ACSAC A

71 papers

YearTitle / Authors
2020A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs.
Sanjeev Das, Kedrian James, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose
2020ACSAC '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020
2020AVclass2: Massive Malware Tag Extraction from AV Labels.
Silvia Sebastián, Juan Caballero
2020Advanced Windows Methods on Malware Detection and Classification.
Dima Rabadi, Sin G. Teo
2020App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts.
Aisha I. Ali-Gombe, Alexandra Tambaoan, Angela Gurfolino, Golden G. Richard III
2020Attacking Graph-Based Classification without Changing Existing Connections.
Xuening Xu, Xiaojiang Du, Qiang Zeng
2020Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions.
Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef
2020CAPS: Smoothly Transitioning to a More Resilient Web PKI.
Stephanos Matsumoto, Jay Bosamiya, Yucheng Dai, Paul C. van Oorschot, Bryan Parno
2020CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications.
Yuhang Lin, Olufogorehan Tunde-Onadele, Xiaohui Gu
2020Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal, Elisa Bertino
2020Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems.
Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer
2020Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing.
Emre Güler, Philipp Görz, Elia Geretto, Andrea Jemmett, Sebastian Österlund, Herbert Bos, Cristiano Giuffrida, Thorsten Holz
2020DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC.
Gaganjeet Singh Reen, Christian Rossow
2020DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching.
Nian Xue, Liang Niu, Xianbin Hong, Zhen Li, Larissa Hoffaeller, Christina Pöpper
2020Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation.
Chen Cao, Le Guan, Jiang Ming, Peng Liu
2020Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns.
Timothy J. Forman, Adam J. Aviv
2020Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild.
Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt
2020Effect of Security Controls on Patching Window: A Causal Inference based Approach.
Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac
2020Efficient Oblivious Substring Search via Architectural Support.
Nicholas Mainardi, Davide Sampietro, Alessandro Barenghi, Gerardo Pelosi
2020FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms.
Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit
2020Faulty Point Unit: ABI Poisoning Attacks on Intel SGX.
Fritz Alder, Jo Van Bulck, David F. Oswald, Frank Piessens
2020Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems.
Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe
2020FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis.
Mingeun Kim, Dongkwan Kim, Eunsoo Kim, Suryeon Kim, Yeongjin Jang, Yongdae Kim
2020GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, Dan Meng
2020Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine.
Fadi Yilmaz, Meera Sridhar, Wontae Choi
2020HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities.
Zekun Shen, Brendan Dolan-Gavitt
2020Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems.
Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
2020IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables.
Prakash Shrestha, Zengrui Liu, Nitesh Saxena
2020LeakyPick: IoT Audio Spy Detector.
Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi
2020Measurements of the Most Significant Software Security Weaknesses.
Carlos Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye
2020Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications.
Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng
2020More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication.
Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono
2020NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services.
Dario Ferrari, Michele Carminati, Mario Polino, Stefano Zanero
2020NoiseScope: Detecting Deepfake Images in a Blind Setting.
Jiameng Pu, Neal Mangaokar, Bolun Wang, Chandan K. Reddy, Bimal Viswanath
2020On the Feasibility of Automating Stock Market Manipulation.
Carter Yagemann, Simon P. Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee
2020On the Forensic Validity of Approximated Audit Logs.
Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, Adam Bates
2020Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability.
Yangguang Tian, Nan Li, Yingjiu Li, Pawel Szalachowski, Jianying Zhou
2020Practical Fine-Grained Binary Code Randomization†.
Soumyakant Priyadarshan, Huan Nguyen, R. Sekar
2020Practical Over-Threshold Multi-Party Private Set Intersection.
Rasoul Akhavan Mahdavi, Thomas Humphries, Bailey Kacsmar, Simeon Krastnikov, Nils Lukas, John A. Premkumar, Masoumeh Shafieinejad, Simon Oya, Florian Kerschbaum, Erik-Oliver Blass
2020Privacy-Preserving Production Process Parameter Exchange.
Jan Pennekamp, Erik Buchholz, Yannik Lockner, Markus Dahlmanns, Tiandong Xi, Marcel Fey, Christian Brecher, Christian Hopmann, Klaus Wehrle
2020Probabilistic Naming of Functions in Stripped Binaries.
James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder
2020Quantifying measurement quality and load distribution in Tor.
André Greubel, Steffen Pohl, Samuel Kounev
2020Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers.
Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach
2020Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices.
Kuniyasu Suzaki, Akira Tsukamoto, Andy Green, Mohammad Mannan
2020RusTEE: Developing Memory-Safe ARM TrustZone Applications.
Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, Xu He
2020SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers.
Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag, Luca Allodi
2020SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation.
Jianwei Tai, Xiaoqi Jia, Qingjia Huang, Weijuan Zhang, Haichao Du, Shengzhi Zhang
2020SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes.
Corentin Thomasset, David Barrera
2020Secure and Verifiable Inference in Deep Neural Networks.
Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haomiao Yang, Kan Yang, Robert H. Deng
2020Security Study of Service Worker Cross-Site Scripting.
Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Guofei Gu
2020Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication.
Yang Xiao, Shanghao Shi, Ning Zhang, Wenjing Lou, Y. Thomas Hou
2020Set It and Forget It! Turnkey ECC for Instant Integration.
Dmitry Belyavsky, Billy Bob Brumley, Jesús-Javier Chi-Domínguez, Luis Rivera-Zamarripa, Igor Ustinov
2020Spotlight: Malware Lead Generation at Scale.
Fabian Kaczmarczyck, Bernhard Grill, Luca Invernizzi, Jennifer Pullman, Cecilia M. Procopiuc, David Tao, Borbala Benko, Elie Bursztein
2020StegoNet: Turn Deep Neural Network into a Stegomalware.
Tao Liu, Zihao Liu, Qi Liu, Wujie Wen, Wenyao Xu, Ming Li
2020Talek: Private Group Messaging with Hidden Access Patterns.
Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno
2020The Tangled Genealogy of IoT Malware.
Emanuele Cozzi, Pierre-Antoine Vervier, Matteo Dell'Amico, Yun Shen, Leyla Bilge, Davide Balzarotti
2020This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates
2020Towards Realistic Membership Inferences: The Case of Survey Data.
Luke A. Bauer, Vincent Bindschaedler
2020Towards a Practical Differentially Private Collaborative Phone Blacklisting System.
Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad
2020Understanding Promotion-as-a-Service on GitHub.
Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang
2020Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK.
Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti
2020Up2Dep: Android Tool Support to Fix Insecure Code Dependencies.
Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel
2020Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices.
Mahmoud Ammar, Bruno Crispo
2020VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment.
Linghan Zhang, Sheng Tan, Zi Wang, Yili Ren, Zhi Wang, Jie Yang
2020Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks.
Maliheh Shirvanian, Manar Mohamed, Nitesh Saxena, S. Abhishek Anand
2020WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training.
Cong Shi, Yan Wang, Yingying Chen, Nitesh Saxena, Chen Wang
2020Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond.
Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber
2020Workflow Integration Alleviates Identity and Access Management in Serverless Computing.
Arnav Sankaran, Pubali Datta, Adam Bates
2020ZeroAUDIT.
Aman Luthra, James Cavanaugh, Hugo Renzzo Olcese, Rina M. Hirsch, Xiang Fu
2020dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets.
Yiming Zhang, Yiyue Qian, Yujie Fan, Yanfang Ye, Xin Li, Qi Xiong, Fudong Shao
2020ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert