default search action
ACSAC 2022: Austin, TX, USA
- Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022. ACM 2022, ISBN 978-1-4503-9759-9
CPS and IoT I
- Savio Sciancalepore, Dominik Roy George:
Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles. 1-12 - Matthew Landen, Key-whan Chung, Moses Ike, Sarah Mackay, Jean-Paul Watson, Wenke Lee:
DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection. 13-27 - Zhuojia Shen, Komail Dharsee, John Criswell:
Randezvous: Making Randomization Effective on MCUs. 28-41 - Maria Zhdanova, Julian Urbansky, Anne Hagemeier, Daniel Zelle, Isabelle Herrmann, Dorian Höffner:
Local Power Grids at Risk - An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid Communication. 42-55 - Qifan Zhang, Junjie Shen, Mingtian Tan, Zhe Zhou, Zhou Li, Qi Alfred Chen, Haipeng Zhang:
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization. 56-70
Deployable Trustworthy Systems
- Nik Sultana, Henry Zhu, Ke Zhong, Zhilei Zheng, Ruijie Mao, Digvijaysinh Chauhan, Stephen Carrasquillo, Junyong Zhao, Lei Shi, Nikos Vasilakis, Boon Thau Loo:
Towards Practical Application-level Support for Privilege Separation. 71-87 - Yinggang Guo, Zicheng Wang, Bingnan Zhong, Qingkai Zeng:
Formal Modeling and Security Analysis for Intra-level Privilege Separation. 88-101 - Flavio Toffalini, Mathias Payer, Jianying Zhou, Lorenzo Cavallaro:
Designing a Provenance Analysis for SGX Enclaves. 102-116 - Qian Ren, Yingjun Wu, Han Liu, Yue Li, Anne Victor, Hong Lei, Lei Wang, Bangdao Chen:
Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation. 117-131 - Xinshu Ma, Florentin Rochet, Tariq Elahi:
Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering. 132-145
Machine Learning I
- Mohamad Mansouri, Melek Önen, Wafa Ben Jaballah:
Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning. 146-158 - Yinbin Miao, Rongpeng Xie, Xinghua Li, Ximeng Liu, Zhuo Ma, Robert H. Deng:
Compressed Federated Learning Based on Adaptive Local Differential Privacy. 159-170 - Giovanni Apruzzese, Mauro Conti, Ying Yuan:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. 171-185 - Chen Gong, Zhou Yang, Yunpeng Bai, Jieke Shi, Arunesh Sinha, Bowen Xu, David Lo, Xinwen Hou, Guoliang Fan:
Curiosity-Driven and Victim-Aware Adversarial Policies. 186-200 - Liyue Shen, Yanjun Zhang, Jingwei Wang, Guangdong Bai:
Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification. 201-213
Malware
- Yong-Gang Li, Yeh-Ching Chung, Jinbiao Xing, Yu Bao, Guoyuan Lin:
MProbe: Make the code probing meaningless. 214-226 - Jia Yan, Ming Wan, Xiangkun Jia, Lingyun Ying, Purui Su, Zhanyi Wang:
DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection. 227-239 - Aaron Faulkenberry, Athanasios Avgetidis, Zane Ma, Omar Alrawi, Charles Lever, Panagiotis Kintis, Fabian Monrose, Angelos D. Keromytis, Manos Antonakakis:
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy. 240-250 - Afsah Anwar, Yi Hui Chen, Roy Hodgman, Tom Sellers, Engin Kirda, Alina Oprea:
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices. 251-266 - Xutong Wang, Chaoge Liu, Xiaohui Hu, Zhi Wang, Jie Yin, Xiang Cui:
Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks. 267-278
Applied Crypto, Privacy, and Anonymity
- Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil Subhash Kanhere:
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. 279-292 - Ammar Haydari, Chen-Nee Chuah, H. Michael Zhang, Jane MacFarlane, Sean Peisert:
Differentially Private Map Matching for Mobility Trajectories. 293-303 - Jieyu Zheng, Feng He, Shiyu Shen, Chenxi Xue, Yunlei Zhao:
Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation. 304-317 - Wenqing Li, Shijie Jia, Limin Liu, Fangyu Zheng, Yuan Ma, Jingqiang Lin:
CryptoGo: Automatic Detection of Go Cryptographic API Misuses. 318-331 - Seung Ho Na, Hyeong Gwon Hong, Junmo Kim, Seungwon Shin:
Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint. 332-345
Software Security I
- Markus Bauer, Ilya Grishchenko, Christian Rossow:
TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation. 346-360 - Sunwoo Ahn, Seonggwan Ahn, Hyungjoon Koo, Yunheung Paek:
Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning. 361-374 - Elia Geretto, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe:
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots. 375-387 - Prashast Srivastava, Stefan Nagy, Matthew Hicks, Antonio Bianchi, Mathias Payer:
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction. 388-399 - Carmen Cheh, Nicholas Tay, Binbin Chen:
From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery. 400-411
CPS and IoT II
- Alessandro Erba, Nils Ole Tippenhauer:
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks. 412-426 - Yechan Bae, Sarbartha Banerjee, Sangho Lee, Marcus Peinado:
Spacelord: Private and Secure Smart Space Sharing. 427-439 - Anomadarshi Barua, Lelin Pan, Mohammad Abdullah Al Faruque:
BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems. 440-454 - Jan Sebastian Götte, Liran Katzir, Björn Scheuermann:
Ripples in the Pond: Transmitting Information through Grid Frequency Modulation. 455-466 - Luca Morgese Zangrandi, Thijs van Ede, Tim M. Booij, Savio Sciancalepore, Luca Allodi, Andrea Continella:
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles. 467-480
Software Security II
- Chandra Thapa, Seung Ick Jang, Muhammad Ejaz Ahmed, Seyit Camtepe, Josef Pieprzyk, Surya Nepal:
Transformer-Based Language Models for Software Vulnerability Detection. 481-496 - Yu Luo, Weifeng Xu, Dianxiang Xu:
Compact Abstract Graphs for Detecting Code Vulnerability with GNN Models. 497-507 - Ying Cao, Ruigang Liang, Kai Chen, Peiwei Hu:
Boosting Neural Networks to Decompile Optimized Binaries. 508-518 - Yuki Koike, Hiroyuki Katsura, Hiromu Yakura, Yuma Kurogome:
SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing. 519-533 - Yiru Zhao, Xiaoke Wang, Lei Zhao, Yueqiang Cheng, Heng Yin:
Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing. 534-547
Mobile and Wireless Security
- Harshad Sathaye, Guevara Noubir, Aanjhan Ranganathan:
On the Implications of Spoofing and Jamming Aviation Datalink Applications. 548-560 - Evangelos Bitsikas, Christina Pöpper:
You have been warned: Abusing 5G's Warning and Emergency Systems. 561-575 - Samin Yaseer Mahmud, K. Virgil English, Seaver Thorn, William Enck, Adam Oest, Muhammad Saad:
Analysis of Payment Service Provider SDKs in Android. 576-590
Usability and Human-Centered Security
- Rahel A. Fainchtein, Adam J. Aviv, Micah Sherr:
User Perceptions of the Privacy and Usability of Smart DNS. 591-604 - Xiaoyuan Wu, Collins W. Munyendo, Eddie Cosic, Genevieve A. Flynn, Olivia Legault, Adam J. Aviv:
User Perceptions of Five-Word Passwords. 605-618 - James Mattei, Madeline McLaughlin, Samantha Katcher, Daniel Votipka:
A Qualitative Evaluation of Reverse Engineering Tool Usability. 619-631
Machine Learning II
- Minghong Fang, Jia Liu, Neil Zhenqiang Gong, Elizabeth S. Bentley:
AFLGuard: Byzantine-robust Asynchronous Federated Learning. 632-646 - Ning Wang, Yang Xiao, Yimin Chen, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning. 647-657 - Yufeng Diao, Yichi Zhang, Guodong Zhao, Mohamed Khamis:
Drone Authentication via Acoustic Fingerprint. 658-668 - Nuo Xu, Binghui Wang, Ran Ran, Wujie Wen, Parv Venkitasubramaniam:
NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks. 669-683 - Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. 684-698
Network Security
- Levente Csikor, Sriram Ramachandran, Anantharaman Lakshminarayanan:
ZeroDNS: Towards Better Zero Trust Security using DNS. 699-713 - Jeongyoon Heo, Sangwon Gil, Youngman Jung, Jinmok Kim, Donguk Kim, Woojin Park, Yongdae Kim, Kang G. Shin, Choong-Hoon Lee:
Are There Wireless Hidden Cameras Spying on Me? 714-726 - Zheng Yang, Chao Yin, Junming Ke, Tien Tuan Anh Dinh, Jianying Zhou:
If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable. 727-741 - Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis:
Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots. 742-755 - Zhechang Zhang, Bin Yuan, Kehan Yang, Deqing Zou, Hai Jin:
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance. 756-768
Anomaly, Intrusion, and Threat Detection
- Xiaolei Wang, Lin Yang, Dongyang Li, Linru Ma, Yongzhong He, Junchao Xiao, Jiyuan Liu, Yuexiang Yang:
MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs. 769-784 - Xian Wang:
ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift. 785-798 - Bingkun Wu, Weizhi Meng, Wei-Yang Chiu:
Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface. 799-812 - Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan:
FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput. 813-826 - Yushan Liu, Xiaokui Shu, Yixin Sun, Jiyong Jang, Prateek Mittal:
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery. 827-840
OS Security I
- Debopriya Roy Dipta, Berk Gülmezoglu:
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical. 841-853 - Rajat Gupta, Lukas Patrick Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel, Taesoo Kim:
POPKORN: Popping Windows Kernel Drivers At Scale. 854-868 - Yutian Yang, Wenbo Shen, Xun Xie, Kangjie Lu, Mingsen Wang, Tianyu Zhou, Chenggang Qin, Wang Yu, Kui Ren:
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms. 869-880
Web Security
- ChangSeok Oh, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, Wenke Lee:
DeView: Confining Progressive Web Applications by Debloating Web APIs. 881-895 - Pablo Picazo-Sanchez, Benjamin Eriksson, Andrei Sabelfeld:
No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns. 896-910 - David Klein, Marius Musch, Thomas Barber, Moritz Kopmann, Martin Johns:
Accept All Exploits: Exploring the Security Impact of Cookie Banners. 911-922
Resilience and Data Protection
- Xiaohai Dai, Liping Huang, Jiang Xiao, Zhaonan Zhang, Xia Xie, Hai Jin:
Trebiz: Byzantine Fault Tolerance with Byzantine Merchants. 923-935 - Moe Sabry, Reza Samavi:
ArchiveSafe LT: Secure Long-term Archiving System. 936-948 - Minjae Seo, Jaehan Kim, Eduard Marin, Myoungsung You, Taejune Park, Seungsoo Lee, Seungwon Shin, Jinwoo Kim:
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic. 949-963
OS Security II
- Yizhuo Wang, Yikun Hu, Xuangan Xiao, Dawu Gu:
iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOS. 964-977 - Fan Lang, Wei Wang, Lingjia Meng, Jingqiang Lin, Qiongxiao Wang, Linli Lu:
MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape. 978-988 - Joana Pecholt, Sascha Wessel:
CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments. 989-998
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.