ACSAC A

49 papers

YearTitle / Authors
2017A Secure Mobile Authentication Alternative to Biometrics.
Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar
2017A Security-Mode for Carrier-Grade SDN Controllers.
Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska
2017Analysis of SEAndroid Policies: Combining MAC and DAC in Android.
Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang
2017Automated Analysis of Secure Internet of Things Protocols.
Jun Young Kim, Ralph Holz, Wen Hu, Sanjay Jha
2017Breaking and Fixing Destructive Code Read Defenses.
Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz
2017Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode.
Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet
2017Commoner Privacy And A Study On Network Traces.
Xiyue Deng, Jelena Mirkovic
2017DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting.
Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter
2017Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware.
Xiaolei Wang, Sencun Zhu, Dehua Zhou, Yuexiang Yang
2017ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers.
Ali Abbasi, Thorsten Holz, Emmanuele Zambon, Sandro Etalle
2017Ex-Ray: Detection of History-Leaking Browser Extensions.
Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William K. Robertson, Engin Kirda
2017Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information.
Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna
2017Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well.
Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl
2017Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones.
Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon
2017HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens.
Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic
2017I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication.
Jake Weidman, Jens Grossklags
2017Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security.
Jianyu Jiang, Shixiong Zhao, Danish Alsayed, Yuexuan Wang, Heming Cui, Feng Liang, Zhaoquan Gu
2017Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data.
Matteo Dell'Amico, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier
2017Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection.
Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue
2017Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps.
Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter
2017Marmite: Spreading Malicious File Reputation Through Download Graphs.
Gianluca Stringhini, Yun Shen, Yufei Han, Xiangliang Zhang
2017Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans.
Matús Nemec, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas
2017Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification.
Xiaoyu Cao, Neil Zhenqiang Gong
2017Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices.
Junya Ogasawara, Kenji Kono
2017Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning.
Uyeong Jang, Xi Wu, Somesh Jha
2017On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification.
Maliheh Shirvanian, Nitesh Saxena, Jesvin James George
2017Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks.
Long Cheng, Ke Tian, Danfeng (Daphne) Yao
2017Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior.
Timothy Barron, Nick Nikiforakis
2017Piston: Uncooperative Remote Runtime Patching.
Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna
2017Predicting Cyber Threats with Virtual Security Products.
Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy
2017Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017
2017Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel.
Peter C. Johnson, Sergey Bratus, Sean W. Smith
2017Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks.
Mingwei Zhang, Michalis Polychronakis, R. Sekar
2017Proxy Re-Encryption Based on Homomorphic Encryption.
Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwenolé Quellec, Michel Cozic
2017QUASAR: Quantitative Attack Space Analysis and Reasoning.
Richard Skowyra, Steven R. Gomez, David Bigelow, James Landry, Hamed Okhravi
2017RESECT: Self-Learning Traffic Filters for IP Spoofing Defense.
Jelena Mirkovic, Erik Kline, Peter L. Reiher
2017RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications.
Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu
2017Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.
Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng
2017SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks.
Lingwei Chen, Shifu Hou, Yanfang Ye
2017Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators.
Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico, Robert Scott
2017Spinner: Semi-Automatic Detection of Pinning without Hostname Verification.
Chris McMahon Stone, Tom Chothia, Flavio D. Garcia
2017Supplementing Modern Software Defenses with Stack-Pointer Sanity.
Anh Quach, Matthew Cole, Aravind Prakash
2017Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia
2017TRAKS: A Universal Key Management Scheme for ERTMS.
Richard James Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter
2017TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources.
Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed, Bill Chu, Xi Niu
2017The Devil's in The Details: Placing Decoy Routers in the Internet.
Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya
2017Towards Baselines for Shoulder Surfing on Mobile Authentication.
Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber
2017VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks.
Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens
2017n-Auth: Mobile Authentication Done Right.
Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö