NDSS Symposium
NDSS Symposium
  • 1 051
  • 277 942
NDSS 2024 - WOSOC 2024, Workshop on SOC Operations and Construction
WOSOC 2024, Workshop on SOC Operations and Construction
Security Operations Centers (SOCs) are a field of growing interest for both researchers and SOC operators. SOC operators are increasingly recognized as a distinct class of security professionals who need tools and practices that address the distinct challenges and insights of their discipline. In parallel to this increased professionalization by the operational community is an increased interest in the academic community: researchers are studying SOC processes, workflows, and training. The WOSOC workshop is a common forum for both of these distinct groups to interact, present, and cross-pollinate ideas across this young field.
(NOTE NOT ALL TALKS WERE RECORDED DUE TO OPERATIONAL SENSITIVITY)
Jump to parts of the program by clicking on the chapters below:
00:00 - Welcome and Opening Remarks
05:18 - Session 1
55:58 - Panel: Sharing Between Operations and Academia: Experiences and New Approaches
Speakers: kc Claffy (CAIDA), M. Patrick Collins (USC-ISI), S. Raj Rajagoppalan (Resideo), Shawn McGhee
1:39:34 - Session 2
2:54:15 - Closing Remarks
Program: www.ndss-symposium.org/ndss-program/wosoc-2024/
Accepted Papers: www.ndss-symposium.org/ndss2024/co-located-events/wosoc/accepted-papers/
Leadership: www.ndss-symposium.org/ndss2024/co-located-events/wosoc/leadership/
Submissions: www.ndss-symposium.org/ndss2024/submissions/cfp-wosoc/
Network and Distributed System Security (NDSS) Symposium 2024, 26 February - 1 March 2024 in San Diego, California.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.
www.ndss-symposium.org/
#NDSS #NDSS24 #NDSS2024 #InternetSecurity
zhlédnutí: 181

Video

NDSS 2024 - SpaceSec 2024, Workshop on the Security of Space and Satellite Systems
zhlédnutí 170Před 3 měsíci
SpaceSec 2024, Workshop on the Security of Space and Satellite Systems Novel mega-constellations in Low Earth Orbit (LEO), including those of Starlink, OneWeb and others, will see over 100,000 satellites in space over the next several years. They will increasingly fulfill communication functions in both consumer settings and critical infrastructures. These critical functions, ranging from globa...
NDSS 2024 - BAR 2024, Workshop on Binary Analysis Research
zhlédnutí 253Před 3 měsíci
BAR 2024, Workshop on Binary Analysis Research With the analysis of binary code more relevant than ever due to the proliferation of interconnected embedded devices, closed-source commercial and legacy software, and evasive malware and cyber-threats, the field of binary analysis has recently undergone a renaissance. The last decade has seen the emergence of well over a dozen binary analysis fram...
NDSS 2024 - MADWeb 2024, Workshop on Measurements, Attacks, and Defenses for the Web
zhlédnutí 111Před 3 měsíci
MADWeb 2024, Workshop on Measurements, Attacks, and Defenses for the Web The web connects billions of devices, running a plethora of clients, and serves billions of users every day. To cope with such a widespread adoption, the web constantly changes. This is evident by some browsers that have a release cycle of just six weeks. Unfortunately, these rapid changes are not always designed with a se...
NDSS 2024 - SDIoTSec 2024, Workshop on Security and Privacy in Standardized IoT
zhlédnutí 92Před 3 měsíci
SDIoTSec 2024, Workshop on Security and Privacy in Standardized IoT Internet of things (IoT) devices are heterogeneous, commonly with vendor-specific protocols, designs and implementations for device access, communication, and security. The IoT ecosystem’s heterogeneous nature has posed fundamental challenges for consumer usability and device security. In response, industry-unifying standards f...
NDSS 2024 - AISCC 2024, Workshop on Artificial Intelligence System with Confidential Computing
zhlédnutí 241Před 3 měsíci
AISCC 2024, Workshop on Artificial Intelligence System with Confidential Computing The transformative power of Artificial Intelligence (AI) is reshaping industries, from healthcare and finance to transportation and entertainment, ushering in a new era of innovation and efficiency. However, with the rapid advancements in AI, there is an escalating concern regarding the profound implications for ...
NDSS 2024 - USEC 2024, Symposium on Usable Security and Privacy
zhlédnutí 123Před 3 měsíci
USEC 2024, Symposium on Usable Security and Privacy The Symposium on Usable Security and Privacy (USEC) 2024 serves as an international forum for research and discussion in the area of human factors in security and privacy. USEC is a symposium with proceedings. USEC 2024 was held in conjunction with NDSS in San Diego, California from 26 February to 1 March, 2024. The specific date of USEC 2024 ...
NDSS 2024 - VehicleSec Track 2, Symposium on Vehicle Security and Privacy (VehicleSec 2024)
zhlédnutí 103Před 3 měsíci
VehicleSec Track 2, Symposium on Vehicle Security and Privacy (VehicleSec 2024) Founded in 2023, Vehicle Security and Privacy (VehicleSec) aims to bring together an audience of university researchers, scientists, industry professionals, and government representatives to contribute new theories, technologies, and systems on any security/privacy issues related to vehicles (e.g., ground, aerial, u...
NDSS 2024 - VehicleSec Track 1, Symposium on Vehicle Security and Privacy (VehicleSec 2024)
zhlédnutí 173Před 3 měsíci
VehicleSec Track 1, Symposium on Vehicle Security and Privacy (VehicleSec 2024) Founded in 2023, Vehicle Security and Privacy (VehicleSec) aims to bring together an audience of university researchers, scientists, industry professionals, and government representatives to contribute new theories, technologies, and systems on any security/privacy issues related to vehicles (e.g., ground, aerial, u...
NDSS 2024 - K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Li
zhlédnutí 53Před 3 měsíci
NDSS 2024 - K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Li
NDSS 2024 - Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning
zhlédnutí 61Před 3 měsíci
NDSS 2024 - Experimental Analyses of the Physical Surveillance Risks in Client-Side Content Scanning
NDSS 2024 - Towards Precise Reporting of Cryptographic Misuses
zhlédnutí 73Před 3 měsíci
NDSS 2024 - Towards Precise Reporting of Cryptographic Misuses
NDSS 2024 - Transpose Attack: Stealing Datasets with Bidirectional Training
zhlédnutí 68Před 3 měsíci
NDSS 2024 - Transpose Attack: Stealing Datasets with Bidirectional Training
NDSS 2024 - Attributions for ML-based ICS Anomaly Detection: From Theory to Practice
zhlédnutí 109Před 3 měsíci
SESSION 5B-2 Attributions for ML-based ICS Anomaly Detection: From Theory to Practice Industrial Control Systems (ICS) govern critical infrastructure like power plants and water treatment plants. ICS can be attacked through manipulations of its sensor or actuator values, causing physical harm. A promising technique for detecting such attacks is machine-learning-based anomaly detection, but it d...
NDSS 2024 - Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Sys
zhlédnutí 30Před 3 měsíci
SESSION 6B-4 Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences Known, but unpatched vulnerabilities represent one of the most concerning threats for businesses today. The average time-to-patch of zero-day vulnerabilities remains around 100 days in recent years. The lack of means to mitigate an unpatched vulnerability may force businesses to t...
NDSS 2024 - Modeling and Detecting Internet Censorship Events
zhlédnutí 69Před 3 měsíci
SESSION 1B-3 Modeling and Detecting Internet Censorship Events Publicly accessible censorship datasets, such as OONI and Censored Planet, provide valuable resources for understanding global censorship events. However, censorship event detection in these datasets is challenging due to the overwhelming amount of data, the dynamic nature of censorship, and potentially heterogeneous blocking polici...
NDSS 2024 - Group-based Robustness: A General Framework for Customized Robustness in the Real World
zhlédnutí 83Před 3 měsíci
SESSION 4B-2 Group-based Robustness: A General Framework for Customized Robustness in the Real World Machine-learning models are known to be vulnerable to evasion attacks that perturb model inputs to induce misclassifications. In this work, we identify real-world scenarios where the true threat cannot be assessed accurately by existing attacks. Specifically, we find that conventional metrics me...
NDSS 2024 - 50 Shades of Support: A Device-Centric Analysis of Android Security Updates
zhlédnutí 68Před 3 měsíci
SESSION 3B-2 50 Shades of Support: A Device-Centric Analysis of Android Security Updates Android is by far the most popular OS with over three billion active mobile devices. As in any software, uncovering vulnerabilities on Android devices and applying timely patches are both critical. Android Open Source Project has initiated efforts to improve the traceability of security updates through Secu...
NDSS 2024 - Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
zhlédnutí 39Před 3 měsíci
SESSION 8B-3 Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks Automatic speech recognition (ASR) provides diverse audio-to-text services for humans to communicate with machines. However, recent research reveals ASR systems are vulnerable to various malicious audio attacks. In particular, by removing the non-essential frequency components, a new spectrum redu...
NDSS 2024 - File Hijacking Vulnerability: The Elephant in the Room
zhlédnutí 60Před 3 měsíci
NDSS 2024 - File Hijacking Vulnerability: The Elephant in the Room
NDSS 2024 - Don't Interrupt Me - A Large-Scale Study of On-Device Permission Prompt Quieting in Chro
zhlédnutí 14Před 3 měsíci
NDSS 2024 - Don't Interrupt Me - A Large-Scale Study of On-Device Permission Prompt Quieting in Chro
NDSS 2024 - ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
zhlédnutí 17Před 3 měsíci
NDSS 2024 - ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
NDSS 2024 - Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks
zhlédnutí 16Před 3 měsíci
NDSS 2024 - Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks
NDSS 2024 - TextGuard: Provable Defense against Backdoor Attacks on Text Classification
zhlédnutí 26Před 3 měsíci
NDSS 2024 - TextGuard: Provable Defense against Backdoor Attacks on Text Classification
NDSS 2024 - Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neur
zhlédnutí 58Před 3 měsíci
NDSS 2024 - Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neur
NDSS 2024 - A Security and Usability Analysis of Local Attacks Against FIDO2
zhlédnutí 47Před 3 měsíci
NDSS 2024 - A Security and Usability Analysis of Local Attacks Against FIDO2
NDSS 2024 - dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository
zhlédnutí 26Před 3 měsíci
NDSS 2024 - dRR: A Decentralized, Scalable, and Auditable Architecture for RPKI Repository
NDSS 2024 - A Unified Symbolic Analysis of WireGuard
zhlédnutí 38Před 3 měsíci
NDSS 2024 - A Unified Symbolic Analysis of WireGuard
NDSS 2024 - SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing
zhlédnutí 46Před 3 měsíci
NDSS 2024 - SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing
NDSS 2024 - Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR
zhlédnutí 49Před 3 měsíci
NDSS 2024 - Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR

Komentáře

  • @informatikmitbeispielen2840

    Hi, is the programmong code of this paper already open source online? I can't find it anywhere on Github, GitLab.

  • @sunduselahi2580
    @sunduselahi2580 Před 2 měsíci

    I just watched the starlink launch yesterday evening from South Florida! I was in awe. The way it brightened up the sky like a Comet. Particularly interesting to read about ‘Connecting the dots in the sky’. (Great job!) Truly makes you wonder and appreciate how far we’ve come in the sciences.

  • @thusharag.a5181
    @thusharag.a5181 Před 2 měsíci

    How can we integrate ABE into blockchain? whether in Smart contract or Ledger?

  • @user-id9rd7yz3z
    @user-id9rd7yz3z Před 3 měsíci

    Is this work’s source open?I only found the benchmark suite. :(

  • @toshiharuakama9456
    @toshiharuakama9456 Před 3 měsíci

    ユウチューブに動画で、発表での登壇自体も凄いことなのに動画で発信おめでとうございます。福島のお爺ちゃんです。 ❤

  • @chenguo6589
    @chenguo6589 Před 3 měsíci

    can't reach the slides

  • @imsrini
    @imsrini Před 3 měsíci

    Came here because I wanted some basic understanding of Intel SGX. If you did too, just play this video at 75% speed - you can thank me later ! 🤣

  • @harshithmonu1092
    @harshithmonu1092 Před 3 měsíci

    👏👏

  • @AtaberkOlgun
    @AtaberkOlgun Před 3 měsíci

    🤩

  • @TheCarGuy0
    @TheCarGuy0 Před 3 měsíci

    Damn, Kerem killing it as always. Binghamton you gotta increase the pay for this kid asap

  • @mehmetanlozat4581
    @mehmetanlozat4581 Před 3 měsíci

    Great Presentation!

  • @beratdeep
    @beratdeep Před 3 měsíci

    You continue to exceed every expectation. Great job Kerem!

  • @user-nd1vl2jb5d
    @user-nd1vl2jb5d Před 5 měsíci

    not match this video

  • @lsanaldeen
    @lsanaldeen Před 6 měsíci

    The tool discussed here only works with x86-64 binaries. Something that they didn't make clear from the beginning.

  • @rubidiotesla4458
    @rubidiotesla4458 Před 6 měsíci

    I have been following the work of Dr. James Pavur for a while now, he is very good in this area of security research in satellite communications.

  • @AZMReece
    @AZMReece Před 6 měsíci

    Hi, is there supposed to be a full video available for this? Thanks

    • @NDSSSymposium
      @NDSSSymposium Před 4 měsíci

      Hi, definitely there should be more... we'll check and revise.

  • @realhacker
    @realhacker Před 6 měsíci

    good

  • @moneremorgul1686
    @moneremorgul1686 Před 8 měsíci

    Can someone explain how they make a restore of server?

  • @eprohoda
    @eprohoda Před 9 měsíci

    yo~ Ndss- useful video-I'll be back-;)

  • @user-ui1em7wo2b
    @user-ui1em7wo2b Před 10 měsíci

    Please provide me

  • @user-ui1em7wo2b
    @user-ui1em7wo2b Před 10 měsíci

    Where will i get your journal paper

  • @ramalingam1655
    @ramalingam1655 Před 10 měsíci

    ிமஞ்ஞஊம்மகிபஇமம்ம்மமமமமமமமமுூப்பாப்பாந்து என ூூறமமமமம்உெஈபபஂ

  • @user-dv9dl2cl1p
    @user-dv9dl2cl1p Před 11 měsíci

    any CVE id for this issue?

  • @sven5666
    @sven5666 Před rokem

    Thanks for sharing!

  • @Capyparanoid
    @Capyparanoid Před rokem

    The worst paper in the human history

  • @proxyscrape
    @proxyscrape Před rokem

    Thanks a lot for the video. Given that both services missed 90% of the tokens, have you found an alternative to them that updates more frequently?

  • @TungThanh-ys2yv
    @TungThanh-ys2yv Před rokem

    When will all videos be uploaded?

  • @weimingsong6429
    @weimingsong6429 Před rokem

    这嘴快的就像被烫到一样,一句话说完还要接上半句改前面说错的,不知道在急什么。

  • @rogerioar
    @rogerioar Před rokem

    But itsn't this just adding a layer of obfuscation? If I am a malicious server, even if I disable delivery receipts, I can still (statistically) tie the interaction between bob and alice via this ephemeral mailbox, can't I?

  • @celloblack4208
    @celloblack4208 Před rokem

    Can you upload the video as soon as possible?

  • @rzz5202
    @rzz5202 Před rokem

    When the video of NDSS 2023 will release?

  • @anhla4265
    @anhla4265 Před rokem

    Can i have the dataset please ? It's for school project, thanks!

  • @shengran4761
    @shengran4761 Před rokem

    very good!

  • @GurpreetSingh-si2gh

    Thanks very much. Great work.

  • @alexishauf2097
    @alexishauf2097 Před rokem

    *promo sm*

  • @abdurrafae
    @abdurrafae Před rokem

    Great work!

  • @abhishekpatil2451
    @abhishekpatil2451 Před rokem

    Really an Awesome game!! Wanted to know more about this game pls help🙏

  • @rtlinsn5085
    @rtlinsn5085 Před rokem

    thank you very much. Could we download Binary Patcher source code? I need to patch an ARM 32-bit ELF file and add a custom section of instructions. Could you help me please ...

  • @realhacker
    @realhacker Před rokem

    Good

  • @PARADISEMERCYPRAISEPRKCS

    where can i get the dataset and code

  • @doctordorkmeister5330

    This is an explainable message from analog bio intelligence. You’re Fired

  • @realhacker
    @realhacker Před rokem

    💪💪

  • @simonykhsu
    @simonykhsu Před rokem

    讚👍

  • @agroindustrytube6955

    please share slides

  • @abcd45679
    @abcd45679 Před rokem

    I am unable to open link for slides

  • @jeremy812
    @jeremy812 Před rokem

    Good work, Gabe

  • @harshal6332
    @harshal6332 Před rokem

    A wonderful Job well Done. Really amazing guys, and it opens new doors for my understanding of various Consensus Algorithms. Wishing you well for the next Project.

  • @Cherry-gm3od
    @Cherry-gm3od Před rokem

    Outstanding !Proud of you🤣

  • @yuandawang7323
    @yuandawang7323 Před rokem

    😂😂😂

  • @shihanwang3969
    @shihanwang3969 Před rokem

    Awesome