default search action
ACSAC 2019: San Juan, PR, USA
- David M. Balenson:
Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019. ACM 2019, ISBN 978-1-4503-7628-0
IOT security
- Chenglu Jin, Zheng Yang, Marten van Dijk, Jianying Zhou:
Proof of aliveness. 1-16 - Charalampos Stylianopoulos, Simon Kindström, Magnus Almgren, Olaf Landsiedel, Marina Papatriantafilou:
Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs. 17-27 - Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac:
Aegis: a context-aware security framework for smart home systems. 28-41 - Chen Wang, S. Abhishek Anand, Jian Liu, Payton Walker, Yingying Chen, Nitesh Saxena:
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations. 42-56
Binary analysis & defense
- Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, Ziqiang Ma:
TF-BIV: transparent and fine-grained binary integrity verification in the cloud. 57-69 - Ioannis Agadakos, Di Jin, David Williams-King, Vasileios P. Kemerlis, Georgios Portokalidis:
Nibbler: debloating binary shared libraries. 70-83 - Jim Alves-Foss, Jia Song:
Function boundary detection in stripped binaries. 84-96 - Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos:
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching. 97-112
AI security
- Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith Chinthana Ranasinghe, Surya Nepal:
STRIP: a defence against trojan attacks on deep neural networks. 113-125 - Zheng Li, Chengyu Hu, Yang Zhang, Shanqing Guo:
How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. 126-137 - Yu Li, Yannan Liu, Min Li, Ye Tian, Bo Luo, Qiang Xu:
D2NN: a fine-grained dual modular redundancy framework for deep neural networks. 138-147 - Zecheng He, Tianwei Zhang, Ruby B. Lee:
Model inversion attacks against collaborative inference. 148-162
Software security I
- Sebastian Poeplau, Aurélien Francillon:
Systematic comparison of symbolic execution systems: intermediate representation and its generation. 163-176 - Mathilde Ollivier, Sébastien Bardin, Richard Bonichon, Jean-Yves Marion:
How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections). 177-189 - Christophe Hauser, Jayakrishna Menon, Yan Shoshitaishvili, Ruoyu Wang, Giovanni Vigna, Christopher Kruegel:
Sleak: automating address space layout derandomization. 190-202 - Mohsen Ahmadvand, Dennis Fischer, Sebastian Banescu:
SIP shaker: software integrity protection composition. 203-214
Intrusion detection
- Samuel Marchal, Sebastian Szyller:
Detecting organized eCommerce fraud using scalable categorical clustering. 215-228 - Mahsa Foruhandeh, Yanmao Man, Ryan M. Gerdes, Ming Li, Thidapat Chantem:
SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. 229-244 - Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao, Kevin W. Hamlen, Latifur Khan:
Improving intrusion detectors by crook-sourcing. 245-256 - Aurore Fass, Michael Backes, Ben Stock:
JStap: a static pre-filter for malicious JavaScript detection. 257-269
Privacy
- Huangyi Ge, Sze Yiu Chau, Victor E. Gonsalves, Huian Li, Tianhao Wang, Xukai Zou, Ninghui Li:
Koinonia: verifiable e-voting with long-term privacy. 270-285 - Tavish Vaidya, Tim Walsh, Micah Sherr:
Whisper: a unilateral defense against VoIP traffic re-identification attacks. 286-296 - Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Privacy preserving substring search protocol with polylogarithmic communication cost. 297-312 - Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:
Revisiting utility metrics for location privacy-preserving mechanisms. 313-327
Mobile security
- Stefano Cristalli, Long Lu, Danilo Bruschi, Andrea Lanzi:
Detecting (absent) app-to-app authentication on cross-device short-distance channels. 328-338 - Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. 339-354 - Manar Mohamed, Prakash Shrestha, Nitesh Saxena:
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. 355-365 - Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef:
AppVeto: mobile application self-defense through resource access veto. 366-377
Big data security
- Jiaping Gui, Xusheng Xiao, Ding Li, Chung Hwan Kim, Haifeng Chen:
Progressive processing of system-behavioral query. 378-389 - Saeid Mofrad, Ishtiaq Ahmed, Shiyong Lu, Ping Yang, Heming Cui, Fengwei Zhang:
SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments. 390-403 - Matthew W. Sanders, Chuan Yue:
Mining least privilege attribute based access control policies. 404-416 - Pejman Najafi, Alexander Mühle, Wenzel Pünter, Feng Cheng, Christoph Meinel:
MalRank: a measure of maliciousness in SIEM-based knowledge graphs. 417-429
Malware
- Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jack W. Davidson:
Cubismo: decloaking server-side malware via cubist program analysis. 430-443 - Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna:
Neurlux: dynamic malware analysis without feature engineering. 444-455 - Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:
A game of "Cut and Mouse": bypassing antivirus by simulating user inputs. 456-465 - Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura:
My script engines know what you did in the dark: converting engines into script API tracers. 466-477
Web security
- Iskander Sánchez-Rola, Davide Balzarotti, Igor Santos:
BakingTimer: privacy analysis of server-side request processing time. 478-488 - Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik:
PDoT: private DNS-over-TLS with TEE support. 489-499 - Hao Yang, Kun Du, Yubao Zhang, Shuang Hao, Zhou Li, Mingxuan Liu, Haining Wang, Hai-Xin Duan, Yazhou Shi, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
Casino royale: a deep exploration of illegal online gambling. 500-513 - Luke Dickinson, Trevor Smith, Kent E. Seamons:
Leveraging locality of reference for certificate revocation. 514-528
Network security
- Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones. 529-543 - Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Haoliang Lu, Longquan Liu, Chen Wang, Dandan Sun, Chao Zhang, Baoxu Liu:
SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities. 544-556 - Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet:
Premadoma: an operational solution for DNS registries to prevent malicious domain registrations. 557-567 - Vasudevan Nagendra, Vinod Yegneswaran, Phillip A. Porras, Samir R. Das:
Coordinated dataflow protection for ultra-high bandwidth science networks. 568-583
Software security II
- Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
Analyzing control flow integrity with LLVM-CFI. 584-597 - Tapti Palit, Fabian Monrose, Michalis Polychronakis:
Mitigating data leakage by protecting memory-resident sensitive data. 598-611 - Myoung Jin Nam, Periklis Akritidis, David J. Greaves:
FRAMER: a tagged-pointer capability system with memory safety applications. 612-626 - Joonun Jang, Huy Kang Kim:
FuzzBuilder: automated building greybox fuzzing environment for C/C++ library. 627-637
Embedded security
- Amir Herzberg, Yehonatan Kfir:
The chatty-sensor: a provably-covert channel in cyber physical systems. 638-649 - Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac:
HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol. 650-659 - Pritam Dash, Mehdi Karimibiuki, Karthik Pattabiraman:
Out of control: stealthy attacks against robotic vehicles protected by control-based techniques. 660-672 - Ryad Benadjila, Arnauld Michelizza, Mathieu Renard, Philippe Thierry, Philippe Trebuchet:
WooKey: designing a trusted and efficient USB device. 673-686
Usability & human aspects
- Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Syogo Hayashi, Tatsuya Mori, Koushik Sen:
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection. 687-701 - Tobias Urban, Martin Degeling, Thorsten Holz, Norbert Pohlmann:
"Your hashed IP address: Ubuntu.": perspectives on transparency tools for online advertising. 702-717 - Martin Ukrop, Lydia Kraus, Vashek Matyas, Heider Ahmad Mutleq Wahsheh:
Will you trust this TLS certificate?: perceptions of people working in IT. 718-731 - Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama:
I know what you did last login: inconsistent messages tell existence of a target's account to insiders. 732-746
OS security
- Andrea Mambretti, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus:
Speculator: a tool to analyze speculative execution attacks and mitigations. 747-761 - Ronny Chevalier, David Plaquin, Chris I. Dalton, Guillaume Hiet:
Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems. 762-775
Side channels
- David Slater, Scott Novotney, Jessica Moore, Sean Morgan, Scott Tenaglia:
Robust keystroke transcription from the acoustic side-channel. 776-787 - Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi:
DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization. 788-800
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.