default search action
ACSAC 2023: Austin, TX, USA
- Annual Computer Security Applications Conference, ACSAC 2023, Austin, TX, USA, December 4-8, 2023. ACM 2023
Web Security
- Takashi Koide, Naoki Fukushi, Hiroki Nakano, Daiki Chiba:
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names. 1-13 - Giada Stivala, Sahar Abdelnabi, Andrea Mengascini, Mariano Graziano, Mario Fritz, Giancarlo Pellegrino:
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs! 14-28 - Platon Kotzias, Kevin A. Roundy, Michalis Pachilakis, Iskander Sánchez-Rola, Leyla Bilge:
Scamdog Millionaire: Detecting E-commerce Scams in the Wild. 29-43 - Alberto Carboneri, Mohammad Ghasemisharif, Soroush Karami, Jason Polakis:
When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild. 44-55
Application and Software Security
- Elia Geretto, Julius Hohnerlein, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe, Klaus von Gleissenthall:
Triereme: Speeding up hybrid fuzzing through efficient query scheduling. 56-70 - Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais:
On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI. 71-82 - Marina Moore, Trishank Karthik Kuppusamy, Justin Cappos:
Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems. 83-97 - Xinyu Liu, Ze Jin, Jiaxi Liu, Wei Liu, Xiaoxi Wang, Qixu Liu:
ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications. 98-112
Network and Enterprise Security
- DaeGeun Yoon, Taejoong Chung, Yongdae Kim:
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials. 113-123 - Silvia Sebastián, Raluca-Georgia Diugan, Juan Caballero, Iskander Sánchez-Rola, Leyla Bilge:
Domain and Website Attribution beyond WHOIS. 124-137 - Ayesha S. Dina, A. B. Siddique, D. Manivannan:
FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks. 138-149 - Ariana Mirian, Grant Ho, Stefan Savage, Geoffrey M. Voelker:
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates. 150-162
IoT and Cyber-Physical Systems Security
- Martín Ochoa, Hernán Vanegas, Jorge Toro-Pozo, David A. Basin:
SealClub: Computer-aided Paper Document Authentication. 163-177 - Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones. 178-189 - Philipp Pütz, Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi:
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats. 190-204 - Berkay Kaplan, Israel J. Lopez-Toledo, Carl A. Gunter, Jingyu Qian:
A Tagging Solution to Discover IoT Devices in Apartments. 205-215
Authentication and Access Control
- Ke Wang, Jianbo Gao, Qiao Wang, Jiashuo Zhang, Yue Li, Zhi Guan, Zhong Chen:
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance. 216-228 - Shaowen Xu, Qihang Zhou, Heqing Huang, Xiaoqi Jia, Haichao Du, Yang Chen, Yamin Xie:
Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch. 229-240 - Fahad Shaon, Sazzadur Rahaman, Murat Kantarcioglu:
The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms. 241-255 - Tommaso Innocenti, Matteo Golinelli, Kaan Onarlioglu, Seyed Ali Mirheidari, Bruno Crispo, Engin Kirda:
OAuth 2.0 Redirect URI Validation Falls Short, Literally. 256-267
Connected Vehicles and Industrial Control Systems Security
- Christian Plappert, Andreas Fuchs:
Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles. 268-282 - Christian Plappert, Andreas Fuchs:
Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles. 283-297 - Dustin Kern, Christoph Krauß, Matthias Hollick:
Detection of Anomalies in Electric Vehicle Charging Sessions. 298-309 - Jie Meng, Zeyu Yang, Zhenyong Zhang, Yangyang Geng, Ruilong Deng, Peng Cheng, Jiming Chen, Jianying Zhou:
SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic. 310-323
Security and Machine Learning I
- Jack Nicholls, Aditya Kuppa, Nhien-An Le-Khac:
FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification. 324-336 - Giorgio Severi, Simona Boboila, Alina Oprea, John T. Holodnak, Kendra Kratkiewicz, Jason Matterer:
Poisoning Network Flow Classifiers. 337-351 - Sijia Li, Gaopeng Gou, Chang Liu, Gang Xiong, Zhen Li, Junchao Xiao, Xinyu Xing:
TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection. 352-365
Security and Machine Learning II
- Yufan Chen, Arjun Arunasalam, Z. Berkay Celik:
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. 366-378 - Son Seonghun, Debopriya Roy Dipta, Berk Gülmezoglu:
DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection. 379-393 - Zihao Liu, Yan Zhang, Chenglin Miao:
Protecting Your Voice from Speech Synthesis Attacks. 394-408
Wireless and Cyberphysical-Systems Security
- Srinivasan Murali, Wenqiang Jin, Vighnesh Sivaraman, Huadi Zhu, Tianxi Ji, Pan Li, Ming Li:
Continuous Authentication Using Human-Induced Electric Potential. 409-423 - Jafar Pourbemany, Ye Zhu:
Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory Sensors. 424-438 - Saeif Alhazbi, Savio Sciancalepore, Gabriele Oligeri:
The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time. 439-450 - Zeyu Deng, Long Huang, Chen Wang:
Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays. 451-462
Machine Learning Security I
- Yu Zheng, Qizhi Zhang, Sherman S. M. Chow, Yuxiang Peng, Sijun Tan, Lichun Li, Shan Yin:
Secure Softmax/Sigmoid for Machine-learning Computation. 463-476 - Xiuling Wang, Wendy Hui Wang:
Link Membership Inference Attacks against Unsupervised Graph Representation Learning. 477-491 - Buse G. A. Tekgul, N. Asokan:
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks. 492-505
Machine Learning Security II
- Erwin Quiring, Andreas Müller, Konrad Rieck:
On the Detection of Image-Scaling Attacks in Machine Learning. 506-520 - Connor Weeks, Aravind Cheruvu, Sifat Muhammad Abdullah, Shravya Kanchi, Daphne Yao, Bimal Viswanath:
A First Look at Toxicity Injection Attacks on Open-domain Chatbots. 521-534 - Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks. 535-549
Malware
- Andrew Chi, Blake Anderson, Michael K. Reiter:
Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk. 550-564 - Yizhe Zhang, Hongying Dong, Alastair Nottingham, Molly Buchanan, Donald E. Brown, Yixin Sun:
Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks. 565-579 - Dazhi Zhan, Wei Bai, Xin Liu, Yue Hu, Lei Zhang, Shize Guo, Zhisong Pan:
PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior. 580-593 - Richard August See, Maximilian Gehring, Mathias Fischer, Shankar Karuppayah:
Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons. 594-608
Trustworthy Machine Learning
- Xirong Zhuang, Lan Zhang, Chen Tang, Huiqi Liu, Bin Wang, Yan Zheng, Bo Ren:
DeepContract: Controllable Authorization of Deep Learning Models. 609-620 - Fabing Li, Xiang Li, Mingyu Gao:
Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse. 621-635 - Bo Cui, Tianyu Mei:
ABFL: A Blockchain-enabled Robust Framework for Secure and Trustworthy Federated Learning. 636-646 - Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad-Reza Sadeghi:
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks. 647-661
OS and Software Security
- Lukas Maar, Martin Schwarzl, Fabian Rauscher, Daniel Gruss, Stefan Mangard:
DOPE: DOmain Protection Enforcement with PKS. 662-676 - Fabian Franzen, Andreas Chris Wilhelmer, Jens Grossklags:
RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis. 677-690 - Farabi Mahmud, Sungkeun Kim, Harpreet Singh Chawla, Eun Jung Kim, Chia-Che Tsai, Abdullah Muzahid:
Attack of the Knights: Non Uniform Cache Side Channel Attack. 691-703 - Tom Ganz, Erik Imgrund, Martin Härterich, Konrad Rieck:
PAVUDI: Patch-based Vulnerability Discovery using Machine Learning. 704-717
Trustworthy Systems
- Michael Eckel, Dominik Roy George, Björn Grohmann, Christoph Krauß:
Remote Attestation with Constrained Disclosure. 718-731 - Vikram Narayanan, Cláudio Carvalho, Angelo Ruocco, Gheorghe Almási, James Bottomley, Mengmei Ye, Tobin Feldman-Fitzthum, Daniele Buono, Hubertus Franke, Anton Burtsev:
Remote attestation of confidential VMs using ephemeral vTPMs. 732-743 - Samira Briongos, Ghassan Karame, Claudio Soriente, Annika Wilde:
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications. 744-758 - Andrew Chi, Brandon Enright, David A. McGrew:
Detecting Weak Keys in Manufacturing Certificates: A Case Study. 759-771
Privacy
- Joann Qiongna Chen, Tianhao Wang, Zhikun Zhang, Yang Zhang, Somesh Jha, Zhou Li:
Differentially Private Resource Allocation. 772-786 - Mingtian Tan, Xiaofei Xie, Jun Sun, Tianhao Wang:
Mitigating Membership Inference Attacks via Weighted Smoothing. 787-798 - Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication. 799-813
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.