ACSAC A

85 papers

YearTitle / Authors
2025A Cloudy View on Trust Relationships of CVMs: How Confidential Virtual Machines are Falling Short in Public Cloud.
Jana Eisoldt, Anna Galanou, Andrey Ruzhanskiy, Nils Küchenmeister, Yewgenij Baburkin, Tianxiang Dai, Ivan Gudymenko, Stefan Köpsell, Rüdiger Kapitza
2025A Period-Adaptive Traffic Fingerprint-Based Method for Smart Home Device Identification.
Yingjie Hu, Weiping Wang, Shigeng Zhang, Hong Song, Shilei Kuang
2025AGNOMIN - Architecture Agnostic Multi-Label Function Name Prediction.
Yonatan Gizachew Achamyeleh, Tongtao Zhang, Joshua Hyunki Kim, Gabriel Garcia, Shih-Yuan Yu, Anton Kocheturov, Mohammad Abdullah Al Faruque
2025APILOT: Improving the Security and Usability of LLM Code Suggestions via Outdated API Mitigation.
Weiheng Bai, Keyang Xuan, Pengxiang Huang, Qiushi Wu, Jianing Wen, Jingjing Wu, Kangjie Lu
2025AdvOSD: Adversarial One-Step Diffusion for Generalizable and Efficient Fake Image Detection.
Liqun Shan, Kaiying Han, Yazhou Tu, Xiali Hei
2025Analysis of Encryption Key Zeroization from System-Wide Perspective.
Toyofumi Sawa, Kuniyasu Suzaki
2025AndroByte: LLM-Driven Privacy Analysis through Bytecode Summarization and Dynamic Dataflow Call Graph Generation.
Mst. Eshita Khatun, Lamine Noureddine, Zhiyong Sui, Aisha I. Ali-Gombe
2025Belt and Braces! Fight against Key Compromising in Single Sign-On Systems.
Yuan Zhang, Yali Wang, Guowen Xu, Yaqing Song, Hongwei Li
2025Beyond Driver Isolation - Triaging Threats against Driver Isolation.
Yongzhe Huang, Kaiming Huang, Matthew Ennis, Vikram Narayanan, Anton Burtsev, Trent Jaeger, Gang Tan
2025Big Broker is Tracking You! A Privacy Assessment of Large-Scale Location Trace Datasets.
Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Vincent Naessens
2025CAUA: A Realistic and Effective Attack on Machine Unlearning Under Limited Information.
Jing Zhang, Yichen Zhang, Jie Cui, Xianfeng Xie, Chunyang Fan, Bei Li
2025CarDS - Controller Area Network and Automotive Ethernet Realistic Data Set.
Wouter Hellemans, Jannis Hamborg, Timm Lauser, Md Masoom Rabbani, Bart Preneel, Christoph Krauß, Nele Mentens
2025Clouseau: A Hierarchical Multi-Agent Approach for Autonomous Attack Investigation.
Abdullah Aldaihan, Fahad Alotaibi, Sergio Maffeis
2025Compact and Selective Disclosure for Verifiable Credentials.
Alessandro Buldini, Carlo Mazzocca, Rebecca Montanari, A. Selcuk Uluagac
2025Contextual Adversarial Triggers with Masked Language Models.
JiaQi Wu, Chen Chen, Chunyan Hou, Hanwen Xing, Xiaojie Yuan
2025Controllable Spoofing Attacks on Visual SLAM in Robotic Vehicles.
Yuan Xu, Gelei Deng, Guanlin Li, Xingshuo Han, Shangwei Guo, Tianwei Zhang
2025DP-Mix: Differentially Private Routing in Mix Networks.
Mahdi Rahimi
2025DROIDCCT: Cryptographic Compliance Test via Trillion-Scale Measurement.
Daniel Moghimi, Alexandru-Cosmin Mihai, Borbala Benko, Catherine Vlasov, Elie Bursztein, Kurt Thomas, Laszlo Siroki, Pedro Barbosa, Remi Audebert
2025Decentralized Privacy-Preserving Authenticated Key Exchange Using Real-World Attributes.
Ling Chen, Xiao Lan, Hao Ren, Hui Guo, Long Chen, Kunpeng Bai
2025DeepProv: Behavioral Characterization and Repair of Neural Networks via Inference Provenance Graph Analysis.
Firas Ben Hmida, Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete
2025ELK: Effective Lock-and-Key Technique for Temporal Memory Safety on Embedded Devices in ARMv8-M.
Jeonghwan Kang, Kyounghwan Kim, Donghyun Kwon
2025EM-Flow: Advanced Electromagnetic Control Flow Verification for Embedded Systems.
Carson Stillman, Jennifer Sheldon, Ian Y. Garrett, Patrick Traynor, Ryan M. Gerdes, Sara Rampazzi, Kevin R. B. Butler
2025Enabling Plausible Deniability in Flash-based Storage through Data Permutation.
Weidong Zhu, Wenxuan Bao, Vincent Bindschaedler, Sara Rampazzi, Kevin R. B. Butler
2025End-to-End Encrypted Applications with Strong Consistency Under Byzantine Actors.
Natalie Popescu, Shai Caspin, Leon Schuermann, Jingyuan Chen, Amit Levy
2025Enhancing Noisy Functional Encryption for Privacy-Preserving Machine Learning.
Linda Scheu-Hachtel, Jasmin Zalonis
2025Environmental Rate Manipulation Attacks on Power Grid Security.
Yonatan Gizachew Achamyeleh, Yang Xiang, Yun-Ping Hsiao, Yasamin Moghaddas, Mohammad Abdullah Al Faruque
2025FLAME: Flexible and Lightweight Biometric Authentication Scheme in Malicious Environments.
Fuyi Wang, Fangyuan Sun, Mingyuan Fan, Jianying Zhou, Jin Ma, Chao Chen, Jiangang Shu, Leo Yu Zhang
2025False Promises of Passwordless: Defeating Windows Hello through TPM Misuses.
Jeongho Lee, Minkyeong Kang, Seunghwan Lee, Hyoung-Kee Choi
2025Fix it - If you Can! Towards Understanding the Impact of Tool Support and Domain Owners' Reactions to SSHFP Misconfigurations.
Anne Hennig, Sebastian Neef, Peter Mayer
2025Flashy Backdoor: Real-world Environment Backdoor Attack on SNNs with DVS Cameras.
Roberto Riaño, Gorka Abad, Stjepan Picek, Aitor Urbieta
2025Fooling Machine's Eyes: Unicode Modifier Letter Evasion Attack.
Chao Gao, Guanglu Sun, Xin Liu, Feiyan Liu
2025Fuzzing Acceleration for Memory Safety Bug Discovery with Slicer.
Giyeol Kim, Dohyun Ryu, Seungjin Bae, Changyul Lee, Taegyu Kim
2025GET /large. file HTTP /1.1: Connection-Based TCP Amplification Attacks.
Yepeng Pan, Lars Richter, Christian Rossow
2025Gravity of the Situation: Security Analysis on Rocket.Chat E2EE.
Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Takanori Isobe
2025IEEE Annual Computer Security Applications Conference, ACSAC 2025, Honolulu, HI, USA, December 8-12, 2025
2025In Pursuit of Lean OS Kernels: Improving Configuration-Based Debloating.
Akshith Gunasekaran, Gabriel Ritter, Rakesh B. Bobba
2025InteractionShield: Harnessing Event Relations for Interaction Threat Detection and Resolution in Smart Homes.
Zhaohui Wang, Bo Luo, Fengjun Li
2025Into the Unknown: Fuzzing CPU Non-standard Instructions with MystFuzz.
Zihui Guo, Wenhao Cui, Liwei Chen, Miaomiao Yuan, Gang Shi, Dan Meng
2025Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors.
Mohamad Habib Fakih, Rahul Dharmaji, Youssef Mahmoud, Halima Bouzidi, Mohammad Abdullah Al Faruque
2025It's a Non-Stop PARTEE! Practical Multi-Enclave Availability Through Partitioning and Asynchrony.
Richard Habeeb, Hao Chen, Man-Ki Yoon, Zhong Shao
2025Leaking Queries On Secure Stream Processing Systems.
Hung Pham, Viet Vo, Tien Tuan Anh Dinh, Duc Tran, Shuhao Zhang
2025Learned, Lagged, LLM-Splained: LLM Responses to End User Security Questions.
Vijay Prakash, Kevin Lee, Arkaprabha Bhattacharya, Danny Yuxing Huang, Jessica Staddon
2025MOEVIL: Poisoning Experts to Compromise the Safety of Mixture-of-Experts LLMs.
Jaehan Kim, Seung Ho Na, Minkyoo Song, Seungwon Shin, Sooel Son
2025MimicCall: Bypassing System Call Filters via Kernel Function Redundancy.
Songah Joo, Minchan Park, Hyerean Jang, Youngjoo Shin
2025Mizar: Boosting Secure Three-Party Deep Learning with Co-Designed Sign-Bit Extraction and GPU Acceleration.
Ye Dong, Xudong Chen, Xiangfu Song, Yaxi Yang, Tianwei Zhang, Jinsong Dong
2025No Fish Is Too Big for Flash Boys! Frontrunning on DAG-Based Blockchains.
Jianting Zhang, Aniket Kate
2025Non-Bare-Metal User-Space Control-Flow Attestation.
Nikita Yadav, Hrushikesh Salunke, Dev Tejas Gandhi, Vinod Ganapathy
2025ORT: Unintended Text Recognition from Eyeglass Reflections in Video Conferencing Environments.
Jieun Kim, Youngjoo Park, Rokyung Kwon, Jimin Han, Hoorin Park
2025OTABase: Enhancing Over-the-Air Testing to Detect Memory Crashes in Cellular Basebands.
CheolJun Park, Marc Egli, Beomseok Oh, Tuan Dinh Hoang, Suhwan Jeong, Martin Crettol, Insu Yun, Mathias Payer, Yongdae Kim
2025Octopus: Fast Homomorphic Convolution for Secure Neural Network Inference.
Yu Tong, Yu Fu, Tianshi Xu, Cheng Hong, Meng Li, Wei Wang, Dengguo Feng, Jingqiang Lin
2025One Detector Fits All: Robust and Adaptive Detection of Malicious Packages from PyPI to Enterprises.
Biagio Montaruli, Luca Compagna, Serena Elisa Ponta, Davide Balzarotti
2025PIM-ORAM: Towards Oblivious RAM Primitives in Commodity Processing-In-Memory.
Byeongsu Woo, Kha Dinh Duy, Youngkwang Han, Brent ByungHoon Kang, Hojoon Lee
2025PP3D: An In-Browser Vision-Based Defense Against Web Behavior Manipulation Attacks.
Spencer King, Irfan Ozen, Karthika Subramani, Saranyan Senthivel, Phani Vadrevu, Roberto Perdisci
2025PSan: Towards Hybrid Metadata Scheme for Efficient Pointer Checking.
Shengjie Xu, Eric Liu, Wei Huang, Ilya Grishchenko, David Lie
2025Pathfinder: Exploring Path Diversity for Assessing Internet Censorship Inconsistency.
Xiaoqin Liang, Guannan Liu, Lin Jin, Shuai Hao, Haining Wang
2025ProxyPrints: From Database Breach to Spoof, A Plug-and-Play Defense for Biometric Systems.
Yaniv Hacmon, Keren Gorelik, Gilad Gressel, Yisroel Mirsky
2025R+R: Anonymous Authentication and Key Agreement, Revisited.
Yanqi Zhao, Xiangyu Liu, Min Xie, Xiaoyi Yang, Jianting Ning, Baodong Qin, Haibin Zhang, Yong Yu
2025R+R: From Claims to Crashes: A Systematic Re-evaluation of Graph-Based Network Intrusion Detection Systems.
Chenglong Wang, Pujia Zheng, Jiaping Gui, Cunqing Hua, Wajih Ul Hassan
2025R+R: IoT Device Identification Under Realistic Conditions.
Chakshu Gupta, Andreas Peter, Andrea Continella
2025R+R: Revisiting Static Feature-Based Android Malware Detection Using Machine Learning.
Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi
2025REx86: A Local Large Language Model for Assisting in x86 Assembly Reverse Engineering.
Darrin Lea, James M. Ghawaly, Golden G. Richard III, Aisha I. Ali-Gombe, Andrew Case
2025Recovering Peripheral Maps and Protocols to Expedite Firmware Reverse Engineering.
Bayan Turkistani, Carter Yagemann
2025Rescuing the Unpoisoned: Efficient Defense Against Knowledge Corruption Attacks on RAG Systems.
Minseok Kim, Hankook Lee, Hyungjoon Koo
2025Retain the Date: Detecting Recycled Chips in the Supply Chain Through SRAM's Data Retention Behavior.
Jubayer Mahmod, Matthew Hicks
2025Revealing the True Indicators: Understanding and Improving IoC Extraction From Threat Reports.
Evangelos Froudakis, Athanasios Avgetidis, Sean Tyler Frankum, Roberto Perdisci, Manos Antonakakis, Angelos D. Keromytis
2025Revisiting Prime+Prune+Probe: Pitfalls and Remedies.
Moritz Peters, Florian Stolz, Jan Philipp Thoma, Tim Güneysu, Yuval Yarom
2025SMORE: Practical Redzone-Based Stack Memory Error Detection Mechanism for Embedded Systems.
Jaeyeol Park, Yunju Gu, Donghyun Kwon
2025Sagitta: Facilitating Post-Fuzzing Root Cause Analysis via Data Flow Differencing.
Katsunori Aoki, Takahiro Shinagawa
2025Securing On-device Transformer with Hardware Binding and Reversible Obfuscation.
Peichun Hua, Hanxiu Zhang, Tuo Li, Yue Zheng
2025Seti:Secure Time for Virtualized Systems.
Adeel Nasrullah, Muhammad Abdullah Soomro, Fatima Muhammad Anwar
2025Siren: A Learning-Based Multi-Turn Attack Framework for Simulating Real-World Human Jailbreak Behaviors.
Yi Zhao, Youzhi Zhang
2025SnoopDog: Detecting USB Bus Sniffers Using Responsive EMR.
Srinivasan Murali, YoungTak Cho, Huadi Zhu, Pan Li, Ming Li
2025Splash: Adversarial Defense with Short Perturbation Blocks Against Adversarial Training Aided Website Fingerprinting.
Runsheng Ma, Chengshang Hou, Gaopeng Gou, Junzheng Shi, Zhen Li, Gang Xiong
2025Supply Chain Reaction: Enhancing the Precision of Vulnerability Triage using Code Reachability Information.
Harshvardhan Patel, Alexander Snit, Michalis Polychronakis
2025TeTRIS: General-purpose Fuzzing for Translation Bugs in Source-to-Source Code Transpilers.
Yeaseen Arafat, Stefan Nagy
2025TempoNet: Learning Realistic Communication and Timing Patterns for Network Traffic Simulation.
Kristen Moore, Diksha Goel, Cody James Christopher, Zhen Wang, Minjune Kim, Ahmed Ibrahim, Ahmad Mohsin, Seyit Camtepe
2025The 2FA Illusion: Uncovering Weak Links of Web Account Access in the Wild.
Ke Coby Wang, Sunpreet S. Arora, Michael K. Reiter
2025TrustLeech: Privileged System Analysis using Nested Virtualization.
Matti Schulze, Paul Bergmann, Jonas Röckl, Felix C. Freiling
2025Uncovering Bigger Truths: Deobfuscating PHP with Phoebe.
Manuel Karl, Simon Koch, David Klein, Martin Johns
2025Understanding the Security Impact of CHERI on the Operating System Kernel.
Zhaofeng Li, Jerry Zhang, Joshua Tlatelpa-Agustin, Xiangdong Chen, Anton Burtsev
2025VMIGEN: Utilizing Virtual Machine Introspection for Fuzzing Complex Closed-Source Targets.
Florian Schweins, Moritz Schloegel, Moritz Bley, Nico Schiller, Thorsten Holz
2025VerDiff: Vulnerability Presence Verification for Comprehensive Reporting Using Constraint Programming.
Md Sakib Anwar, Carter Yagemann, Zhiqiang Lin
2025WAFFLED: Exploiting Parsing Discrepancies to Bypass Web Application Firewalls.
Seyed Ali Akhavani, Bahruz Jabiyev, Ben Kallus, Cem Topcuoglu, Sergey Bratus, Engin Kirda
2025XPOZ-HUB: Privacy Infiltration in Payment Channel Hubs through Balance Probing and Transaction Discovery.
Alvi Ataur Khalil, Mohammad Ashiqur Rahman
2025Zeus-IoT: Comprehensive Code Signing to Prevent IoT Device Weaponization.
Alireza Roshandel, Manuel Egele