Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJuly 2024
Implementing and Evaluating Ioam Integrity Protection
ANRW '24: Proceedings of the 2024 Applied Networking Research WorkshopPages 60–66https://doi.org/10.1145/3673422.3674886In-Situ Operations, Administration, and Maintenance (Ioam) gathers telemetry and operational information along a path, within packets. Up to now, Ioam header and data are carried in plain text without any protection against data-altering nodes or ...
- research-articleJune 2024
SEPTON Toolkit application: An overview of the security techniques used from wearable medical devices to physician’s healthcare platform
PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive EnvironmentsPages 582–586https://doi.org/10.1145/3652037.3663888Now that the technology is more widely available than ever before, protecting information assets is paramount, especially in the face of escalating cyber threats. The healthcare sector has experienced a significant increase in cyber-attacks, ...
- short-paperJune 2024
Anomaly Detection Method based on Discrete Particle Swarm Optimization for Continuous-Flow Microfluidic Biochips
GLSVLSI '24: Proceedings of the Great Lakes Symposium on VLSI 2024Pages 507–510https://doi.org/10.1145/3649476.3658767Continuous-Flow Microfluidic Biochips (CFMBs) have been widely applied in various biochemical fields due to their capabilities of precise control, high integration, and automation. However, insecure supply chains enable malicious actors to tamper with ...
- short-paperMay 2024
Distributed Transparent Data Layer for Next Generation Blockchains
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 1178–1181https://doi.org/10.1145/3589335.3651255Distributed Transparent Data Layer (DTDL) aims to overcome the significant storage inefficiencies in blockchain technology. The proposed scheme enhances scalability and enables broader adoption by allowing nodes to store only portions of the blockchain ...
- research-articleMarch 2024
Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 6Article No.: 153, Pages 1–18https://doi.org/10.1145/3638769With the wide application of Internet of Things (IoT) technology, large volumes of multimodal data are collected and analyzed for various diagnoses, analyses, and predictions to help in decision-making and management. However, the research on protecting ...
-
- abstractMarch 2024
Integrity 2024: Integrity in Social Networks and Media
- Lluís Garcia-Pueyo,
- Symeon Papadopoulos,
- Prathyusha Senthil Kumar,
- Aristides Gionis,
- Panayiotis Tsaparas,
- Vasilis Verroios,
- Giuseppe Manco,
- Anton Andryeyev,
- Stefano Cresci,
- Timos Sellis,
- Anthony McCosker
WSDM '24: Proceedings of the 17th ACM International Conference on Web Search and Data MiningPages 1212–1213https://doi.org/10.1145/3616855.3635721Integrity 2024 is the fifth edition of the Workshop on Integrity in Social Networks and Media, held in conjunction with the ACM Conference on Web Search and Data Mining (WSDM) since the 2020 edition [1-4]. The goal of the workshop is to bring together ...
- research-articleAugust 2024
DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing
Journal of Computer Security (JOCS), Volume 32, Issue 4Pages 405–423https://doi.org/10.3233/JCS-220103As far as mobile edge computing is concerned, it is necessary to ensure the data integrity of latency-sensitive applications during the process of computing. While certain research programs have demonstrated efficacy, challenges persist, including the ...
- research-articleJanuary 2024
Security in database management system using machine learning
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 16, Issue 1Pages 124–133https://doi.org/10.1504/ijesdf.2024.136024The term 'database security' refers to the collection of rules, tools, and processes that have been developed to maintain and protect the databases' confidentiality, integrity, and accessibility. The use of machine learning to improve database management ...
- abstractOctober 2023
Practical Lessons Learned From Detecting, Preventing and Mitigating Harmful Experiences on Facebook
CIKM '23: Proceedings of the 32nd ACM International Conference on Information and Knowledge ManagementPages 5251–5252https://doi.org/10.1145/3583780.3615511Social media's explosive growth brings with it a variety of societal risks ranging from severely harmful issues such as dangerous organizations and child sexual exploitation to moderately harmful content like displays of aggression, borderline nudity to ...
- research-articleSeptember 2023
Interruptible Remote Attestation of Low-end IoT Microcontrollers via Performance Counters
ACM Transactions on Embedded Computing Systems (TECS), Volume 22, Issue 5Article No.: 87, Pages 1–19https://doi.org/10.1145/3611674Remote attestation is a method used in distributed systems to detect integrity violations on a target device (prover) through a challenge–response protocol initiated by a verifier device. The prover calculates a hash of its memory, which is compared to a ...
- surveyJuly 2023
Intel Software Guard Extensions Applications: A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 14sArticle No.: 322, Pages 1–38https://doi.org/10.1145/3593021Data confidentiality is a central concern in modern computer systems and services, as sensitive data from users and companies are being increasingly delegated to such systems. Several hardware-based mechanisms have been recently proposed to enforce ...
- research-articleJune 2023
A distributed approach to privacy-preservation and integrity assurance of smart metering data
e-Energy '23: Proceedings of the 14th ACM International Conference on Future Energy SystemsPages 60–65https://doi.org/10.1145/3575813.3576876Smart grid service providers collect metering data at frequent intervals for providing grid and billing functionalities. Studies have shown that access to the granular metering data can lead to breaches in customers’ privacy. Several aggregation-based ...
- research-articleNovember 2023
The Impact of Radio Frequency (RF) Attacks on Security and Privacy: A Comprehensive Review
NISS '23: Proceedings of the 6th International Conference on Networking, Intelligent Systems & SecurityArticle No.: 48, Pages 1–23https://doi.org/10.1145/3607720.3607771With the increasing use of wireless communication technologies, such as Radio Frequency Identification (RFID), Bluetooth Low Energy (BLE), ZigBee, and cellular networks, the risk of Radio Frequency (RF) attacks has become a significant concern for ...
- research-articleJuly 2023
Enhancing Maritime Data Standardization and Integrity Using Docker and Blockchain
ICSE '23: Proceedings of the 45th International Conference on Software Engineering: Companion ProceedingsPages 370–374https://doi.org/10.1109/ICSE-Companion58688.2023.00105Massive maritime data is available nowadays to tackle vital industrial challenges such as autonomous vessels and carbon neutrality. These data can be collected on board vessels and shared with maritime stakeholders (e.g., ship owners and ship ...
- research-articleApril 2023
Learned Temporal Aggregations for Fraud Classification on E-Commerce Platforms
WWW '23 Companion: Companion Proceedings of the ACM Web Conference 2023Pages 1365–1372https://doi.org/10.1145/3543873.3587632Fraud and other types of adversarial behavior are serious problems on customer-to-customer (C2C) e-commerce platforms, where harmful behaviors by bad actors erode user trust and safety. Many modern e-commerce integrity systems utilize machine learning (...
- research-articleApril 2023
Detecting and Limiting Negative User Experiences in Social Media Platforms
- Lluis Garcia-Pueyo,
- Vinodh Kumar Sunkara,
- Prathyusha Senthil Kumar,
- Mohit Diwan,
- Qian Ge,
- Behrang Javaherian,
- Vasilis Verroios
WWW '23: Proceedings of the ACM Web Conference 2023Pages 4086–4094https://doi.org/10.1145/3543507.3583883Item ranking is important to a social media platform’s success. The order in which posts, videos, messages, comments, ads, used products, notifications are presented to a user greatly affects the time spent on the platform, how often they visit it, how ...
An Empirical Study of the Usage of Checksums for Web Downloads
WWW '23: Proceedings of the ACM Web Conference 2023Pages 2155–2165https://doi.org/10.1145/3543507.3583326Checksums, typically provided on webpages and generated from cryptographic hash functions (e.g., MD5, SHA256) or signature schemes (e.g., PGP), are commonly used on websites to enable users to verify that the files they download have not been tampered ...
- research-articleMarch 2023
Immutability and Encapsulation for Sound OO Information Flow Control
ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 45, Issue 1Article No.: 3, Pages 1–35https://doi.org/10.1145/3573270Security-critical software applications contain confidential information which has to be protected from leaking to unauthorized systems. With language-based techniques, the confidentiality of applications can be enforced. Such techniques are for example ...
- abstractFebruary 2023
Integrity 2023: Integrity in Social Networks and Media
- Lluís Garcia-Pueyo,
- Panayiotis Tsaparas,
- Prathyusha Senthil Kumar,
- Timos Sellis,
- Paolo Papotti,
- Sibel Adali,
- Giuseppe Manco,
- Tudor Trufinescu,
- Gireeja Ranade,
- James Verbus,
- Mehmet N. Tek,
- Anthony McCosker
WSDM '23: Proceedings of the Sixteenth ACM International Conference on Web Search and Data MiningPages 1269–1270https://doi.org/10.1145/3539597.3572704Integrity 2023 is the fourth edition of the successful Workshop on Integrity in Social Networks and Media, held in conjunction with the ACM Conference on Web Search and Data Mining (WSDM) in the past three years. The goal of the workshop is to bring ...