ACSAC A

60 papers

YearTitle / Authors
2023A First Look at Toxicity Injection Attacks on Open-domain Chatbots.
Connor Weeks, Aravind Cheruvu, Sifat Muhammad Abdullah, Shravya Kanchi, Daphne Yao, Bimal Viswanath
2023A Tagging Solution to Discover IoT Devices in Apartments.
Berkay Kaplan, Israel J. Lopez-Toledo, Carl A. Gunter, Jingyu Qian
2023ABFL: A Blockchain-enabled Robust Framework for Secure and Trustworthy Federated Learning.
Bo Cui, Tianyu Mei
2023ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications.
Xinyu Liu, Ze Jin, Jiaxi Liu, Wei Liu, Xiaoxi Wang, Qixu Liu
2023An Empirical Analysis of Enterprise-Wide Mandatory Password Updates.
Ariana Mirian, Grant Ho, Stefan Savage, Geoffrey M. Voelker
2023Annual Computer Security Applications Conference, ACSAC 2023, Austin, TX, USA, December 4-8, 2023
2023Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems.
Marina Moore, Trishank Karthik Kuppusamy, Justin Cappos
2023Attack of the Knights: Non Uniform Cache Side Channel Attack.
Farabi Mahmud, Sungkeun Kim, Harpreet Singh Chawla, Eun Jung Kim, Chia-Che Tsai, Abdullah Muzahid
2023Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons.
Richard August See, Maximilian Gehring, Mathias Fischer, Shankar Karuppayah
2023Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions.
Yufan Chen, Arjun Arunasalam, Z. Berkay Celik
2023Continuous Authentication Using Human-Induced Electric Potential.
Srinivasan Murali, Wenqiang Jin, Vighnesh Sivaraman, Huadi Zhu, Tianxi Ji, Pan Li, Ming Li
2023Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory Sensors.
Jafar Pourbemany, Ye Zhu
2023DOPE: DOmain Protection Enforcement with PKS.
Lukas Maar, Martin Schwarzl, Fabian Rauscher, Daniel Gruss, Stefan Mangard
2023DeepContract: Controllable Authorization of Deep Learning Models.
Xirong Zhuang, Lan Zhang, Chen Tang, Huiqi Liu, Bin Wang, Yan Zheng, Bo Ren
2023DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal
2023DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection.
Son Seonghun, Debopriya Roy Dipta, Berk Gülmezoglu
2023Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials.
DaeGeun Yoon, Taejoong Chung, Yongdae Kim
2023Detecting Weak Keys in Manufacturing Certificates: A Case Study.
Andrew Chi, Brandon Enright, David A. McGrew
2023Detection of Anomalies in Electric Vehicle Charging Sessions.
Dustin Kern, Christoph Krauß, Matthias Hollick
2023Differentially Private Resource Allocation.
Joann Qiongna Chen, Tianhao Wang, Zhikun Zhang, Yang Zhang, Somesh Jha, Zhou Li
2023Domain and Website Attribution beyond WHOIS.
Silvia Sebastián, Raluca-Georgia Diugan, Juan Caballero, Iskander Sánchez-Rola, Leyla Bilge
2023Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays.
Zeyu Deng, Long Huang, Chen Wang
2023FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks.
Buse G. A. Tekgul, N. Asokan
2023FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.
Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad-Reza Sadeghi
2023FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks.
Ayesha S. Dina, A. B. Siddique, D. Manivannan
2023FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification.
Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac
2023From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!
Giada Stivala, Sahar Abdelnabi, Andrea Mengascini, Mariano Graziano, Mario Fritz, Giancarlo Pellegrino
2023Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks.
Yizhe Zhang, Hongying Dong, Alastair Nottingham, Molly Buchanan, Donald E. Brown, Yixin Sun
2023Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance.
Ke Wang, Jianbo Gao, Qiao Wang, Jiashuo Zhang, Yue Li, Zhi Guan, Zhong Chen
2023Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones.
Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro
2023Link Membership Inference Attacks against Unsupervised Graph Representation Learning.
Xiuling Wang, Wendy Hui Wang
2023Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch.
Shaowen Xu, Qihang Zhou, Heqing Huang, Xiaoqi Jia, Haichao Du, Yang Chen, Yamin Xie
2023Mitigating Membership Inference Attacks via Weighted Smoothing.
Mingtian Tan, Xiaofei Xie, Jun Sun, Tianhao Wang
2023Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication.
Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello
2023No Forking Way: Detecting Cloning Attacks on Intel SGX Applications.
Samira Briongos, Ghassan Karame, Claudio Soriente, Annika Wilde
2023OAuth 2.0 Redirect URI Validation Falls Short, Literally.
Tommaso Innocenti, Matteo Golinelli, Kaan Onarlioglu, Seyed Ali Mirheidari, Bruno Crispo, Engin Kirda
2023On the Detection of Image-Scaling Attacks in Machine Learning.
Erwin Quiring, Andreas Müller, Konrad Rieck
2023On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI.
Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais
2023PAVUDI: Patch-based Vulnerability Discovery using Machine Learning.
Tom Ganz, Erik Imgrund, Martin Härterich, Konrad Rieck
2023PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior.
Dazhi Zhan, Wei Bai, Xin Liu, Yue Hu, Lei Zhang, Shize Guo, Zhisong Pan
2023PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names.
Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba
2023Poisoning Network Flow Classifiers.
Giorgio Severi, Simona Boboila, Alina Oprea, John T. Holodnak, Kendra Kratkiewicz, Jason Matterer
2023Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk.
Andrew Chi, Blake Anderson, Michael K. Reiter
2023Protecting Your Voice from Speech Synthesis Attacks.
Zihao Liu, Yan Zhang, Chenglin Miao
2023RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis.
Fabian Franzen, Andreas Chris Wilhelmer, Jens Grossklags
2023Remote Attestation with Constrained Disclosure.
Michael Eckel, Dominik Roy George, Björn Grohmann, Christoph Krauß
2023Remote attestation of confidential VMs using ephemeral vTPMs.
Vikram Narayanan, Cláudio Carvalho, Angelo Ruocco, Gheorghe Almási, James Bottomley, Mengmei Ye, Tobin Feldman-Fitzthum, Daniele Buono, Hubertus Franke, Anton Burtsev
2023Scamdog Millionaire: Detecting E-commerce Scams in the Wild.
Platon Kotzias, Kevin A. Roundy, Michalis Pachilakis, Iskander Sánchez-Rola, Leyla Bilge
2023SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic.
Jie Meng, Zeyu Yang, Zhenyong Zhang, Yangyang Geng, Ruilong Deng, Peng Cheng, Jiming Chen, Jianying Zhou
2023SealClub: Computer-aided Paper Document Authentication.
Martín Ochoa, Hernán Vanegas, Jorge Toro-Pozo, David A. Basin
2023Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse.
Fabing Li, Xiang Li, Mingyu Gao
2023Secure Softmax/Sigmoid for Machine-learning Computation.
Yu Zheng, Qizhi Zhang, Sherman S. M. Chow, Yuxiang Peng, Sijun Tan, Lichun Li, Shan Yin
2023Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles.
Christian Plappert, Andreas Fuchs
2023Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles.
Christian Plappert, Andreas Fuchs
2023TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection.
Sijia Li, Gaopeng Gou, Chang Liu, Gang Xiong, Zhen Li, Junchao Xiao, Xinyu Xing
2023The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time.
Saeif Alhazbi, Savio Sciancalepore, Gabriele Oligeri
2023The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms.
Fahad Shaon, Sazzadur Rahaman, Murat Kantarcioglu
2023Triereme: Speeding up hybrid fuzzing through efficient query scheduling.
Elia Geretto, Julius Hohnerlein, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe, Klaus von Gleissenthall
2023Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.
Philipp Pütz, Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi
2023When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild.
Alberto Carboneri, Mohammad Ghasemisharif, Soroush Karami, Jason Polakis