ACSAC A

81 papers

YearTitle / Authors
20212D-2FA: A New Dimension in Two-Factor Authentication.
Maliheh Shirvanian, Shashank Agrawal
2021A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects.
Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, Mitsuaki Akiyama
2021A Look Back on a Function Identification Problem.
Hyungjoon Koo, Soyeon Park, Taesoo Kim
2021A formal analysis of IKEv2's post-quantum extension.
Stefan-Lukas Gazdag, Sophia Grundner-Culemann, Tobias Guggemos, Tobias Heider, Daniel Loebenberger
2021ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021
2021ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles.
Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro
2021Advanced System Resiliency Based on Virtualization Techniques for IoT Devices.
Jonas Röckl, Mykolai Protsenko, Monika Huber, Tilo Müller, Felix C. Freiling
2021An Efficient Man-Machine Recognition Method Based On Mouse Trajectory Feature De-redundancy.
Xiaofeng Lu, Zhenhan Feng, Jupeng Xia
2021An Exploration of ARM System-Level Cache and GPU Side Channels.
Patrick Cronin, Xing Gao, Haining Wang, Chase Cotton
2021BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor.
Zhong Guan, Gang Xiong, Gaopeng Gou, Zhen Li, Mingxin Cui, Chang Liu
2021BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang
2021Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu
2021Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services.
Sojhal Ismail Khan, Dominika C. Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed
2021CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech.
Zhaohe John Zhang, Edwin Yang, Song Fang
2021Crypto-Chain: A Relay Resilience Framework for Smart Vehicles.
Abubakar Sadiq Sani, Dong Yuan, Elisa Bertino, Zhao Yang Dong
2021Detecting Audio Adversarial Examples with Logit Noising.
Namgyu Park, Sangwoo Ji, Jong Kim
2021Detecting and Characterizing SMS Spearphishing Attacks.
Mingxuan Liu, Yiming Zhang, Baojun Liu, Zhou Li, Haixin Duan, Donghong Sun
2021Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions.
Hyunji Hong, Seunghoon Woo, Heejo Lee
2021Digit Semantics based Optimization for Practical Password Cracking Tools.
Haodong Zhang, Chuanwang Wang, Wenqiang Ruan, Junjie Zhang, Ming Xu, Weili Han
2021DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment.
Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang, Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet
2021Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications.
Evangelos Bitsikas, Christina Pöpper
2021Dynamic Taint Analysis versus Obfuscated Self-Checking.
Sebastian Banescu, Samuel Valenzuela, Marius Guggenmos, Mohsen Ahmadvand, Alexander Pretschner
2021Efficient, Private and Robust Federated Learning.
Meng Hao, Hongwei Li, Guowen Xu, Hanxiao Chen, Tianwei Zhang
2021Eluding ML-based Adblockers With Actionable Adversarial Examples.
Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq, Yu Hao, Guoren Li, Zheng Zhang, Xiaochen Zou
2021Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise.
Payton Walker, Nitesh Saxena
2021FINN: Fingerprinting Network Flows using Neural Networks.
Fatemeh Rezaei, Amir Houmansadr
2021FlexFilt: Towards Flexible Instruction Filtering for Security.
Leila Delshadtehrani, Sadullah Canakci, William Blair, Manuel Egele, Ajay Joshi
2021Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication.
Duo Lu, Yuli Deng, Dijiang Huang
2021Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location.
Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou
2021Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment.
Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang
2021ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun
2021Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph Feedback.
Shaltiel Eloul, Sean J. Moran, Jacob Mendel
2021Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD).
Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp
2021Keeping Safe Rust Safe with Galeed.
Elijah Rivera, Samuel Mergendahl, Howard E. Shrobe, Hamed Okhravi, Nathan Burow
2021LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems.
Niclas Kühnapfel, Stefan Preußler, Maximilian Noppel, Thomas Schneider, Konrad Rieck, Christian Wressnegger
2021MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks.
Thai-Dien Pham, Thien-Lac Ho, Tram Truong Huu, Tien-Dung Cao, Hong Linh Truong
2021MISA: Online Defense of Trojaned Models using Misattributions.
Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha
2021MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking.
Shize Zhang, Zhiliang Wang, Jiahai Yang, Xin Cheng, Xiaoqian Ma, Hui Zhang, Bo Wang, Zimu Li, Jianping Wu
2021Mitosis: Practically Scaling Permissioned Blockchains.
Giorgia Azzurra Marson, Sébastien Andreina, Lorenzo Alluminio, Konstantin Munichev, Ghassan Karame
2021Morphence: Moving Target Defense Against Adversarial Examples.
Abderrahmen Amich, Birhanu Eshete
2021OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks.
Mahshid Mehr Nezhad, Feng Hao
2021Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification.
Duy-Phuc Pham, Damien Marion, Matthieu Mastio, Annelie Heuser
2021On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks.
Zijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu, Neil Zhenqiang Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu
2021On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact.
Muhammad Taqi Raza, Yunqi Guo, Songwu Lu, Fatima Muhammad Anwar
2021Optimized Paillier's Cryptosystem with Fast Encryption and Decryption.
Huanyu Ma, Shuai Han, Hao Lei
2021Physical Logic Bombs in 3D Printers via Emerging 4D Techniques.
Tuan Le, Sriharsha Etigowni, Sizhuang Liang, Xirui Peng, H. Jerry Qi, Mehdi Javanmard, Saman A. Zonouz, Raheem Beyah
2021Platform-Oblivious Anti-Spam Gateway.
Yihe Zhang, Xu Yuan, Nian-Feng Tzeng
2021Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications.
Ismi Abidi, Vireshwar Kumar, Rijurekha Sen
2021Program Obfuscation via ABI Debiasing.
David Demicco, Rukayat Erinfolami, Aravind Prakash
2021ReCFA: Resilient Control-Flow Attestation.
Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma
2021Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI.
Taejune Park, Jaehyun Nam, Seung Ho Na, JaeWoong Chung, Seungwon Shin
2021Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization.
Antonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti, Alessio Merlo
2021Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments.
Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, Martin Henze
2021RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age.
Michael Moukarzel, Matthew Hicks
2021Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure.
Beom Heyn Kim, Hyoungshick Kim
2021Rupair: Towards Automatic Buffer Overflow Detection and Rectification for Rust.
Baojian Hua, Wanrong Ouyang, Chengman Jiang, Qiliang Fan, Zhizhong Pan
2021S2-CAN: Sufficiently Secure Controller Area Network.
Mert D. Pesé, Jay W. Schauer, Junhui Li, Kang G. Shin
2021SMap: Internet-wide Scanning for Spoofing.
Tianxiang Dai, Haya Schulmann
2021SODA: A System for Cyber Deception Orchestration and Automation.
Md Sajidul Islam Sajid, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md. Mazharul Islam, Walter Diong, Latifur Khan
2021Security of Multicarrier Time-of-Flight Ranging.
Patrick Leu, Martin Kotuliak, Marc Roeschlin, Srdjan Capkun
2021Sipster: Settling IOU Privately and Quickly with Smart Meters.
Sherman S. M. Chow, Ming Li, Yongjun Zhao, Wenqiang Jin
2021SoftMark: Software Watermarking via a Binary Function Relocation.
Honggoo Kang, Yonghwi Kwon, Sangjin Lee, Hyungjoon Koo
2021SolSaviour: A Defending Framework for Deployed Defective Smart Contracts.
Zecheng Li, Yu Zhou, Songtao Guo, Bin Xiao
2021Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks.
Hailong Hu, Jun Pang
2021Systematization of Password ManagerUse Cases and Design Paradigms.
James Simmons, Oumar Diallo, Sean Oesch, Scott Ruoti
2021TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment.
Mingyuan Gao, Hung Dang, Ee-Chien Chang
2021TLB Poisoning Attacks on AMD Secure Encrypted Virtualization.
Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng
2021The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android.
Sean Oesch, Anuj Gautam, Scott Ruoti
2021The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery.
Mingtian Tan, Zhe Zhou, Zhou Li
2021They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors.
Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic
2021Time to Rethink the Design of Qi Standard? Security and Privacy Vulnerability Analysis of Qi Wireless Charging.
Yi Wu, Zhuohang Li, Nicholas Van Nostrand, Jian Liu
2021Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things.
Rouzbeh Behnia, Attila Altay Yavuz
2021Towards Stalkerware Detection with Precise Warnings.
Yufei Han, Kevin Alejandro Roundy, Acar Tamersoy
2021Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace.
Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu
2021Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency.
Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, Bo Luo
2021Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains.
Xudong Pan, Mi Zhang, Yifan Yan, Min Yang
2021VASA: Vector AES Instructions for Security Applications.
Jean-Pierre Münch, Thomas Schneider, Hossein Yalame
2021VIA: Analyzing Device Interfaces of Protected Virtual Machines.
Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert
2021Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms.
Lannan Luo, Qiang Zeng, Bokai Yang, Fei Zuo, Junzhe Wang
2021What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP.
Borce Stojkovski, Gabriele Lenzini, Vincent Koenig, Salvador Rivas
2021argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries.
Pallavi Sivakumaran, Jorge Blasco