-against-memory-leakage-attacks-for-serverless-platforms\/\">LeakLess: Selective Data Protection against Memory Leakage Attacks...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">LeakLess: Selective Data Protection against Memory Leakage Attacks...<\/h3>\n    <p>Maryam Rostamipoor (Stony Brook University), Seyedhamed Ghavamnia (University of Connecticut), Michalis Polychronakis (Stony Brook...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/leakless-selective-data-protection-against-memory-leakage-attacks-for-serverless-platforms\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/magmaw-modality-agnostic-adversarial-attacks-on-machine-learning-based-wireless-communication-systems\/\">Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless...<\/h3>\n    <p>Jung-Woo Chang (University of California, San Diego), Ke Sun (University of California, San Diego),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/magmaw-modality-agnostic-adversarial-attacks-on-machine-learning-based-wireless-communication-systems\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/malintent-coverage-guided-intent-fuzzing-framework-for-android\/\">MALintent: Coverage Guided Intent Fuzzing Framework for Android<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">MALintent: Coverage Guided Intent Fuzzing Framework for Android<\/h3>\n    <p>Ammar Askar (Georgia Institute of Technology), Fabian Fleischer (Georgia Institute of Technology), Christopher Kruegel...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/malintent-coverage-guided-intent-fuzzing-framework-for-android\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/manifoldchain-maximizing-blockchain-throughput-via-bandwidth-clustered-sharding\/\">Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding<\/h3>\n    <p>Chunjiang Che (The Hong Kong University of Science and Technology (Guangzhou)), Songze Li (Southeast...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/manifoldchain-maximizing-blockchain-throughput-via-bandwidth-clustered-sharding\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mens-sana-in-corpore-sano-sound-firmware-corpora-for-vulnerability-research\/\">Mens Sana In Corpore Sano: Sound Firmware Corpora...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Mens Sana In Corpore Sano: Sound Firmware Corpora...<\/h3>\n    <p>Ren\u00e9 Helmke (Fraunhofer FKIE), Elmar Padilla (Fraunhofer FKIE, Germany), Nils Aschenbruck (University of Osnabr\u00fcck)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mens-sana-in-corpore-sano-sound-firmware-corpora-for-vulnerability-research\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mineshark-cryptomining-traffic-detection-at-scale\/\">MineShark: Cryptomining Traffic Detection at Scale<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">MineShark: Cryptomining Traffic Detection at Scale<\/h3>\n    <p>Shaoke Xi (Zhejiang University), Tianyi Fu (Zhejiang University), Kai Bu (Zhejiang University), Chunling Yang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mineshark-cryptomining-traffic-detection-at-scale\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/misdirection-of-trust-demystifying-the-abuse-of-dedicated-url-shortening-service\/\">Misdirection of Trust: Demystifying the Abuse of Dedicated...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Misdirection of Trust: Demystifying the Abuse of Dedicated...<\/h3>\n    <p>Zhibo Zhang (Fudan University), Lei Zhang (Fudan University), Zhangyue Zhang (Fudan University), Geng Hong...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/misdirection-of-trust-demystifying-the-abuse-of-dedicated-url-shortening-service\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/moneta-ex-vivo-gpu-driver-fuzzing-by-recalling-in-vivo-execution-states\/\">Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo...<\/h3>\n    <p>Joonkyo Jung (Department of Computer Science, Yonsei University), Jisoo Jang (Department of Computer Science,...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/moneta-ex-vivo-gpu-driver-fuzzing-by-recalling-in-vivo-execution-states\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mtzk-testing-and-exploring-bugs-in-zero-knowledge-zk-compilers\/\">MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK)...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK)...<\/h3>\n    <p>Dongwei Xiao (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mtzk-testing-and-exploring-bugs-in-zero-knowledge-zk-compilers\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/off-path-tcp-hijacking-in-wi-fi-networks-a-packet-size-side-channel-attack\/\">Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size...<\/h3>\n    <p>Ziqiang Wang (Southeast University), Xuewei Feng (Tsinghua University), Qi Li (Tsinghua University), Kun Sun...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/off-path-tcp-hijacking-in-wi-fi-networks-a-packet-size-side-channel-attack\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/on-the-realism-of-lidar-spoofing-attacks-against-autonomous-driving-vehicle-at-high-speed-and-long-distance\/\">On the Realism of LiDAR Spoofing Attacks against...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">On the Realism of LiDAR Spoofing Attacks against...<\/h3>\n    <p>Takami Sato (University of California, Irvine), Ryo Suzuki (Keio University), Yuki Hayakawa (Keio University),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/on-the-realism-of-lidar-spoofing-attacks-against-autonomous-driving-vehicle-at-high-speed-and-long-distance\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/passive-inference-attacks-on-split-learning-via-adversarial-regularization\/\">Passive Inference Attacks on Split Learning via Adversarial...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Passive Inference Attacks on Split Learning via Adversarial...<\/h3>\n    <p>Xiaochen Zhu (National University of Singapore & Massachusetts Institute of Technology), Xinjian Luo (National...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/passive-inference-attacks-on-split-learning-via-adversarial-regularization\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/phantomlidar-cross-modality-signal-injection-attacks-against-lidar\/\">PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR<\/h3>\n    <p>Zizhi Jin (Zhejiang University), Qinhong Jiang (Zhejiang University), Xuancun Lu (Zhejiang University), Chen Yan...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/phantomlidar-cross-modality-signal-injection-attacks-against-lidar\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/powerradio-manipulate-sensor-measurement-via-power-gnd-radiation\/\">PowerRadio: Manipulate Sensor Measurement via Power GND Radiation<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">PowerRadio: Manipulate Sensor Measurement via Power GND Radiation<\/h3>\n    <p>Yan Jiang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Yancheng Jiang (Zhejiang University), Kai Wang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/powerradio-manipulate-sensor-measurement-via-power-gnd-radiation\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/raconteur-a-knowledgeable-insightful-and-portable-llm-powered-shell-command-explainer\/\">RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell...<\/h3>\n    <p>Jiangyi Deng (Zhejiang University), Xinfeng Li (Zhejiang University), Yanjiao Chen (Zhejiang University), Yijie Bai...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/raconteur-a-knowledgeable-insightful-and-portable-llm-powered-shell-command-explainer\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/radsee-see-your-handwriting-through-walls-using-fmcw-radar\/\">RadSee: See Your Handwriting Through Walls Using FMCW...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">RadSee: See Your Handwriting Through Walls Using FMCW...<\/h3>\n    <p>Shichen Zhang (Michigan State University), Qijun Wang (Michigan State University), Maolin Gan (Michigan State...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/radsee-see-your-handwriting-through-walls-using-fmcw-radar\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/redan-an-empirical-study-on-remote-dos-attacks-against-nat-networks\/\">ReDAN: An Empirical Study on Remote DoS Attacks...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">ReDAN: An Empirical Study on Remote DoS Attacks...<\/h3>\n    <p>Xuewei Feng (Tsinghua University), Yuxiang Yang (Tsinghua University), Qi Li (Tsinghua University), Xingxiang Zhan...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/redan-an-empirical-study-on-remote-dos-attacks-against-nat-networks\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/reinforcement-unlearning\/\">Reinforcement Unlearning<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Reinforcement Unlearning<\/h3>\n    <p>Dayong Ye (University of Technology Sydney), Tianqing Zhu (City University of Macau), Congcong Zhu...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/reinforcement-unlearning\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rethink-reveal-the-threat-of-electromagnetic-interference-on-power-inverters\/\">ReThink: Reveal the Threat of Electromagnetic Interference on...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">ReThink: Reveal the Threat of Electromagnetic Interference on...<\/h3>\n    <p>Fengchen Yang (Zhejiang University; ZJU QI-ANXIN IoT Security Joint Labratory), Zihao Dan (Zhejiang University;...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rethink-reveal-the-threat-of-electromagnetic-interference-on-power-inverters\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-em-based-estimation-for-locally-differentially-private-protocols\/\">Revisiting EM-based Estimation for Locally Differentially Private Protocols<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Revisiting EM-based Estimation for Locally Differentially Private Protocols<\/h3>\n    <p>Yutong Ye (Institute of software, Chinese Academy of Sciences & Zhongguancun Laboratory, Beijing, PR.China.),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-em-based-estimation-for-locally-differentially-private-protocols\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-physical-world-adversarial-attack-on-traffic-sign-recognition-a-commercial-systems-perspective\/\">Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition:...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition:...<\/h3>\n    <p>Ningfei Wang (University of California, Irvine), Shaoyuan Xie (University of California, Irvine), Takami Sato...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-physical-world-adversarial-attack-on-traffic-sign-recognition-a-commercial-systems-perspective\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rondo-scalable-and-reconfiguration-friendly-randomness-beacon\/\">Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon<\/h3>\n    <p>Xuanji Meng (Tsinghua University), Xiao Sui (Shandong University), Zhaoxin Yang (Tsinghua University), Kang Rong...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rondo-scalable-and-reconfiguration-friendly-randomness-beacon\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/scrutinizer-towards-secure-forensics-on-compromised-trustzone\/\">SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone<\/h3>\n    <p>Yiming Zhang (Southern University of Science and Technology and The Hong Kong Polytechnic University),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/scrutinizer-towards-secure-forensics-on-compromised-trustzone\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/secret-spilling-drive-leaking-user-behavior-through-ssd-contention\/\">Secret Spilling Drive: Leaking User Behavior through SSD...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Secret Spilling Drive: Leaking User Behavior through SSD...<\/h3>\n    <p>Jonas Juffinger (Graz University of Technology), Fabian Rauscher (Graz University of Technology), Giuseppe La...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/secret-spilling-drive-leaking-user-behavior-through-ssd-contention\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/secure-ip-address-allocation-at-cloud-scale\/\">Secure IP Address Allocation at Cloud Scale<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Secure IP Address Allocation at Cloud Scale<\/h3>\n    <p>Eric Pauley (University of Wisconsin\u2013Madison), Kyle Domico (University of Wisconsin\u2013Madison), Blaine Hoak (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/secure-ip-address-allocation-at-cloud-scale\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/secure-transformer-inference-made-non-interactive\/\">Secure Transformer Inference Made Non-interactive<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Secure Transformer Inference Made Non-interactive<\/h3>\n    <p>Jiawen Zhang (Zhejiang University), Xinpeng Yang (Zhejiang University), Lipeng He (University of Waterloo), Kejia...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/secure-transformer-inference-made-non-interactive\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/silence-false-alarms-identifying-anti-reentrancy-patterns-on-ethereum-to-refine-smart-contract-reentrancy-detection\/\">Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum...<\/h3>\n    <p>Qiyang Song (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security,...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/silence-false-alarms-identifying-anti-reentrancy-patterns-on-ethereum-to-refine-smart-contract-reentrancy-detection\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-unusual-suspects-studying-reasons-for-lacking-updates-in-wordpress\/\">The (Un)usual Suspects \u2013 Studying Reasons for Lacking...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The (Un)usual Suspects \u2013 Studying Reasons for Lacking...<\/h3>\n    <p>Maria Hellenthal (CISPA Helmholtz Center for Information Security), Lena Gotsche (CISPA Helmholtz Center for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-unusual-suspects-studying-reasons-for-lacking-updates-in-wordpress\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-midas-touch-triggering-the-capability-of-llms-for-rm-api-misuse-detection\/\">The Midas Touch: Triggering the Capability of LLMs...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The Midas Touch: Triggering the Capability of LLMs...<\/h3>\n    <p>Yi Yang (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-midas-touch-triggering-the-capability-of-llms-for-rm-api-misuse-detection\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-philosophers-stone-trojaning-plugins-of-large-language-models\/\">The Philosopher\u2019s Stone: Trojaning Plugins of Large Language...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The Philosopher\u2019s Stone: Trojaning Plugins of Large Language...<\/h3>\n    <p>Tian Dong (Shanghai Jiao Tong University), Minhui Xue (CSIRO's Data61), Guoxing Chen (Shanghai Jiao...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-philosophers-stone-trojaning-plugins-of-large-language-models\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-power-of-words-a-comprehensive-analysis-of-rationales-and-their-effects-on-users-permission-decisions\/\">The Power of Words: A Comprehensive Analysis of...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The Power of Words: A Comprehensive Analysis of...<\/h3>\n    <p>Yusra Elbitar (CISPA Helmholtz Center for Information Security), Alexander Hart (CISPA Helmholtz Center for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-power-of-words-a-comprehensive-analysis-of-rationales-and-their-effects-on-users-permission-decisions\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-skeleton-keys-a-large-scale-analysis-of-credential-leakage-in-mini-apps\/\">The Skeleton Keys: A Large Scale Analysis of...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The Skeleton Keys: A Large Scale Analysis of...<\/h3>\n    <p>Yizhe Shi (Fudan University), Zhemin Yang (Fudan University), Kangwei Zhong (Fudan University), Guangliang Yang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-skeleton-keys-a-large-scale-analysis-of-credential-leakage-in-mini-apps\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/themis-regulating-textual-inversion-for-personalized-concept-censorship\/\">THEMIS: Regulating Textual Inversion for Personalized Concept Censorship<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">THEMIS: Regulating Textual Inversion for Personalized Concept Censorship<\/h3>\n    <p>Yutong Wu (Nanyang Technological University), Jie Zhang (Centre for Frontier AI Research, Agency for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/themis-regulating-textual-inversion-for-personalized-concept-censorship\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/time-varying-bottleneck-links-in-leo-satellite-networks-identification-exploits-and-countermeasures\/\">Time-varying Bottleneck Links in LEO Satellite Networks: Identification,...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Time-varying Bottleneck Links in LEO Satellite Networks: Identification,...<\/h3>\n    <p>Yangtao Deng (Tsinghua University), Qian Wu (Tsinghua University), Zeqi Lai (Tsinghua University), Chenwei Gu...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/time-varying-bottleneck-links-in-leo-satellite-networks-identification-exploits-and-countermeasures\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/too-subtle-to-notice-investigating-executable-stack-issues-in-linux-systems\/\">Too Subtle to Notice: Investigating Executable Stack Issues...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Too Subtle to Notice: Investigating Executable Stack Issues...<\/h3>\n    <p>Hengkai Ye (The Pennsylvania State University), Hong Hu (The Pennsylvania State University)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/too-subtle-to-notice-investigating-executable-stack-issues-in-linux-systems\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/trajdeleter-enabling-trajectory-forgetting-in-offline-reinforcement-learning-agents\/\">TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning...<\/h3>\n    <p>Chen Gong (University of Vriginia), Kecen Li (Chinese Academy of Sciences), Jin Yao (University...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/trajdeleter-enabling-trajectory-forgetting-in-offline-reinforcement-learning-agents\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/transparency-or-information-overload-evaluating-users-comprehension-and-perceptions-of-the-ios-app-privacy-report\/\">Transparency or Information Overload? Evaluating Users\u2019 Comprehension and...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Transparency or Information Overload? Evaluating Users\u2019 Comprehension and...<\/h3>\n    <p>Xiaoyuan Wu (Carnegie Mellon University), Lydia Hu (Carnegie Mellon University), Eric Zeng (Carnegie Mellon...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/transparency-or-information-overload-evaluating-users-comprehension-and-perceptions-of-the-ios-app-privacy-report\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/tweezers-a-framework-for-security-event-detection-via-event-attribution-centric-tweet-embedding\/\">Tweezers: A Framework for Security Event Detection via...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Tweezers: A Framework for Security Event Detection via...<\/h3>\n    <p>Jian Cui (Indiana University), Hanna Kim (KAIST), Eugene Jang (S2W Inc.), Dayeon Yim (S2W...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/tweezers-a-framework-for-security-event-detection-via-event-attribution-centric-tweet-embedding\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/type-prohibiting-type-confusion-with-inline-type-information\/\">type++: Prohibiting Type Confusion with Inline Type Information<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">type++: Prohibiting Type Confusion with Inline Type Information<\/h3>\n    <p>Nicolas Badoux (EPFL), Flavio Toffalini (Ruhr-Universit\u00e4t Bochum, EPFL), Yuseok Jeon (UNIST), Mathias Payer (EPFL)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/type-prohibiting-type-confusion-with-inline-type-information\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/understanding-data-importance-in-machine-learning-attacks-does-valuable-data-pose-greater-harm\/\">Understanding Data Importance in Machine Learning Attacks: Does...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Understanding Data Importance in Machine Learning Attacks: Does...<\/h3>\n    <p>Rui Wen (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/understanding-data-importance-in-machine-learning-attacks-does-valuable-data-pose-greater-harm\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/understanding-miniapp-malware-identification-dissection-and-characterization\/\">Understanding Miniapp Malware: Identification, Dissection, and Characterization<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Understanding Miniapp Malware: Identification, Dissection, and Characterization<\/h3>\n    <p>Yuqing Yang (The Ohio State University), Yue Zhang (Drexel University), Zhiqiang Lin (The Ohio...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/understanding-miniapp-malware-identification-dissection-and-characterization\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/veribin-adaptive-verification-of-patches-at-the-binary-level\/\">VeriBin: Adaptive Verification of Patches at the Binary...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">VeriBin: Adaptive Verification of Patches at the Binary...<\/h3>\n    <p>Hongwei Wu (Purdue University), Jianliang Wu (Simon Fraser University), Ruoyu Wu (Purdue University), Ayushi...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/veribin-adaptive-verification-of-patches-at-the-binary-level\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/wallbleed-a-memory-disclosure-vulnerability-in-the-great-firewall-of-china\/\">Wallbleed: A Memory Disclosure Vulnerability in the Great...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Wallbleed: A Memory Disclosure Vulnerability in the Great...<\/h3>\n    <p>Shencha Fan (GFW Report), Jackson Sippe (University of Colorado Boulder), Sakamoto San (Shinonome Lab),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/wallbleed-a-memory-disclosure-vulnerability-in-the-great-firewall-of-china\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/waven-webassembly-memory-virtualization-for-enclaves\/\">WAVEN: WebAssembly Memory Virtualization for Enclaves<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">WAVEN: WebAssembly Memory Virtualization for Enclaves<\/h3>\n    <p>Weili Wang (Southern University of Science and Technology), Honghan Ji (ByteDance Inc.), Peixuan He...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/waven-webassembly-memory-virtualization-for-enclaves\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/welcome-to-jurassic-park-a-comprehensive-study-of-security-risks-in-deno-and-its-ecosystem\/\">Welcome to Jurassic Park: A Comprehensive Study of...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Welcome to Jurassic Park: A Comprehensive Study of...<\/h3>\n    <p>Abdullah AlHamdan (CISPA Helmholtz Center for Information Security), Cristian-Alexandru Staicu (CISPA Helmholtz Center for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/welcome-to-jurassic-park-a-comprehensive-study-of-security-risks-in-deno-and-its-ecosystem\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  <\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-width fixed-1110 section-padding fall-circle padding-top-0 section-title-h is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading\"><strong>Fall Cycle<\/strong><\/h2>\n\n\n<div class=\"paper-list rel-wrap\">\n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/who-is-trying-to-access-my-account-exploring-user-perceptions-and-reactions-to-risk-based-authentication-notifications\/\">&#8221;Who is Trying to Access My Account?&#8221; Exploring...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">&#8221;Who is Trying to Access My Account?&#8221; Exploring...<\/h3>\n    <p>Tongxin Wei (Nankai University), Ding Wang (Nankai University), Yutong Li (Nankai University), Yuehuan Wang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/who-is-trying-to-access-my-account-exploring-user-perceptions-and-reactions-to-risk-based-authentication-notifications\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/where-are-we-on-cyber-a-qualitative-study-on-boards-cybersecurity-risk-decision-making\/\">&#8220;Where Are We On Cyber?&#8221; &#8211; A Qualitative...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">&#8220;Where Are We On Cyber?&#8221; &#8211; A Qualitative...<\/h3>\n    <p>Jens Christian Opdenbusch (Ruhr University Bochum), Jonas Hielscher (Ruhr University Bochum), M. Angela Sasse...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/where-are-we-on-cyber-a-qualitative-study-on-boards-cybersecurity-risk-decision-making\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-comprehensive-memory-safety-analysis-of-bootloaders\/\">A Comprehensive Memory Safety Analysis of Bootloaders<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">A Comprehensive Memory Safety Analysis of Bootloaders<\/h3>\n    <p>Jianqiang Wang (CISPA Helmholtz Center for Information Security), Meng Wang (CISPA Helmholtz Center for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-comprehensive-memory-safety-analysis-of-bootloaders\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-formal-approach-to-multi-layered-privileges-for-enclaves\/\">A Formal Approach to Multi-Layered Privileges for Enclaves<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">A Formal Approach to Multi-Layered Privileges for Enclaves<\/h3>\n    <p>Ganxiang Yang (Shanghai Jiao Tong University), Chenyang Liu (Shanghai Jiao Tong University), Zhen Huang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-formal-approach-to-multi-layered-privileges-for-enclaves\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-large-scale-measurement-study-of-the-proxy-protocol-and-its-security-implications\/\">A Large-Scale Measurement Study of the PROXY Protocol...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">A Large-Scale Measurement Study of the PROXY Protocol...<\/h3>\n    <p>Stijn Pletinckx (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-large-scale-measurement-study-of-the-proxy-protocol-and-its-security-implications\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-multifaceted-study-on-the-use-of-tls-and-auto-detect-in-email-ecosystems\/\">A Multifaceted Study on the Use of TLS...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">A Multifaceted Study on the Use of TLS...<\/h3>\n    <p>Ka Fun Tang (The Chinese University of Hong Kong), Che Wei Tu (The Chinese...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-multifaceted-study-on-the-use-of-tls-and-auto-detect-in-email-ecosystems\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-new-ppml-paradigm-for-quantized-models\/\">A New PPML Paradigm for Quantized Models<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">A New PPML Paradigm for Quantized Models<\/h3>\n    <p>Tianpei Lu (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Bingsheng...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/a-new-ppml-paradigm-for-quantized-models\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/alba-the-dawn-of-scalable-bridges-for-blockchains\/\">Alba: The Dawn of Scalable Bridges for Blockchains<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Alba: The Dawn of Scalable Bridges for Blockchains<\/h3>\n    <p>Giulia Scaffino (TU Wien), Lukas Aumayr (TU Wien), Mahsa Bastankhah (Princeton University), Zeta Avarikioti...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/alba-the-dawn-of-scalable-bridges-for-blockchains\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/all-your-database-are-belong-to-us-characterizing-database-ransomware-attacks\/\">All your (data)base are belong to us: Characterizing...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">All your (data)base are belong to us: Characterizing...<\/h3>\n    <p>Kevin van Liebergen (IMDEA Software Institute), Gibran Gomez (IMDEA Software Institute), Srdjan Matic (IMDEA...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/all-your-database-are-belong-to-us-characterizing-database-ransomware-attacks\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/asgard-protecting-on-device-deep-neural-networks-with-virtualization-based-trusted-execution-environments\/\">ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based...<\/h3>\n    <p>Myungsuk Moon (Yonsei University), Minhee Kim (Yonsei University), Joonkyo Jung (Yonsei University), Dokyung Song...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/asgard-protecting-on-device-deep-neural-networks-with-virtualization-based-trusted-execution-environments\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/attributing-open-source-contributions-is-critical-but-difficult-a-systematic-analysis-of-github-practices-and-their-impact-on-software-supply-chain-security\/\">Attributing Open-Source Contributions is Critical but Difficult: A...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Attributing Open-Source Contributions is Critical but Difficult: A...<\/h3>\n    <p>Jan-Ulrich Holtgrave (CISPA Helmholtz Center for Information Security), Kay Friedrich (CISPA Helmholtz Center for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/attributing-open-source-contributions-is-critical-but-difficult-a-systematic-analysis-of-github-practices-and-their-impact-on-software-supply-chain-security\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/automated-mass-malware-factory-the-convergence-of-piggybacking-and-adversarial-example-in-android-malicious-software-generation\/\">Automated Mass Malware Factory: The Convergence of Piggybacking...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Automated Mass Malware Factory: The Convergence of Piggybacking...<\/h3>\n    <p>Heng Li (Huazhong University of Science and Technology), Zhiyuan Yao (Huazhong University of Science...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/automated-mass-malware-factory-the-convergence-of-piggybacking-and-adversarial-example-in-android-malicious-software-generation\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/automatic-insecurity-exploring-email-auto-configuration-in-the-wild\/\">Automatic Insecurity: Exploring Email Auto-configuration in the Wild<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Automatic Insecurity: Exploring Email Auto-configuration in the Wild<\/h3>\n    <p>Shushang Wen (School of Cyber Science and Technology, University of Science and Technology of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/automatic-insecurity-exploring-email-auto-configuration-in-the-wild\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/automatic-library-fuzzing-through-api-relation-evolvement\/\">Automatic Library Fuzzing through API Relation Evolvement<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Automatic Library Fuzzing through API Relation Evolvement<\/h3>\n    <p>Jiayi Lin (The University of Hong Kong), Qingyu Zhang (The University of Hong Kong),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/automatic-library-fuzzing-through-api-relation-evolvement\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/balancing-privacy-and-data-utilization-a-comparative-vignette-study-on-user-acceptance-of-data-trustees-in-germany-and-the-us\/\">Balancing Privacy and Data Utilization: A Comparative Vignette...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Balancing Privacy and Data Utilization: A Comparative Vignette...<\/h3>\n    <p>Leona Lassak (Ruhr University Bochum), Hanna P\u00fcschel (TU Dortmund University), Oliver D. Reithmaier (Leibniz...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/balancing-privacy-and-data-utilization-a-comparative-vignette-study-on-user-acceptance-of-data-trustees-in-germany-and-the-us\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/barbie-robust-backdoor-detection-based-on-latent-separability\/\">BARBIE: Robust Backdoor Detection Based on Latent Separability<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">BARBIE: Robust Backdoor Detection Based on Latent Separability<\/h3>\n    <p>Hanlei Zhang (Zhejiang University), Yijie Bai (Zhejiang University), Yanjiao Chen (Zhejiang University), Zhongming Ma...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/barbie-robust-backdoor-detection-based-on-latent-separability\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/beyond-classification-inferring-function-names-in-stripped-binaries-via-domain-adapted-llms\/\">Beyond Classification: Inferring Function Names in Stripped Binaries...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Beyond Classification: Inferring Function Names in Stripped Binaries...<\/h3>\n    <p>Linxi Jiang (The Ohio State University), Xin Jin (The Ohio State University), Zhiqiang Lin...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/beyond-classification-inferring-function-names-in-stripped-binaries-via-domain-adapted-llms\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/binenhance-an-enhancement-framework-based-on-external-environment-semantics-for-binary-code-search\/\">BinEnhance: An Enhancement Framework Based on External Environment...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">BinEnhance: An Enhancement Framework Based on External Environment...<\/h3>\n    <p>Yongpan Wang (Institute of Information Engineering Chinese Academy of Sciences & University of Chinese...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/binenhance-an-enhancement-framework-based-on-external-environment-semantics-for-binary-code-search\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/bitshield-defending-against-bit-flip-attacks-on-dnn-executables\/\">BitShield: Defending Against Bit-Flip Attacks on DNN Executables<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">BitShield: Defending Against Bit-Flip Attacks on DNN Executables<\/h3>\n    <p>Yanzuo Chen (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/bitshield-defending-against-bit-flip-attacks-on-dnn-executables\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/blackbox-fuzzing-of-distributed-systems-with-multi-dimensional-inputs-and-symmetry-based-feedback-pruning\/\">Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs...<\/h3>\n    <p>Yonghao Zou (Beihang University and Peking University), Jia-Ju Bai (Beihang University), Zu-Ming Jiang (ETH...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/blackbox-fuzzing-of-distributed-systems-with-multi-dimensional-inputs-and-symmetry-based-feedback-pruning\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/blindfold-confidential-memory-management-by-untrusted-operating-system\/\">Blindfold: Confidential Memory Management by Untrusted Operating System<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Blindfold: Confidential Memory Management by Untrusted Operating System<\/h3>\n    <p>Caihua Li (Yale University), Seung-seob Lee (Yale University), Lin Zhong (Yale University)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/blindfold-confidential-memory-management-by-untrusted-operating-system\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/caspr-context-aware-security-policy-recommendation\/\">CASPR: Context-Aware Security Policy Recommendation<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">CASPR: Context-Aware Security Policy Recommendation<\/h3>\n    <p>Lifang Xiao (Institute of Information Engineering, Chinese Academy of Sciences), Hanyu Wang (Institute of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/caspr-context-aware-security-policy-recommendation\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/cctag-configurable-and-combinable-tagged-architecture\/\">CCTAG: Configurable and Combinable Tagged Architecture<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">CCTAG: Configurable and Combinable Tagged Architecture<\/h3>\n    <p>Zhanpeng Liu (Peking University), Yi Rong (Tsinghua University), Chenyang Li (Peking University), Wende Tan...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/cctag-configurable-and-combinable-tagged-architecture\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/characterizing-the-impact-of-audio-deepfakes-in-the-presence-of-cochlear-implant\/\">Characterizing the Impact of Audio Deepfakes in the...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Characterizing the Impact of Audio Deepfakes in the...<\/h3>\n    <p>Magdalena Pasternak (University of Florida), Kevin Warren (University of Florida), Daniel Olszewski (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/characterizing-the-impact-of-audio-deepfakes-in-the-presence-of-cochlear-implant\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/counterseveillance-performance-counter-attacks-on-amd-sev-snp\/\">CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP<\/h3>\n    <p>Stefan Gast (Graz University of Technology), Hannes Weissteiner (Graz University of Technology), Robin Leander...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/counterseveillance-performance-counter-attacks-on-amd-sev-snp\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/crosstalk-induced-side-channel-threats-in-multi-tenant-nisq-computers\/\">Crosstalk-induced Side Channel Threats in Multi-Tenant NISQ Computers<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Crosstalk-induced Side Channel Threats in Multi-Tenant NISQ Computers<\/h3>\n    <p>Ruixuan Li (Choudhury), Chaithanya Naik Mude (University of Wisconsin-Madison), Sanjay Das (The University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/crosstalk-induced-side-channel-threats-in-multi-tenant-nisq-computers\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ctrlaltdeceive-quantifying-user-exposure-to-online-scams\/\">Ctrl+Alt+Deceive: Quantifying User Exposure to Online Scams<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Ctrl+Alt+Deceive: Quantifying User Exposure to Online Scams<\/h3>\n    <p>Platon Kotzias (Norton Research Group, BforeAI), Michalis Pachilakis (Norton Research Group, Computer Science Department...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ctrlaltdeceive-quantifying-user-exposure-to-online-scams\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/deanonymizing-device-identities-via-side-channel-attacks-in-exclusive-use-iots-mitigation\/\">Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use...<\/h3>\n    <p>Christopher Ellis (The Ohio State University), Yue Zhang (Drexel University), Mohit Kumar Jangid (The...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/deanonymizing-device-identities-via-side-channel-attacks-in-exclusive-use-iots-mitigation\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/defending-against-membership-inference-attacks-on-iteratively-pruned-deep-neural-networks\/\">Defending Against Membership Inference Attacks on Iteratively Pruned...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Defending Against Membership Inference Attacks on Iteratively Pruned...<\/h3>\n    <p>Jing Shang (Beijing Jiaotong University), Jian Wang (Beijing Jiaotong University), Kailun Wang (Beijing Jiaotong...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/defending-against-membership-inference-attacks-on-iteratively-pruned-deep-neural-networks\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/density-boosts-everything-a-one-stop-strategy-for-improving-performance-robustness-and-sustainability-of-malware-detectors\/\">Density Boosts Everything: A One-stop Strategy for Improving...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Density Boosts Everything: A One-stop Strategy for Improving...<\/h3>\n    <p>Jianwen Tian (Academy of Military Sciences), Wei Kong (Zhejiang Sci-Tech University), Debin Gao (Singapore...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/density-boosts-everything-a-one-stop-strategy-for-improving-performance-robustness-and-sustainability-of-malware-detectors\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/detecting-imsi-catchers-by-characterizing-identity-exposing-messages-in-cellular-traffic\/\">Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Detecting IMSI-Catchers by Characterizing Identity Exposing Messages in...<\/h3>\n    <p>Tyler Tucker (University of Florida), Nathaniel Bennett (University of Florida), Martin Kotuliak (ETH Zurich),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/detecting-imsi-catchers-by-characterizing-identity-exposing-messages-in-cellular-traffic\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/detecting-ransomware-despite-i-o-overhead-a-practical-multi-staged-approach\/\">Detecting Ransomware Despite I\/O Overhead: A Practical Multi-Staged...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Detecting Ransomware Despite I\/O Overhead: A Practical Multi-Staged...<\/h3>\n    <p>Christian van Sloun (RWTH Aachen University), Vincent Woeste (RWTH Aachen University), Konrad Wolsing (RWTH...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/detecting-ransomware-despite-i-o-overhead-a-practical-multi-staged-approach\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/distefano-decentralized-infrastructure-for-sharing-trusted-encrypted-facts-and-nothing-more\/\">DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts...<\/h3>\n    <p>Sofia Celi (Brave Software), Alex Davidson (NOVA LINCS & Universidade NOVA de Lisboa), Hamed...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/distefano-decentralized-infrastructure-for-sharing-trusted-encrypted-facts-and-nothing-more\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/distributed-function-secret-sharing-and-applications\/\">Distributed Function Secret Sharing and Applications<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Distributed Function Secret Sharing and Applications<\/h3>\n    <p>Pengzhi Xing (University of Electronic Science and Technology of China), Hongwei Li (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/distributed-function-secret-sharing-and-applications\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/dlbox-new-model-training-framework-for-protecting-training-data\/\">DLBox: New Model Training Framework for Protecting Training...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">DLBox: New Model Training Framework for Protecting Training...<\/h3>\n    <p>Jaewon Hur (Seoul National University), Juheon Yi (Nokia Bell Labs, Cambridge, UK), Cheolwoo Myung...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/dlbox-new-model-training-framework-for-protecting-training-data\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/do-not-follow-the-white-rabbit-challenging-the-myth-of-harmless-open-redirection\/\">Do (Not) Follow the White Rabbit: Challenging the...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Do (Not) Follow the White Rabbit: Challenging the...<\/h3>\n    <p>Soheil Khodayari (CISPA Helmholtz Center for Information Security), Kai Glauber (Saarland University), Giancarlo Pellegrino...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/do-not-follow-the-white-rabbit-challenging-the-myth-of-harmless-open-redirection\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/do-we-really-need-to-design-new-byzantine-robust-aggregation-rules\/\">Do We Really Need to Design New Byzantine-robust...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Do We Really Need to Design New Byzantine-robust...<\/h3>\n    <p>Minghong Fang (University of Louisville), Seyedsina Nabavirazavi (Florida International University), Zhuqing Liu (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/do-we-really-need-to-design-new-byzantine-robust-aggregation-rules\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/dshield-defending-against-backdoor-attacks-on-graph-neural-networks-via-discrepancy-learning\/\">DShield: Defending against Backdoor Attacks on Graph Neural...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">DShield: Defending against Backdoor Attacks on Graph Neural...<\/h3>\n    <p>Hao Yu (National University of Defense Technology), Chuan Ma (Chongqing University), Xinhang Wan (National...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/dshield-defending-against-backdoor-attacks-on-graph-neural-networks-via-discrepancy-learning\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/dumpling-fine-grained-differential-javascript-engine-fuzzing\/\">DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing<\/h3>\n    <p>Liam Wachter (EPFL), Julian Gremminger (EPFL), Christian Wressnegger (Karlsruhe Institute of Technology (KIT)), Mathias...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/dumpling-fine-grained-differential-javascript-engine-fuzzing\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/eagleye-exposing-hidden-web-interfaces-in-iot-devices-via-routing-analysis\/\">EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices...<\/h3>\n    <p>Hangtian Liu (Information Engineering University), Lei Zheng (Institute for Network Sciences and Cyberspace (INSC),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/eagleye-exposing-hidden-web-interfaces-in-iot-devices-via-routing-analysis\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/eclipse-attacks-on-moneros-peer-to-peer-network\/\">Eclipse Attacks on Monero's Peer-to-Peer Network<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Eclipse Attacks on Monero's Peer-to-Peer Network<\/h3>\n    <p>Ruisheng Shi (Beijing University of Posts and Telecommunications), Zhiyuan Peng (Beijing University of Posts...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/eclipse-attacks-on-moneros-peer-to-peer-network\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel\/\">EMIRIS: Eavesdropping on Iris Information via Electromagnetic Side...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">EMIRIS: Eavesdropping on Iris Information via Electromagnetic Side...<\/h3>\n    <p>Wenhao Li (Shandong University), Jiahao Wang (Shandong University), Guoming Zhang (Shandong University), Yanni Yang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/emiris-eavesdropping-on-iris-information-via-electromagnetic-side-channel\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/enhancing-security-in-third-party-library-reuse-comprehensive-detection-of-1-day-vulnerability-through-code-patch-analysis\/\">Enhancing Security in Third-Party Library Reuse &#8211; Comprehensive...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Enhancing Security in Third-Party Library Reuse &#8211; Comprehensive...<\/h3>\n    <p>Shangzhi Xu (The University of New South Wales), Jialiang Dong (The University of New...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/enhancing-security-in-third-party-library-reuse-comprehensive-detection-of-1-day-vulnerability-through-code-patch-analysis\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/evaluating-machine-learning-based-iot-device-identification-models-for-security-applications\/\">Evaluating Machine Learning-Based IoT Device Identification Models for...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Evaluating Machine Learning-Based IoT Device Identification Models for...<\/h3>\n    <p>Eman Maali (Imperial College London), Omar Alrawi (Georgia Institute of Technology), Julie McCann (Imperial...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/evaluating-machine-learning-based-iot-device-identification-models-for-security-applications\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/exploring-user-perceptions-of-security-auditing-in-the-web3-ecosystem\/\">Exploring User Perceptions of Security Auditing in the...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Exploring User Perceptions of Security Auditing in the...<\/h3>\n    <p>Molly Zhuangtong Huang (University of Macau), Rui Jiang (University of Macau), Tanusree Sharma (Pennsylvania...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/exploring-user-perceptions-of-security-auditing-in-the-web3-ecosystem\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/from-large-to-mammoth-a-comparative-evaluation-of-large-language-models-in-vulnerability-detection\/\">From Large to Mammoth: A Comparative Evaluation of...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">From Large to Mammoth: A Comparative Evaluation of...<\/h3>\n    <p>Jie Lin (University of Central Florida), David Mohaisen (University of Central Florida)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/from-large-to-mammoth-a-comparative-evaluation-of-large-language-models-in-vulnerability-detection\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/fuzzuer-enabling-fuzzing-of-uefi-interfaces-on-edk-2\/\">FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2<\/h3>\n    <p>Connor Glosner (Purdue University), Aravind Machiry (Purdue University)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/fuzzuer-enabling-fuzzing-of-uefi-interfaces-on-edk-2\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/gadgetmeter-quantitatively-and-accurately-gauging-the-exploitability-of-speculative-gadgets\/\">GadgetMeter: Quantitatively and Accurately Gauging the Exploitability of...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">GadgetMeter: Quantitatively and Accurately Gauging the Exploitability of...<\/h3>\n    <p>Qi Ling (Purdue University), Yujun Liang (Tsinghua University), Yi Ren (Tsinghua University), Baris Kasikci...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/gadgetmeter-quantitatively-and-accurately-gauging-the-exploitability-of-speculative-gadgets\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/gap-diff-protecting-jpeg-compressed-images-from-diffusion-based-facial-customization\/\">GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization<\/h3>\n    <p>Haotian Zhu (Nanjing University of Science and Technology), Shuchao Pang (Nanjing University of Science...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/gap-diff-protecting-jpeg-compressed-images-from-diffusion-based-facial-customization\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ghostshot-manipulating-the-image-of-ccd-cameras-with-electromagnetic-interference\/\">GhostShot: Manipulating the Image of CCD Cameras with...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">GhostShot: Manipulating the Image of CCD Cameras with...<\/h3>\n    <p>Yanze Ren (Zhejiang University), Qinhong Jiang (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ghostshot-manipulating-the-image-of-ccd-cameras-with-electromagnetic-interference\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/hades-attack-understanding-and-evaluating-manipulation-risks-of-email-blocklists\/\">HADES Attack: Understanding and Evaluating Manipulation Risks of...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">HADES Attack: Understanding and Evaluating Manipulation Risks of...<\/h3>\n    <p>Ruixuan Li (Tsinghua University), Chaoyi Lu (Tsinghua University), Baojun Liu (Tsinghua University;Zhongguancun Laboratory), Yunyi...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/hades-attack-understanding-and-evaluating-manipulation-risks-of-email-blocklists\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/hidden-and-lost-control-on-security-design-risks-in-iot-user-facing-matter-controller\/\">Hidden and Lost Control: on Security Design Risks...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Hidden and Lost Control: on Security Design Risks...<\/h3>\n    <p>Haoqiang Wang, Yiwei Fang (Institute of Information Engineering, Chinese Academy of Sciences; School of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/hidden-and-lost-control-on-security-design-risks-in-iot-user-facing-matter-controller\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/hitchhiking-vaccine-enhancing-botnet-remediation-with-remote-code-deployment-reuse\/\">Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Hitchhiking Vaccine: Enhancing Botnet Remediation With Remote Code...<\/h3>\n    <p>Runze Zhang (Georgia Institute of Technology), Mingxuan Yao (Georgia Institute of Technology), Haichuan Xu...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/hitchhiking-vaccine-enhancing-botnet-remediation-with-remote-code-deployment-reuse\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/i-know-what-you-asked-prompt-leakage-via-kv-cache-sharing-in-multi-tenant-llm-serving\/\">I Know What You Asked: Prompt Leakage via...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">I Know What You Asked: Prompt Leakage via...<\/h3>\n    <p>Guanlong Wu (Southern University of Science and Technology), Zheng Zhang (ByteDance Inc.), Yao Zhang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/i-know-what-you-asked-prompt-leakage-via-kv-cache-sharing-in-multi-tenant-llm-serving\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/i-know-what-you-meme-understanding-and-detecting-harmful-memes-with-multimodal-large-language-models\/\">I know what you MEME! Understanding and Detecting...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">I know what you MEME! Understanding and Detecting...<\/h3>\n    <p>Yong Zhuang (Wuhan University), Keyan Guo (University at Buffalo), Juan Wang (Wuhan University), Yiheng...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/i-know-what-you-meme-understanding-and-detecting-harmful-memes-with-multimodal-large-language-models\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/icsquartz-scan-cycle-aware-and-vendor-agnostic-fuzzing-for-industrial-control-systems\/\">ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial...<\/h3>\n    <p>Corban Villa (New York University Abu Dhabi), Constantine Doumanidis (New York University Abu Dhabi),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/icsquartz-scan-cycle-aware-and-vendor-agnostic-fuzzing-for-industrial-control-systems\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/impact-tracing-identifying-the-culprit-of-misinformation-in-encrypted-messaging-systems\/\">Impact Tracing: Identifying the Culprit of Misinformation in...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Impact Tracing: Identifying the Culprit of Misinformation in...<\/h3>\n    <p>Zhongming Wang (Chongqing University), Tao Xiang (Chongqing University), Xiaoguo Li (Chongqing University), Biwen Chen...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/impact-tracing-identifying-the-culprit-of-misinformation-in-encrypted-messaging-systems\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/interventional-root-cause-analysis-of-failures-in-multi-sensor-fusion-perception-systems\/\">Interventional Root Cause Analysis of Failures in Multi-Sensor...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Interventional Root Cause Analysis of Failures in Multi-Sensor...<\/h3>\n    <p>Shuguang Wang (City University of Hong Kong), Qian Zhou (City University of Hong Kong),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/interventional-root-cause-analysis-of-failures-in-multi-sensor-fusion-perception-systems\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/iris-dynamic-privacy-preserving-search-in-authenticated-chord-peer-to-peer-networks\/\">Iris: Dynamic Privacy Preserving Search in Authenticated Chord...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Iris: Dynamic Privacy Preserving Search in Authenticated Chord...<\/h3>\n    <p>Angeliki Aktypi (University of Oxford), Kasper Rasmussen (University of Oxford)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/iris-dynamic-privacy-preserving-search-in-authenticated-chord-peer-to-peer-networks\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/isolategpt-an-execution-isolation-architecture-for-llm-based-agentic-systems\/\">IsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">IsolateGPT: An Execution Isolation Architecture for LLM-Based Agentic...<\/h3>\n    <p>Yuhao Wu (Washington University in St. Louis), Franziska Roesner (University of Washington), Tadayoshi Kohno...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/isolategpt-an-execution-isolation-architecture-for-llm-based-agentic-systems\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/jbomaudit-assessing-the-landscape-compliance-and-security-implications-of-java-sboms\/\">JBomAudit: Assessing the Landscape, Compliance, and Security Implications...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">JBomAudit: Assessing the Landscape, Compliance, and Security Implications...<\/h3>\n    <p>Yue Xiao (IBM Research), Dhilung Kirat (IBM Research), Douglas Lee Schales (IBM Research), Jiyong...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/jbomaudit-assessing-the-landscape-compliance-and-security-implications-of-java-sboms\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/kernelsnitch-side-channel-attacks-on-kernel-data-structures\/\">KernelSnitch: Side Channel-Attacks on Kernel Data Structures<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">KernelSnitch: Side Channel-Attacks on Kernel Data Structures<\/h3>\n    <p>Lukas Maar (Graz University of Technology), Jonas Juffinger (Graz University of Technology), Thomas Steinbauer...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/kernelsnitch-side-channel-attacks-on-kernel-data-structures\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/l-hawk-a-controllable-physical-adversarial-patch-against-a-long-distance-target\/\">L-HAWK: A Controllable Physical Adversarial Patch Against a...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">L-HAWK: A Controllable Physical Adversarial Patch Against a...<\/h3>\n    <p>Taifeng Liu (Xidian University), Yang Liu (Xidian University), Zhuo Ma (Xidian University), Tong Yang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/l-hawk-a-controllable-physical-adversarial-patch-against-a-long-distance-target\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ladder-multi-objective-backdoor-attack-via-evolutionary-algorithm\/\">LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm<\/h3>\n    <p>Dazhuang Liu (Delft University of Technology), Yanqi Qiao (Delft University of Technology), Rui Wang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ladder-multi-objective-backdoor-attack-via-evolutionary-algorithm\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/lamp-lightweight-approaches-for-latency-minimization-in-mixnets-with-practical-deployment-considerations\/\">LAMP: Lightweight Approaches for Latency Minimization in Mixnets...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">LAMP: Lightweight Approaches for Latency Minimization in Mixnets...<\/h3>\n    <p>Mahdi Rahimi (KU Leuven), Piyush Kumar Sharma (University of Michigan), Claudia Diaz (KU Leuven)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/lamp-lightweight-approaches-for-latency-minimization-in-mixnets-with-practical-deployment-considerations\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/lend-me-your-beam-privacy-implications-of-plaintext-beamforming-feedback-in-wifi\/\">Lend Me Your Beam: Privacy Implications of Plaintext...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Lend Me Your Beam: Privacy Implications of Plaintext...<\/h3>\n    <p>Rui Xiao (Zhejiang University), Xiankai Chen (Zhejiang University), Yinghui He (Nanyang Technological University), Jun...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/lend-me-your-beam-privacy-implications-of-plaintext-beamforming-feedback-in-wifi\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/lightantenna-characterizing-the-limits-of-fluorescent-lamp-induced-electromagnetic-interference\/\">LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic...<\/h3>\n    <p>Fengchen Yang (Zhejiang University), Wenze Cui (Zhejiang University), Xinfeng Li (Zhejiang University), Chen Yan...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/lightantenna-characterizing-the-limits-of-fluorescent-lamp-induced-electromagnetic-interference\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/llmpirate-llms-for-black-box-hardware-ip-piracy\/\">LLMPirate: LLMs for Black-box Hardware IP Piracy<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">LLMPirate: LLMs for Black-box Hardware IP Piracy<\/h3>\n    <p>Vasudev Gohil (Texas A&M University), Matthew DeLorenzo (Texas A&M University), Veera Vishwa Achuta Sai...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/llmpirate-llms-for-black-box-hardware-ip-piracy\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mingledpie-a-cluster-mingling-approach-for-mitigating-preference-profiling-in-cfl\/\">MingledPie: A Cluster Mingling Approach for Mitigating Preference...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">MingledPie: A Cluster Mingling Approach for Mitigating Preference...<\/h3>\n    <p>Cheng Zhang (Hunan University), Yang Xu (Hunan University), Jianghao Tan (Hunan University), Jiajie An...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mingledpie-a-cluster-mingling-approach-for-mitigating-preference-profiling-in-cfl\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mysticeti-reaching-the-latency-limits-with-uncertified-dags\/\">Mysticeti: Reaching the Latency Limits with Uncertified DAGs<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Mysticeti: Reaching the Latency Limits with Uncertified DAGs<\/h3>\n    <p>Kushal Babel (Cornell Tech & IC3), Andrey Chursin (Mysten Labs), George Danezis (Mysten Labs...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/mysticeti-reaching-the-latency-limits-with-uncertified-dags\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/nodemedic-fine-automatic-detection-and-exploit-synthesis-for-node-js-vulnerabilities\/\">NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js...<\/h3>\n    <p>Darion Cassel (Carnegie Mellon University), Nuno Sabino (IST & CMU), Min-Chien Hsu (Carnegie Mellon...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/nodemedic-fine-automatic-detection-and-exploit-synthesis-for-node-js-vulnerabilities\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/non-intrusive-and-unconstrained-keystroke-inference-in-vr-platforms-via-infrared-side-channel\/\">Non-intrusive and Unconstrained Keystroke Inference in VR Platforms...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Non-intrusive and Unconstrained Keystroke Inference in VR Platforms...<\/h3>\n    <p>Tao Ni (City University of Hong Kong), Yuefeng Du (City University of Hong Kong),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/non-intrusive-and-unconstrained-keystroke-inference-in-vr-platforms-via-infrared-side-channel\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/on-borrowed-time-preventing-static-side-channel-analysis\/\">On Borrowed Time \u2013 Preventing Static Side-Channel Analysis<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">On Borrowed Time \u2013 Preventing Static Side-Channel Analysis<\/h3>\n    <p>Robert Dumitru (Ruhr University Bochum and The University of Adelaide), Thorben Moos (UCLouvain), Andrew...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/on-borrowed-time-preventing-static-side-channel-analysis\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/on-the-robustness-of-ldp-protocols-for-numerical-attributes-under-data-poisoning-attacks\/\">On the Robustness of LDP Protocols for Numerical...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">On the Robustness of LDP Protocols for Numerical...<\/h3>\n    <p>Xiaoguang Li (Xidian University, Purdue University), Zitao Li (Alibaba Group (U.S.) Inc.), Ninghui Li...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/on-the-robustness-of-ldp-protocols-for-numerical-attributes-under-data-poisoning-attacks\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/onion-franking-abuse-reports-for-mix-based-private-messaging\/\">Onion Franking: Abuse Reports for Mix-Based Private Messaging<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Onion Franking: Abuse Reports for Mix-Based Private Messaging<\/h3>\n    <p>Matthew Gregoire (University of North Carolina at Chapel Hill), Margaret Pierce (University of North...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/onion-franking-abuse-reports-for-mix-based-private-messaging\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/oreo-protecting-aslr-against-microarchitectural-attacks\/\">Oreo: Protecting ASLR Against Microarchitectural Attacks<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Oreo: Protecting ASLR Against Microarchitectural Attacks<\/h3>\n    <p>Shixin Song (Massachusetts Institute of Technology), Joseph Zhang (Massachusetts Institute of Technology), Mengjia Yan...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/oreo-protecting-aslr-against-microarchitectural-attacks\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/pbp-post-training-backdoor-purification-for-malware-classifiers\/\">PBP: Post-training Backdoor Purification for Malware Classifiers<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">PBP: Post-training Backdoor Purification for Malware Classifiers<\/h3>\n    <p>Dung Thuy Nguyen (Vanderbilt University), Ngoc N. Tran (Vanderbilt University), Taylor T. Johnson (Vanderbilt...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/pbp-post-training-backdoor-purification-for-malware-classifiers\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/policypulse-precision-semantic-role-extraction-for-enhanced-privacy-policy-comprehension\/\">PolicyPulse: Precision Semantic Role Extraction for Enhanced Privacy...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">PolicyPulse: Precision Semantic Role Extraction for Enhanced Privacy...<\/h3>\n    <p>Andrick Adhikari (University of Denver), Sanchari Das (University of Denver), Rinku Dewri (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/policypulse-precision-semantic-role-extraction-for-enhanced-privacy-policy-comprehension\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/power-related-side-channel-attacks-using-the-android-sensor-framework\/\">Power-Related Side-Channel Attacks using the Android Sensor Framework<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Power-Related Side-Channel Attacks using the Android Sensor Framework<\/h3>\n    <p>Mathias Oberhuber (Graz University of Technology), Martin Unterguggenberger (Graz University of Technology), Lukas Maar...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/power-related-side-channel-attacks-using-the-android-sensor-framework\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/pqconnect-automated-post-quantum-end-to-end-tunnels\/\">PQConnect: Automated Post-Quantum End-to-End Tunnels<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">PQConnect: Automated Post-Quantum End-to-End Tunnels<\/h3>\n    <p>Daniel J. Bernstein (University of Illinois at Chicago and Academia Sinica), Tanja Lange (Eindhoven...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/pqconnect-automated-post-quantum-end-to-end-tunnels\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/privacy-preserving-data-deduplication-for-enhancing-federated-learning-of-language-models\/\">Privacy-Preserving Data Deduplication for Enhancing Federated Learning of...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Privacy-Preserving Data Deduplication for Enhancing Federated Learning of...<\/h3>\n    <p>Aydin Abadi (Newcastle University), Vishnu Asutosh Dasu (Pennsylvania State University), Sumanta Sarkar (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/privacy-preserving-data-deduplication-for-enhancing-federated-learning-of-language-models\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/probe-me-not-protecting-pre-trained-encoders-from-malicious-probing\/\">Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing<\/h3>\n    <p>Ruyi Ding (Northeastern University), Tong Zhou (Northeastern University), Lili Su (Northeastern University), Aidong Adam...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/probe-me-not-protecting-pre-trained-encoders-from-malicious-probing\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/propertygpt-llm-driven-formal-verification-of-smart-contracts-through-retrieval-augmented-property-generation\/\">PropertyGPT: LLM-driven Formal Verification of Smart Contracts through...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">PropertyGPT: LLM-driven Formal Verification of Smart Contracts through...<\/h3>\n    <p>Ye Liu (Singapore Management University), Yue Xue (MetaTrust Labs), Daoyuan Wu (The Hong Kong...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/propertygpt-llm-driven-formal-verification-of-smart-contracts-through-retrieval-augmented-property-generation\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/provably-unlearnable-data-examples\/\">Provably Unlearnable Data Examples<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Provably Unlearnable Data Examples<\/h3>\n    <p>Derui Wang (CSIRO's Data61), Minhui Xue (CSIRO's Data61), Bo Li (The University of Chicago),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/provably-unlearnable-data-examples\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/provguard-detecting-sdn-control-policy-manipulation-via-contextual-semantics-of-provenance-graphs\/\">ProvGuard: Detecting SDN Control Policy Manipulation via Contextual...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">ProvGuard: Detecting SDN Control Policy Manipulation via Contextual...<\/h3>\n    <p>Ziwen Liu (Beihang University), Jian Mao (Beihang University; Tianmushan Laboratory; Hangzhou Innovation Institute, Beihang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/provguard-detecting-sdn-control-policy-manipulation-via-contextual-semantics-of-provenance-graphs\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/qmsan-efficiently-detecting-uninitialized-memory-errors-during-fuzzing\/\">QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing<\/h3>\n    <p>Matteo Marini (Sapienza University of Rome), Daniele Cono D'Elia (Sapienza University of Rome), Mathias...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/qmsan-efficiently-detecting-uninitialized-memory-errors-during-fuzzing\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/raifle-reconstruction-attacks-on-interaction-based-federated-learning-with-adversarial-data-manipulation\/\">RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">RAIFLE: Reconstruction Attacks on Interaction-based Federated Learning with...<\/h3>\n    <p>Dzung Pham (University of Massachusetts Amherst), Shreyas Kulkarni (University of Massachusetts Amherst), Amir Houmansadr...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/raifle-reconstruction-attacks-on-interaction-based-federated-learning-with-adversarial-data-manipulation\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rcontainer-a-secure-container-architecture-through-extending-arm-cca-hardware-primitives\/\">RContainer: A Secure Container Architecture through Extending ARM...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">RContainer: A Secure Container Architecture through Extending ARM...<\/h3>\n    <p>Qihang Zhou (Institute of Information Engineering, Chinese Academy of Sciences), Wenzhuo Cao (Institute of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rcontainer-a-secure-container-architecture-through-extending-arm-cca-hardware-primitives\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/recurrent-private-set-intersection-for-unbalanced-databases-with-cuckoo-hashing-and-leveled-fhe\/\">Recurrent Private Set Intersection for Unbalanced Databases with...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Recurrent Private Set Intersection for Unbalanced Databases with...<\/h3>\n    <p>Eduardo Chielle (New York University Abu Dhabi), Michail Maniatakos (New York University Abu Dhabi)<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/recurrent-private-set-intersection-for-unbalanced-databases-with-cuckoo-hashing-and-leveled-fhe\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rediscovering-method-confusion-in-proposed-security-fixes-for-bluetooth\/\">Rediscovering Method Confusion in Proposed Security Fixes for...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Rediscovering Method Confusion in Proposed Security Fixes for...<\/h3>\n    <p>Maximilian von Tschirschnitz (Technical University of Munich), Ludwig Peuckert (Technical University of Munich), Moritz...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rediscovering-method-confusion-in-proposed-security-fixes-for-bluetooth\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/repurposing-neural-networks-for-efficient-cryptographic-computation\/\">Repurposing Neural Networks for Efficient Cryptographic Computation<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Repurposing Neural Networks for Efficient Cryptographic Computation<\/h3>\n    <p>Xin Jin (The Ohio State University), Shiqing Ma (University of Massachusetts Amherst), Zhiqiang Lin...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/repurposing-neural-networks-for-efficient-cryptographic-computation\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rethinking-trust-in-forge-based-git-security\/\">Rethinking Trust in Forge-Based Git Security<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Rethinking Trust in Forge-Based Git Security<\/h3>\n    <p>Aditya Sirish A Yelgundhalli (New York University), Patrick Zielinski (New York University), Reza Curtmola...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/rethinking-trust-in-forge-based-git-security\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/retrofitting-xom-for-stripped-binaries-without-embedded-data-relocation\/\">Retrofitting XoM for Stripped Binaries without Embedded Data...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Retrofitting XoM for Stripped Binaries without Embedded Data...<\/h3>\n    <p>Chenke Luo (Wuhan University), Jiang Ming (Tulane University), Mengfei Xie (Wuhan University), Guojun Peng...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/retrofitting-xom-for-stripped-binaries-without-embedded-data-relocation\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/revealing-the-black-box-of-device-search-engine-scanning-assets-strategies-and-ethical-consideration\/\">Revealing the Black Box of Device Search Engine:...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Revealing the Black Box of Device Search Engine:...<\/h3>\n    <p>Mengying Wu (Fudan University), Geng Hong (Fudan University), Jinsong Chen (Fudan University), Qi Liu...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/revealing-the-black-box-of-device-search-engine-scanning-assets-strategies-and-ethical-consideration\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-concept-drift-in-windows-malware-detection-adaptation-to-real-drifted-malware-with-minimal-samples\/\">Revisiting Concept Drift in Windows Malware Detection: Adaptation...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Revisiting Concept Drift in Windows Malware Detection: Adaptation...<\/h3>\n    <p>Adrian Shuai Li (Purdue University), Arun Iyengar (Intelligent Data Management and Analytics, LLC), Ashish...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/revisiting-concept-drift-in-windows-malware-detection-adaptation-to-real-drifted-malware-with-minimal-samples\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ring-of-gyges-accountable-anonymous-broadcast-via-secret-shared-shuffle\/\">Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Ring of Gyges: Accountable Anonymous Broadcast via Secret-Shared...<\/h3>\n    <p>Wentao Dong (City University of Hong Kong), Peipei Jiang (Wuhan University; City University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ring-of-gyges-accountable-anonymous-broadcast-via-secret-shared-shuffle\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/safesplit-a-novel-defense-against-client-side-backdoor-attacks-in-split-learning\/\">SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks...<\/h3>\n    <p>Phillip Rieger (Technical University of Darmstadt), Alessandro Pegoraro (Technical University of Darmstadt), Kavita Kumari...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/safesplit-a-novel-defense-against-client-side-backdoor-attacks-in-split-learning\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/safety-misalignment-against-large-language-models\/\">Safety Misalignment Against Large Language Models<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Safety Misalignment Against Large Language Models<\/h3>\n    <p>Yichen Gong (Tsinghua University), Delong Ran (Tsinghua University), Xinlei He (Hong Kong University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/safety-misalignment-against-large-language-models\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/scale-mia-a-scalable-model-inversion-attack-against-secure-federated-learning-via-latent-space-reconstruction\/\">Scale-MIA: A Scalable Model Inversion Attack against Secure...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Scale-MIA: A Scalable Model Inversion Attack against Secure...<\/h3>\n    <p>Shanghao Shi (Virginia Tech), Ning Wang (University of South Florida), Yang Xiao (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/scale-mia-a-scalable-model-inversion-attack-against-secure-federated-learning-via-latent-space-reconstruction\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/scammagnifier-piercing-the-veil-of-fraudulent-shopping-website-campaigns\/\">SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website...<\/h3>\n    <p>Marzieh Bitaab (Arizona State University), Alireza Karimi (Arizona State University), Zhuoer Lyu (Arizona State...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/scammagnifier-piercing-the-veil-of-fraudulent-shopping-website-campaigns\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/scopeverif-analyzing-the-security-of-androids-scoped-storage-via-differential-analysis\/\">ScopeVerif: Analyzing the Security of Android\u2019s Scoped Storage...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">ScopeVerif: Analyzing the Security of Android\u2019s Scoped Storage...<\/h3>\n    <p>Zeyu Lei (Purdue University), G\u00fcliz Seray Tuncay (Google), Beatrice Carissa Williem (Purdue University), Z....<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/scopeverif-analyzing-the-security-of-androids-scoped-storage-via-differential-analysis\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/secure-data-analytics-in-apache-spark-with-fine-grained-policy-enforcement-and-isolated-execution\/\">Secure Data Analytics in Apache Spark with Fine-grained...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Secure Data Analytics in Apache Spark with Fine-grained...<\/h3>\n    <p>Byeongwook Kim (Seoul National University), Jaewon Hur (Seoul National University), Adil Ahmad (Arizona State...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/secure-data-analytics-in-apache-spark-with-fine-grained-policy-enforcement-and-isolated-execution\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/securing-bgp-asap-aspa-and-other-post-rov-defenses\/\">Securing BGP ASAP: ASPA and other Post-ROV Defenses<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Securing BGP ASAP: ASPA and other Post-ROV Defenses<\/h3>\n    <p>Justin Furuness (University of Connecticut), Cameron Morris (University of Connecticut), Reynaldo Morillo (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/securing-bgp-asap-aspa-and-other-post-rov-defenses\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/shaft-secure-handy-accurate-and-fast-transformer-inference\/\">SHAFT: Secure, Handy, Accurate and Fast Transformer Inference<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">SHAFT: Secure, Handy, Accurate and Fast Transformer Inference<\/h3>\n    <p>Andes Y. L. Kei (Chinese University of Hong Kong), Sherman S. M. Chow (Chinese...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/shaft-secure-handy-accurate-and-fast-transformer-inference\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/sheeps-clothing-wolfs-data-detecting-server-induced-client-vulnerabilities-in-windows-remote-ipc\/\">Sheep's Clothing, Wolf's Data: Detecting Server-Induced Client Vulnerabilities...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Sheep's Clothing, Wolf's Data: Detecting Server-Induced Client Vulnerabilities...<\/h3>\n    <p>Fangming Gu (Institute of Information Engineering, Chinese Academy of Sciences), Qingli Guo (Institute of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/sheeps-clothing-wolfs-data-detecting-server-induced-client-vulnerabilities-in-windows-remote-ipc\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/siguard-guarding-secure-inference-with-post-data-privacy\/\">SIGuard: Guarding Secure Inference with Post Data Privacy<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">SIGuard: Guarding Secure Inference with Post Data Privacy<\/h3>\n    <p>Xinqian Wang (RMIT University), Xiaoning Liu (RMIT University), Shangqi Lai (CSIRO Data61), Xun Yi...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/siguard-guarding-secure-inference-with-post-data-privacy\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/siniel-distributed-privacy-preserving-zksnark\/\">Siniel: Distributed Privacy-Preserving zkSNARK<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Siniel: Distributed Privacy-Preserving zkSNARK<\/h3>\n    <p>Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Yuejia...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/siniel-distributed-privacy-preserving-zksnark\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/sketchfeature-high-quality-per-flow-feature-extractor-towards-security-aware-data-plane\/\">SketchFeature: High-Quality Per-Flow Feature Extractor Towards Security-Aware Data...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">SketchFeature: High-Quality Per-Flow Feature Extractor Towards Security-Aware Data...<\/h3>\n    <p>Sian Kim (Ewha Womans University), Seyed Mohammad Mehdi Mirnajafizadeh (Wayne State University), Bara Kim...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/sketchfeature-high-quality-per-flow-feature-extractor-towards-security-aware-data-plane\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/skillpov-towards-accessible-and-effective-privacy-notice-for-amazon-alexa-skills\/\">SKILLPoV: Towards Accessible and Effective Privacy Notice for...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">SKILLPoV: Towards Accessible and Effective Privacy Notice for...<\/h3>\n    <p>Jingwen Yan (Clemson University), Song Liao (Texas Tech University), Mohammed Aldeen (Clemson University), Luyi...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/skillpov-towards-accessible-and-effective-privacy-notice-for-amazon-alexa-skills\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/songbsab-a-dual-prevention-approach-against-singing-voice-conversion-based-illegal-song-covers\/\">SongBsAb: A Dual Prevention Approach against Singing Voice...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">SongBsAb: A Dual Prevention Approach against Singing Voice...<\/h3>\n    <p>Guangke Chen (Pengcheng Laboratory), Yedi Zhang (National University of Singapore), Fu Song (Key Laboratory...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/songbsab-a-dual-prevention-approach-against-singing-voice-conversion-based-illegal-song-covers\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/spatial-domain-wireless-jamming-with-reconfigurable-intelligent-surfaces\/\">Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Spatial-Domain Wireless Jamming with Reconfigurable Intelligent Surfaces<\/h3>\n    <p>Philipp Mackensen (Ruhr University Bochum), Paul Staat (Max Planck Institute for Security and Privacy),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/spatial-domain-wireless-jamming-with-reconfigurable-intelligent-surfaces\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/speak-up-im-listening-extracting-speech-from-zero-permission-vr-sensors\/\">Speak Up, I\u2019m Listening: Extracting Speech from Zero-Permission...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Speak Up, I\u2019m Listening: Extracting Speech from Zero-Permission...<\/h3>\n    <p>Derin Cayir (Florida International University), Reham Mohamed Aburas (American University of Sharjah), Riccardo Lazzeretti...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/speak-up-im-listening-extracting-speech-from-zero-permission-vr-sensors\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/starshields-for-ios-navigating-the-security-cosmos-in-satellite-communication\/\">Starshields for iOS: Navigating the Security Cosmos in...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Starshields for iOS: Navigating the Security Cosmos in...<\/h3>\n    <p>Jiska Classen (Hasso Plattner Institute, University of Potsdam), Alexander Heinrich (TU Darmstadt, Germany), Fabian...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/starshields-for-ios-navigating-the-security-cosmos-in-satellite-communication\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/statically-discover-cross-entry-use-after-free-vulnerabilities-in-the-linux-kernel\/\">Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Statically Discover Cross-Entry Use-After-Free Vulnerabilities in the Linux...<\/h3>\n    <p>Hang Zhang (Indiana University Bloomington), Jangha Kim (The Affiliated Institute of ETRI, ROK), Chuhong...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/statically-discover-cross-entry-use-after-free-vulnerabilities-in-the-linux-kernel\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-discriminative-power-of-cross-layer-rtts-in-fingerprinting-proxy-traffic\/\">The Discriminative Power of Cross-layer RTTs in Fingerprinting...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The Discriminative Power of Cross-layer RTTs in Fingerprinting...<\/h3>\n    <p>Diwen Xue (University of Michigan), Robert Stanley (University of Michigan), Piyush Kumar (University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-discriminative-power-of-cross-layer-rtts-in-fingerprinting-proxy-traffic\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-forking-way-when-tees-meet-consensus\/\">The Forking Way: When TEEs Meet Consensus<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The Forking Way: When TEEs Meet Consensus<\/h3>\n    <p>Annika Wilde (Ruhr University Bochum), Tim Niklas Gruel (Ruhr University Bochum), Claudio Soriente (NEC...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-forking-way-when-tees-meet-consensus\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-guardians-of-name-street-studying-the-defensive-registration-practices-of-the-fortune-500\/\">The Guardians of Name Street: Studying the Defensive...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The Guardians of Name Street: Studying the Defensive...<\/h3>\n    <p>Boladji Vinny Adjibi (Georgia Tech), Athanasios Avgetidis (Georgia Tech), Manos Antonakakis (Georgia Tech), Michael...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-guardians-of-name-street-studying-the-defensive-registration-practices-of-the-fortune-500\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-kids-are-all-right-investigating-the-susceptibility-of-teens-and-adults-to-youtube-giveaway-scams\/\">The Kids Are All Right: Investigating the Susceptibility...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The Kids Are All Right: Investigating the Susceptibility...<\/h3>\n    <p>Elijah Bouma-Sims (Carnegie Mellon University), Lily Klucinec (Carnegie Mellon University), Mandy Lanyon (Carnegie Mellon...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-kids-are-all-right-investigating-the-susceptibility-of-teens-and-adults-to-youtube-giveaway-scams\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-road-to-trust-building-enclaves-within-confidential-vms\/\">The Road to Trust: Building Enclaves within Confidential...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">The Road to Trust: Building Enclaves within Confidential...<\/h3>\n    <p>Wenhao Wang (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS), Linke...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/the-road-to-trust-building-enclaves-within-confidential-vms\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/tme-box-scalable-in-process-isolation-through-intel-tme-mk-memory-encryption\/\">TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory...<\/h3>\n    <p>Martin Unterguggenberger (Graz University of Technology), Lukas Lamster (Graz University of Technology), David Schrammel...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/tme-box-scalable-in-process-isolation-through-intel-tme-mk-memory-encryption\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/towards-understanding-unsafe-video-generation\/\">Towards Understanding Unsafe Video Generation<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Towards Understanding Unsafe Video Generation<\/h3>\n    <p>Yan Pang (University of Virginia), Aiping Xiong (Penn State University), Yang Zhang (CISPA Helmholtz...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/towards-understanding-unsafe-video-generation\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/translating-c-to-rust-lessons-from-a-user-study\/\">Translating C To Rust: Lessons from a User...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Translating C To Rust: Lessons from a User...<\/h3>\n    <p>Ruishi Li (National University of Singapore), Bo Wang (National University of Singapore), Tianyu Li...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/translating-c-to-rust-lessons-from-a-user-study\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/truman-constructing-device-behavior-models-from-os-drivers-to-fuzz-virtual-devices\/\">Truman: Constructing Device Behavior Models from OS Drivers...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Truman: Constructing Device Behavior Models from OS Drivers...<\/h3>\n    <p>Zheyu Ma (Institute for Network Sciences and Cyberspace (INSC), Tsinghua University; EPFL; JCSS, Tsinghua...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/truman-constructing-device-behavior-models-from-os-drivers-to-fuzz-virtual-devices\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/try-to-poison-my-deep-learning-data-nowhere-to-hide-your-trajectory-spectrum\/\">Try to Poison My Deep Learning Data? Nowhere...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Try to Poison My Deep Learning Data? Nowhere...<\/h3>\n    <p>Yansong Gao (The University of Western Australia), Huaibing Peng (Nanjing University of Science and...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/try-to-poison-my-deep-learning-data-nowhere-to-hide-your-trajectory-spectrum\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/twinfuzz-differential-testing-of-video-hardware-acceleration-stacks\/\">TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks<\/h3>\n    <p>Matteo Leonelli (CISPA Helmholtz Center for Information Security), Addison Crump (CISPA Helmholtz Center for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/twinfuzz-differential-testing-of-video-hardware-acceleration-stacks\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/tz-datashield-automated-data-protection-for-embedded-systems-via-data-flow-based-compartmentalization\/\">TZ-DATASHIELD: Automated Data Protection for Embedded Systems via...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">TZ-DATASHIELD: Automated Data Protection for Embedded Systems via...<\/h3>\n    <p>Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/tz-datashield-automated-data-protection-for-embedded-systems-via-data-flow-based-compartmentalization\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ui-ctx-understanding-ui-behaviors-with-code-contexts-for-mobile-applications\/\">UI-CTX: Understanding UI Behaviors with Code Contexts for...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">UI-CTX: Understanding UI Behaviors with Code Contexts for...<\/h3>\n    <p>Jiawei Li (Beihang University & National University of Singapore), Jiahao Liu (National University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/ui-ctx-understanding-ui-behaviors-with-code-contexts-for-mobile-applications\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/uncovering-the-iceberg-from-the-tip-generating-api-specifications-for-bug-detection-via-specification-propagation-analysis\/\">Uncovering the iceberg from the tip: Generating API...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Uncovering the iceberg from the tip: Generating API...<\/h3>\n    <p>Miaoqian Lin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/uncovering-the-iceberg-from-the-tip-generating-api-specifications-for-bug-detection-via-specification-propagation-analysis\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/unleashing-the-power-of-generative-model-in-recovering-variable-names-from-stripped-binary\/\">Unleashing the Power of Generative Model in Recovering...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Unleashing the Power of Generative Model in Recovering...<\/h3>\n    <p>Xiangzhe Xu (Purdue University), Zhuo Zhang (Purdue University), Zian Su (Purdue University), Ziyang Huang...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/unleashing-the-power-of-generative-model-in-recovering-variable-names-from-stripped-binary\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/urvfl-undetectable-data-reconstruction-attack-on-vertical-federated-learning\/\">URVFL: Undetectable Data Reconstruction Attack on Vertical Federated...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">URVFL: Undetectable Data Reconstruction Attack on Vertical Federated...<\/h3>\n    <p>Duanyi Yao (Hong Kong University of Science and Technology), Songze Li (Southeast University), Xueluan...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/urvfl-undetectable-data-reconstruction-attack-on-vertical-federated-learning\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/voiceradar-voice-deepfake-detection-using-micro-frequency-and-compositional-analysis\/\">VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional...<\/h3>\n    <p>Kavita Kumari (Technical University of Darmstadt), Maryam Abbasihafshejani (University of Texas at San Antonio),...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/voiceradar-voice-deepfake-detection-using-micro-frequency-and-compositional-analysis\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/vulnerability-where-art-thou-an-investigation-of-vulnerability-management-in-android-smartphone-chipsets\/\">Vulnerability, Where Art Thou? An Investigation of Vulnerability...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Vulnerability, Where Art Thou? An Investigation of Vulnerability...<\/h3>\n    <p>Daniel Klischies (Ruhr University Bochum), Philipp Mackensen (Ruhr University Bochum), Veelasha Moonsamy (Ruhr University...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/vulnerability-where-art-thou-an-investigation-of-vulnerability-management-in-android-smartphone-chipsets\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/vulshield-protecting-vulnerable-code-before-deploying-patches\/\">VulShield: Protecting Vulnerable Code Before Deploying Patches<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">VulShield: Protecting Vulnerable Code Before Deploying Patches<\/h3>\n    <p>Yuan Li (Zhongguancun Laboratory & Tsinghua University), Chao Zhang (Tsinghua University & JCSS &...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/vulshield-protecting-vulnerable-code-before-deploying-patches\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/was-this-you-investigating-the-design-considerations-for-suspicious-login-notifications\/\">Was This You? Investigating the Design Considerations for...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">Was This You? Investigating the Design Considerations for...<\/h3>\n    <p>Sena Sahin (Georgia Institute of Technology), Burak Sahin (Georgia Institute of Technology), Frank Li...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/was-this-you-investigating-the-design-considerations-for-suspicious-login-notifications\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/whats-done-is-not-whats-claimed-detecting-and-interpreting-inconsistencies-in-app-behaviors\/\">What\u2019s Done Is Not What\u2019s Claimed: Detecting and...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">What\u2019s Done Is Not What\u2019s Claimed: Detecting and...<\/h3>\n    <p>Chang Yue (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China), Kai Chen...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/whats-done-is-not-whats-claimed-detecting-and-interpreting-inconsistencies-in-app-behaviors\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/you-can-rand-but-you-cant-hide-a-holistic-security-analysis-of-google-fuchsias-and-gvisors-network-stack\/\">You Can Rand but You Can't Hide: A...<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">You Can Rand but You Can't Hide: A...<\/h3>\n    <p>Inon Kaplan (Independent researcher), Ron even (Independent researcher), Amit Klein (The Hebrew University of...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/you-can-rand-but-you-cant-hide-a-holistic-security-analysis-of-google-fuchsias-and-gvisors-network-stack\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  \n\n<div class=\"tag-box rel-paper\">\n\n    <div class=\"selected-post-text-area rel-paper-in\">\n<!--    <h3 class=\"blog-post-title\"><a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/yurascanner-leveraging-llms-for-task-driven-web-app-scanning\/\">YuraScanner: Leveraging LLMs for Task-driven Web App Scanning<\/a><\/h3> -->\n    <h3 class=\"blog-post-title\">YuraScanner: Leveraging LLMs for Task-driven Web App Scanning<\/h3>\n    <p>Aleksei Stafeev (CISPA Helmholtz Center for Information Security), Tim Recktenwald (CISPA Helmholtz Center for...<\/p>\n\n    <a class=\"paper-link-abs\" href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/yurascanner-leveraging-llms-for-task-driven-web-app-scanning\/\"><span>More Details<\/span><\/a>\n    <\/div>\n\n\n<\/div>\n\n  <\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>NDSS Symposium 2025 Accepted Papers View the detailed program page to learn when each paper will be presented during the upcoming event. Summer Cycle Fall Cycle<\/p>\n","protected":false},"author":237,"featured_media":0,"parent":17913,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"views\/template-full-width-gutenberg-heding.blade.php","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-18736","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NDSS Symposium 2025 Accepted Papers - NDSS Symposium<\/title>\n<meta name=\"description\" content=\"Stay up-to-date with the cutting-edge research presented at NDSS Symposium 2025 through our compilation of accepted papers on network security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NDSS Symposium 2025 Accepted Papers - NDSS Symposium\" \/>\n<meta property=\"og:description\" content=\"Stay up-to-date with the cutting-edge research presented at NDSS Symposium 2025 through our compilation of accepted papers on network security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/\" \/>\n<meta property=\"og:site_name\" content=\"NDSS Symposium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NDSSSymposium\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-27T13:04:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"815\" \/>\n\t<meta property=\"og:image:height\" content=\"345\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NDSSSymposium\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/\",\"name\":\"NDSS Symposium 2025 Accepted Papers - NDSS Symposium\",\"isPartOf\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\"},\"datePublished\":\"2024-10-02T11:48:40+00:00\",\"dateModified\":\"2025-03-27T13:04:03+00:00\",\"description\":\"Stay up-to-date with the cutting-edge research presented at NDSS Symposium 2025 through our compilation of accepted papers on network security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ndss-symposium.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network and Distributed System Security (NDSS) Symposium 2025\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NDSS Symposium 2025 Accepted Papers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"name\":\"NDSS Symposium\",\"description\":\"The Network and Distributed System Security (NDSS) Symposium\",\"publisher\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ndss-symposium.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\",\"name\":\"NDSS Symposium\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"contentUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"width\":815,\"height\":345,\"caption\":\"NDSS Symposium\"},\"image\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NDSSSymposium\/\",\"https:\/\/x.com\/NDSSSymposium\",\"https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/\",\"https:\/\/www.youtube.com\/ndsssymposium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NDSS Symposium 2025 Accepted Papers - NDSS Symposium","description":"Stay up-to-date with the cutting-edge research presented at NDSS Symposium 2025 through our compilation of accepted papers on network security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/","og_locale":"en_US","og_type":"article","og_title":"NDSS Symposium 2025 Accepted Papers - NDSS Symposium","og_description":"Stay up-to-date with the cutting-edge research presented at NDSS Symposium 2025 through our compilation of accepted papers on network security.","og_url":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/","og_site_name":"NDSS Symposium","article_publisher":"https:\/\/www.facebook.com\/NDSSSymposium\/","article_modified_time":"2025-03-27T13:04:03+00:00","og_image":[{"width":815,"height":345,"url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@NDSSSymposium","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/","url":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/","name":"NDSS Symposium 2025 Accepted Papers - NDSS Symposium","isPartOf":{"@id":"https:\/\/www.ndss-symposium.org\/#website"},"datePublished":"2024-10-02T11:48:40+00:00","dateModified":"2025-03-27T13:04:03+00:00","description":"Stay up-to-date with the cutting-edge research presented at NDSS Symposium 2025 through our compilation of accepted papers on network security.","breadcrumb":{"@id":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-papers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ndss-symposium.org\/"},{"@type":"ListItem","position":2,"name":"Network and Distributed System Security (NDSS) Symposium 2025","item":"https:\/\/www.ndss-symposium.org\/ndss2025\/"},{"@type":"ListItem","position":3,"name":"NDSS Symposium 2025 Accepted Papers"}]},{"@type":"WebSite","@id":"https:\/\/www.ndss-symposium.org\/#website","url":"https:\/\/www.ndss-symposium.org\/","name":"NDSS Symposium","description":"The Network and Distributed System Security (NDSS) Symposium","publisher":{"@id":"https:\/\/www.ndss-symposium.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ndss-symposium.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ndss-symposium.org\/#organization","name":"NDSS Symposium","url":"https:\/\/www.ndss-symposium.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","contentUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","width":815,"height":345,"caption":"NDSS Symposium"},"image":{"@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NDSSSymposium\/","https:\/\/x.com\/NDSSSymposium","https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/","https:\/\/www.youtube.com\/ndsssymposium"]}]}},"coauthors":[],"author_meta":{"author_link":"https:\/\/www.ndss-symposium.org\/author\/strinekatrbovic\/","display_name":"Ivana Trbovic"},"relative_dates":{"created":"Posted 1 year ago","modified":"Updated 9 months ago"},"absolute_dates":{"created":"Posted on 2 October 2024","modified":"Updated on 27 March 2025"},"absolute_dates_time":{"created":"Posted on 2 October 2024 11:48 am","modified":"Updated on 27 March 2025 1:04 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/18736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/users\/237"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/comments?post=18736"}],"version-history":[{"count":0,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/18736\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/17913"}],"wp:attachment":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/media?parent=18736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/categories?post=18736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/tags?post=18736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}