ACSAC A

84 papers

YearTitle / Authors
2024A Fly on the Wall - Exploiting Acoustic Side-Channels in Differential Pressure Sensors.
Yonatan Gizachew Achamyeleh, Mohamad Habib Fakih, Gabriel Garcia, Anomadarshi Barua, Mohammad Abdullah Al Faruque
2024A Longitudinal Analysis of Corporate Data Portability Practices Across Industries.
Emmanuel Syrmoudis, Stefan A. Mager, Jens Grossklags
2024A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events.
Leon Kersten, Santiago Darré, Tom Mulders, Emmanuele Zambon, Marco Caselli, Chris Snijders, Luca Allodi
2024Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning.
Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay K. Jha
2024AirBugCatcher: Automated Wireless Reproduction of IoT Bugs.
Guoqiang Hua, Matheus E. Garbelini, Sudipta Chattopadhyay
2024Annual Computer Security Applications Conference, ACSAC 2024, Honolulu, HI, USA, December 9-13, 2024
2024Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks.
Marcell Szakály, Sebastian Köhler, Martin Strohmeier, Ivan Martinovic
2024Assessing UAV Sensor Spoofing: More Than A GNSS Problem.
Bailey Srimoungchanh, J. Garrett Morris, Drew Davidson
2024Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War.
Yagiz Yilmaz, Orçun Çetin, Omer Said Ozturk, Emre Ekmekcioglu, Budi Arief, Julio C. Hernandez-Castro
2024BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables
Sima Arasteh, Jelena Mirkovic, Mukund Raghothaman, Christophe Hauser
2024BioSaFe: Bioprinting Security Framework for Detecting Sabotage Attacks on Printability and Cell Viability.
Muhammad Ahsan, Eunice Pak, Kate Jackson, Muhammad Haris Rais, Barry Najarro-Blancas, Nastassja Lewinski, Irfan Ahmed
2024BlueScream: Screaming Channels on Bluetooth Low Energy.
Pierre Ayoub, Romain Cayre, Aurélien Francillon, Clémentine Maurice
2024Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions.
Mengya Zhang, Xingyu Lyu, Jianyu Niu, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin
2024CIGA: Detecting Adversarial Samples via Critical Inference Graph Analysis.
Fei Zhang, Zhe Li, Yahang Hu, Yaohua Wang
2024CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments.
Dalton A. Brucker-Hahn, Wang Feng, Shanchao Li, Matthew Petillo, Alexandru G. Bardas, Drew Davidson, Yuede Ji
2024ConProv: A Container-Aware Provenance System for Attack Investigation.
Qiqing Deng, Yanqiang Zhang, Zhen Xu, Qian Tan, Yan Zhang
2024Confidential Computing with Heterogeneous Devices at Cloud-Scale.
Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri
2024CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis.
Xiangxin Guo, Shijie Jia, Jingqiang Lin, Yuan Ma, Fangyu Zheng, Guangzheng Li, Bowen Xu, Yueqiang Cheng, Kailiang Ji
2024CubeVisor: A Multi-realm Architecture Design for Running VM with ARM CCA.
Jiayun Chen, Qihang Zhou, Xiaolong Yan, Nan Jiang, Xiaoqi Jia, Weijuan Zhang
2024DEEPCAPA: Identifying Malicious Capabilities in Windows Malware.
Saastha Vasan, Hojjat Aghakhani, Stefano Ortolani, Roman Vasilenko, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna
2024Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks.
Yu Bi, Mingshuo Yang, Yong Fang, Xianghang Mi, Shanqing Guo, Shujun Tang, Haixin Duan
2024Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning.
Rouzbeh Behnia, Arman Riasi, Reza Ebrahimi, Sherman S. M. Chow, Balaji Padmanabhan, Thang Hoang
2024Enhancing Database Encryption: Adaptive Measures for Digital Assets Against LLMs-Based Reverse Engineering.
Kerou Zhou, Jiakang Qiu, Yuehua Wang, Xiaojun Ye
2024Eunomia: A Real-time Privacy Compliance Firewall for Alexa Skills.
Javaria Ahmad, Fengjun Li, Razvan Beuran, Bo Luo
2024Evil from Within: Machine Learning Backdoors Through Dormant Hardware Trojans.
Alexander Warnecke, Julian Speith, Jan-Niklas Möller, Konrad Rieck, Christof Paar
2024Exploring Inherent Backdoors in Deep Learning Models.
Guanhong Tao, Siyuan Cheng, Zhenting Wang, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang
2024FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs.
Basanta Chaulagain, Kyu Hyung Lee
2024FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation.
Daniel Günther, Joachim Schmidt, Thomas Schneider, Hossein Yalame
2024Faking deduplication to prevent timing side-channel attacks on memory deduplication.
Jens Lindemann
2024FedCAP: Robust Federated Learning via Customized Aggregation and Personalization.
Youpeng Li, Xinda Wang, Fuxun Yu, Lichao Sun, Wenbin Zhang, Xuyu Wang
2024FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free.
Yijia Fang, Bingyu Li, Jiale Xiao, Bo Qin, Zhijintong Zhang, Qianhong Wu
2024Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations.
Konstantinos Solomos, Nick Nikiforakis, Jason Polakis
2024Hypervisor Dissociative Execution: Programming Guests for Monitoring, Management, and Security.
Andrew Fasano, Zak Estrada, Tim Leek, William K. Robertson
2024I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques.
Anna Crowder, Daniel Olszewski, Patrick Traynor, Kevin R. B. Butler
2024I'll Be There for You! Perpetual Availability in the A
André Rösti, Stijn Volckaert, Michael Franz, Alexios Voulimeneas
2024IoC Stalker: Early detection of Indicators of Compromise.
Mariella Mischinger, Sergio Pastrana, Guillermo Suarez-Tangil
2024Janus: Enhancing Asynchronous Common Subset with Trusted Hardware.
Liangrong Zhao, Hans Schmiedel, Qin Wang, Jiangshan Yu
2024Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality.
Yanduo Fu, Ding Wang
2024Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs.
Yeji Park, Hyunsu Cho, Dong Hoon Lee, Wonsuk Choi
2024Lightweight Secure Aggregation for Personalized Federated Learning with Backdoor Resistance.
Tingyu Fan, Xiaojun Chen, Ye Dong, Xudong Chen, Yuexin Xuan, Weizhan Jing
2024Link Inference Attacks in Vertical Federated Graph Learning.
Oualid Zari, Chuan Xu, Javier Parra-Arnau, Ayse Ünsal, Melek Önen
2024Madeline: Continuous and Low-cost Monitoring with Graph-free Representations to Combat Cyber Threats.
Wenjia Song, Hailun Ding, Na Meng, Peng Gao, Danfeng Yao
2024Manifest Problems: Analyzing Code Transparency for Android Application Bundles.
Florian Draschbacher, Lukas Maar
2024Model-Manipulation Attacks Against Black-Box Explanations.
Achyut Hegde, Maximilian Noppel, Christian Wressnegger
2024Moiré Injection Attack (MIA) : Compromising Autonomous Vehicle Safety via Exploiting Camera's Color Filter Array (CFA) to Inject Hidden Traffic Sign.
Qi Xia, Qian Chen
2024No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks.
Daniel Weber, Leonard Niemann, Lukas Gerlach, Jan Reineke, Michael Schwarz
2024Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models.
Changtian Song, Dongdong Zhao, Jianwen Xiang
2024On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World.
Bao Gia Doan, Dang Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe
2024Passwords To-Go: Investigating Multifaceted Challenges for Password Managers in the Android Ecosystem.
Nicolas Huaman, Marten Oltrogge, Sabrina Klivan, Yannick Evers, Sascha Fahl
2024Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory.
Chenyi Wang, Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes, Jonathan Petit
2024Practical Light Clients for Committee-Based Blockchains.
Frederik Armknecht, Ghassan Karame, Malcom Mohamed, Christiane Weis
2024Privacy-Preserving Verifiable Neural Network Inference Service.
Arman Riasi, Jorge Guajardo, Thang Hoang
2024R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries.
Yongming Fan, Priyam Biswas, Christina Garman
2024R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction.
Zhiyuan Zhang, Zhenzhi Lai, Udaya Parampalli
2024R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android.
Simone Zerbini, Samuele Doria, Primal Wijesekera, Serge Egelman, Eleonora Losiouk
2024R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage.
Jochen Schäfer, Frederik Armknecht, Youzhe Heng
2024R+R: Security Vulnerability Dataset Quality Is Critical.
Anurag Swarnim Yadav, Joseph N. Wilson
2024R+R: Towards Reliable and Generalizable Differentially Private Machine Learning.
Wenxuan Bao, Vincent Bindschaedler
2024R+R: Understanding Hyperparameter Effects in DP-SGD.
Felix Morsbach, Jan Reubold, Thorsten Strufe
2024Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks.
Sirui Shen, Chenglu Jin
2024Ready or Not, Here I Come: Characterizing the Security of Prematurely-public Web Applications.
Brian Kondracki, Michael Ferdman, Nick Nikiforakis
2024Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments.
Ildi Alla, Selma Yahia, Valeria Loscrì, Hossien B. Eldeeb
2024RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments.
Junmo Lee, Seongjun Kim, Sanghyeon Park, Soo-Mook Moon
2024Rust for Linux: Understanding the Security Impact of Rust in the Linux Kernel.
Zhaofeng Li, Vikram Narayanan, Xiangdong Chen, Jerry Zhang, Anton Burtsev
2024SECURE: Benchmarking Large Language Models for Cybersecurity.
Dipkamal Bhusal, Md Tanvirul Alam, Le Nguyen, Ashim Mahara, Zachary Lightcap, Rodney Frazier, Romy Fieblinger, Grace Long Torales, Benjamin A. Blakely, Nidhi Rastogi
2024SECvma: Virtualization-based Linux Kernel Protection for Arm.
Teh Beng Yen, Joey Li, Shih-Wei Li
2024Securing PUFs via a Predictive Adversarial Machine Learning System by Modeling of Attackers.
Mieszko Ferens, Edlira Dushku, Shreyas Srinivasa, Sokol Kosta
2024SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware.
Si Liao, Huangxun Chen, Zhice Yang
2024Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software.
Konstantinos Kleftogiorgos, Patrick Zielinski, Shan Huang, Jun Xu, Georgios Portokalidis
2024Single Sign-On Privacy: We Still Know What You Did Last Summer.
Maximilian Westers, Andreas Mayer, Louis Jannett
2024SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation.
Adam Caulfield, Liam Tyler, Ivan De Oliveira Nunes
2024Stealing Watermarks of Large Language Models via Mixed Integer Programming.
Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill, Shirui Pan
2024T-Edge: Trusted Heterogeneous Edge Computing.
Jiamin Shen, Yao Chen, Weng-Fai Wong, Ee-Chien Chang
2024TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding.
Giulio Pagnotta, Dorjan Hitaj, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini
2024TILE: Input Structure Optimization for Neural Networks to Accelerate Secure Inference.
Yizhou Feng, Qiao Zhang, Yifei Cai, Hongyi Wu, Chunsheng Xin
2024TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems.
Adam Caulfield, Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes
2024Towards a Taxonomy of Challenges in Security Control Implementation.
Md. Rayhanur Rahman, Brandon Wroblewski, Mahzabin Tamanna, Imranur Rahman, Andrew Anufryienak, Laurie A. Williams
2024VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs.
Yunbo Wang, Cong Sun, Qiaosen Liu, Bingnan Su, Zongxu Zhang, Michael Norris, Gang Tan, Jianfeng Ma
2024VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections.
Geovani Benita, Leonardo Sestrem, Matheus E. Garbelini, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan
2024Verifying Loot-box Probability Without Source-code Disclosure.
Jing-Jie Wang, An-Jie Li, Ting-Yu Fang, Hsu-Chun Hsiao
2024ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer.
Shihua Sun, Kenechukwu Nwodo, Shridatt Sugrim, Angelos Stavrou, Haining Wang
2024Web-Armour: Mitigating Reconnaissance and Vulnerability Scanning with Scan-Impeding Delays in Web Deployments.
Yousif Dafalla, Dalton A. Brucker-Hahn, Drew Davidson, Alexandru G. Bardas
2024WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home.
Yihui Yan, Zhice Yang
2024You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations.
Dongwon Shin, Suyoung Lee, Sanghyun Hong, Sooel Son