ACSAC A

74 papers

YearTitle / Authors
2022A Qualitative Evaluation of Reverse Engineering Tool Usability.
James Mattei, Madeline McLaughlin, Samantha Katcher, Daniel Votipka
2022A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices.
Afsah Anwar, Yi Hui Chen, Roy Hodgman, Tom Sellers, Engin Kirda, Alina Oprea
2022AFLGuard: Byzantine-robust Asynchronous Federated Learning.
Minghong Fang, Jia Liu, Neil Zhenqiang Gong, Elizabeth S. Bentley
2022Accept All Exploits: Exploring the Security Impact of Cookie Banners.
David Klein, Marius Musch, Thomas Barber, Moritz Kopmann, Martin Johns
2022Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing.
Yiru Zhao, Xiaoke Wang, Lei Zhao, Yueqiang Cheng, Heng Yin
2022Analysis of Payment Service Provider SDKs in Android.
Samin Yaseer Mahmud, K. Virgil English, Seaver Thorn, William Enck, Adam Oest, Muhammad Saad
2022Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022
2022ArchiveSafe LT: Secure Long-term Archiving System.
Moe Sabry, Reza Samavi
2022Are There Wireless Hidden Cameras Spying on Me?
Jeongyoon Heo, Sangwon Gil, Youngman Jung, Jinmok Kim, Donguk Kim, Woojin Park, Yongdae Kim, Kang G. Shin, Choong-Hoon Lee
2022Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks.
Alessandro Erba, Nils Ole Tippenhauer
2022BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems.
Anomadarshi Barua, Lelin Pan, Mohammad Abdullah Al Faruque
2022Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification.
Liyue Shen, Yanjun Zhang, Jingwei Wang, Guangdong Bai
2022Boosting Neural Networks to Decompile Optimized Binaries.
Ying Cao, Ruigang Liang, Kai Chen, Peiwei Hu
2022Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation.
Qian Ren, Yingjun Wu, Han Liu, Yue Li, Anne Victor, Hong Lei, Lei Wang, Bangdao Chen
2022Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint.
Seung Ho Na, Hyeong Gwon Hong, Junmo Kim, Seungwon Shin
2022CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments.
Joana Pecholt, Sascha Wessel
2022Compact Abstract Graphs for Detecting Code Vulnerability with GNN Models.
Yu Luo, Weifeng Xu, Dianxiang Xu
2022Compressed Federated Learning Based on Adaptive Local Differential Privacy.
Yinbin Miao, Rongpeng Xie, Xinghua Li, Ximeng Liu, Zhuo Ma, Robert H. Deng
2022CryptoGo: Automatic Detection of Go Cryptographic API Misuses.
Wenqing Li, Shijie Jia, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin
2022Curiosity-Driven and Victim-Aware Adversarial Policies.
Chen Gong, Zhou Yang, Yunpeng Bai, Jieke Shi, Arunesh Sinha, Bowen Xu, David Lo, Xinwen Hou, Guoliang Fan
2022DF-SCA: Dynamic Frequency Side Channel Attacks are Practical.
Debopriya Roy Dipta, Berk Gülmezoglu
2022DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection.
Matthew Landen, Key-whan Chung, Moses Ike, Sarah Mackay, Jean-Paul Watson, Wenke Lee
2022DeView: Confining Progressive Web Applications by Debloating Web APIs.
ChangSeok Oh, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, Wenke Lee
2022Designing a Provenance Analysis for SGX Enclaves.
Flavio Toffalini, Mathias Payer, Jianying Zhou, Lorenzo Cavallaro
2022Differentially Private Map Matching for Mobility Trajectories.
Ammar Haydari, Chen-Nee Chuah, H. Michael Zhang, Jane MacFarlane, Sean Peisert
2022DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection.
Jia Yan, Ming Wan, Xiangkun Jia, Lingyun Ying, Purui Su, Zhanyi Wang
2022Drone Authentication via Acoustic Fingerprint.
Yufeng Diao, Yichi Zhang, Guodong Zhao, Mohamed Khamis
2022ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift.
Xian Wang
2022FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput.
Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan
2022Formal Modeling and Security Analysis for Intra-level Privilege Separation.
Yinggang Guo, Zicheng Wang, Bingnan Zhong, Qingkai Zeng
2022From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery.
Carmen Cheh, Nicholas Tay, Binbin Chen
2022Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic.
Minjae Seo, Jaehan Kim, Eduard Marin, Myoungsung You, Taejune Park, Seungsoo Lee, Seungwon Shin, Jinwoo Kim
2022If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable.
Zheng Yang, Chao Yin, Junming Ke, Tien Tuan Anh Dinh, Jianying Zhou
2022Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots.
Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis
2022Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning.
Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah
2022Local Power Grids at Risk - An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid Communication.
Maria Zhdanova, Julian Urbansky, Anne Hagemeier, Daniel Zelle, Isabelle Herrmann, Dorian Höffner
2022MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs.
Xiaolei Wang, Lin Yang, Dongyang Li, Linru Ma, YongZhong He, Junchao Xiao, Jiyuan Liu, Yuexiang Yang
2022MProbe: Make the code probing meaningless.
Yong-Gang Li, Yeh-Ching Chung, Jinbiao Xing, Yu Bao, Guoyuan Lin
2022Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks.
Xutong Wang, Chaoge Liu, Xiaohui Hu, Zhi Wang, Jie Yin, Xiang Cui
2022Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Yutian Yang, Wenbo Shen, Xun Xie, Kangjie Lu, Mingsen Wang, Tianyu Zhou, Chenggang Qin, Wang Yu, Kui Ren
2022MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape.
Fan Lang, Wei Wang, Lingjia Meng, Jingqiang Lin, Qiongxiao Wang, Linli Lu
2022More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks.
Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek
2022NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks.
Nuo Xu, Binghui Wang, Ran Ran, Wujie Wen, Parv Venkitasubramaniam
2022No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns.
Pablo Picazo-Sanchez, Benjamin Eriksson, Andrei Sabelfeld
2022On the Implications of Spoofing and Jamming Aviation Datalink Applications.
Harshad Sathaye, Guevara Noubir, Aanjhan Ranganathan
2022One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction.
Prashast Srivastava, Stefan Nagy, Matthew Hicks, Antonio Bianchi, Mathias Payer
2022POPKORN: Popping Windows Kernel Drivers At Scale.
Rajat Gupta, Lukas Patrick Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel, Taesoo Kim
2022Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation.
Jieyu Zheng, Feng He, Shiyu Shen, Chenxi Xue, Yunlei Zhao
2022Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization.
Qifan Zhang, Junjie Shen, Mingtian Tan, Zhe Zhou, Zhou Li, Qi Alfred Chen, Haipeng Zhang
2022Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning.
Sunwoo Ahn, Seonggwan Ahn, Hyungjoon Koo, Yunheung Paek
2022Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles.
Savio Sciancalepore, Dominik Roy George
2022RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery.
Yushan Liu, Xiaokui Shu, Yixin Sun, Jiyong Jang, Prateek Mittal
2022Randezvous: Making Randomization Effective on MCUs.
Zhuojia Shen, Komail Dharsee, John Criswell
2022Reconstruction Attack on Differential Private Trajectory Protection Mechanisms.
Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil Subhash Kanhere
2022Ripples in the Pond: Transmitting Information through Grid Frequency Modulation.
Jan Sebastian Götte, Liran Katzir, Björn Scheuermann
2022SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing.
Yuki Koike, Hiroyuki Katsura, Hiromu Yakura, Yuma Kurogome
2022Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots.
Elia Geretto, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe
2022SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning.
Giovanni Apruzzese, Mauro Conti, Ying Yuan
2022Spacelord: Private and Secure Smart Space Sharing.
Yechan Bae, Sarbartha Banerjee, Sangho Lee, Marcus Peinado
2022Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning.
Ning Wang, Yang Xiao, Yimin Chen, Ning Zhang, Wenjing Lou, Y. Thomas Hou
2022StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance.
Zhechang Zhang, Bin Yuan, Kehan Yang, Deqing Zou, Hai Jin
2022Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles.
Luca Morgese Zangrandi, Thijs van Ede, Tim M. Booij, Savio Sciancalepore, Luca Allodi, Andrea Continella
2022Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering.
Xinshu Ma, Florentin Rochet, Tariq Elahi
2022Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface.
Bingkun Wu, Weizhi Meng, Wei-Yang Chiu
2022Towards Practical Application-level Support for Privilege Separation.
Nik Sultana, Henry Zhu, Ke Zhong, Zhilei Zheng, Ruijie Mao, Digvijaysinh Chauhan, Stephen Carrasquillo, Junyong Zhao, Lei Shi, Nikos Vasilakis, Boon Thau Loo
2022Transformer-Based Language Models for Software Vulnerability Detection.
Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal
2022Trebiz: Byzantine Fault Tolerance with Byzantine Merchants.
Xiaohai Dai, Liping Huang, Jiang Xiao, Zhaonan Zhang, Xia Xie, Hai Jin
2022TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation.
Markus Bauer, Ilya Grishchenko, Christian Rossow
2022User Perceptions of Five-Word Passwords.
Xiaoyuan Wu, Collins W. Munyendo, Eddie Cosic, Genevieve A. Flynn, Olivia Legault, Adam J. Aviv
2022User Perceptions of the Privacy and Usability of Smart DNS.
Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr
2022View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy.
Aaron Faulkenberry, Athanasios Avgetidis, Zane Ma, Omar Alrawi, Charles Lever, Panagiotis Kintis, Fabian Monrose, Angelos D. Keromytis, Manos Antonakakis
2022You have been warned: Abusing 5G's Warning and Emergency Systems.
Evangelos Bitsikas, Christina Pöpper
2022ZeroDNS: Towards Better Zero Trust Security using DNS.
Levente Csikor, Sriram Ramachandran, Anantharaman Lakshminarayanan
2022iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOS.
Yizhuo Wang, Yikun Hu, Xuangan Xiao, Dawu Gu