2022年网络安全四大顶会论文录用列表(中国大陆) | xxx2022年网络安全四大顶会论文录用列表(中国大陆) – xxx
菜单

2022年网络安全四大顶会论文录用列表(中国大陆)

十二月 29, 2022 - 安全维基

2022年网络安全四大顶会论文录用列表(中国大陆)



注意:数据范围是2022年发表的且第一作者所属机构为中国大陆机构


安全四大顶会





分析:在2022年,安全四大顶会总计收录文章580篇,以中国大陆机构为第一机构发文98.5篇,占比16.98%。其中ACM CCS收录287篇,以中国大陆机构为第一机构发文31篇,占比10.80%;IEEE S&P收录184篇,以中国大陆机构为第一机构发文20篇,占比10.84%;USENIX收录256篇,以中国大陆机构为第一机构发文31.5篇,占比12.30%;NDSS收录83篇,以中国大陆机构为第一机构发文16篇,占比19.28% 。






ACM CCS



1:An Extensive Study of Residential Proxies in China.

Mingshuo Yang (Shandong University); Yunnan Yu (University at Buffalo); Xianghang Mi (University of Science and Technology of China); Shujun Tang (QI-ANXIN Technology Research Institute); Shanqing Guo (Shandong University); Yilin Li (Shandong University); Xiaofeng Zheng (Tsinghua University); Haixin Duan (Tsinghua University).


2:Blacktooth: Breaking through the Defense of Bluetooth in Silence.

Mingrui Ai (University of Science and Technology of China); Kaiping Xue (University of Science and Technology of China); Bo Luo (University of Kansas); Lutong Chen (University of Science and Technology of China); Nenghai Yu (University of Science and Technology of China); Qibin Sun (University of Science and Technology of China); Feng Wu (University of Science and Technology of China).


3:Bolt-Dumbo Transformer: Asynchronous Consensus As Fast As the Pipelined BFT.

Yuan Lu (Institute of Software Chinese Academy of Sciences); Zhenliang Lu (The University of Sydney); Qiang Tang (The University of Sydney).


4:CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation.

Mengyao Xie (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences); Chenggang Wu (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences & Zhongguancun Laboratory); Yinqian Zhang (Research Institute of Trustworthy Autonomous Systems; Southern University of Science and Technology & Department of Computer Science and Engineering; Southern University of Science and Technology); Jiali Xu (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences); Yuanming Lai (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences); Yan Kang (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & University of Chinese Academy of Sciences); Wei Wang (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences); Zhe Wang (State Key Lab of Processors; Institute of Computing Technology; Chinese Academy of Sciences & Zhongguancun Laboratory).


5:Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks.

Tengfei Zheng (National University of Defense Technology); Tongqing Zhou (National University of Defense Technology); Qiang Liu (National University of Defense Technology); Kui Wu (University of Victoria); Zhiping Cai (National University of Defense Technology).


6:Collect Responsibly But Deliver Arbitrarily? A Study on Cross-User Privacy Leakage in Mobile Apps.

Shuai Li (Fudan University); Zhemin Yang (Fudan University); Nan Hua (Fudan University); Peng Liu (The Pennsylvania State University); Xiaohan Zhang (Fudan University); Guangliang Yang (Fudan University); Min Yang (Fudan University).


7:Detecting Missing-Permission-Check Vulnerabilities in Distributed Cloud Systems.

Jie Lu (SKLP; Institute of Computing Technology; CAS); Haofeng Li (SKLP; Institute of Computing Technology; CAS); Chen Liu (SKLP; Institute of Computing Technology; CAS); Lian Li (SKLP; Institute of Computing Technology; CAS); Kun Cheng (Huawei Technologies Co. Ltd).


8:Dumbo-NG: Fast Asynchronous BFT Consensus with Throughput-Oblivious Latency.

Yingzi Gao (Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences); Yuan Lu (Institute of Software Chinese Academy of Sciences); Zhenliang Lu (The University of Sydney); Qiang Tang (The University of Sydney); Jing Xu (Institute of Software Chinese Academy of Sciences); Zhenfeng Zhang (Institute of Software Chinese Academy of Sciences).


9:EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.

Cong Wu (Wuhan University); Jing Chen (Wuhan University); Kun He (Wuhan University); Ziming Zhao (University at Buffalo); Ruiying Du (Wuhan University); Chen Zhang (Wuhan University).


10:ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.

Weili Wang (Southern University of Science and Technology); Sen Deng (Southern University of Science and Technology); Jianyu Niu (Southern University of Science and Technology); Michael K. Reiter (Duke University); Yinqian Zhang (Southern University of Science and Technology).


11:Evocatio: Conjuring Bug Capabilities from a Single PoC.

Zhiyuan Jiang (National University of Defense Technology); Shuitao Gan (SKL-MEAC; Tsinghua University); Adrian Herrera (Australian National University); Flavio Toffalini (EPFL); Lucio Romerio (EPFL); Chaojing Tang (National University of Defense Technology); Manuel Egele (Boston University); Chao Zhang (Tsinghua University; BNRist Zhongguancun Lab); Mathias Payer (EPFL).


12:FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems.

Jiangyi Deng (Zhejiang University); Yanjiao Chen (Zhejiang University); Wenyuan Xu (Zhejiang University).


13:Gringotts: Fast and Accurate Internal Denial-of-Wallet Detection for Serverless Computing.

Junxian Shen (Tsinghua University & Zhongguancun Laboratory); Han Zhang (Tsinghua University & Zhongguancun Laboratory); Yantao Geng (Tsinghua University & Zhongguancun Laboratory); Jiawei Li (Tsinghua University); Jilong Wang (Tsinghua University & Peng Cheng Laboratory); Mingwei Xu (Tsinghua University & Peng Cheng Laboratory).


14:Harnessing Perceptual Adversarial Patches for Crowd Counting.

Shunchang Liu (Beihang University); Jiakai Wang (Zhongguancun Laboratory); Aishan Liu (Beihang University); Yingwei Li (Johns Hopkins University); Yijie Gao (Beihang University); Xianglong Liu (Beihang University); Dacheng Tao (JD Explore Academy & The University of Sydney).


15:Matproofs: Maintainable Matrix Commitment with Efficient Aggregation.

Jing Liu (ShanghaiTech University); Liang Feng Zhang (ShanghaiTech University).


16:Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud.

Jianyu Niu (Southern University of Science and Technology); Wei Peng (Southern University of Science and Technology); Xiaokuan Zhang (George Mason University); Yinqian Zhang (Southern University of Science and Technology).


17:NFGen: Automatic Non-linear Function Evaluation Code Generator for General-purpose MPC Platforms.

Xiaoyu Fan (Tsinghua University); Kun Chen (Tsingjiao Information Technology Co. Ltd.); Guosai Wang (Tsingjiao Information Technology Co. Ltd.); Mingchun Zhuang (Beijing University of Posts and Telecommunications); Yi Li (Tsingjiao Information Technology Co. Ltd.); Wei Xu (Tsinghua University).


18:Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models.

Jiawei Liu (Wuhan University); Yangyang Kang (Alibaba Group); Di Tang (Indiana University Bloomington); Kaisong Song (Northeastern University & Alibaba Group); Changlong Sun (Alibaba Group); Xiaofeng Wang (Indiana University Bloomington); Wei Lu (Wuhan University); Xiaozhong Liu (Worcester Polytechnic Institute).


19:P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.

Ze Jin (Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences & Indiana University Bloomington); Luyi Xing (Indiana University Bloomington); Yiwei Fang (Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences & Indiana University Bloomington); Yan Jia (Nankai University); Bin Yuan (HuaZhong University of Science and Technology); Qixu Liu (Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences).


20:PACE: Fully Parallelizable BFT from Reproposable Byzantine Agreement.

Haibin Zhang (Beijing Institute of Technology); Sisi Duan (Tsinghua University).


21:PACMem: Enforcing Spatial and Temporal Memory Safety via ARM Pointer Authentication.

Yuan Li (Tsinghua University); Wende Tan (Tsinghua University); Zhizheng Lv (Tsinghua University); Songtao Yang (Tsinghua University); Mathias Payer (EPFL); Ying Liu (Tsinghua University; Zhongguancun Lab); Chao Zhang (Tsinghua University; Zhongguancun Lab; BNRist).


22:pMPL: A Robust Multi-Party Learning Framework with a Privileged Party.

Lushan Song (Fudan University); Jiaxuan Wang (Fudan University); Zhexuan Wang (Fudan University); Xinyu Tu (Fudan University); Guopeng Lin (Fudan University); Wenqiang Ruan (Fudan University); Haoqi Wu (Fudan University); Weili Han (Fudan University).


23:Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.

Jianfeng Wang (Xidian University); Shi-Feng Sun (Shanghai Jiao Tong University); Tianci Li (Xidian University); Saiyu Qi (Xi’an Jiao Tong University); Xiaofeng Chen (Xidian University).


24:SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.

Libo Chen (Shandong University); Quanpu Cai (Shanghai Jiao Tong University); Zhenbang Ma (QI-ANXIN Technology Research Institute); Yanhao Wang (QI-ANXIN Technology Research Institute); Hong Hu (Pennsylvania State University); Minghang Shen (Tencent Security Xuanwu Lab); Yue Liu (QI-ANXIN Technology Research Institute); Shanqing Guo (Shandong University); Haixin Duan (Tsinghua University); Kaida Jiang (Shanghai Jiao Tong University); Zhi Xue (Shanghai Jiao Tong University).


25:SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders.

Tianshuo Cong (Institute for Advanced Study; BNRist; Tsinghua University); Xinlei He (CISPA Helmholtz Center for Information Security); Yang Zhang (CISPA Helmholtz Center for Information Security).


26:StrongBox: A GPU TEE on Arm Endpoints.

Yunjie Deng (Southern University of Science and Technology); Chenxu Wang (Southern University of Science and Technology; The Hong Kong Polytechnic University); Shunchang Yu (Southern University of Science and Technology); Shiqing Liu (Southern University of Science and Technology); Zhenyu Ning (Hunan University; Southern University of Science and Technology); Kevin Leach (Vanderbilt University); Jin Li (Guangzhou University); Shoumeng Yan (Ant Group); Zhengyu He (Ant Group); Jiannong Cao (The Hong Kong Polytechnic University); Fengwei Zhang (Southern University of Science and Technology).


27:Understanding Real-world Threats to Deep Learning Models in Android Apps.

Zizhuang Deng (SKLOIS; Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences); Kai Chen (SKLOIS; Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences & Beijing Academy of Artificial Intelligence); Guozhu Meng (SKLOIS; Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences); Xiaodong Zhang (SKLOIS; Institute of Information Engineering; Chinese Academy of Sciences & School of Cyber Security; University of Chinese Academy of Sciences); Ke Xu (Huawei International Pte Ltd); Yao Cheng (Huawei International Pte Ltd).


28:VOProof: Efficient zkSNARKs Generation for Algebra Dummies.

Yuncong Zhang (Shanghai Jiao Tong University); Alan Szepeniec (Nervos); Ren Zhang (Cryptape Co. Ltd. and Nervos); Shi-Feng Sun (Shanghai Jiao Tong University); Geng Wang (Shanghai Jiao Tong University); Dawu Gu (Shanghai Jiao Tong University).


29:Watch Out for Race Condition Attacks When Using Android External Storage.

Shaoyong Du (State Key Laboratory of Mathematical Engineering and Advanced Computing); Xin Liu (State Key Laboratory of Mathematical Engineering and Advanced Computing); Guoqing Lai (State Key Laboratory of Mathematical Engineering and Advanced Computing); Xiangyang Luo (State Key Laboratory of Mathematical Engineering and Advanced Computing).


30:What Your Firmware Tells You Is Not How You Should Emulate It: A Specification-Guided Approach for Firmware Emulation.

Wei Zhou (Huazhong University of Science&University of Chinese Academy of Sciences and Technology); Lan Zhang (College of Information Sciences and Technology; The Pennsylvania State University); Le Guan (School of Computing; University of Georgia); Peng Liu (College of Information Sciences and Technology; The Pennsylvania State University); Yuqing Zhang (National Computer Network Intrusion Protection Center; University of Chinese Academy of Sciences).


31:‘Is your explanation stable?’: A Robustness Evaluation Framework for Feature Attribution.

Yuyou Gan (Zhejiang University); Yuhao Mao (Zhejiang University); Xuhong Zhang (Zhejiang University); Shouling Ji (Zhejiang University); Yuwen Pu (Zhejiang University); Meng Han (Zhejiang University); Jianwei Yin (Zhejiang University); Ting Wang (The Pennsylvania State University).


IEEE S&P



1:AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary .

Pengfei Hu (Shandong University), Hui Zhuang (Shandong University), Panneer Selvam Santhalingam (George Mason University), Riccardo Spolaor (Shandong University), Parth Pathak (George Mason University), Guoming Zhang (Shandong University), Xiuzhen Cheng (Shandong University).


2:Adversarial Examples for Proof-of-Learning.

Rui Zhang (Zhejiang University), Jian Liu (Zhejiang University), Yuan Ding (Zhejiang University), Zhibo Wang (Zhejiang University), Qingbiao Wu (Zhejiang University), Kui Ren (Zhejiang University), Jian Liu (Zhejiang University).


3:Analyzing Ground-Truth Data of Mobile Gambling Scam .

Geng Hong (Fudan University), Zhemin Yang (Fudan University), Sen Yang (Fudan University), Xiaojing Liao (Indiana University Bloomington), Xiaolin Du (Fudan University), Min Yang (Fudan University), Haixin Duan (Institute for Network Science and Cyberspace, Tsinghua University; Qi An Xin Group Corp).


4:Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK.

Xuancheng Jin (Shanghai Jiao Tong University), Xuangan Xiao (Shanghai Jiao Tong University), Songlin Jia (Shanghai Jiao Tong University), Wang Gao (Shanghai Jiao Tong University), Hang Zhang (UC Riverside), Dawu Gu (Shanghai Jiao Tong University), Siqi Ma (The University of Queensland), Zhiyun Qian (UC Riverside), Juanru Li (Shanghai Jiao Tong University).


5:Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models .

Jialuo Chen (Zhejiang University), Jingyi Wang (Zhejiang University), Tinglan Peng (Zhejiang University), Youcheng Sun (Queen’s University Belfast, UK), Peng Cheng (Zhejiang University), Shouling Ji (Zhejiang University), Xingjun Ma (Deakin University), Bo Li (University of Illinois Urbana-Champaign), Dawn Song (University of California, Berkeley).


6:DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.

Zhiqiang Xu (Chinese Academy of Sciences, China), Pengcheng Fang (Case Western Reserve University, USA), Changlin Liu (Case Western Reserve University, USA), Xusheng Xiao (Case Western Reserve University, USA), Yu Wen (Chinese Academy of Sciences, China), Dan Meng (Chinese Academy of Sciences, China).


7:Exploit the Last Straw That Breaks Android Systems .

Lei Zhang (Fudan University, China), Keke Lian (Fudan University, China), Haoyu Xiao (Fudan University, China), Zhibo Zhang (Fudan University, China), Peng Liu (The Pennsylvania State University, United States of America), Yuan Zhang (Fudan University, China), Min Yang (Fudan University, China), Haixin Duan (Tsinghua University, China).


8:Finding SMM Privilege-Escalation Vulnerabilities in UEFI Firmware with Protocol-Centric Static Analysis.

Jiawei Yin (Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China), Wei Huo (Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China), Menghao Li (Institute of Information Engineering, Chinese Academy of Sciences), Wei Wu (Huawei Technologies), Dandan Sun (Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China), Jianhua Zhou (Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China), Jingling Xue (University of New South Wales).


9:Foundations of Dynamic BFT .

Sisi Duan (Tsinghua University), Haibin Zhang (independent).


10:FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy.

Zhi Yang (PLA Information Engineering University, Zhengzhou, China), Zhanhui Yuan (PLA Information Engineering University, Zhengzhou, China), Xingyuan Chen (PLA Information Engineering University, Zhengzhou, China), Shuyuan Jin (SUN YAT-SEN University, Guangzhou, China.), Lei Sun (PLA Information Engineering University, Zhengzhou, China), Xuehui Du (PLA Information Engineering University, Zhengzhou, China), Wenfa Li (Beijing Union University, Beijing, Chian).


11:Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis .

Yunlong Lyu (University of Science and Technology of China), Yi Fang (Feiyu Security), Yiwei Zhang (Shanghai Jiao Tong University), Qibin Sun (University of Science and Technology of China), Siqi Ma (The University of New South Wales Canberra), Elisa Bertino (Purdue University), Kangjie Lu (University of Minnesota), Juanru Li (Shanghai Jiao Tong University).


12:How to Attack and Generate Honeywords .

Ding Wang (Nankai University), Yunkai Zou (Nankai University), Qiying Dong (Nankai University), Yuanming Song (Peking University), Xinyi Huang (Fujian Normal University).


13:MeshUp: Stateless Cache Side-channel Attack on CPU Mesh.

Junpeng Wan (Fudan University), Yanxiang Bi (Fudan University), Zhe Zhou (Fudan University), Zhou Li (University of California, Irvine).


14:Multi-Server Verifiable Computation of Low-Degree Polynomials.

Liang Feng Zhang (ShanghaiTech University), Huaxiong Wang (Nanyang Technological University).


15:PATA: Fuzzing with Path Aware Taint Analysis.

Jie Liang (Tsinghua University, China), Mingzhe Wang (Tsinghua University, China), Chijin Zhou (Tsinghua University, China), Zhiyong Wu (Tsinghua University, China), Yu Jiang (Tsinghua University, China), (Jianzhong Liu (Tsinghua University, China), Zhe Liu (Nanjing University of Aeronautics and Astronautics, China), Jiaguang Sun (Tsinghua University, China).


16:Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms .

Zhi Li (School of Cyber Science and Engineering, Huazhong University of Science and Technology, China; School of Computer Science and Technology, Huazhong University of Science and Technology, China; National Engineering Research Center for Big Data Technology and Sytem, China; Cluster and Grid Computing Lab, China; Services Computing Technology and System Lab, China; Big Data Security Engineering Research Center, China), Weijie Liu (Indiana University Bloomington, USA), Hongbo Chen (Indiana University Bloomington, USA), XiaoFeng Wang (Indiana University Bloomington, USA), Xiaojing Liao (Indiana University Bloomington, USA), Luyi Xing (Indiana University Bloomington, USA), Mingming Zha (Indiana University Bloomington, USA), Hai Jin (School of Computer Science and Technology, Huazhong University of Science and Technology, China; National Engineering Research Center for Big Data Technology and Sytem, China; Cluster and Grid Computing Lab, China; Services Computing, Deqing Zou (School of Cyber Science and Engineering, Huazhong University of Science and Technology, China; National Engineering Research Center for Big Data Technology and Sytem, China; Cluster and Grid Computing Lab, China; Services Computing Technology and System Lab, China; Big Data Security Engineering Research Center, China Technology and System Lab, China; Big Data Security Engineering Research Center, China).


17:SMILE: Secure Memory Introspection for Live Enclave.

Lei Zhou (Southern University of Science and Technology (SUSTech)), Xuhua Ding (Singapore Management University), Fengwei Zhang (Southern University of Science and Technology (SUSTech)).


18:Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.

Zihao Jin (Microsoft Research Asia and Tsinghua University, China), Ziqiao Kong (Microsoft Research Asia, China), Shuo Chen (Microsoft Research Asia), Haixin Duan (Tsinghua University, China).


19:Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings .

Yuhao Mao (Zhejiang University), Saizhuo Wang (Zhejiang University), Shouling Ji (Zhejiang University), Xuhong Zhang (Zhejiang University), Zhenguang Liu (Zhejiang Gongshang University), Jun Zhou (Ant Financial Services Group), Raheem Beyah (Georgia Institute of Technology), Ting Wang (Penn State).


20:WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens .

Yan Jiang (Zhejiang University), Xiaoyu Ji (Zhejiang University), Kai Wang (Zhejiang University), Chen Yan (Zhejiang University), Richard Mitev (Technische University of Darmstadt), Ahmad-Reza Sadeghi (Technical University of Darmstadt), Wenyuan Xu (Zhejiang University).




USENIX Security



1:”OK, Siri” or “Hey, Google”: Evaluating Voiceprint Distinctiveness via Content-based PROLE Score.

Ruiwen He, Xiaoyu Ji, and Xinfeng Li, Zhejiang University; Yushi Cheng, Tsinghua University; Wenyuan Xu, Zhejiang University.


2:A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.

Jinyu Gu, Bojun Zhu, Mingyu Li, Wentai Li, Yubin Xia, and Haibo Chen, Shanghai Jiao Tong University.


3:A Large-scale and Longitudinal Measurement Study of DKIM Deployment.

Chuhan Wang, Kaiwen Shen, and Minglei Guo, Tsinghua University; Yuxuan Zhao, North China Institute of Computing Technology; Mingming Zhang, Jianjun Chen, and Baojun Liu, Tsinghua University; Xiaofeng Zheng and Haixin Duan, Tsinghua University and Qi An Xin Technology Research Institute; Yanzhong Lin and Qingfeng Pan, Coremail Technology Co. Ltd.


4:AutoDA: Automated Decision-based Iterative Adversarial Attacks.

Qi-An Fu, Dept. of Comp. Sci. and Tech., Institute for AI, Tsinghua-Bosch Joint ML Center, THBI Lab, BNRist Center, Tsinghua University, Beijing, China; Yinpeng Dong, Dept. of Comp. Sci. and Tech., Institute for AI, Tsinghua-Bosch Joint ML Center, THBI Lab, BNRist Center, Tsinghua University, Beijing, China; RealAI; Hang Su, Dept. of Comp. Sci. and Tech., Institute for AI, Tsinghua-Bosch Joint ML Center, THBI Lab, BNRist Center, Tsinghua University, Beijing, China; Peng Cheng Laboratory; Tsinghua University-China Mobile Communications Group Co., Ltd. Joint Institute; Jun Zhu, Dept. of Comp. Sci. and Tech., Institute for AI, Tsinghua-Bosch Joint ML Center, THBI Lab, BNRist Center, Tsinghua University, Beijing, China; RealAI; Peng Cheng Laboratory; Tsinghua University-China Mobile Communications Group Co., Ltd. Joint Institute; Chao Zhang, Institute for Network Science and Cyberspace / BNRist, Tsinghua University.


5:Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches.

Youkun Shi, Yuan Zhang, Tianhan Luo, and Xiangyu Mao, Fudan University; Yinzhi Cao, Johns Hopkins University; Ziwen Wang, Yudi Zhao, Zongan Huang, and Min Yang, Fudan University.


6:Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.

Xiaojie Guo, Ye Han, Zheli Liu, Ding Wang, and Yan Jia, Nankai University; Jin Li, Guangzhou University.


7:CamShield: Securing Smart Cameras through Physical Replication and Isolation.

Zhiwei Wang, Yihui Yan, and Yueli Yan, ShanghaiTech University; Huangxun Chen, Huawei Theory Lab; Zhice Yang, ShanghaiTech University.


8:Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference.

Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding, Alibaba Group.


9:End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage.

Long Chen, Institute of Software, Chinese Academy of Sciences; Ya-Nan Li and Qiang Tang, The University of Sydney; Moti Yung, Google & Columbia University.


10:Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis.

Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, and Min Yang, Fudan University.


11:Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.

Shunfan Zhou, Zhemin Yang, and Dan Qiao, Fudan University; Peng Liu, The Pennsylvania State University; Min Yang, Fudan University; Zhe Wang and Chenggang Wu, State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences.


12:FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries.

Liang He, TCA, Institute of Software, Chinese Academy of Sciences; Hong Hu, Pennsylvania State University; Purui Su, TCA / SKLCS, Institute of Software, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences; Yan Cai, SKLCS, Institute of Software, Chinese Academy of Sciences; Zhenkai Liang, National University of Singapore.


13:GhostTouch: Targeted Attacks on Touchscreens without Physical Touch.

Kai Wang, Zhejiang University; Richard Mitev, Technical University of Darmstadt; Chen Yan and Xiaoyu Ji, Zhejiang University; Ahmad-Reza Sadeghi, Technical University of Darmstadt; Wenyuan Xu, Zhejiang University.


14:Ground Truth for Binary Disassembly is Not Easy.

Chengbin Pang and Tiantai Zhang, Nanjing University; Ruotong Yu, University of Utah; Bing Mao, Nanjing University; Jun Xu, University of Utah.


15:Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.

Xudong Pan, Mi Zhang, Beina Sheng, Jiaming Zhu, and Min Yang, Fudan University.


16:Identity Confusion in WebView-based Mobile App-in-app Ecosystems.

Lei Zhang, Zhibo Zhang, and Ancong Liu, Fudan University; Yinzhi Cao, Johns Hopkins University; Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, and Min Yang, Fudan University.


17:Label Inference Attacks Against Vertical Federated Learning.

Chong Fu, Zhejiang University; Xuhong Zhang and Shouling Ji, Binjiang Institute of Zhejiang University; Jinyin Chen, Zhejiang University of Technology; Jingzheng Wu, Institute of Software, Chinese Academy of Sciences; Shanqing Guo, Shandong University; Jun Zhou and Alex X. Liu, Ant Group; Ting Wang, Pennsylvania State University.


18:LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution.

Jian Liu, {CAS-KLONAT, BKLONSPT}, Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences; Lin Yi, {CAS-KLONAT, BKLONSPT}, Institute of Information Engineering, Chinese Academy of Sciences; Weiteng Chen, Chengyu Song, and Zhiyun Qian, UC Riverside; Qiuping Yi, Beijing University of Posts and Telecommunications and Beijing Key Lab of Intelligent Telecommunication Software and Multimedia.


19:MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties.

Guoxing Chen, Shanghai Jiao Tong University; Yinqian Zhang, Southern University of Science and Technology.


20:Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.

Xuewei Feng, Department of Computer Science and Technology & BNRist, Tsinghua University; Qi Li, Institute for Network Sciences and Cyberspace & BNRist, Tsinghua University and Zhongguancun Lab; Kun Sun, Department of Information Sciences and Technology & CSIS, George Mason University; Zhiyun Qian, UC Riverside; Gang Zhao, Department of Computer Science and Technology & BNRist, Tsinghua University; Xiaohui Kuang, Beijing University of Posts and Telecommunications; Chuanpu Fu, Department of Computer Science and Technology & BNRist, Tsinghua University; Ke Xu, Department of Computer Science and Technology & BNRist, Tsinghua University and Zhongguancun Lab.


21:RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.

Yi He and Zhenhua Zou, Tsinghua University and BNRist; Kun Sun, George Mason University; Zhuotao Liu and Ke Xu, Tsinghua University and BNRist; Qian Wang, Wuhan University; Chao Shen, Xi’an Jiaotong University; Zhi Wang, Florida State University; Qi Li, Tsinghua University and BNRist.


22:RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix.

Yeting Li, CAS-KLONAT, Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences; SKLCS, Institute of Software, Chinese Academy of Sciences; Yecheng Sun, SKLCS, Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences; Zhiwu Xu, College of Computer Science and Software Engineering, Shenzhen University; Jialun Cao, The Hong Kong University of Science and Technology; Yuekang Li, School of Computer Science and Engineering, Nanyang Technological University; Rongchen Li, SKLCS, Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences; Haiming Chen, SKLCS, Institute of Software, Chinese Academy of Sciences; CAS-KLONAT, Institute of Information Engineering, Chinese Academy of Sciences; Shing-Chi Cheung, The Hong Kong University of Science and Technology; Yang Liu, School of Computer Science and Engineering, Nanyang Technological University; Yang Xiao, CAS-KLONAT, Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences.


23:Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition.

Chen Yan, Zhejiang University; Zhijian Xu, Zhejiang University and The Chinese University of Hong Kong; Zhanyuan Yin, The University of Chicago; Xiaoyu Ji and Wenyuan Xu, Zhejiang University.


24:Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.

Changjiang Li, Pennsylvania State University and Zhejiang University; Li Wang, Shandong University; Shouling Ji and Xuhong Zhang, Zhejiang University; Zhaohan Xi, Pennsylvania State University; Shanqing Guo, Shandong University; Ting Wang, Pennsylvania State University.


25:SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.

Yuan Chen, Jiaqi Li, Guorui Xu, and Yajin Zhou, Zhejiang University; Zhi Wang, Florida State University; Cong Wang, City University of Hong Kong; Kui Ren, Zhejiang University.


26:Shuffle-based Private Set Union: Faster and More Secure.

Yanxue Jia and Shi-Feng Sun, Shanghai Jiao Tong University; Hong-Sheng Zhou, Virginia Commonwealth University; Jiajun Du and Dawu Gu, Shanghai Jiao Tong University.


27:StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing.

Bodong Zhao, Zheming Li, Shisong Qin, Zheyu Ma, and Ming Yuan, Institute for Network Science and Cyberspace / BNRist, Tsinghua University; Wenyu Zhu, Department of Electronic Engineering, Tsinghua University; Zhihong Tian, Guangzhou University; Chao Zhang, Institute for Network Science and Cyberspace / BNRist, Tsinghua University and Zhongguancun Lab.


28:Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOAS.

Lancheng Qin, Tsinghua University; Dan Li, Tsinghua University and Zhongguancun Laboratory; Ruifeng Li, Tsinghua Shenzhen International Graduate School; Kang Wang, Tsinghua University.


29:Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.

Yan Meng and Jiachun Li, Shanghai Jiao Tong University; Matthew Pillari, Arjun Deopujari, Liam Brennan, and Hafsah Shamsie, University of Virginia; Haojin Zhu, Shanghai Jiao Tong University; Yuan Tian, University of Virginia.


30:COMRace: Detecting Data Race Vulnerabilities in COM Objects.

Fangming Gu, Qingli Guo(Institute of Information Engineering; University of Chinese Academy of Sciences); Lian Li(Institute of Computing Technology; University of Chinese Academy of Sciences); Zhiniang Peng(Sangfor Technologies Inc; Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences); Wei Lin, Xiaobo Yang, Xiaorui Gong(Institute of Information Engineering; University of Chinese Academy of Sciences).


31:How Are Your Zombie Accounts? Understanding Users’ Practices and Expectations on Mobile App Account Deletion.

Yijing Liu, Yan Jia, Qingyin Tan, Zheli Liu(Nankai University); Luyi Xing(Indiana University Bloomington).


32:Teacher Model Fingerprinting Attacks Against Transfer Learning.

Yufei Chen, Xi’an Jiaotong University & City University of Hong Kong; Chao Shen, Xi’an Jiaotong University; Cong Wang, City University of Hong Kong; Yang Zhang, CISPA Helmholtz Center for Information Security.

(注:该篇论文第一作者所属机构同时是西安交通大学和香港城市大学,故计0.5篇)



NDSS



1:An In-depth Analysis of Duplicated Linux Kernel Bug Reports.

Dongliang Mu (Huazhong University of Science and Technology); Yuhang Wu, Yueqi Chen, and Zhenpeng Lin (Pennsylvania State University); Chensheng Yu (George Washington University); Xinyu Xing (Pennsylvania State University); Gang Wang (University of Illinois at Urbana-Champaign).


2:ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.

Xueluan Gong (Wuhan University); Yanjiao Chen (Zhejiang University); Jianshuo Dong and Qian Wang (Wuhan University).


3:Chosen-Assembly Attack Against Commercial Code Virtualization Obfuscators.

Shijia Li, Chunfu Jia, Pengda Qiu, and Qiyuan Chen (College of Computer Science, NanKai University and the Tianjin Key Laboratory of Network and Data Security Technology); Jiang Ming (University of Texas at Arlington); Debin Gao (Singapore Management University).


4:Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection.

Zu-Ming Jiang and Jia-Ju Bai (Tsinghua University); Kangjie Lu (University of Minnesota); Shi-Min Hu (Tsinghua University).


5:COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation.

Peng Xu (Institute of Software/CAS China; University of Chinese Academy of Sciences); Wang Yanhao (QI-ANXIN Technology Research Institute); Hong Hu (Penn State University); Purui Su (Institute of Software/CAS China).


6:EMS: History-Driven Mutation for Coverage-based Fuzzing.

Chenyang Lyu and Shouling Ji (Zhejiang University); Xuhong Zhang (Zhejiang University & Zhejiang University NGICS Platform); Hong Liang (Zhejiang University); Binbin Zhao (Georgia Institute of Technology); Kangjie Lu (University of Minnesota); Raheem Beyah (Georgia Institute of Technology).


7:Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems.

Wei Jia (School of Cyber Science and Engineering, Huazhong University of Science and Technology); Haichun Zhang (Huazhong University of Science and Technology); Zhaojun Lu (School of Cyber Science and Engineering, Huazhong University of Science and Technology); Jie Wang (Shenzhen Kaiyuan Internet Security Co., Ltd); Zhenglin Liu (Huazhong University of Science and Technology); Gang Qu (University of Maryland).


8:MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing.

Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu (National University of Defense Technology).


9:Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures.

Huibo Wang (Baidu Security); Guoxing Chen (Shanghai Jiao Tong University); Yinqian Zhang (Southern University of Science and Technology); Zhiqiang Lin (Ohio State University).


10:PMTUD is not Panacea: Revisiting IP Fragmentation Attacks against TCP.

Xuewei Feng and Qi Li (Tsinghua University); Kun Sun (George Mason University); Ke Xu and Baojun Liu (Tsinghua University); Xiaofeng Zheng (Institute for Network Sciences and Cyberspace, Tsinghua University; QiAnXin Technology Research Institute & Legendsec Information Technology (Beijing) Inc.); Qiushi Yang (QiAnXin Technology Research Institute & Legendsec Information Technology (Beijing) Inc.); Haixin Duan (Institute for Network Science and Cyberspace, Tsinghua University; Qi An Xin Group Corp.); Zhiyun Qian (UC Riverside).


11:Property Inference Attacks Against GANs.

Junhao Zhou, Yufei Chen, and Chao Shen (Xi’an Jiaotong University); Yang Zhang (CISPA Helmholtz Center for Information Security).


12:ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment.

Wenqi Chen (Tsinghua University); Zhiliang Wang (wzl@cernet.edu.cn); Dongqi Han (Institute for Network Sciences and Cyberspace, Tsinghua University); Chenxin Duan, Xia Yin, Jiahai Yang, and Xingang Shi (Tsinghua University).


13:ScriptChecker: To Tame Third-party Script Execution With Task Capabilities.

Wu Luo (Peking University); Xuhua Ding (Singapore Management University); Pengfei Wu (School of Computing, National University of Singapore); Xiaolei Zhang, Qingni Shen, and Zhonghai Wu (Peking University).


14:Shaduf: Non-Cycle Payment Channel Rebalancing.

Zhonghui Ge, Yi Zhang, Yu Long, and Dawu Gu (Shanghai Jiao Tong University).


15:Speeding Dumbo: Pushing Asynchronous BFT to Practice.

Bingyong Guo (Institute of Software, Chinese Academy of Sciences); Yuan Lu (Institute of Software Chinese Academy of Sciences); Zhenliang Lu and Qiang Tang (The University of Sydney); jing xu (Institute of Software, Chinese Academy of Sciences); Zhenfeng Zhang (TCA of State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences).


16:Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators.

Wenjia Zhao (Xi’an Jiaotong University and University of Minnesota); Kangjie Lu and Qiushi Wu (University of Minnesota); Yong Qi (Xi’an Jiaotong University).

(注:该篇论文第一作者所属机构同时是西安交通大学和明尼苏达大学,故计0.5篇)


17:FakeGuard: Exploring haptic response to mitigate the vulnerability in commercial fingerprint anti-spoofing.

Aditya Singh Rathore (University at Buffalo, SUNY); Yijie Shen (Zhejiang University); Chenhan Xu and Jacob Snyderman (University at Buffalo, SUNY); Jinsong Han and Fan Zhang (Zhejiang University); Zhengxiong Li (University at Buffalo, SUNY); Feng Lin (Zhejiang University); Wenyao Xu (University at Buffalo, SUNY); Kui Ren (Zhejiang University).

(注:该篇论文共同第一作者单位是浙江大学和纽约州立大学布法罗分校,故计0.5篇)




2022年网络安全四大顶会论文录用列表(中国大陆)
安全张之家

长按并关注

了解更多信息



Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51