NDSS 2019论文录用列表

NDSS 会议(全称The Network and Distributed System Security Symposium)是和CCS,USENIX SECURITY及IEEE S&P并称的计算机系统安全领域的四大顶级会议之一。CCF B 类会议,2019年共收到521篇论文(2018: 331篇), 共录取了89份论文(2018: 71篇),接收率为17.08%(2018: 21.5%),所有录用论文标题如下:

Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild

Marius Steffens and Christian Rossow (CISPA Helmholtz Center i.G.); Martin Johns (TU Braunschweig); Ben Stock (CISPA Helmholtz Center i.G.)

Countering Malicious Processes with Process-DNS Association

Suphannee Sivakorn (Columbia University); Kangkook Jee (NEC Labs America); Yixin Sun (Princeton University); Lauri Kort-Parn (Cyber Defense Institute); Zhichun Li, Cristian Lumezanu, Lu-An Tang, and Ding Li (NEC Labs America)

A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence

Bingsheng Zhang (Lancaster University); Roman Oliynykov (IOHK Ltd.); Hamed Balogun (Lancaster University)

The Unexpected Danger of UX Features: A Case of Sensitive Data Leakage of Drivers in Ride-Hailing Services

Qingchuan Zhao and Chaoshun Zuo (The Ohio State University); Giancarlo Pellegrino (CISPA, Saarland University; Stanford University); Zhiqiang Lin (The Ohio State University)

Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web

Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, and Seungwon Shin (KAIST)

Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers

Gabriel Kaptchuk and Matthew Green (Johns Hopkins University); Ian Miers (Cornell Tech)

Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing

Jiyong Yu and Lucas Hsiung (UIUC); Mohamad El’Hajj (EPFL); Christopher Fletcher (UIUC)

MBeacon: Privacy-Preserving Beacons for DNA Methylation Data

Inken Hagestedt and Yang Zhang (CISPA, Saarland University); Mathias Humbert (Swiss Data Science Center, ETH Zurich/EPFL); Pascal Berrang (CISPA, Saarland University); Haixu Tang and Xiaofeng Wang (Indiana University Bloomington); Michael Backes (CISPA Helmholtz Center i.G.)

Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based

David Derler (DFINITY); Kai Samelin (TÜV Rheinland i-sec GmbH); Daniel Slamanig and Christoph Striecks (AIT Austrian Institute of Technology)

TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V

Samuel Weiser and Mario Werner (Graz University of Technology); Ferdinand Brasser (Technische Universität Darmstadt); Maja Malenko and Stefan Mangard (Graz University of Technology); Ahmad-Reza Sadeghi (Technische Universität Darmstadt)

Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation

Panagiotis Papadopoulos (FORTH-ICS, Greece); Panagiotis Ilia (FORTH-ICS); Michalis Polychronakis (Stony Brook University, USA); Evangelos Markatos, Sotiris Ioannidis, and Giorgos Vasiliadis (FORTH-ICS, Greece)

UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks

Mridula Singh, Patrick Leu, and Srdjan Capkun (ETH Zurich, Switzerland)

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models

Ahmed Salem and Yang Zhang (CISPA, Saarland University); Mathias Humbert (Swiss Data Science Center, ETH Zurich/EPFL); Pascal Berrang (CISPA, Saarland University); Mario Fritz and Michael Backes (CISPA Helmholtz Center i.G.)

Distinguishing Attacks from Legitimate Authentication Traffic at Scale

Cormac Herley (Microsoft); Stuart Schechter (Unaffiliated)

Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries

Ruian Duan, Ashish Bijlani, Yang Ji, and Omar Alrawi (Georgia Institute of Technology); Yiyuan Xiong (Peking University); Moses Ike, Brendan Saltaformaggio, and Wenke Lee (Georgia Institute of Technology)

TextBugger: Generating Adversarial Text Against Real-world Applications

Jinfeng Li, Shouling Ji, and Tianyu Du (Zhejiang University); Bo Li (University of California, Berkeley); Ting Wang (Lehigh University)

YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes

Sourav Das, Vinay Joseph Ribeiro, and Abhijeet Anand (Department of Computer Science and Engineering, Indian Institute of Technology Delhi)

Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers

Meng Luo, Pierre Laperdrix, Nima Honarmand, and Nick Nikiforakis (Stony Brook University)

Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data

Kostas Drakonakis, Panagiotis Ilia, and Sotiris Ioannidis (FORTH, Greece); Jason Polakis (University of Illinois at Chicago, USA)

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Michael Schwarz, Florian Lackner, and Daniel Gruss (Graz University of Technology)

Establishing Software Root of Trust Unconditionally

Virgil Gligor (Carnegie Mellon University); Maverick Woo (unaffiliated)

Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment

Daoyuan Wu and Debin Gao (Singapore Management University); Rocky K. C. Chang (The Hong Kong Polytechnic University); En He (China Electronic Technology Cyber Security Co., Ltd.); Eric K. T. Cheng (The Hong Kong Polytechnic University); Robert H. Deng (Singapore Management University)

PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary

Dokyung Song (University of California, Irvine); Felicitas Hetzelt (Technical University of Berlin); Dipanjan Das and Chad Spensky (University of California, Santa Barbara); Yeoul Na (University of California, Irvine); Stijn Volckaert (University of California, Irvine and KU Leuven); Giovanni Vigna and Christopher Kruegel (University of California, Santa Barbara); Jean-Pierre Seifert (Technical University of Berlin); Michael Franz (University of California, Irvine)

Total Recall: Persistence of Password in Android

Jaeho Lee, Ang Chen, and Dan S. Wallach (Rice University)

DNS Cache-Based User Tracking

Amit Klein and Benny Pinkas (Bar Ilan University)

Thunderclap: Exploiting the Attack Surface of Operating-System IOMMU Protection with DMA from Malicious Peripherals

A. Theodore Markettos and Colin Rothwell (University of Cambridge); Brett F. Gutstein (Rice University); Allison Pearce (University of Cambridge); Peter G. Neumann (SRI International); Simon W. Moore and Robert N. M. Watson (University of Cambridge)

TEE-aided Write Protection Against Privileged Data Tampering

Lianying Zhao and Mohammad Mannan (Concordia University)

Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems

Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, and Amit K. Roy Chowdhury (University of California Riverside); Ananthram Swami (United States Army Research Laboratory)

The Crux of Voice (In)Security: A Brain Study of Speaker Legitimacy Detection

Ajaya Neupane (University of California Riverside); Nitesh Saxena (University of Alabama at Birmingham); Leanne Hirshfield and Sarah Elaine Bratt (Syracuse University)

Statistical Privacy for Streaming Traffic

Xiaokuan Zhang and Jihun Hamm (The Ohio State University); Michael K. Reiter (University of North Carolina at Chapel Hill); Yinqian Zhang (The Ohio State University)

Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries

Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael Abu-Ghazaleh, and Srikanth V. Krishnamurthy (University of California Riverside); Edward J. M. Colbert (Virgnia Tech); Paul Yu (U.S. Army Research Lab (ARL))

Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation

Binghui Wang, Jinyuan Jia, and Neil Zhenqiang Gong (Iowa State University)

Cracking Wall of Confinement: Understanding and Analyzing Malicious Domain Takedowns

Eihal Alowaisheq (Indiana University, King Saud University); Peng Wang (Indiana University); Sumayah Alrwais (King Saud University); Xiaojin Leo and Xaiofeng Wang (Indiana University); Tasneem Alowaisheq (Indiana University, King Saud University); XiangHang Mi and Siyuan Tang (Indiana University); Baojun Liu (unaffiliated)

SABRE: Protecting Bitcoin against Routing Attacks

Maria Apostolaki, Gian Marti, Jan Müller, and Laurent Vanbever (ETH Zurich)

CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines

HyungSeok Han, DongHyeon Oh, and Sang Kil Cha (KAIST)

A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems

Cheng Feng (Imperial College London); Venkata Reddy Palleti (Singapore University of Technology and Design); Deeph Chana (Imperial College London); Aditya Mathur (Singapore University of Technology and Design)

ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries

Anastasis Keliris (NYU); Michail Maniatakos (NYU Abu Dhabi)

Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers

Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, and George Danezis (University College London (UCL))

A First Look into the Facebook Advertising Ecosystem

Athanasios Andreou (EURECOM); Márcio Silva and Fabrício Benevenuto (UFMG); Oana Goga (Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG); Patrick Loiseau (Univ. Grenoble Alpes, CNRS, Inria, Grenoble INP, LIG & MPI-SWS); Alan Mislove (Northeastern University)

Adversarial Attacks Against Automatic Speech Recognition Systems via Psychoacoustic Hiding

Lea Schönherr, Katharina Kohls, Steffen Zeiler, Thorsten Holz, and Dorothea Kolossa (Ruhr University Bochum)

Latex Gloves: Protecting Browser Extensions from Probing and Revelation Attacks

Alexander Sjösten, Steven Van Acker, Pablo Picazo-Sanchez, and Andrei Sabelfeld (Chalmers University of Technology)

Vault: Fast Bootstrapping for Cryptocurrencies

Derek Leung, Adam Suhl, Yossi Gilad, and Nickolai Zeldovich (MIT CSAIL)

rORAM: Efficient Range ORAM with O(log2 N) Locality

Anrin Chakraborti (Stony Brook University); Adam J. Aviv, Seung Geol Choi, Travis Mayberry, and Daniel S. Roche (United States Naval Academy); Radu Sion (Stony Brook University)

IoTGuard: Dynamic Enforcement of Security and Safety Policy in Commodity IoT

Z. Berkay Celik, Gang Tan, and Patrick McDaniel (Penn State University)

Ginseng: Keeping Secrets in Registers When You Distrust the Operating System

Min Hong Yun and Lin Zhong (Rice University)

Privacy-preserving Multi-hop Locks for Blockchain Scalability and Interoperability

Giulio Malavolta (Friedrich-Alexander University Erlangen-Nürnberg); Pedro Moreno Sanchez (Purdue University); Clara Schneidewind and Matteo Maffei (TU Wien); Aniket Kate (Purdue University)

Constructing an Adversary Solver for Equihash

Xiaofei Bai, Jian Gao, Chenglong Hu, and Liang Zhang (School of Computer Science, Fudan University)

One Engine To Serve’em All: Inferring Taint Rules Without Architectural Semantics

Zheng Leong Chua (National University of Singapore); Yanhao Wang (TCA/SKLCS, Institute of Software, Chinese Academy of Sciences); Teodora Baluta, Prateek Saxena, and Zhenkai Liang (National University of Singapore); Purui Su (TCA/SKLCS, Institute of Software, Chinese Academy of Sciences)

NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage

Wajih Ul Hassan (NEC Laboratories America, Inc.; University of Illinois at Urbana-Champaign); Shengjian Guo (Virginia Tech); Ding Li, Zhengzhang Chen, Kangkook Jee, and Zhichun Li (NEC Laboratories America, Inc.); Adam Bates (University of Illinois at Urbana-Champaign)

How to end password reuse on the web

Ke Coby Wang and Michael K. Reiter (UNC Chapel Hill)

Robust Performance Metrics for Authentication Systems

Shridatt Sugrim (Rutgers Universty); Can Liu, Meghan McLean, and Janne Lindqvist (Rutgers University)

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin Butler, and Joseph Wilson (University of Florida)

Nearby Threats: Reversing, Analyzing, and Attacking Google’s “Nearby Connections” on Android

Daniele Antonioli (Singapore University of Technology and Design (SUTD)); Nils Ole Tippenhauer (CISPA); Kasper B. Rasmussen (University of Oxford)

REDQUEEN: Fuzzing with Input-to-State Correspondence

Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz (Ruhr-Universität Bochum)

We Value Your Privacy … Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy

Martin Degeling, Christine Utz, Christopher Lentzsch, and Henry Hosseini (Ruhr-Universität Bochum); Florian Schaub (University of Michigan); Thorsten Holz (Ruhr-Universität Bochum)

Rigging Research Results by Manipulating Top Websites Rankings

Victor Le Pochat and Tom Van Goethem (imec-DistriNet, KU Leuven); Samaneh Tajalizadehkhoob (Delft University of Technology); Maciej Korczynski (Grenoble Institute of Technology); Wouter Joosen (imec-DistriNet, KU Leuven)

Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers

Muhammad Ahmad Bashir (Northeastern University); Umar Farooq and Maryam Shahid (LUMS Pakistan); Christo Wilson (Northeastern University); Muhammad Fareed Zaffar (LUMS Pakistan)

Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion

Cas Cremers (CISPA Helmholtz Center i.G., Saarbrücken); Martin Dehnel-Wild (University of Oxford)

DroidCap: OS Support for Capability-based Permissions in Android

Abdallah Dawoud (CISPA, Saarland University); Sven Bugiel (CISPA Helmholtz Center i.G.)

On the Challenges of Geographical Avoidance for Tor

Katharina Kohls, Kai Jansen, David Rupprecht, and Thorsten Holz (Ruhr-University Bochum); Christina Pöpper (New York University Abu Dhabi)

ExSpectre: Hiding Malware in Speculative Execution

Jack Wampler, Ian Martiny, and Eric Wustrow (University of Colorado Boulder)

ConcurORAM: High-Throughput Stateless Parallel Multi-Client ORAM

Anrin Chakraborti and Radu Sion (Stony Brook University)

NAUTILUS: Fishing for Deep Bugs with Grammars

Cornelius Aschermann (Ruhr-Universität Bochum); Tommaso Frassetto (Technische Universität Darmstadt); Thorsten Holz (Ruhr-Universität Bochum); Patrick Jauernig and Ahmad-Reza Sadeghi (Technische Universität Darmstadt); Daniel Teuchert (Ruhr-Universität Bochum)

Seth: Protecting Existing Smart Contracts Against Re-Entrancy Attacks

Michael Rodler (University of Duisburg-Essen); Wenting Li and Ghassan Karame (NEC Laboratories, Germany); Lucas Davi (University of Duisburg-Essen)

NIC: Detecting Adversarial Samples with Neural Network Invariant Checking

Shiqing Ma, Yingqi Liu, Guanhong Tao, Wen-Chuan Lee, and Xiangyu Zhang (Purdue University)

How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories

Michael Meli (North Carolina State University); Matthew McNiece (Cisco Systems and North Carolina State University); Bradley Reaves (North Carolina State University)

DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems

Tigist Abera, Raad Bahmani, Ferdinand Brasser, Ahmad Ibrahim, and Ahmad-Reza Sadeghi (Technische Universität Darmstadt); Matthias Schunter (Intel Labs)

Analyzing Semantic Correctness using Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification

Sze Yiu Chau (Purdue University); Moosa Yahyazadeh and Omar Chowdhury (The University of Iowa); Aniket Kate and Ninghui Li (Purdue University)

Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption

Kimia Tajik and Akshith Gunasekharan (Oregon State University); Rhea Dutta (Cornell University); Brandon Ellis, Rakesh B. Bobba, and Mike Rosulek (Oregon State University); Charles V. Wright and Wu-Chi Feng (Portland State University)

Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai

Orcun Cetin, Carlos Ganan, and Lisette Altena (Delft University of Technology); Daisuke Inoue and Takahiro Kasama (National Institute of Information and Communications Technology); Kazuki Tamiya, Ying Tie, and Katsunari Yoshioka (Yokohama National University); Michel van Eeten (Delft University of Technology)

Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information

Syed Rafiul Hussain (Purdue University); Mitziu Echeverria and Omar Chowdhury (University of Iowa); Ninghui Li and Elisa Bertino (Purdue University)

Digital Healthcare-Associated Infection Analysis of a Major Multi-Campus Hospital System

Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin Butler, and Patrick Traynor (University of Florida)

SANCTUARY: ARMing TrustZone with User-space Enclaves

Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, and Emmanuel Stapf (Technische Universität Darmstadt)

RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Tohid Shekari, Christian Bayens, Morris Cohen, Lukas Graber, and Raheem Beyah (ECE, Georgia Tech)

BadBluetooth: Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals

Fenghao Xu (The Chinese University of Hong Kong); Wenrui Diao (Jinan University); Zhou Li (IEEE Member); Jiongyi Chen and Kehuan Zhang (The Chinese University of Hong Kong)

Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet

Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, and Dave Levin (University of Maryland)

Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs

Fei Zuo, Xiaopeng Li, and Zhexin Zhang (University of South Carolina); Patrick Young (Temple University); Lannan Luo and Qiang Zeng (University of South Carolina)

Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory

Milad Nasr (University of Massachusetts Amherst); Sadegh Farhang (Pennsylvania State University); Amir Houmansadr (University of Massachusetts Amherst); Jens Grossklags (Technical University of Munich)

Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing

Lei Zhao (Wuhan University); Yue Duan and Heng Yin (University of California, Riverside); Jifeng Xuan (Wuhan University)

The use of TLS in Censorship Circumvention

Sergey Frolov and Eric Wustrow (University of Colorado Boulder)

OBFSCURO: A Commodity Obfuscation Engine on Intel SGX

Adil Ahmad (Purdue); Byunggill Joe (KAIST); Yuan Xiao and Yinqian Zhang (Ohio State University); Insik Shin (KAIST); Byoungyoung Lee (Purdue/SNU)

Mind your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises

Platon Kotzias (IMDEA Software Institute, Universidad Politécnica de Madrid); Leyla Bilge and Pierre-Antoine Vervier (Symantec Research Labs); Juan Caballero (IMDEA Software Institute)

Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications

Yangyong Zhang, Lei Xu, Abner Mendoza, Guangliang Yang, Phakpoom Chinprutthiwong, and Guofei Gu (TAMU)

Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints

Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Prateek Saxena, and Abhik Roychoudhury (National University of Singapore)

Private Continual Release of Real-Valued Data Streams

Victor Perrier (Data61, CSIRO and ISAE-SUPAERO); Hassan Jameel Asghar and Dali Kaafar (Macquarie University and Data61, CSIRO)

Profit: Detecting and Quantifying Side Channels in Networked Applications

Nicolás Rosner and Ismet Burak Kadron (University of California, Santa Barbara); Lucas Bang (Harvey Mudd College); Tevfik Bultan (University of California, Santa Barbara)

CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C++

Jangseop Shin, Donghyun Kwon, and Jiwon Seo (Seoul National University and Inter-University Semiconductor Research Center); Yeongpil Cho (Soongsil University); Yunheung Paek (Seoul National University and Inter-University Semiconductor Research Center)

Oligo-Snoop: A Non-Invasive Side Channel Attack Against DNA Synthesis Machines

Sina Faezi, Sujit Rokka Chhetri, Arnav Vaibhav Malawade, and John Charles Chaput (University of California, Irvine); William Grover and Philip Brisk (University of California, Riverside); Mohammad Abdullah Al Faruque (University of California, Irvine)

maTLS: How to Make TLS middlebox-aware?

Hyunwoo Lee (Seoul National University); Zachary Smith (University of Luxembourg); Junghwan Lim, Gyeongjae Choi, and Selin Chun (Seoul National University); Taejoong Chung (Rochester Institute of Technology); Taekyoung Ted Kwon (Seoul National University)

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 157,298评论 4 360
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 66,701评论 1 290
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 107,078评论 0 237
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 43,687评论 0 202
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 52,018评论 3 286
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 40,410评论 1 211
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 31,729评论 2 310
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 30,412评论 0 194
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 34,124评论 1 239
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 30,379评论 2 242
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 31,903评论 1 257
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 28,268评论 2 251
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 32,894评论 3 233
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 26,014评论 0 8
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 26,770评论 0 192
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 35,435评论 2 269
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 35,312评论 2 260

推荐阅读更多精彩内容

  • rljs by sennchi Timeline of History Part One The Cognitiv...
    sennchi阅读 7,096评论 0 10
  • **2014真题Directions:Read the following text. Choose the be...
    又是夜半惊坐起阅读 8,543评论 0 23
  • 今天是拓展训练的第一天,七年前我在大一也是来到了这个地方,参加了拓展训练,那时单纯,幼稚,在这遇见了一位比较好看的...
    晓玖的碎碎念阅读 448评论 0 1
  • --以下内容于2017年5月13日记录于本人产品微博:http://weibo.com/cuibenbenpm 最...
    崔玉龑阅读 251评论 0 0
  • 昨天学习的种子用完了,一直都处于懈怠学习的状态。今天猛然间发现这个问题,在经过激烈的斗争(一个人在家是看会儿电视还...
    jessie娟子阅读 141评论 0 3