Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 217–230https://doi.org/10.1145/3634737.3637662Spectre-BTB, also known as Spectre Variant 2, is often considered the most dangerous Spectre variant. While there are widely-deployed software workarounds on x86, such as Retpoline, there are no automated software workarounds for protecting generic ...
- surveyJune 2024
“Are you feeling sick?” – A systematic literature review of cybersickness in virtual reality
ACM Computing Surveys (CSUR), Volume 56, Issue 11Article No.: 284, Pages 1–38https://doi.org/10.1145/3670008Cybersickness (CS), also known as visually induced motion sickness (VIMS), is a condition that can affect individuals when they interact with virtual reality (VR) technology. This condition is characterized by symptoms such as nausea, dizziness, headaches,...
- short-paperOctober 2023
Counterfactual Graph Augmentation for Consumer Unfairness Mitigation in Recommender Systems
CIKM '23: Proceedings of the 32nd ACM International Conference on Information and Knowledge ManagementPages 3753–3757https://doi.org/10.1145/3583780.3615165In recommendation literature, explainability and fairness are becoming two prominent perspectives to consider. However, prior works have mostly addressed them separately, for instance by explaining to consumers why a certain item was recommended or ...
- research-articleSeptember 2023
LEAF: Navigating Concept Drift in Cellular Networks
- Shinan Liu,
- Francesco Bronzino,
- Paul Schmitt,
- Arjun Nitin Bhagoji,
- Nick Feamster,
- Hector Garcia Crespo,
- Timothy Coyle,
- Brian Ward
Proceedings of the ACM on Networking (PACMNET), Volume 1, Issue CoNEXT2Article No.: 7, Pages 1–24https://doi.org/10.1145/3609422Operational networks commonly rely on machine learning models for many tasks, including detecting anomalies, inferring application performance, and forecasting demand. Yet, model accuracy can degrade due to concept drift, whereby the relationship between ...
- research-articleJune 2023
Preventing EFail Attacks with Client-Side WebAssembly: The Case of Swiss Post's IncaMail
- Pascal Gerig,
- Jämes Ménétrey,
- Baptiste Lanoix,
- Florian Stoller,
- Pascal Felber,
- Marcelo Pasin,
- Valerio Schiavoni
DEBS '23: Proceedings of the 17th ACM International Conference on Distributed and Event-based SystemsPages 151–156https://doi.org/10.1145/3583678.3596899Traditional email encryption schemes are vulnerable to EFail attacks, which exploit the lack of message authentication by manipulating ciphertexts and exfiltrating plaintext via HTML backchannels. Swiss Post's IncaMail, a secure email service for ...
-
- research-articleMarch 2023
Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters
Digital Threats: Research and Practice (DTRAP), Volume 4, Issue 1Article No.: 5, Pages 1–24https://doi.org/10.1145/3519601We present a kernel-level infrastructure that allows systemwide detection of malicious applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by standard operating systems. This infrastructure relies ...
- tutorialFebruary 2023
Hate Speech: Detection, Mitigation and Beyond
WSDM '23: Proceedings of the Sixteenth ACM International Conference on Web Search and Data MiningPages 1232–1235https://doi.org/10.1145/3539597.3572721Social media sites such as Twitter and Facebook have connected billions of people and given the opportunity to the users to share their ideas and opinions instantly. That being said, there are several negative consequences as well such as online ...
- research-articleJune 2023
ComMit: Blind Community-Based Early Mitigation Strategy against Viral Spread
ASONAM '22: Proceedings of the 2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 26–33https://doi.org/10.1109/ASONAM55673.2022.10068568In the early stages of a pandemic, epidemiological knowledge of the disease is limited and no vaccination is available. This poses the problem of determining an Early Mitigation Strategy. Previous studies have tackled this problem through finding ...
- research-articleNovember 2022
Industrial Control Systems Security via Runtime Enforcement
ACM Transactions on Privacy and Security (TOPS), Volume 26, Issue 1Article No.: 4, Pages 1–41https://doi.org/10.1145/3546579With the advent of Industry 4.0, industrial facilities and critical infrastructures are transforming into an ecosystem of heterogeneous physical and cyber components, such as programmable logic controllers, increasingly interconnected and therefore ...
DeJITLeak: eliminating JIT-induced timing side-channel leaks
ESEC/FSE 2022: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 872–884https://doi.org/10.1145/3540250.3549150Timing side-channels can be exploited to infer secret information when the execution time of a program is correlated with secrets. Recent work has shown that Just-In-Time (JIT) compilation can introduce new timing side-channels in programs even if ...
- research-articleNovember 2022
Repeated Knowledge Distillation with Confidence Masking to Mitigate Membership Inference Attacks
- Federico Mazzone,
- Leander van den Heuvel,
- Maximilian Huber,
- Cristian Verdecchia,
- Maarten Everts,
- Florian Hahn,
- Andreas Peter
AISec'22: Proceedings of the 15th ACM Workshop on Artificial Intelligence and SecurityPages 13–24https://doi.org/10.1145/3560830.3563721Machine learning models are often trained on sensitive data, such as medical records or bank transactions, posing high privacy risks. In fact, membership inference attacks can use the model parameters or predictions to determine whether a given data ...
- research-articleNovember 2022
A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform
AbstractThe increasing number of attacks leads to a growing research and development interest in cybersecurity systems. As a response to the increasingly distributed nature of attacks, many organizations have demonstrated willingness to ...
- research-articleApril 2022
Avatar Identities and Climate Change Action in Video Games: Analysis of Mitigation and Adaptation Practices
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 561, Pages 1–18https://doi.org/10.1145/3491102.3517438Games are considered promising for engaging people with climate change. In virtual worlds, players can adopt empowering roles to mitigate greenhouse gas emissions and/or adapt to climate impacts. However, the lack of a comprehensive exploration of ...
- research-articleMay 2022
Proactive run-time mitigation for time-critical applications using dynamic scenario methodology
DATE '22: Proceedings of the 2022 Conference & Exhibition on Design, Automation & Test in EuropePages 616–619Energy saving is important for both high-end processors and battery-powered devices. However, for time-critical application such as car auto-driving systems and multimedia streaming, saving energy by slowing down speed poses a threat to timing guarantee ...
- surveyFebruary 2022
Tackling Climate Change with Machine Learning
- David Rolnick,
- Priya L. Donti,
- Lynn H. Kaack,
- Kelly Kochanski,
- Alexandre Lacoste,
- Kris Sankaran,
- Andrew Slavin Ross,
- Nikola Milojevic-Dupont,
- Natasha Jaques,
- Anna Waldman-Brown,
- Alexandra Sasha Luccioni,
- Tegan Maharaj,
- Evan D. Sherwin,
- S. Karthik Mukkavilli,
- Konrad P. Kording,
- Carla P. Gomes,
- Andrew Y. Ng,
- Demis Hassabis,
- John C. Platt,
- Felix Creutzig,
- Jennifer Chayes,
- Yoshua Bengio
ACM Computing Surveys (CSUR), Volume 55, Issue 2Article No.: 42, Pages 1–96https://doi.org/10.1145/3485128Climate change is one of the greatest challenges facing humanity, and we, as machine learning (ML) experts, may wonder how we can help. Here we describe how ML can be a powerful tool in reducing greenhouse gas emissions and helping society adapt to a ...
- research-articleJanuary 2022
Assessment and mitigation of DC bias risk in power grids at provincial boundaries
Journal of Computational Methods in Sciences and Engineering (JOCMSE), Volume 22, Issue 3Pages 857–869https://doi.org/10.3233/JCM-225945With the wide application of high voltage/ultra-high voltage (HV/UHV) DC transmission technology, the impact of DC grounding electrode location selection on the surrounding power grid has become increasingly prominent, especially the problem of DC bias ...
- research-articleJune 2022
Human-in-the-loop XAI-enabled vulnerability detection, investigation, and mitigation
ASE '21: Proceedings of the 36th IEEE/ACM International Conference on Automated Software EngineeringPages 1210–1212https://doi.org/10.1109/ASE51524.2021.9678840The need for cyber resilience is increasingly important in our technology-dependent society, where computing systems, devices and data will continue to be the target of cyber attackers. Hence, we propose a conceptual framework called 'Human-in-the-Loop ...
On reducing the energy consumption of software product lines
SPLC '21: Proceedings of the 25th ACM International Systems and Software Product Line Conference - Volume APages 89–99https://doi.org/10.1145/3461001.3471142Along the last decade, several studies considered green software design as a key development concern to improve the energy efficiency of software. Yet, few techniques address this concern for Software Product Lines (SPL). In this paper, we therefore ...
- rfcSeptember 2021
RFC 9132: Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification
This document specifies the Distributed Denial-of-Service Open Threat Signaling (DOTS) signal channel, a protocol for signaling the need for protection against Distributed Denial-of-Service (DDoS) attacks to a server capable of enabling network traffic ...
- research-articleApril 2021
Ghost Thread: Effective User-Space Cache Side Channel Protection
CODASPY '21: Proceedings of the Eleventh ACM Conference on Data and Application Security and PrivacyPages 233–244https://doi.org/10.1145/3422337.3447846Cache-based side channel attacks pose a serious threat to computer security. Numerous cache attacks have been demonstrated, highlighting the need for effective and efficient defense mechanisms to shield systems from this threat. In this paper, we ...