default search action
ACSAC 2021: Virtual Event, USA
- ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021. ACM 2021, ISBN 978-1-4503-8579-4
Machine Learning Security 1
- Hailong Hu, Jun Pang:
Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks. 1-16 - Mingtian Tan, Zhe Zhou, Zhou Li:
The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery. 17-30 - Sohaib Kiani, Sana Awan, Chao Lan, Fengjun Li, Bo Luo:
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. 31-44 - Meng Hao, Hongwei Li, Guowen Xu, Hanxiao Chen, Tianwei Zhang:
Efficient, Private and Robust Federated Learning. 45-60 - Abderrahmen Amich, Birhanu Eshete:
Morphence: Moving Target Defense Against Adversarial Examples. 61-75
Applied Cryptography
- Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang:
Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment. 76-90 - Stefan-Lukas Gazdag, Sophia Grundner-Culemann, Tobias Guggemos, Tobias Heider, Daniel Loebenberger:
A formal analysis of IKEv2's post-quantum extension. 91-105 - Huanyu Ma, Shuai Han, Hao Lei:
Optimized Paillier's Cryptosystem with Fast Encryption and Decryption. 106-118 - Rouzbeh Behnia, Attila Altay Yavuz:
Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things. 119-130 - Jean-Pierre Münch, Thomas Schneider, Hossein Yalame:
VASA: Vector AES Instructions for Security Applications. 131-145
Software Security 1
- David Demicco, Rukayat Erinfolami, Aravind Prakash:
Program Obfuscation via ABI Debiasing. 146-157 - Hyungjoon Koo, Soyeon Park, Taesoo Kim:
A Look Back on a Function Identification Problem. 158-168 - Honggoo Kang, Yonghwi Kwon, Sangjin Lee, Hyungjoon Koo:
SoftMark: Software Watermarking via a Binary Function Relocation. 169-181 - Sebastian Banescu, Samuel Valenzuela, Marius Guggenmos, Mohsen Ahmadvand, Alexander Pretschner:
Dynamic Taint Analysis versus Obfuscated Self-Checking. 182-193 - Hyunji Hong, Seunghoon Woo, Heejo Lee:
Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions. 194-206
Privacy and Anonymity
- Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles. 207-218 - Sherman S. M. Chow, Ming Li, Yongjun Zhao, Wenqiang Jin:
Sipster: Settling IOU Privately and Quickly with Smart Meters. 219-234 - Mingyuan Gao, Hung Dang, Ee-Chien Chang:
TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment. 235-247 - Zhong Guan, Gang Xiong, Gaopeng Gou, Zhen Li, Mingxin Cui, Chang Liu:
BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor. 248-259 - Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu:
Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. 260-272
Distributed systems
- Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert:
VIA: Analyzing Device Interfaces of Protected Virtual Machines. 273-284 - Beom Heyn Kim, Hyoungshick Kim:
Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure. 285-296 - Zijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu, Neil Zhenqiang Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu:
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks. 297-310 - Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan, Siqi Ma:
ReCFA: Resilient Control-Flow Attestation. 311-322 - Ismi Abidi, Vireshwar Kumar, Rijurekha Sen:
Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications. 323-336
Usability and Human-Centric Aspects of Security
- Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, L. Jean Camp:
Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD). 337-348 - Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, Mitsuaki Akiyama:
A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects. 349-364 - Xiaofeng Lu, Zhenhan Feng, Jupeng Xia:
An Efficient Man-Machine Recognition Method Based On Mouse Trajectory Feature De-redundancy. 365-374 - Mahshid Mehr Nezhad, Feng Hao:
OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks. 375-384 - Borce Stojkovski, Gabriele Lenzini, Vincent Koenig, Salvador Rivas:
What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. 385-398
CPS and IoT
- Sebastian Köhler, Giulio Lovisotto, Simon Birnbach, Richard Baker, Ivan Martinovic:
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors. 399-413 - Payton Walker, Nitesh Saxena:
Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise. 414-424 - Mert D. Pesé, Jay W. Schauer, Junhui Li, Kang G. Shin:
S2-CAN: Sufficiently Secure Controller Area Network. 425-438 - Abubakar Sadiq Sani, Dong Yuan, Elisa Bertino, Zhao Yang Dong:
Crypto-Chain: A Relay Resilience Framework for Smart Vehicles. 439-454 - Jonas Röckl, Mykolai Protsenko, Monika Huber, Tilo Müller, Felix C. Freiling:
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices. 455-467
Authentication and Passwords
- Duo Lu, Yuli Deng, Dijiang Huang:
Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication. 468-481 - Maliheh Shirvanian, Shashank Agrawal:
2D-2FA: A New Dimension in Two-Factor Authentication. 482-496 - Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. 497-512 - Haodong Zhang, Chuanwang Wang, Wenqiang Ruan, Junjie Zhang, Ming Xu, Weili Han:
Digit Semantics based Optimization for Practical Password Cracking Tools. 513-527 - James Simmons, Oumar Diallo, Sean Oesch, Scott Ruoti:
Systematization of Password ManagerUse Cases and Design Paradigms. 528-540
Machine Learning Security 2
- Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq, Yu Hao, Guoren Li, Zheng Zhang, Xiaochen Zou:
Eluding ML-based Adblockers With Actionable Adversarial Examples. 541-553 - Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang:
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements. 554-569 - Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha:
MISA: Online Defense of Trojaned Models using Misattributions. 570-585 - Namgyu Park, Sangwoo Ji, Jong Kim:
Detecting Audio Adversarial Examples with Logit Noising. 586-595 - Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu:
Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection? 596-608
Hardware and Architecture
- Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization. 609-619 - Taejune Park, Jaehyun Nam, Seung Ho Na, Jaewoong Chung, Seungwon Shin:
Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI. 620-633 - Xudong Pan, Mi Zhang, Yifan Yan, Min Yang:
Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains. 634-645 - Leila Delshadtehrani, Sadullah Canakci, William Blair, Manuel Egele, Ajay Joshi:
FlexFilt: Towards Flexible Instruction Filtering for Security. 646-659 - Michael Moukarzel, Matthew Hicks:
RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age. 660-674
Malware and Novel Attacks
- Md Sajidul Islam Sajid, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md. Mazharul Islam, Walter Diong, Latifur Khan:
SODA: A System for Cyber Deception Orchestration and Automation. 675-689 - Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, Martin Henze:
Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments. 690-705 - Duy-Phuc Pham, Damien Marion, Matthieu Mastio, Annelie Heuser:
Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification. 706-719 - Zhaohe John Zhang, Edwin Yang, Song Fang:
CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech. 720-731 - Tuan Le, Sriharsha Etigowni, Sizhuang Liang, Xirui Peng, H. Jerry Qi, Mehdi Javanmard, Saman A. Zonouz, Raheem Beyah:
Physical Logic Bombs in 3D Printers via Emerging 4D Techniques. 732-747
Cryptocurrency and Side Channels
- Zecheng Li, Yu Zhou, Songtao Guo, Bin Xiao:
SolSaviour: A Defending Framework for Deployed Defective Smart Contracts. 748-760 - Shaltiel Eloul, Sean J. Moran, Jacob Mendel:
Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph Feedback. 761-772 - Giorgia Azzurra Marson, Sébastien Andreina, Lorenzo Alluminio, Konstantin Munichev, Ghassan Karame:
Mitosis: Practically Scaling Permissioned Blockchains. 773-783 - Patrick Cronin, Xing Gao, Haining Wang, Chase Cotton:
An Exploration of ARM System-Level Cache and GPU Side Channels. 784-795 - Niclas Kühnapfel, Stefan Preußler, Maximilian Noppel, Thomas Schneider, Konrad Rieck, Christian Wressnegger:
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems. 796-811
Software Security 2
- Baojian Hua, Wanrong Ouyang, Chengman Jiang, Qiliang Fan, Zhizhong Pan:
Rupair: Towards Automatic Buffer Overflow Detection and Rectification for Rust. 812-823 - Elijah Rivera, Samuel Mergendahl, Howard E. Shrobe, Hamed Okhravi, Nathan Burow:
Keeping Safe Rust Safe with Galeed. 824-836 - Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang, Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet:
DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment. 837-848 - Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun:
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing. 849-860 - Pallavi Sivakumaran, Jorge Blasco:
argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries. 861-876
Wireless Security
- Muhammad Taqi Raza, Yunqi Guo, Songwu Lu, Fatima Muhammad Anwar:
On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact. 877-886 - Patrick Leu, Martin Kotuliak, Marc Roeschlin, Srdjan Capkun:
Security of Multicarrier Time-of-Flight Ranging. 887-899 - Evangelos Bitsikas, Christina Pöpper:
Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications. 900-915 - Yi Wu, Zhuohang Li, Nicholas Van Nostrand, Jian Liu:
Time to Rethink the Design of Qi Standard? Security and Privacy Vulnerability Analysis of Qi Wireless Charging. 916-929 - Mingxuan Liu, Yiming Zhang, Baojun Liu, Zhou Li, Haixin Duan, Donghong Sun:
Detecting and Characterizing SMS Spearphishing Attacks. 930-943
Smart Apps
- Sojhal Ismail Khan, Dominika C. Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed:
Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services. 944-956 - Yufei Han, Kevin Alejandro Roundy, Acar Tamersoy:
Towards Stalkerware Detection with Precise Warnings. 957-969 - Antonio Ruggia, Eleonora Losiouk, Luca Verderame, Mauro Conti, Alessio Merlo:
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization. 970-981 - Lannan Luo, Qiang Zeng, Bokai Yang, Fei Zuo, Junzhe Wang:
Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms. 982-995 - Sean Oesch, Anuj Gautam, Scott Ruoti:
The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android. 996-1010
Internet Traffic
- Fatemeh Rezaei, Amir Houmansadr:
FINN: Fingerprinting Network Flows using Neural Networks. 1011-1024 - Thai-Dien Pham, Thien-Lac Ho, Tram Truong Huu, Tien-Dung Cao, Hong Linh Truong:
MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks. 1025-1038 - Tianxiang Dai, Haya Schulmann:
SMap: Internet-wide Scanning for Spoofing. 1039-1050 - Shize Zhang, Zhiliang Wang, Jiahai Yang, Xin Cheng, Xiaoqian Ma, Hui Zhang, Bo Wang, Zimu Li, Jianping Wu:
MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking. 1051-1063 - Yihe Zhang, Xu Yuan, Nian-Feng Tzeng:
Platform-Oblivious Anti-Spam Gateway. 1064-1077
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.