https://www.ndss-symposium.org/ndss-program/symposium-2025/
Privacy & Cryptography
“Breaking Ciphers, Not Trust”
“Crypto’s Secret: Keeping It Safe, Keeping It Quiet”
- Secure Transformer Inference Made Non-interactive https://www.ndss-symposium.org/ndss-paper/secure-transformer-inference-made-non-interactive/
- Revisiting EM-based Estimation for Locally Differentially Private Protocols https://www.ndss-symposium.org/ndss-paper/revisiting-em-based-estimation-for-locally-differentially-private-protocols/
- BumbleBee: Secure Two-party Inference Framework for Large Transformers https://www.ndss-symposium.org/ndss-paper/bumblebee-secure-two-party-inference-framework-for-large-transformers/
- Repurposing Neural Networks for Efficient Cryptographic Computation https://www.ndss-symposium.org/ndss-paper/repurposing-neural-networks-for-efficient-cryptographic-computation/
- MTZK: Testing and Exploring Bugs in Zero-Knowledge (ZK) Compilers https://www.ndss-symposium.org/ndss-paper/mtzk-testing-and-exploring-bugs-in-zero-knowledge-zk-compilers/
- SHAFT: Secure, Handy, Accurate and Fast Transformer Inference https://www.ndss-symposium.org/ndss-paper/shaft-secure-handy-accurate-and-fast-transformer-inference/
- Siniel: Distributed Privacy-Preserving zkSNARK https://www.ndss-symposium.org/ndss-paper/siniel-distributed-privacy-preserving-zksnark/
Blockchain Security
“Blockchain: Not Just for Cryptos”
“The Ledger of Lies: Securing the Blockchain Wild West”
- Kronos: A Secure and Generic Sharding Blockchain Consensus with Optimized Overhead https://www.ndss-symposium.org/ndss-paper/kronos-a-secure-and-generic-sharding-blockchain-consensus-with-optimized-overhead/
- Manifoldchain: Maximizing Blockchain Throughput via Bandwidth-Clustered Sharding https://www.ndss-symposium.org/ndss-paper/manifoldchain-maximizing-blockchain-throughput-via-bandwidth-clustered-sharding/
- The Forking Way: When TEEs Meet Consensus https://www.ndss-symposium.org/ndss-paper/the-forking-way-when-tees-meet-consensus/
- Eclipse Attacks on Monero's Peer-to-Peer Network https://www.ndss-symposium.org/ndss-paper/eclipse-attacks-on-moneros-peer-to-peer-network/
- Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection https://www.ndss-symposium.org/ndss-paper/silence-false-alarms-identifying-anti-reentrancy-patterns-on-ethereum-to-refine-smart-contract-reentrancy-detection/
- PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation https://www.ndss-symposium.org/ndss-paper/propertygpt-llm-driven-formal-verification-of-smart-contracts-through-retrieval-augmented-property-generation/
- Alba: The Dawn of Scalable Bridges for Blockchains https://www.ndss-symposium.org/ndss-paper/alba-the-dawn-of-scalable-bridges-for-blockchains/
- Horcrux: Synthesize, Split, Shift and Stay Alive; Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments https://www.ndss-symposium.org/ndss-paper/horcrux-synthesize-split-shift-and-stay-alive-preventing-channel-depletion-via-universal-and-enhanced-multi-hop-payments/
Secure Protocols
“Handshake With Caution: Securing the Digital Dialogue”
- Rondo: Scalable and Reconfiguration-Friendly Randomness Beacon https://www.ndss-symposium.org/ndss-paper/rondo-scalable-and-reconfiguration-friendly-randomness-beacon/
- Distributed Function Secret Sharing and Applications https://www.ndss-symposium.org/ndss-paper/distributed-function-secret-sharing-and-applications/
- PQConnect: Automated Post-Quantum End-to-End Tunnels https://www.ndss-symposium.org/ndss-paper/pqconnect-automated-post-quantum-end-to-end-tunnels/
- Impact Tracing: Identifying the Culprit of Misinformation in Encrypted Messaging Systems https://www.ndss-symposium.org/ndss-paper/impact-tracing-identifying-the-culprit-of-misinformation-in-encrypted-messaging-systems/
- DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More https://www.ndss-symposium.org/ndss-paper/distefano-decentralized-infrastructure-for-sharing-trusted-encrypted-facts-and-nothing-more/
ML Backdoors
“Backdoors in ML: When the Algorithm Gets Tricked”
- CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models https://www.ndss-symposium.org/ndss-paper/clibe-detecting-dynamic-backdoors-in-transformer-based-nlp-models/
- Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum! https://www.ndss-symposium.org/ndss-paper/try-to-poison-my-deep-learning-data-nowhere-to-hide-your-trajectory-spectrum/
- LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm https://www.ndss-symposium.org/ndss-paper/ladder-multi-objective-backdoor-attack-via-evolutionary-algorithm/
- DShield: Defending against Backdoor Attacks on Graph Neural Networks via Discrepancy Learning https://www.ndss-symposium.org/ndss-paper/dshield-defending-against-backdoor-attacks-on-graph-neural-networks-via-discrepancy-learning/
- BARBIE: Robust Backdoor Detection Based on Latent Separability https://www.ndss-symposium.org/ndss-paper/barbie-robust-backdoor-detection-based-on-latent-separability/