default search action
ACSAC 2023: Austin, TX, USA
- Annual Computer Security Applications Conference, ACSAC 2023, Austin, TX, USA, December 4-8, 2023. ACM 2023
Web Security
- Takashi Koide
, Naoki Fukushi
, Hiroki Nakano
, Daiki Chiba
:
PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names. 1-13 - Giada Stivala
, Sahar Abdelnabi
, Andrea Mengascini
, Mariano Graziano
, Mario Fritz
, Giancarlo Pellegrino
:
From Attachments to SEO: Click Here to Learn More about Clickbait PDFs! 14-28 - Platon Kotzias
, Kevin A. Roundy
, Michalis Pachilakis
, Iskander Sánchez-Rola
, Leyla Bilge
:
Scamdog Millionaire: Detecting E-commerce Scams in the Wild. 29-43 - Alberto Carboneri
, Mohammad Ghasemisharif
, Soroush Karami
, Jason Polakis
:
When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild. 44-55
Application and Software Security
- Elia Geretto
, Julius Hohnerlein
, Cristiano Giuffrida
, Herbert Bos
, Erik van der Kouwe
, Klaus von Gleissenthall
:
Triereme: Speeding up hybrid fuzzing through efficient query scheduling. 56-70 - Piergiorgio Ladisa
, Serena Elisa Ponta
, Nicola Ronzoni
, Matias Martinez
, Olivier Barais
:
On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI. 71-82 - Marina Moore
, Trishank Karthik Kuppusamy
, Justin Cappos
:
Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems. 83-97 - Xinyu Liu
, Ze Jin
, Jiaxi Liu
, Wei Liu
, Xiaoxi Wang
, Qixu Liu
:
ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications. 98-112
Network and Enterprise Security
- DaeGeun Yoon
, Taejoong Chung
, Yongdae Kim
:
Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials. 113-123 - Silvia Sebastián
, Raluca-Georgia Diugan
, Juan Caballero
, Iskander Sánchez-Rola
, Leyla Bilge
:
Domain and Website Attribution beyond WHOIS. 124-137 - Ayesha S. Dina
, A. B. Siddique, D. Manivannan
:
FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks. 138-149 - Ariana Mirian
, Grant Ho
, Stefan Savage
, Geoffrey M. Voelker
:
An Empirical Analysis of Enterprise-Wide Mandatory Password Updates. 150-162
IoT and Cyber-Physical Systems Security
- Martín Ochoa
, Hernán Vanegas
, Jorge Toro-Pozo
, David A. Basin
:
SealClub: Computer-aided Paper Document Authentication. 163-177 - Pietro Tedeschi
, Savio Sciancalepore
, Roberto Di Pietro
:
Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones. 178-189 - Philipp Pütz
, Richard Mitev
, Markus Miettinen
, Ahmad-Reza Sadeghi
:
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats. 190-204 - Berkay Kaplan
, Israel J. Lopez-Toledo
, Carl A. Gunter
, Jingyu Qian
:
A Tagging Solution to Discover IoT Devices in Apartments. 205-215
Authentication and Access Control
- Ke Wang
, Jianbo Gao
, Qiao Wang
, Jiashuo Zhang
, Yue Li
, Zhi Guan
, Zhong Chen
:
Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance. 216-228 - Shaowen Xu
, Qihang Zhou
, Heqing Huang
, Xiaoqi Jia
, Haichao Du
, Yang Chen
, Yamin Xie
:
Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch. 229-240 - Fahad Shaon
, Sazzadur Rahaman
, Murat Kantarcioglu
:
The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms. 241-255 - Tommaso Innocenti
, Matteo Golinelli
, Kaan Onarlioglu
, Seyed Ali Mirheidari
, Bruno Crispo
, Engin Kirda
:
OAuth 2.0 Redirect URI Validation Falls Short, Literally. 256-267
Connected Vehicles and Industrial Control Systems Security
- Christian Plappert
, Andreas Fuchs
:
Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles. 268-282 - Christian Plappert
, Andreas Fuchs
:
Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles. 283-297 - Dustin Kern
, Christoph Krauß
, Matthias Hollick
:
Detection of Anomalies in Electric Vehicle Charging Sessions. 298-309 - Jie Meng
, Zeyu Yang
, Zhenyong Zhang
, Yangyang Geng
, Ruilong Deng
, Peng Cheng
, Jiming Chen
, Jianying Zhou
:
SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic. 310-323
Security and Machine Learning I
- Jack Nicholls
, Aditya Kuppa
, Nhien-An Le-Khac
:
FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification. 324-336 - Giorgio Severi
, Simona Boboila
, Alina Oprea
, John T. Holodnak
, Kendra Kratkiewicz
, Jason Matterer
:
Poisoning Network Flow Classifiers. 337-351 - Sijia Li
, Gaopeng Gou
, Chang Liu
, Gang Xiong
, Zhen Li
, Junchao Xiao
, Xinyu Xing
:
TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection. 352-365
Security and Machine Learning II
- Yufan Chen
, Arjun Arunasalam
, Z. Berkay Celik
:
Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions. 366-378 - Son Seonghun
, Debopriya Roy Dipta
, Berk Gülmezoglu
:
DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection. 379-393 - Zihao Liu
, Yan Zhang
, Chenglin Miao
:
Protecting Your Voice from Speech Synthesis Attacks. 394-408
Wireless and Cyberphysical-Systems Security
- Srinivasan Murali
, Wenqiang Jin
, Vighnesh Sivaraman
, Huadi Zhu
, Tianxi Ji
, Pan Li
, Ming Li
:
Continuous Authentication Using Human-Induced Electric Potential. 409-423 - Jafar Pourbemany
, Ye Zhu
:
Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory Sensors. 424-438 - Saeif Alhazbi
, Savio Sciancalepore
, Gabriele Oligeri
:
The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time. 439-450 - Zeyu Deng
, Long Huang
, Chen Wang
:
Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays. 451-462
Machine Learning Security I
- Yu Zheng
, Qizhi Zhang
, Sherman S. M. Chow
, Yuxiang Peng
, Sijun Tan
, Lichun Li
, Shan Yin
:
Secure Softmax/Sigmoid for Machine-learning Computation. 463-476 - Xiuling Wang
, Wendy Hui Wang
:
Link Membership Inference Attacks against Unsupervised Graph Representation Learning. 477-491 - Buse G. A. Tekgul
, N. Asokan
:
FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks. 492-505
Machine Learning Security II
- Erwin Quiring
, Andreas Müller
, Konrad Rieck
:
On the Detection of Image-Scaling Attacks in Machine Learning. 506-520 - Connor Weeks
, Aravind Cheruvu
, Sifat Muhammad Abdullah
, Shravya Kanchi
, Daphne Yao
, Bimal Viswanath
:
A First Look at Toxicity Injection Attacks on Open-domain Chatbots. 521-534 - Seonhye Park
, Alsharif Abuadbba
, Shuo Wang
, Kristen Moore
, Yansong Gao
, Hyoungshick Kim
, Surya Nepal
:
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks. 535-549
Malware
- Andrew Chi
, Blake Anderson
, Michael K. Reiter
:
Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk. 550-564 - Yizhe Zhang
, Hongying Dong
, Alastair Nottingham
, Molly Buchanan
, Donald E. Brown
, Yixin Sun
:
Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks. 565-579 - Dazhi Zhan
, Wei Bai
, Xin Liu
, Yue Hu
, Lei Zhang
, Shize Guo
, Zhisong Pan
:
PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior. 580-593 - Richard August See
, Maximilian Gehring
, Mathias Fischer
, Shankar Karuppayah
:
Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons. 594-608
Trustworthy Machine Learning
- Xirong Zhuang
, Lan Zhang
, Chen Tang
, Huiqi Liu
, Bin Wang
, Yan Zheng
, Bo Ren
:
DeepContract: Controllable Authorization of Deep Learning Models. 609-620 - Fabing Li
, Xiang Li
, Mingyu Gao
:
Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse. 621-635 - Bo Cui
, Tianyu Mei
:
ABFL: A Blockchain-enabled Robust Framework for Secure and Trustworthy Federated Learning. 636-646 - Jorge Castillo
, Phillip Rieger
, Hossein Fereidooni
, Qian Chen
, Ahmad-Reza Sadeghi
:
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks. 647-661
OS and Software Security
- Lukas Maar
, Martin Schwarzl
, Fabian Rauscher
, Daniel Gruss
, Stefan Mangard
:
DOPE: DOmain Protection Enforcement with PKS. 662-676 - Fabian Franzen
, Andreas Chris Wilhelmer
, Jens Grossklags
:
RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis. 677-690 - Farabi Mahmud
, Sungkeun Kim
, Harpreet Singh Chawla
, Eun Jung Kim
, Chia-Che Tsai
, Abdullah Muzahid
:
Attack of the Knights: Non Uniform Cache Side Channel Attack. 691-703 - Tom Ganz
, Erik Imgrund
, Martin Härterich
, Konrad Rieck
:
PAVUDI: Patch-based Vulnerability Discovery using Machine Learning. 704-717
Trustworthy Systems
- Michael Eckel
, Dominik Roy George
, Björn Grohmann
, Christoph Krauß
:
Remote Attestation with Constrained Disclosure. 718-731 - Vikram Narayanan
, Cláudio Carvalho
, Angelo Ruocco
, Gheorghe Almási
, James Bottomley
, Mengmei Ye
, Tobin Feldman-Fitzthum
, Daniele Buono
, Hubertus Franke
, Anton Burtsev
:
Remote attestation of confidential VMs using ephemeral vTPMs. 732-743 - Samira Briongos
, Ghassan Karame
, Claudio Soriente
, Annika Wilde
:
No Forking Way: Detecting Cloning Attacks on Intel SGX Applications. 744-758 - Andrew Chi
, Brandon Enright
, David A. McGrew
:
Detecting Weak Keys in Manufacturing Certificates: A Case Study. 759-771
Privacy
- Joann Qiongna Chen
, Tianhao Wang
, Zhikun Zhang
, Yang Zhang
, Somesh Jha
, Zhou Li
:
Differentially Private Resource Allocation. 772-786 - Mingtian Tan
, Xiaofei Xie
, Jun Sun
, Tianhao Wang
:
Mitigating Membership Inference Attacks via Weighted Smoothing. 787-798 - Jianli Bai
, Xiangfu Song
, Xiaowu Zhang
, Qifan Wang
, Shujie Cui
, Ee-Chien Chang
, Giovanni Russello
:
Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication. 799-813
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.