ACSAC A

61 papers

YearTitle / Authors
2019"
Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann
2019A game of "Cut and Mouse": bypassing antivirus by simulating user inputs.
Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra
2019Aegis: a context-aware security framework for smart home systems.
Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
2019An empirical study of SMS one-time password authentication in Android apps.
Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha
2019Analyzing control flow integrity with LLVM-CFI.
Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert
2019AppVeto: mobile application self-defense through resource access veto.
Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef
2019BakingTimer: privacy analysis of server-side request processing time.
Iskander Sánchez-Rola, Davide Balzarotti, Igor Santos
2019Casino royale: a deep exploration of illegal online gambling.
Hao Yang, Kun Du, Yubao Zhang, Shuang Hao, Zhou Li, Mingxuan Liu, Haining Wang, Hai-Xin Duan, Yazhou Shi, Xiaodong Su, Guang Liu, Zhifeng Geng, Jianping Wu
2019Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games.
Manar Mohamed, Prakash Shrestha, Nitesh Saxena
2019Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs.
Charalampos Stylianopoulos, Simon Kindström, Magnus Almgren, Olaf Landsiedel, Marina Papatriantafilou
2019Coordinated dataflow protection for ultra-high bandwidth science networks.
Vasudevan Nagendra, Vinod Yegneswaran, Phillip A. Porras, Samir R. Das
2019Cubismo: decloaking server-side malware via cubist program analysis.
Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jack W. Davidson
2019D2NN: a fine-grained dual modular redundancy framework for deep neural networks.
Yu Li, Yannan Liu, Min Li, Ye Tian, Bo Luo, Qiang Xu
2019DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi
2019Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations.
Chen Wang, S. Abhishek Anand, Jian Liu, Payton Walker, Yingying Chen, Nitesh Saxena
2019Detecting (absent) app-to-app authentication on cross-device short-distance channels.
Stefano Cristalli, Long Lu, Danilo Bruschi, Andrea Lanzi
2019Detecting organized eCommerce fraud using scalable categorical clustering.
Samuel Marchal, Sebastian Szyller
2019EIGER: automated IOC generation for accurate and interpretable endpoint malware detection.
Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Syogo Hayashi, Tatsuya Mori, Koushik Sen
2019FRAMER: a tagged-pointer capability system with memory safety applications.
Myoung Jin Nam, Periklis Akritidis, David J. Greaves
2019Function boundary detection in stripped binaries.
Jim Alves-Foss, Jia Song
2019FuzzBuilder: automated building greybox fuzzing environment for C/C++ library.
Joonun Jang, Huy Kang Kim
2019HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol.
Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac
2019How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections).
Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion
2019How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Zheng Li, Chengyu Hu, Yang Zhang, Shanqing Guo
2019I know what you did last login: inconsistent messages tell existence of a target's account to insiders.
Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama
2019Improving intrusion detectors by crook-sourcing.
Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao, Kevin W. Hamlen, Latifur Khan
2019JStap: a static pre-filter for malicious JavaScript detection.
Aurore Fass, Michael Backes, Ben Stock
2019Koinonia: verifiable e-voting with long-term privacy.
Huangyi Ge, Sze Yiu Chau, Victor E. Gonsalves, Huian Li, Tianhao Wang, Xukai Zou, Ninghui Li
2019Leveraging locality of reference for certificate revocation.
Luke Dickinson, Trevor Smith, Kent E. Seamons
2019MalRank: a measure of maliciousness in SIEM-based knowledge graphs.
Pejman Najafi, Alexander Mühle, Wenzel Pünter, Feng Cheng, Christoph Meinel
2019Mining least privilege attribute based access control policies.
Matthew W. Sanders, Chuan Yue
2019Mitigating data leakage by protecting memory-resident sensitive data.
Tapti Palit, Fabian Monrose, Michalis Polychronakis
2019Model inversion attacks against collaborative inference.
Zecheng He, Tianwei Zhang, Ruby B. Lee
2019My script engines know what you did in the dark: converting engines into script API tracers.
Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura
2019Neurlux: dynamic malware analysis without feature engineering.
Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna
2019Nibbler: debloating binary shared libraries.
Ioannis Agadakos, Di Jin, David Williams-King, Vasileios P. Kemerlis, Georgios Portokalidis
2019Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones.
Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino
2019Out of control: stealthy attacks against robotic vehicles protected by control-based techniques.
Pritam Dash, Mehdi Karimibiuki, Karthik Pattabiraman
2019PDoT: private DNS-over-TLS with TEE support.
Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik
2019Premadoma: an operational solution for DNS registries to prevent malicious domain registrations.
Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet
2019Privacy preserving substring search protocol with polylogarithmic communication cost.
Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi
2019Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019
David M. Balenson
2019Progressive processing of system-behavioral query.
Jiaping Gui, Xusheng Xiao, Ding Li, Chung Hwan Kim, Haifeng Chen
2019Proof of aliveness.
Chenglu Jin, Zheng Yang, Marten van Dijk, Jianying Zhou
2019Revisiting utility metrics for location privacy-preserving mechanisms.
Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel
2019Robust keystroke transcription from the acoustic side-channel.
David Slater, Scott Novotney, Jessica Moore, Sean Morgan, Scott Tenaglia
2019SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks.
Mahsa Foruhandeh, Yanmao Man, Ryan M. Gerdes, Ming Li, Thidapat Chantem
2019SIP shaker: software integrity protection composition.
Mohsen Ahmadvand, Dennis Fischer, Sebastian Banescu
2019SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities.
Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Haoliang Lu, Longquan Liu, Chen Wang, Dandan Sun, Chao Zhang, Baoxu Liu
2019STRIP: a defence against trojan attacks on deep neural networks.
Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith Chinthana Ranasinghe, Surya Nepal
2019SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments.
Saeid Mofrad, Ishtiaq Ahmed, Shiyong Lu, Ping Yang, Heming Cui, Fengwei Zhang
2019Sleak: automating address space layout derandomization.
Christophe Hauser, Jayakrishna Menon, Yan Shoshitaishvili, Ruoyu Wang, Giovanni Vigna, Christopher Kruegel
2019Speculator: a tool to analyze speculative execution attacks and mitigations.
Andrea Mambretti, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus
2019Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems.
Ronny Chevalier, David Plaquin, Chris I. Dalton, Guillaume Hiet
2019Systematic comparison of symbolic execution systems: intermediate representation and its generation.
Sebastian Poeplau, Aurélien Francillon
2019TF-BIV: transparent and fine-grained binary integrity verification in the cloud.
Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, Ziqiang Ma
2019The chatty-sensor: a provably-covert channel in cyber physical systems.
Amir Herzberg, Yehonatan Kfir
2019VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching.
Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
2019Whisper: a unilateral defense against VoIP traffic re-identification attacks.
Tavish Vaidya, Timothy Walsh, Micah Sherr
2019Will you trust this TLS certificate?: perceptions of people working in IT.
Martin Ukrop, Lydia Kraus, Vashek Matyas, Heider Ahmad Mutleq Wahsheh
2019WooKey: designing a trusted and efficient USB device.
Ryad Benadjila, Arnauld Michelizza, Mathieu Renard, Philippe Thierry, Philippe Trebuchet