default search action
ACSAC 2018: San Juan, PR, USA
- Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018. ACM 2018, ISBN 978-1-4503-6569-7
Software Hardening
- Shachee Mishra, Michalis Polychronakis:
Shredder: Breaking Exploits through API Specialization. 1-16 - Erik van der Kouwe, Taddeus Kroes, Chris Ouwehand, Herbert Bos, Cristiano Giuffrida:
Type-After-Type: Practical and Complete Type-Safe Memory Reuse. 17-27 - Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. 28-39 - Mohsen Ahmadvand, Anahit Hayrapetyan, Sebastian Banescu, Alexander Pretschner:
Practical Integrity Protection with Oblivious Hashing. 40-52
Authentication
- Ximing Liu, Yingjiu Li, Robert H. Deng:
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings. 53-65 - Shane McCulley, Vassil Roussev:
Latent Typing Biometrics in Online Collaboration Services. 66-76 - Zhe Zhou, Di Tang, Wenhao Wang, Xiaofeng Wang, Zhou Li, Kehuan Zhang:
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. 77-88 - Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, Zhiqiang Lin:
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites. 89-100
ML-Based Defenses
- Fady Copty, Matan Danos, Orit Edelstein, Cindy Eisner, Dov Murik, Benjamin Zeltser:
Accurate Malware Detection by Extreme Abstraction. 101-111 - Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations. 112-123 - Alina Oprea, Zhou Li, Robin Norris, Kevin D. Bowers:
MADE: Security Analytics for Enterprise Threat Detection. 124-136 - Juan Echeverría, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou:
LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers. 137-146
Side Channels
- Nicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Bob Brumley:
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study. 147-160 - Jan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar:
MicroWalk: A Framework for Finding Side Channels in Binaries. 161-173 - Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
Analyzing Cache Side Channels Using Deep Neural Networks. 174-186 - Weixin Liang, Kai Bu, Ke Li, Jinhong Li, Arya Tavakoli:
MemCloak: Practical Access Obfuscation for Untrusted Memory. 187-197
Android
- Mohsin Junaid, Jiang Ming, David Chenho Kung:
StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification. 198-209 - Joey Allen, Matthew Landen, Sanya Chaba, Yang Ji, Simon Pak Ho Chung, Wenke Lee:
Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness. 210-221 - Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. 222-235 - Sze Yiu Chau, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li:
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps. 236-251
Network Security
- Akshaya Mani, Tavish Vaidya, David Dworken, Micah Sherr:
An Extensive Evaluation of the Internet's Open Proxies. 252-265 - Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu, Ying Zhang:
SENSS Against Volumetric DDoS Attacks. 266-277 - Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. 278-288 - Erik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer:
Tracking Users across the Web via TLS Session Resumption. 289-299
Web Security
- Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz:
Towards Automated Generation of Exploitation Primitives for Web Browsers. 300-312 - Juan D. Parra Rodriguez, Joachim Posegga:
RAPID: Resource and API-Based Detection Against In-Browser Miners. 313-326 - Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang:
A Multi-tab Website Fingerprinting Attack. 327-341 - Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld:
Raising the Bar: Evaluating Origin-wide Security Manifests. 342-354
Secure Learning
- Jan Henrik Ziegeldorf, Jan Metzke, Klaus Wehrle:
SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments. 355-370 - Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta:
Model Extraction Warning in MLaaS Paradigm. 371-380 - Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu:
Poisoning Attacks to Graph-Based Recommender Systems. 381-392 - Lingxiao Wei, Bo Luo, Yu Li, Yannan Liu, Qiang Xu:
I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators. 393-406
Virtualization
- Sergej Proskurin, Tamas K. Lengyel, Marius Momeu, Claudia Eckert, Apostolis Zarras:
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection. 407-417 - Xin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun, Quan Zhou:
A Measurement Study on Linux Container Security: Attacks and Countermeasures. 418-429 - Shota Futagami, Tomoya Unoki, Kenichi Kourai:
Secure Out-of-band Remote Management of Virtual Machines with Transparent Passthrough. 430-440 - Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. 441-452
Usability
- Adam J. Aviv, Flynn Wolf, Ravi Kuber:
Comparing Video Based Shoulder Surfing with Live Simulation. 453-466 - Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, Haley Johnson Bishop:
Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks. 467-477 - Oliver Wiese, Christoph Weinhold, Jan-Ole Malchow, Volker Roth:
I Need this Back, Later!: An Exploration of Practical Secret Sharing. 478-489 - Sadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, Peng Liu:
Take It or Leave It: A Survey Study on Operating System Upgrade Practices. 490-504
Vulnerability Detection
- Vivek Jain, Sanjay Rawat, Cristiano Giuffrida, Herbert Bos:
TIFF: Using Input Type Inference To Improve Fuzzing. 505-517 - Chengbin Pang, Yunlan Du, Bing Mao, Shanqing Guo:
Mapping to Bits: Efficiently Detecting Type Confusion Errors. 518-528 - Changming Liu, Deqing Zou, Peng Luo, Bin B. Zhu, Hai Jin:
A Heuristic Framework to Detect Concurrency Vulnerabilities. 529-541 - Yanfang Ye, Shifu Hou, Lingwei Chen, Xin Li, Liang Zhao, Shouhuai Xu, Jiabin Wang, Qi Xiong:
ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network. 542-552
Embedded Security
- Sriharsha Etigowni, Shamina Hossain-McKenzie, Maryam Kazerooni, Katherine R. Davis, Saman A. Zonouz:
Crystal (ball): I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller Recovery. 553-565 - Chuadhry Mujeeb Ahmed, Jianying Zhou, Aditya P. Mathur:
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS. 566-581 - John Henry Castellanos, Martín Ochoa, Jianying Zhou:
Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems. 582-594 - Robert Schilling, Mario Werner, Pascal Nasahl, Stefan Mangard:
Pointing in the Right Direction - Securing Memory Accesses in a Faulty World. 595-604
Software & OS Security
- Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
Lprov: Practical Library-aware Provenance Tracing. 605-617 - Franck de Goër, Sanjay Rawat, Dennis Andriesse, Herbert Bos, Roland Groz:
Now You See Me: Real-time Dynamic Function Call Detection. 618-628 - Bumjin Im, Ang Chen, Dan S. Wallach:
An Historical Analysis of the SEAndroid Policy Evolution. 629-640 - Md. Lutfor Rahman, Ajaya Neupane, Chengyu Song:
IAC: On the Feasibility of Utilizing Neural Signals for Access Control. 641-652
Blockchain & Smart Contracts
- Ivica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor:
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. 653-663 - Christof Ferreira Torres, Julian Schütte, Radu State:
Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. 664-676 - André Greubel, Alexandra Dmitrienko, Samuel Kounev:
SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network. 677-691 - Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena:
Obscuro: A Bitcoin Mixer using Trusted Execution Environments. 692-701
Cloud Security
- Andrea Continella, Mario Polino, Marcello Pogliani, Stefano Zanero:
There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets. 702-711 - Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
DeDoS: Defusing DoS with Dispersion Oriented Software. 712-722
Passwords
- Nikola K. Blanchard, Clément Malaingre, Ted Selker:
Improving security and usability of passphrases with guided word choice. 723-732 - Peter Mayer, Christian Schwartz, Melanie Volkamer:
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials. 733-748
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.