Fenghao Dong (CMU)

Network packet traces are critical for security tasks which includes longitudinal traffic analysis, system testing, and future workload forecasting. However, storing these traces over extended periods is costly and subject to compliance constraints. Deep Generative Compression (DGC) offers a solution by generating inexact but structurally accurate synthetic traces that preserve essential features without storing full sensitive data. This paper examines key research questions on the feasibility, cost-competitiveness, and scalability of DGC for large-scale, real-world network environments. We investigate the types of applications that benefit from DGC and design a framework to reliably operate for them. Our initial evaluation indicates that DGC can be an alternative to standard storage techniques (such as gzip or sampling) while meeting regulatory needs and resource limits. We further discuss open challenges and future directions, such as improving efficiency in streaming operations, optimizing model scalability, and addressing privacy risks in this scenario.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 118 [1] => 70 ) ) ) [post__not_in] => Array ( [0] => 19804 ) )

Learning Automated Defense Strategies Using Graph-Based Cyber Attack Simulations

Jakob Nyber, Pontus Johnson (KTH Royal Institute of Technology)

Read More

Understanding Miniapp Malware: Identification, Dissection, and Characterization

Yuqing Yang (The Ohio State University), Yue Zhang (Drexel University), Zhiqiang Lin (The Ohio State University)

Read More

type++: Prohibiting Type Confusion with Inline Type Information

Nicolas Badoux (EPFL), Flavio Toffalini (Ruhr-Universität Bochum, EPFL), Yuseok Jeon (UNIST), Mathias Payer (EPFL)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)