Tag: conference
-
NDSS 2025 Mens Sana In Corpore Sano: Sound Firmware Corpora For Vulnerability Research
Session 8C: Hard & Firmware Security Authors, Creators & Presenters: René Helmke (Fraunhofer FKIE), Elmar Padilla (Fraunhofer FKIE, Germany), Nils Aschenbruck (University of Osnabrück) PAPER Mens Sana In Corpore Sano: Sound Firmware Corpora for Vulnerability Research Firmware corpora for vulnerability research should be scientifically sound. Yet, several practical challenges complicate the creation of sound corpora:…
-
NDSS 2025 A Multifaceted Study On The Use of TLS And Auto-detect In Email Ecosystems
Session 8A: Email Security Authors, Creators & Presenters: Ka Fun Tang (The Chinese University of Hong Kong), Che Wei Tu (The Chinese University of Hong Kong), Sui Ling Angela Mak (The Chinese University of Hong Kong), Sze Yiu Chau (The Chinese University of Hong Kong) PAPER A Multifaceted Study on the Use of TLS and…
-
NDSS 2025 Automatic Insecurity: Exploring Email Auto-configuration In The Wild
Tags: attack, conference, credentials, cyber, email, Internet, network, technology, threat, vulnerabilitySession 8A: Email Security Authors, Creators & Presenters: Shushang Wen (School of Cyber Science and Technology, University of Science and Technology of China), Yiming Zhang (Tsinghua University), Yuxiang Shen (School of Cyber Science and Technology, University of Science and Technology of China), Bingyu Li (School of Cyber Science and Technology, Beihang University), Haixin Duan (Tsinghua…
-
NDSS 2025 HADES Attack: Understanding And Evaluating Manipulation Risks Of Email Blocklists
Tags: attack, conference, dns, email, exploit, infrastructure, Internet, malicious, mitigation, network, risk, service, spam, technologySession 8A: Email Security Authors, Creators & Presenters: Ruixuan Li (Tsinghua University), Chaoyi Lu (Tsinghua University), Baojun Liu (Tsinghua University;Zhongguancun Laboratory), Yunyi Zhang (Tsinghua University), Geng Hong (Fudan University), Haixin Duan (Tsinghua University;Zhongguancun Laboratory), Yanzhong Lin (Coremail Technology Co. Ltd), Qingfeng Pan (Coremail Technology Co. Ltd), Min Yang (Fudan University), Jun Shao (Zhejiang Gongshang University)…
-
NDSS 2025 Exploiting the Complexity Of Modern CSS For Email And Browser Fingerprinting
Session 8A: Email Security Authors, Creators & Presenters: Leon Trampert (CISPA Helmholtz Center for Information Security), Daniel Weber (CISPA Helmholtz Center for Information Security), Lukas Gerlach (CISPA Helmholtz Center for Information Security), Christian Rossow (CISPA Helmholtz Center for Information Security), Michael Schwarz (CISPA Helmholtz Center for Information Security) PAPER Cascading Spy Sheets: Exploiting the Complexity…
-
Hacktivist deletes white supremacist websites live onstage during hacker conference
A hacker known as Martha Root broke in and deleted three white supremacist websites at the end of a talk during the annual hacker conference Chaos Communication Congress in Germany. First seen on techcrunch.com Jump to article: techcrunch.com/2026/01/05/hacktivist-deletes-white-supremacist-websites-live-on-stage-during-hacker-conference/
-
NDSS 2025 ProbeNot: Protecting Pre-trained Encoders From Malicious Probing
Session 7D: ML Security Authors, Creators & Presenters: Ruyi Ding (Northeastern University), Tong Zhou (Northeastern University), Lili Su (Northeastern University), Aidong Adam Ding (Northeastern University), Xiaolin Xu (Northeastern University), Yunsi Fei (Northeastern University) PAPER Probe-Me-Not: Protecting Pre-Trained Encoders From Malicious Probing Adapting pre-trained deep learning models to customized tasks has become a popular choice for…
-
NDSS 2025 A New PPML Paradigm For Quantized Models
Session 7D: ML Security Authors, Creators & Presenters: Tianpei Lu (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Bingsheng Zhang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Xiaoyuan Zhang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Kui Ren (The State Key Laboratory of Blockchain…
-
NDSS 2025 DLBox: New Model Training Framework For Protecting Training Data
Session 7D: ML Security Authors, Creators & Presenters: Jaewon Hur (Seoul National University), Juheon Yi (Nokia Bell Labs, Cambridge, UK), Cheolwoo Myung (Seoul National University), Sangyun Kim (Seoul National University), Youngki Lee (Seoul National University), Byoungyoung Lee (Seoul National University) PAPER DLBox: New Model Training Framework For Protecting Training Data Sharing training data for deep…
-
NDSS 2025 Understanding Data Importance In Machine Learning Attacks
Session 7D: ML Security Authors, Creators & Presenters: Rui Wen (CISPA Helmholtz Center for Information Security), Michael Backes (CISPA Helmholtz Center for Information Security), Yang Zhang (CISPA Helmholtz Center for Information Security) PAPER Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm? Machine learning has revolutionized numerous domains, playing a crucial…
-
NDSS 2025 AlphaDog: No-Box Camouflage Attacks Via Alpha Channel Oversight
Session 7D: ML Security Authors, Creators & Presenters: Qi Xia (University of Texas at San Antonio), Qian Chen (University of Texas at San Antonio) PAPER AlphaDog: No-Box Camouflage Attacks via Alpha Channel Oversight Traditional black-box adversarial attacks on computer vision models face significant limitations, including intensive querying requirements, time-consuming iterative processes, a lack of universality,…
-
Cybersecurity Snapshot: Predictions for 2026: AI Attack Acceleration, Automated Remediation, Custom-Made AI Security Tools, Machine Identity Threats, and More
Tags: access, ai, attack, automation, breach, ciso, cloud, computer, conference, control, cyber, cybersecurity, data, data-breach, defense, detection, exploit, governance, group, identity, intelligence, mitigation, risk, service, threat, tool, zero-dayIn this special edition, Tenable leaders forecast key 2026 trends, including: AI will make attacks more plentiful and less costly; machine identities will become the top cloud risk; preemptive cloud and exposure management will dethrone runtime detection; and automated remediation gets the go-ahead. Key takeaways AI will supercharge the speed and volume of traditional cyber…
-
Careto Hacker Group Resurfaces After a Decade, Unleashing New Attack Techniques
The legendary Careto threat actor, also known as >>The Mask,
-
NDSS 2025 “¢ Decentralized Infrastructure For Sharing Trusted Encrypted Facts And Nothing More
Session 7C: Secure Protocols Authors, Creators & Presenters: Sofia Celi (Brave Software), Alex Davidson (NOVA LINCS & Universidade NOVA de Lisboa), Hamed Haddadi (Imperial College London & Brave Software), Gonçalo Pestana (Hashmatter), Joe Rowell (Information Security Group, Royal Holloway, University of London) PAPER DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More We…
-
NDSS 2025 Impact Tracing: Identifying The Culprit Of Misinformation In Encrypted Messaging Systems
Session 7C: Secure Protocols Authors, Creators & Presenters: Zhongming Wang (Chongqing University), Tao Xiang (Chongqing University), Xiaoguo Li (Chongqing University), Biwen Chen (Chongqing University), Guomin Yang (Singapore Management University), Chuan Ma (Chongqing University), Robert H. Deng (Singapore Management University) PAPER Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems Encrypted messaging systems obstruct…
-
NDSS 2025 PQConnect: Automated Post-Quantum End-To-End Tunnels
Session 7C: Secure Protocols Authors, Creators & Presenters: Daniel J. Bernstein (University of Illinois at Chicago and Academia Sinica), Tanja Lange (Eindhoven University of Technology amd Academia Sinica), Jonathan Levin (Academia Sinica and Eindhoven University of Technology), Bo-Yin Yang (Academia Sinica) PAPER PQConnect: Automated Post-Quantum End-to-End Tunnels This paper introduces PQConnect, a post-quantum end-to-end tunneling…
-
NDSS 2025 Distributed Function Secret Sharing And Applications
Session 7C: Secure Protocols Authors, Creators & Presenters: Pengzhi Xing (University of Electronic Science and Technology of China), Hongwei Li (University of Electronic Science and Technology of China), Meng Hao (Singapore Management University), Hanxiao Chen (University of Electronic Science and Technology of China), Jia Hu (University of Electronic Science and Technology of China), Dongxiao Liu…
-
NDSS 2025 Automated Data Protection For Embedded Systems Via Data Flow Based Compartmentalization
Tags: access, automation, breach, conference, data, exploit, firmware, Hardware, healthcare, Internet, network, tool, vulnerabilityNDSS 2025 – Automated Data Protection For Embedded Systems Via Data Flow Based Compartmentalization Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas), Le Guan (University of Georgia), Ning Zhang (Washington University in St. Louis), Chung Hwan Kim (University of…
-
NDSS 2025 CounterSEVeillance: Performance-Counter Attacks On AMD SEV-SNP
Tags: attack, conference, control, data-breach, exploit, germany, Hardware, Internet, leak, malicious, network, oracle, side-channelSession 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Stefan Gast (Graz University of Technology), Hannes Weissteiner (Graz University of Technology), Robin Leander Schröder (Fraunhofer SIT, Darmstadt, Germany and Fraunhofer Austria, Vienna, Austria), Daniel Gruss (Graz University of Technology) – PAPER CounterSEVeillance: Performance-Counter Attacks On AMD SEV-SNP Confidential virtual machines (VMs) promise higher security…
-
it-sa 2025 Zwischen KI-Disruption und dem Gebot der Cyberresilienz
Die it-sa 2025 in Nürnberg stand im Zeichen einer tiefgreifenden Zerrissenheit: Selten lagen Hype und Handlungsdruck, Chance und Zwang so nah beieinander. Auf der einen Seite entfesselt künstliche Intelligenz eine beispiellose Innovationsdynamik, auf der anderen Seite zwingt ein Tsunami an Regularien wie NIS2 die Unternehmen zu einem strategischen Umdenken. First seen on ap-verlag.de Jump to…
-
NDSS 2025 Mysticeti: Reaching The Latency Limits With Uncertified DAGs
Session 7A: Network Security 2 Authors, Creators & Presenters: Kushal Babel (Cornell Tech & IC3), Andrey Chursin (Mysten Labs), George Danezis (Mysten Labs & University College London (UCL)), Anastasios Kichidis (Mysten Labs), Lefteris Kokoris-Kogias (Mysten Labs & IST Austria), Arun Koshy (Mysten Labs), Alberto Sonnino (Mysten Labs & University College London (UCL)), Mingwei Tian (Mysten…
-
NDSS 2025 LAMP: Lightweight Approaches For Latency Minimization In Mixnets With Practical Deployment Considerations
Session 7A: Network Security 2 Authors, Creators & Presenters: Mahdi Rahimi (KU Leuven), Piyush Kumar Sharma (University of Michigan), Claudia Diaz (KU Leuven) PAPER LAMP: Lightweight Approaches For Latency Minimization In Mixnets With Practical Deployment Considerations Mixnets are a type of anonymous communication system designed to provide network privacy to users. They route client messages…
-
Microsoft Enhances BitLocker with Hardware Acceleration Support
Microsoft has officially announced a major upgrade to its encryption technology with the introduction of hardware-accelerated BitLocker. Revealed by Microsoft’s Rafal Sosnowski following the Ignite conference, this new feature is designed to solve performance bottlenecks that have plagued high-speed storage drives, ensuring that users no longer have to choose between robust security and system speed.…
-
NDSS 2025 Detecting SDN Control Policy Manipulation Via Contextual Semantics Of Provenance Graphs
Tags: attack, conference, control, data, detection, framework, guide, Internet, monitoring, network, software, vulnerabilitySession 7A: Network Security 2 Authors, Creators & Presenters: Ziwen Liu (Beihang University), Jian Mao (Beihang University; Tianmushan Laboratory; Hangzhou Innovation Institute, Beihang University), Jun Zeng (National University of Singapore), Jiawei Li (Beihang University; National University of Singapore), Qixiao Lin (Beihang University), Jiahao Liu (National University of Singapore), Jianwei Zhuge (Tsinghua University; Zhongguancun Laboratory), Zhenkai…
-
NDSS 2025 Detecting SDN Control Policy Manipulation Via Contextual Semantics Of Provenance Graphs
Tags: attack, conference, control, data, detection, framework, guide, Internet, monitoring, network, software, vulnerabilitySession 7A: Network Security 2 Authors, Creators & Presenters: Ziwen Liu (Beihang University), Jian Mao (Beihang University; Tianmushan Laboratory; Hangzhou Innovation Institute, Beihang University), Jun Zeng (National University of Singapore), Jiawei Li (Beihang University; National University of Singapore), Qixiao Lin (Beihang University), Jiahao Liu (National University of Singapore), Jianwei Zhuge (Tsinghua University; Zhongguancun Laboratory), Zhenkai…
-
NDSS 2025 A Large-Scale Measurement Study Of The PROXY Protocol And Its Security Implications
Tags: access, automation, cctv, conference, control, data, email, Internet, iot, leak, monitoring, network, service, vulnerabilitySession 7A: Network Security 2 Authors, Creators & Presenters: Stijn Pletinckx (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara) PAPER A Large-Scale Measurement Study Of The PROXY Protocol And Its Security Implications Reverse proxy servers play a critical role in optimizing Internet services, offering…
-
NDSS 2025 ReDAN: An Empirical Study On Remote DoS Attacks Against NAT Networks
Tags: access, attack, cloud, conference, dos, exploit, firmware, Internet, malicious, network, router, side-channel, software, vulnerability, wifiSession 7A: Network Security 2 Authors, Creators & Presenters: Xuewei Feng (Tsinghua University), Yuxiang Yang (Tsinghua University), Qi Li (Tsinghua University), Xingxiang Zhan (Zhongguancun Lab), Kun Sun (George Mason University), Ziqiang Wang (Southeast University), Ao Wang (Southeast University), Ganqiu Du (China Software Testing Center), Ke Xu (Tsinghua University) PAPER ReDAN: An Empirical Study On Remote…
-
NDSS 2025 GadgetMeter: Quantitatively And Accurately Gauging The Exploitability Of Speculative Gadgets
Tags: attack, conference, detection, exploit, framework, Internet, linux, mitigation, network, software, vulnerabilitySession 6D: Software Security: Vulnerability Detection Authors, Creators & Presenters: Qi Ling (Purdue University), Yujun Liang (Tsinghua University), Yi Ren (Tsinghua University), Baris Kasikci (University of Washington and Google), Shuwen Deng (Tsinghua University) PAPER GadgetMeter: Quantitatively And Accurately Gauging The Exploitability Of Speculative Gadgets Since their emergence in 2018, speculative execution attacks have proven difficult…

