Generated by GPT-5-mini| NDSS Symposium | |
|---|---|
![]() | |
| Name | NDSS Symposium |
| Discipline | Computer security |
| Abbreviation | NDSS |
| Organizer | Internet Society |
| Country | United States |
| Frequency | Annual |
NDSS Symposium
The NDSS Symposium is an annual technical conference bringing together researchers, practitioners, and policymakers in computer security, cryptography, networking, privacy law, and cybercrime policy. It is organized by Internet Society affiliates and hosted in collaboration with institutions such as IETF, ICANN, CLEF, and academic centers including MIT, Stanford University, UC Berkeley, Carnegie Mellon University, and University of Cambridge. Participants have included individuals from National Security Agency, European Commission, NIST, DARPA, Google, Microsoft, Apple Inc., Facebook, Amazon (company), Cisco Systems, IBM, Intel, Qualcomm, and startup communities from Silicon Valley, Tel Aviv, Bangalore, and Shenzhen.
The symposium traces roots to early meetings among scholars connected to IETF working groups, USENIX, ACM, IEEE, and the Crypto (conference) community following influential events such as the Morris worm incident and policy responses led by Clifford Stoll. Early organizers included researchers from Bell Labs, Xerox PARC, DARPA, SRI International, RAND Corporation, and universities like Princeton University, Harvard University, Yale University, Columbia University, University of Pennsylvania, University of Oxford, and ETH Zurich. Over decades the symposium has seen keynote speakers from Alan Turing Institute, Royal Society, European Parliament, US Congress, Council on Foreign Relations, Amnesty International, Electronic Frontier Foundation, RSA Conference, and Black Hat. Major milestones paralleled developments such as the adoption of TLS, the publication of the CVE list by MITRE Corporation, and the rise of formal verification projects at Microsoft Research and Google Research.
Topics span applied cryptography, secure multiparty computation, post-quantum cryptography, blockchain (database), distributed systems security, IoT security, mobile security, cloud computing, hardware security, side-channel attacks, machine learning security, adversarial examples, and privacy-preserving data analysis. The symposium regularly features work connected to standards and bodies such as ISO/IEC JTC 1, IETF TLS Working Group, NIST Post-Quantum Cryptography Standardization, IEEE 802.11, 3GPP, ETSI, and regulatory frameworks like General Data Protection Regulation and discussions informed by cases from European Court of Justice. Researchers cite foundational results from Diffie–Hellman key exchange, RSA (cryptosystem), Elliptic-curve cryptography, SHA-2, SHA-3, AES, and algorithmic advances tied to teams at Princeton University, University of Waterloo, ETH Zurich, University of California, San Diego, and University of Maryland.
Governing structures include steering committees and program committees with members from ACM SIGSAC, IEEE S&P, IACR, OWASP, ISOC, and funding partners such as NSF, DARPA, European Research Council, Wellcome Trust, Bill & Melinda Gates Foundation, and industry labs at Google, Microsoft Research, IBM Research, Facebook AI Research, Amazon Web Services, Intel Labs, and Nokia Bell Labs. Chairs have come from Carnegie Mellon University, University of California, Berkeley, Cornell University, University of Washington, Technion – Israel Institute of Technology, Tsinghua University, and Keio University. The program committee process aligns with peer-review models used by ACM CCS, USENIX Security Symposium, IEEE Symposium on Security and Privacy, and Crypto (conference) with conflict-of-interest policies influenced by Committee on Publication Ethics principles.
Typical formats include peer-reviewed paper sessions, poster sessions, demonstration tracks, workshops, tutorials, and panels featuring members from FBI, Interpol, Europol, Department of Homeland Security, Ministry of Defence (United Kingdom), and Ministry of Defence (Israel). Events often coordinate with satellite workshops such as Workshop on Privacy in the Electronic Society, Symposium on Usable Privacy and Security, Workshop on Cryptographic Hardware and Embedded Systems, and hackathons supported by DEF CON, ShmooCon, BSides, and regional clusters like CanSecWest. Notable panels have included participants from Harvard Kennedy School, Stanford Law School, NYU School of Law, Columbia Law School, University of Chicago Law School, Brookings Institution, and RAND Corporation.
Proceedings are published in conjunction with archives maintained by organizations such as IEEE Xplore, ACM Digital Library, USENIX Association, and institutional repositories at MIT Libraries, Stanford Digital Repository, Harvard DASH, and arXiv. Authors frequently cite standards bodies including IETF, NIST, ISO, and patent offices like the United States Patent and Trademark Office. The symposium’s publication practices intersect with open science initiatives from Creative Commons, SPARC, and funders such as Wellcome Trust and Horizon 2020.
Work presented has influenced protocol design like TLS, QUIC, and secure routing work referenced by BGP studies, and has driven advances in vulnerability discovery tied to disclosures cataloged by MITRE Corporation and exploited in incidents involving Stuxnet and high-profile breaches at Target Corporation, Equifax, Yahoo!, Sony Pictures Entertainment, Marriott International, and Colonial Pipeline. Research has shaped policy and standards, impacting agencies such as NIST, European Union Agency for Cybersecurity, and legislative debates in bodies like United States Congress and European Parliament. Alumni of the symposium’s community have taken leadership roles at Google, Microsoft, Apple Inc., Amazon (company), Facebook, NSA, GCHQ, Interpol, World Economic Forum, Council of Europe, and academic positions at MIT, Stanford University, Carnegie Mellon University, Princeton University, and University of Cambridge.
Category:Computer security conferences