{"id":21156,"date":"2025-02-24T09:20:00","date_gmt":"2025-02-24T09:20:00","guid":{"rendered":"https:\/\/www.ndss-symposium.org\/?page_id=21156"},"modified":"2025-02-24T16:25:06","modified_gmt":"2025-02-24T16:25:06","slug":"accepted-posters","status":"publish","type":"page","link":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/","title":{"rendered":"NDSS Symposium 2025 Accepted Posters"},"content":{"rendered":"\n<div class=\"wp-block-group page-heading green-heading is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h1 class=\"wp-block-heading\">NDSS Symposium 2025 Accepted Posters<\/h1>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group fixed-width fixed-1110 section-padding section-title-h accepted-papers-section is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">50 Shades of Deceptive Patterns: A Unified Taxonomy, Multimodal Detection, and Security Implications<\/h3>\n\n\n\n<p>Zewei Shi, Ruoxi Sun, Jieshan Chen, Jiamou Sun, Jason Xue, Yansong Gao, Feng Liu, Xingliang Yuan<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-45.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">AGORA: Trust Less and Open More in Verification for Confidential Computing<\/h3>\n\n\n\n<p>Hongbo Chen, Quan Zhou, Sen Yang, Sixuan Dang, Xing Han, Danfeng Zhang, Fan Zhang, XiaoFeng Wang<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-44.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">An Analysis of IoT Device Manufacturer&#8217;s Security Advice to Users Through Companion Apps<\/h3>\n\n\n\n<p>Ryota Honda, Junnosuke Kushibiki, Takayuki Sasaki, Simon Parkin, Carlos H. Gan \u0303a \u0301n, Michel van Eeten, Katsunari Yoshioka<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-36.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">An Empirical Study of Backdoor Attacks on Ethereum Smart Contracts<\/h3>\n\n\n\n<p>Naoto Yanai, Naohisa Nishida, Yuji Unagami<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-69.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Automatizing Cybersecurity via LLMs<\/h3>\n\n\n\n<p>Burak Has\u0131rc\u0131og \u0306lu, Vasilios Mavroudis, Chris Hicks<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-77.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Can We Trust PUF Manufacturers? Robust PUF-Based Authentication via Combiners<\/h3>\n\n\n\n<p>Edoardo Liberati, Pierpaolo Della Monica, Riccardo Lazzeretti, Ivan Visconti<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-78.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">DarkWrt: Towards Building a Dataset of Potentially Unwanted Functions in IoT Devices<\/h3>\n\n\n\n<p>Daichi Uezono, Junnosuke Kushibiki, Takayuki Sasaki, Satoshi Hara, Yury Zhauniarovich, Carlos H. Gan \u0303a \u0301n, Michel van Eeten, Katsunari Yoshioka<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-35.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Decoupling the Device and Identity in Cellular Networks with vSIM<\/h3>\n\n\n\n<p>Shirin Ebadi, Zach Moolman, Eric Keller, Tamara Lehman<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-58.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Discovering Sensor-Fusion-Vulnerabilities in autonomous driving systems against LiDAR attacks<\/h3>\n\n\n\n<p>Ryo Yoshida, Takumi Sato, Yuki Hayakawa, Ryo Suzuki, Kazuma Ikeda, Ozora Sako, Rokuto Nagata, Kentaro Yoshioka<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-47.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Do You Sell This? Utilizing Product Searches to Find SEO-driven Fake Shopping Sites<\/h3>\n\n\n\n<p>Mizuho Hasegawa, Akihide Saino, Akira Fujita, Kazuki Takada, Rui Tanabe, Carlos H. Gan \u0303a \u0301n, Michel Van Eeten, Katsunari Yoshioka<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-42.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Enabling Reproducibility through the SPHERE Research Infrastructure<\/h3>\n\n\n\n<p>Jelena Mirkovic, Brian Kocoloski, David Balenson<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-31.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Enhanced Device Identification in Cellular IoT Using IPFIX Records<\/h3>\n\n\n\n<p>Ryuta Ohishi, Norihiro Okui, Masataka Nakahara, Masakatsu Nishigaki, Tetsushi Ohki<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-49.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Enhancing LLM4Decompile with Obfuscated Source Code for Optimized Assembly<\/h3>\n\n\n\n<p>Ryota Saito, Takuya Kataiwa, Tetsushi Ohki<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-51.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Evaluation of Radio Jamming Countermeasures in IoT Thread Networks<\/h3>\n\n\n\n<p>Poonam Yadav, Anthony Moulds, Peter Gillingham<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-21.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Exploring the Impact of Dark Patterns in VR: A Comparison with the Real World<\/h3>\n\n\n\n<p>Toi Kojima, Ayane Sano, Yukiko Sawaya, Takamasa Isohara, Masakatsu Nishigaki, Tetsushi Ohki<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-50.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Fingerprinting IoT Devices Using Latent Physical Side-Channels<\/h3>\n\n\n\n<p>Justin Feng, Tianyi Zhao, Shamik Sarkar, Dominic Konrad, Timothy Jacques, Danijela Cabric, Nader Sehatbakhsh<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-56.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Flexible Remote Attestation System for Trusted Execution Environment using Delegating Verification<\/h3>\n\n\n\n<p>Takashi Yagawa, Tadanori Teruya, Kuniyasu Suzaki, Hirotake Abe<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-82.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">FuzzLGen: Logical Seed Generation for Smart Contract Fuzzing via LLM-based Agents and Program Analysis<\/h3>\n\n\n\n<p>Songyan Ji, Mingyue Xu, Jin Wu, Jian Dong<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-23.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">GSIT: A Geometric Space-based Information Tree for Hierarchical Certificate Management in Vehicular Networks<\/h3>\n\n\n\n<p>Jheng-Jia Huang, Wei-Hsueh Wang, Guan-Yu Chen, Nai-Wei Lo<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-3.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Harmful Terms and Where to Find Them: Measuring and Modeling Unfavorable Financial Terms and Conditions in Shopping Websites at Scale<\/h3>\n\n\n\n<p>Elisa Tsai, Neal Mangaokar, Boyuan Zheng, Haizhong Zheng, Atul Prakash<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-65.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">HoneyOrg: Towards Attracting Targeted ICS Attacks with Standalone Honeypots<\/h3>\n\n\n\n<p>Matthew Rodda , Vasilios Mavroudis , Chris Hicks<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-10.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication<\/h3>\n\n\n\n<p>Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-64.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models<\/h3>\n\n\n\n<p>Delong Ran, Jinyuan Liu, Yichen Gong, Jingyi Zheng, Xinlei He, Tianshuo Cong, Anyu Wang<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-19.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Leveraging In-Sensor Computing to Preserve Privacy in Remote Health Monitoring<\/h3>\n\n\n\n<p>Mashrafi Kajol, Nishanth Chennagouni, Andrew Lu, Wei Lu, Dean Sullivan, Qiaoyan Yu<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-11.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Leveraging Isolation and Adaptive Resource Management for Secure Virtualized ORAN<\/h3>\n\n\n\n<p>Lam D. Nguyen, Wei Shao, Hajime Suzuki, Shiping Chen, Wei Ni<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-1.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">LLM-Driven Automated Exploit Assessment for Penetration Testing<\/h3>\n\n\n\n<p>Xiangmin Shen, Wenyuan Cheng, Yan Chen, Zhenyuan LI, Wencheng Zhao, Dawei Sun<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-71.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Long PHP webshell files detection based on sliding window attention<\/h3>\n\n\n\n<p>Zhiqiang Wang, Haoyu Wang, Lu Hao<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-46.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">MAZU: Zero Trust Architecture for Service Mesh Control Planes<\/h3>\n\n\n\n<p>Aashutosh Poudel, Pankaj Niroula, Collin MacDonald, Lily Gloudemans, Stephen Herwig<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-54.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">NETDPSYN: Synthesizing Network Traces under Differential Privacy<\/h3>\n\n\n\n<p>Danyu Sun, Joann Chen, Chen GONG, Tianhao Wang, Zhou Li<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-27.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Post-Deployment Privacy Enhancement for Smart Contracts<\/h3>\n\n\n\n<p>Tongqi Wang, Jin Wu, Jian Dong<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-75.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel<\/h3>\n\n\n\n<p>Recovering Fingerprints from In-Display Fingerprint Sensors via Electromagnetic Side Channel<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-12.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Rethink: A Personalized Regret Analyzer for Social Media Posts<\/h3>\n\n\n\n<p>William Namgyal, Tianshi Li<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-16.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Rhythm Tap: Inclusive Personal Authentication Method Based on Rhythmic Variation<\/h3>\n\n\n\n<p>Yuri Takase, Yuto Toshikawa, Kazuki Nomoto, Ryo Iijima, Masataka Kakinouchi, Tatsuya Mori<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-7.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Towards a Lightweight Key-Enforced Race Detector for Commodity Kernels<\/h3>\n\n\n\n<p>Rahul Priolkar, Chuqi Zhang, Adil Ahmad, Rahul Priolkar<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-73.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Towards SBOM-based Access Control for Transparent and Explicit Program Execution<\/h3>\n\n\n\n<p>Yuta Shimamoto, Hiroyuki Uekawa, Mitsuaki Akiyama, Toshihiro Yamauchi<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-76.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Usability, Acceptability, and Efficacy of SBOM Visualization and AI Assistant<\/h3>\n\n\n\n<p>Xinyao Ma, Ankith Veldandi, Zitao Zhang, Peter Caven, Ambarish Gurjar, Jean Camp<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-4.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group single-paper is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group inner-wrap is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-group__inner-container\">\n<h3 class=\"wp-block-heading\">Utilizing Large Language Models to Create Context-Aware Spear-Phishing Attacks Using Social Media Data<\/h3>\n\n\n\n<p>Elham Pourabbas Vafa, Sayak Saha Roy, Shirin Nilizadeh<\/p>\n<\/div><\/div>\n\n\n\n<p class=\"paper-link-abs\"><a href=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2025-poster-68.pdf\"><strong>Read More<\/strong><\/a><\/p>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NDSS Symposium 2025 Accepted Posters 50 Shades of Deceptive Patterns: A Unified Taxonomy, Multimodal Detection, and Security Implications Zewei Shi, Ruoxi Sun, Jieshan Chen, Jiamou Sun, Jason Xue, Yansong Gao, Feng Liu, Xingliang Yuan Read More AGORA: Trust Less and Open More in Verification for Confidential Computing Hongbo Chen, Quan Zhou, Sen Yang, Sixuan Dang, &hellip; <a href=\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/\">Continued<\/a><\/p>\n","protected":false},"author":237,"featured_media":0,"parent":17913,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"views\/template-full-width-gutenberg-heding.blade.php","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-21156","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NDSS Symposium 2025 Accepted Posters - NDSS Symposium<\/title>\n<meta name=\"description\" content=\"Browse the accepted posters for NDSS Symposium 2025 that will be running for Best Technical Poster and Best Poster Presentation prizes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NDSS Symposium 2025 Accepted Posters - NDSS Symposium\" \/>\n<meta property=\"og:description\" content=\"Browse the accepted posters for NDSS Symposium 2025 that will be running for Best Technical Poster and Best Poster Presentation prizes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/\" \/>\n<meta property=\"og:site_name\" content=\"NDSS Symposium\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NDSSSymposium\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-24T16:25:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"815\" \/>\n\t<meta property=\"og:image:height\" content=\"345\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NDSSSymposium\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/\",\"name\":\"NDSS Symposium 2025 Accepted Posters - NDSS Symposium\",\"isPartOf\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\"},\"datePublished\":\"2025-02-24T09:20:00+00:00\",\"dateModified\":\"2025-02-24T16:25:06+00:00\",\"description\":\"Browse the accepted posters for NDSS Symposium 2025 that will be running for Best Technical Poster and Best Poster Presentation prizes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ndss-symposium.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network and Distributed System Security (NDSS) Symposium 2025\",\"item\":\"https:\/\/www.ndss-symposium.org\/ndss2025\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NDSS Symposium 2025 Accepted Posters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#website\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"name\":\"NDSS Symposium\",\"description\":\"The Network and Distributed System Security (NDSS) Symposium\",\"publisher\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ndss-symposium.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#organization\",\"name\":\"NDSS Symposium\",\"url\":\"https:\/\/www.ndss-symposium.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"contentUrl\":\"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg\",\"width\":815,\"height\":345,\"caption\":\"NDSS Symposium\"},\"image\":{\"@id\":\"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NDSSSymposium\/\",\"https:\/\/x.com\/NDSSSymposium\",\"https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/\",\"https:\/\/www.youtube.com\/ndsssymposium\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NDSS Symposium 2025 Accepted Posters - NDSS Symposium","description":"Browse the accepted posters for NDSS Symposium 2025 that will be running for Best Technical Poster and Best Poster Presentation prizes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/","og_locale":"en_US","og_type":"article","og_title":"NDSS Symposium 2025 Accepted Posters - NDSS Symposium","og_description":"Browse the accepted posters for NDSS Symposium 2025 that will be running for Best Technical Poster and Best Poster Presentation prizes.","og_url":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/","og_site_name":"NDSS Symposium","article_publisher":"https:\/\/www.facebook.com\/NDSSSymposium\/","article_modified_time":"2025-02-24T16:25:06+00:00","og_image":[{"width":815,"height":345,"url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@NDSSSymposium","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/","url":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/","name":"NDSS Symposium 2025 Accepted Posters - NDSS Symposium","isPartOf":{"@id":"https:\/\/www.ndss-symposium.org\/#website"},"datePublished":"2025-02-24T09:20:00+00:00","dateModified":"2025-02-24T16:25:06+00:00","description":"Browse the accepted posters for NDSS Symposium 2025 that will be running for Best Technical Poster and Best Poster Presentation prizes.","breadcrumb":{"@id":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ndss-symposium.org\/ndss2025\/accepted-posters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ndss-symposium.org\/"},{"@type":"ListItem","position":2,"name":"Network and Distributed System Security (NDSS) Symposium 2025","item":"https:\/\/www.ndss-symposium.org\/ndss2025\/"},{"@type":"ListItem","position":3,"name":"NDSS Symposium 2025 Accepted Posters"}]},{"@type":"WebSite","@id":"https:\/\/www.ndss-symposium.org\/#website","url":"https:\/\/www.ndss-symposium.org\/","name":"NDSS Symposium","description":"The Network and Distributed System Security (NDSS) Symposium","publisher":{"@id":"https:\/\/www.ndss-symposium.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ndss-symposium.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ndss-symposium.org\/#organization","name":"NDSS Symposium","url":"https:\/\/www.ndss-symposium.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/","url":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","contentUrl":"https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/NDSS_Logo_RGB.jpg","width":815,"height":345,"caption":"NDSS Symposium"},"image":{"@id":"https:\/\/www.ndss-symposium.org\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NDSSSymposium\/","https:\/\/x.com\/NDSSSymposium","https:\/\/www.linkedin.com\/company\/network-and-distributed-system-symposium-ndss-\/","https:\/\/www.youtube.com\/ndsssymposium"]}]}},"coauthors":[],"author_meta":{"author_link":"https:\/\/www.ndss-symposium.org\/author\/strinekatrbovic\/","display_name":"Ivana Trbovic"},"relative_dates":{"created":"Posted 10 months ago","modified":"Updated 10 months ago"},"absolute_dates":{"created":"Posted on 24 February 2025","modified":"Updated on 24 February 2025"},"absolute_dates_time":{"created":"Posted on 24 February 2025 9:20 am","modified":"Updated on 24 February 2025 4:25 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/21156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/users\/237"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/comments?post=21156"}],"version-history":[{"count":0,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/21156\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/pages\/17913"}],"wp:attachment":[{"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/media?parent=21156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/categories?post=21156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ndss-symposium.org\/wp-json\/wp\/v2\/tags?post=21156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}