default search action
ACSAC 2017: Orlando, FL, USA
- Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017. ACM 2017, ISBN 978-1-4503-5345-8
Mobile Authentication
- Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö:
n-Auth: Mobile Authentication Done Right. 1-15 - Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. 16-27 - Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar:
A Secure Mobile Authentication Alternative to Biometrics. 28-41
Memory Corruption
- Hua Yan, Yulei Sui, Shiping Chen, Jingling Xue:
Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection. 42-54 - Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz:
Breaking and Fixing Destructive Code Read Defenses. 55-67 - Richard Skowyra, Steven R. Gomez, David Bigelow, James Landry, Hamed Okhravi:
QUASAR: Quantitative Attack Space Analysis and Reasoning. 68-78
Big Data Analytics
- Jianyu Jiang, Shixiong Zhao, Danish Alsayed, Yuexuan Wang, Heming Cui, Feng Liang, Zhaoquan Gu:
Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security. 79-90 - Gianluca Stringhini, Yun Shen, Yufei Han, Xiangliang Zhang:
Marmite: Spreading Malicious File Reputation Through Download Graphs. 91-102 - Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed, Bill Chu, Xi Niu:
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. 103-115
Software Protection
- Anh Quach, Matthew Cole, Aravind Prakash:
Supplementing Modern Software Defenses with Stack-Pointer Sanity. 116-127 - Mingwei Zhang, Michalis Polychronakis, R. Sekar:
Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks. 128-140 - Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna:
Piston: Uncooperative Remote Runtime Patching. 141-153
Applied Crypto
- Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwenolé Quellec, Michel Cozic:
Proxy Re-Encryption Based on Homomorphic Encryption. 154-161 - Matús Nemec, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas:
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. 162-175 - Chris McMahon Stone, Tom Chothia, Flavio D. Garcia:
Spinner: Semi-Automatic Detection of Pinning without Hostname Verification. 176-188
Enterprise Security
- Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy:
Predicting Cyber Threats with Virtual Security Products. 189-199 - Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico, Robert Scott:
Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. 200-211 - Jake Weidman, Jens Grossklags:
I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. 212-224
Internet of Things (IoT)
- Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens:
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. 225-237 - Jun Young Kim, Ralph Holz, Wen Hu, Sanjay Jha:
Automated Analysis of Secure Internet of Things Protocols. 238-249 - Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic:
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens. 250-261
Adversarial Machine Learning
- Uyeong Jang, Xi Wu, Somesh Jha:
Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning. 262-277 - Xiaoyu Cao, Neil Zhenqiang Gong:
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification. 278-287 - Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter:
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. 288-302
Cyber-Physical Systems
- Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl:
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. 303-314 - Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. 315-326 - Richard James Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter:
TRAKS: A Universal Key Management Scheme for ERTMS. 327-338
Android Malware
- Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. 339-349 - Xiaolei Wang, Sencun Zhu, Dehua Zhou, Yuexiang Yang:
Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. 350-361 - Lingwei Chen, Shifu Hou, Yanfang Ye:
SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks. 362-372
Intrusions
- Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. 373-386 - Timothy Barron, Nick Nikiforakis:
Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior. 387-398 - Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet:
Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode. 399-411
Embedded Systems
- Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. 412-424 - Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng:
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. 425-436 - Ali Abbasi, Thorsten Holz, Emmanuele Zambon, Sandro Etalle:
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. 437-448
Network Security
- Matteo Dell'Amico, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier:
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. 449-460 - Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska:
A Security-Mode for Carrier-Grade SDN Controllers. 461-473 - Jelena Mirkovic, Erik Kline, Peter L. Reiher:
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. 474-485
Usability
- Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber:
Towards Baselines for Shoulder Surfing on Mobile Authentication. 486-498 - Maliheh Shirvanian, Nitesh Saxena, Jesvin James George:
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. 499-511 - Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon:
Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones. 512-527
System Security
- Peter C. Johnson, Sergey Bratus, Sean W. Smith:
Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. 528-541 - Junya Ogasawara, Kenji Kono:
Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices. 542-552 - Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang:
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. 553-565
Privacy
- Xiyue Deng, Jelena Mirkovic:
Commoner Privacy And A Study On Network Traces. 566-576 - Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya:
The Devil's in The Details: Placing Decoy Routers in the Internet. 577-589 - Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William K. Robertson, Engin Kirda:
Ex-Ray: Detection of History-Leaking Browser Extensions. 590-602
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.