default search action
ACSAC 2022: Austin, TX, USA
- Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022. ACM 2022, ISBN 978-1-4503-9759-9
CPS and IoT I
- Savio Sciancalepore
, Dominik Roy George
:
Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles. 1-12 - Matthew Landen
, Key-whan Chung
, Moses Ike
, Sarah Mackay
, Jean-Paul Watson
, Wenke Lee
:
DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection. 13-27 - Zhuojia Shen
, Komail Dharsee
, John Criswell
:
Randezvous: Making Randomization Effective on MCUs. 28-41 - Maria Zhdanova
, Julian Urbansky
, Anne Hagemeier
, Daniel Zelle
, Isabelle Herrmann
, Dorian Höffner
:
Local Power Grids at Risk - An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid Communication. 42-55 - Qifan Zhang
, Junjie Shen
, Mingtian Tan
, Zhe Zhou
, Zhou Li
, Qi Alfred Chen
, Haipeng Zhang
:
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization. 56-70
Deployable Trustworthy Systems
- Nik Sultana
, Henry Zhu
, Ke Zhong
, Zhilei Zheng
, Ruijie Mao
, Digvijaysinh Chauhan
, Stephen Carrasquillo
, Junyong Zhao
, Lei Shi
, Nikos Vasilakis
, Boon Thau Loo
:
Towards Practical Application-level Support for Privilege Separation. 71-87 - Yinggang Guo
, Zicheng Wang
, Bingnan Zhong
, Qingkai Zeng
:
Formal Modeling and Security Analysis for Intra-level Privilege Separation. 88-101 - Flavio Toffalini
, Mathias Payer
, Jianying Zhou
, Lorenzo Cavallaro
:
Designing a Provenance Analysis for SGX Enclaves. 102-116 - Qian Ren
, Yingjun Wu
, Han Liu, Yue Li
, Anne Victor
, Hong Lei
, Lei Wang
, Bangdao Chen
:
Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation. 117-131 - Xinshu Ma
, Florentin Rochet
, Tariq Elahi
:
Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering. 132-145
Machine Learning I
- Mohamad Mansouri
, Melek Önen
, Wafa Ben Jaballah
:
Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning. 146-158 - Yinbin Miao
, Rongpeng Xie
, Xinghua Li
, Ximeng Liu
, Zhuo Ma
, Robert H. Deng
:
Compressed Federated Learning Based on Adaptive Local Differential Privacy. 159-170 - Giovanni Apruzzese
, Mauro Conti
, Ying Yuan
:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. 171-185 - Chen Gong
, Zhou Yang
, Yunpeng Bai
, Jieke Shi
, Arunesh Sinha
, Bowen Xu
, David Lo
, Xinwen Hou
, Guoliang Fan
:
Curiosity-Driven and Victim-Aware Adversarial Policies. 186-200 - Liyue Shen
, Yanjun Zhang
, Jingwei Wang
, Guangdong Bai
:
Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification. 201-213
Malware
- Yong-Gang Li, Yeh-Ching Chung
, Jinbiao Xing
, Yu Bao
, Guoyuan Lin
:
MProbe: Make the code probing meaningless. 214-226 - Jia Yan
, Ming Wan
, Xiangkun Jia
, Lingyun Ying
, Purui Su
, Zhanyi Wang
:
DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection. 227-239 - Aaron Faulkenberry
, Athanasios Avgetidis
, Zane Ma
, Omar Alrawi
, Charles Lever
, Panagiotis Kintis
, Fabian Monrose
, Angelos D. Keromytis
, Manos Antonakakis
:
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy. 240-250 - Afsah Anwar
, Yi Hui Chen
, Roy Hodgman
, Tom Sellers
, Engin Kirda
, Alina Oprea
:
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices. 251-266 - Xutong Wang
, Chaoge Liu
, Xiaohui Hu
, Zhi Wang
, Jie Yin, Xiang Cui:
Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks. 267-278
Applied Crypto, Privacy, and Anonymity
- Erik Buchholz
, Alsharif Abuadbba
, Shuo Wang
, Surya Nepal
, Salil Subhash Kanhere
:
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. 279-292 - Ammar Haydari
, Chen-Nee Chuah
, H. Michael Zhang
, Jane MacFarlane
, Sean Peisert
:
Differentially Private Map Matching for Mobility Trajectories. 293-303 - Jieyu Zheng
, Feng He
, Shiyu Shen
, Chenxi Xue
, Yunlei Zhao
:
Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation. 304-317 - Wenqing Li
, Shijie Jia
, Limin Liu
, Fangyu Zheng
, Yuan Ma
, Jingqiang Lin
:
CryptoGo: Automatic Detection of Go Cryptographic API Misuses. 318-331 - Seung Ho Na
, Hyeong Gwon Hong
, Junmo Kim
, Seungwon Shin
:
Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint. 332-345
Software Security I
- Markus Bauer
, Ilya Grishchenko
, Christian Rossow
:
TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation. 346-360 - Sunwoo Ahn
, Seonggwan Ahn
, Hyungjoon Koo
, Yunheung Paek
:
Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning. 361-374 - Elia Geretto
, Cristiano Giuffrida
, Herbert Bos
, Erik van der Kouwe
:
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots. 375-387 - Prashast Srivastava
, Stefan Nagy
, Matthew Hicks
, Antonio Bianchi
, Mathias Payer
:
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction. 388-399 - Carmen Cheh
, Nicholas Tay
, Binbin Chen
:
From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery. 400-411
CPS and IoT II
- Alessandro Erba
, Nils Ole Tippenhauer
:
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks. 412-426 - Yechan Bae
, Sarbartha Banerjee, Sangho Lee, Marcus Peinado:
Spacelord: Private and Secure Smart Space Sharing. 427-439 - Anomadarshi Barua, Lelin Pan, Mohammad Abdullah Al Faruque:
BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems. 440-454 - Jan Sebastian Götte
, Liran Katzir, Björn Scheuermann:
Ripples in the Pond: Transmitting Information through Grid Frequency Modulation. 455-466 - Luca Morgese Zangrandi
, Thijs van Ede
, Tim M. Booij
, Savio Sciancalepore
, Luca Allodi
, Andrea Continella
:
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles. 467-480
Software Security II
- Chandra Thapa
, Seung Ick Jang
, Muhammad Ejaz Ahmed
, Seyit Camtepe
, Josef Pieprzyk
, Surya Nepal
:
Transformer-Based Language Models for Software Vulnerability Detection. 481-496 - Yu Luo, Weifeng Xu, Dianxiang Xu:
Compact Abstract Graphs for Detecting Code Vulnerability with GNN Models. 497-507 - Ying Cao
, Ruigang Liang
, Kai Chen
, Peiwei Hu
:
Boosting Neural Networks to Decompile Optimized Binaries. 508-518 - Yuki Koike, Hiroyuki Katsura, Hiromu Yakura, Yuma Kurogome:
SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing. 519-533 - Yiru Zhao
, Xiaoke Wang
, Lei Zhao
, Yueqiang Cheng
, Heng Yin
:
Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing. 534-547
Mobile and Wireless Security
- Harshad Sathaye
, Guevara Noubir
, Aanjhan Ranganathan
:
On the Implications of Spoofing and Jamming Aviation Datalink Applications. 548-560 - Evangelos Bitsikas
, Christina Pöpper
:
You have been warned: Abusing 5G's Warning and Emergency Systems. 561-575 - Samin Yaseer Mahmud
, K. Virgil English
, Seaver Thorn
, William Enck
, Adam Oest
, Muhammad Saad
:
Analysis of Payment Service Provider SDKs in Android. 576-590
Usability and Human-Centered Security
- Rahel A. Fainchtein
, Adam J. Aviv
, Micah Sherr
:
User Perceptions of the Privacy and Usability of Smart DNS. 591-604 - Xiaoyuan Wu
, Collins W. Munyendo
, Eddie Cosic
, Genevieve A. Flynn
, Olivia Legault
, Adam J. Aviv
:
User Perceptions of Five-Word Passwords. 605-618 - James Mattei
, Madeline McLaughlin
, Samantha Katcher
, Daniel Votipka
:
A Qualitative Evaluation of Reverse Engineering Tool Usability. 619-631
Machine Learning II
- Minghong Fang
, Jia Liu
, Neil Zhenqiang Gong
, Elizabeth S. Bentley
:
AFLGuard: Byzantine-robust Asynchronous Federated Learning. 632-646 - Ning Wang
, Yang Xiao
, Yimin Chen
, Ning Zhang
, Wenjing Lou
, Y. Thomas Hou
:
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning. 647-657 - Yufeng Diao
, Yichi Zhang
, Guodong Zhao
, Mohamed Khamis
:
Drone Authentication via Acoustic Fingerprint. 658-668 - Nuo Xu
, Binghui Wang
, Ran Ran
, Wujie Wen
, Parv Venkitasubramaniam
:
NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks. 669-683 - Jing Xu
, Rui Wang
, Stefanos Koffas
, Kaitai Liang
, Stjepan Picek
:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. 684-698
Network Security
- Levente Csikor
, Sriram Ramachandran
, Anantharaman Lakshminarayanan
:
ZeroDNS: Towards Better Zero Trust Security using DNS. 699-713 - Jeongyoon Heo
, Sangwon Gil
, Youngman Jung
, Jinmok Kim
, Donguk Kim
, Woojin Park
, Yongdae Kim
, Kang G. Shin
, Choong-Hoon Lee
:
Are There Wireless Hidden Cameras Spying on Me? 714-726 - Zheng Yang
, Chao Yin
, Junming Ke
, Tien Tuan Anh Dinh
, Jianying Zhou
:
If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable. 727-741 - Shreyas Srinivasa
, Jens Myrup Pedersen
, Emmanouil Vasilomanolakis
:
Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots. 742-755 - Zhechang Zhang
, Bin Yuan
, Kehan Yang
, Deqing Zou
, Hai Jin
:
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance. 756-768
Anomaly, Intrusion, and Threat Detection
- Xiaolei Wang
, Lin Yang
, Dongyang Li
, Linru Ma
, Yongzhong He
, Junchao Xiao
, Jiyuan Liu
, Yuexiang Yang
:
MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs. 769-784 - Xian Wang
:
ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift. 785-798 - Bingkun Wu
, Weizhi Meng
, Wei-Yang Chiu
:
Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface. 799-812 - Muhammad Adil Inam
, Akul Goyal
, Jason Liu
, Jaron Mink
, Noor Michael
, Sneha Gaur
, Adam Bates
, Wajih Ul Hassan
:
FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput. 813-826 - Yushan Liu
, Xiaokui Shu
, Yixin Sun
, Jiyong Jang
, Prateek Mittal
:
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery. 827-840
OS Security I
- Debopriya Roy Dipta
, Berk Gülmezoglu
:
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical. 841-853 - Rajat Gupta
, Lukas Patrick Dresel
, Noah Spahn
, Giovanni Vigna
, Christopher Kruegel
, Taesoo Kim
:
POPKORN: Popping Windows Kernel Drivers At Scale. 854-868 - Yutian Yang
, Wenbo Shen
, Xun Xie
, Kangjie Lu
, Mingsen Wang
, Tianyu Zhou
, Chenggang Qin
, Wang Yu
, Kui Ren
:
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms. 869-880
Web Security
- ChangSeok Oh
, Sangho Lee
, Chenxiong Qian
, Hyungjoon Koo
, Wenke Lee
:
DeView: Confining Progressive Web Applications by Debloating Web APIs. 881-895 - Pablo Picazo-Sanchez
, Benjamin Eriksson
, Andrei Sabelfeld
:
No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns. 896-910 - David Klein
, Marius Musch
, Thomas Barber
, Moritz Kopmann
, Martin Johns
:
Accept All Exploits: Exploring the Security Impact of Cookie Banners. 911-922
Resilience and Data Protection
- Xiaohai Dai
, Liping Huang
, Jiang Xiao
, Zhaonan Zhang
, Xia Xie
, Hai Jin
:
Trebiz: Byzantine Fault Tolerance with Byzantine Merchants. 923-935 - Moe Sabry
, Reza Samavi
:
ArchiveSafe LT: Secure Long-term Archiving System. 936-948 - Minjae Seo
, Jaehan Kim
, Eduard Marin
, Myoungsung You
, Taejune Park
, Seungsoo Lee
, Seungwon Shin
, Jinwoo Kim
:
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic. 949-963
OS Security II
- Yizhuo Wang
, Yikun Hu
, Xuangan Xiao
, Dawu Gu
:
iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOS. 964-977 - Fan Lang
, Wei Wang
, Lingjia Meng
, Jingqiang Lin
, Qiongxiao Wang
, Linli Lu
:
MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape. 978-988 - Joana Pecholt
, Sascha Wessel
:
CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments. 989-998
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.