NDSS 2018 Inside Job: Applying Traffic Analysis to Measure Tor from Within
NDSS 2018 - LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE
NDSS 2018 - GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temp Identifier
NDSS 2018 - Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
NDSS 2018 - VulDeePecker: A Deep Learning-Based System for Vulnerability Detection
NDSS 2018 JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks
NDSS 2018 SYNODE: Understanding and Automatically Preventing Injection Attacks on NODE.JS
NDSS 2018 Things You May Not Know About Android (Un)Packers: A Systematic Study
NDSS 2018 Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics
NDSS 2018 - Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control.
NDSS 2018 - Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach
NDSS 2018 OBLIVIATE: A Data Oblivious Filesystem for Intel SGX
NDSS 2018 Closing Keynote - Parisa Tabriz
NDSS 2018 - Tipped Off by Your Memory Allocator: Activity Sequencing from Android Memory Images
NDSS 2018 Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing
NDSS 2018 - Fear and Logging in the Internet of Things
NDSS 2018 K-Miner: Uncovering Memory Corruption in Linux
NDSS 2018 - ZeroTrace : Oblivious Memory Primitives from Intel SGX
NDSS 2018 InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android
NDSS 2018 - Device Pairing at the Touch of an Electrode.