Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024JUST ACCEPTED
A Blockchain-Based Privacy-Preserving Charging Station Reservation and Payment Scheme for Electric Vehicles
Distributed Ledger Technologies: Research and Practice (DLT), Just Accepted https://doi.org/10.1145/3696428EV charging infrastructures traditionally rely on untrusted centralized infrastructures that pose several privacy and security threats to EVs’ personal information. Targeted advertisements, privacy leaks, selling data to third parties, are among the ...
- research-articleJune 2024
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem
- Mehrnoosh Zaeifi,
- Faezeh Kalantari,
- Adam Oest,
- Zhibo Sun,
- Gail-Joon Ahn,
- Yan Shoshitaishvili,
- Tiffany Bao,
- Ruoyu Wang,
- Adam Doupé
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 55–65https://doi.org/10.1145/3626232.3653266Online services leverage various authentication methods with differing usability and reliability trade-offs, such as password-based or multi-factor authentication (MFA). However, financial service providers face a unique challenge; authenticating the ...
- research-articleJune 2024
RefreshChannels: Exploiting Dynamic Refresh Rate Switching for Mobile Device Attacks
- Gaofeng Dong,
- Jason Wu,
- Julian De Gortari Briseno,
- Akash Deep Singh,
- Justin Feng,
- Ankur Sarker,
- Nader Sehatbakhsh,
- Mani Srivastava
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 359–371https://doi.org/10.1145/3643832.3661864Mobile devices with dynamic refresh rate (DRR) switching displays have recently become increasingly common. For power optimization, these devices switch to lower refresh rates when idling, and switch to higher refresh rates when the content displayed ...
- short-paperJune 2024
Poster: Hybrid Detection Mechanism for Spoofing Attacks in Bluetooth Low Energy Networks
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 710–711https://doi.org/10.1145/3643832.3661434As the foremost protocol for low-power communication, Bluetooth Low Energy (BLE) significantly impacts various aspects of our lives, including industry and healthcare. Given BLE's inherent security limitations and firmware vulnerabilities, spoofing ...
- surveyMay 2024
Exploring Blockchain Technology through a Modular Lens: A Survey
ACM Computing Surveys (CSUR), Volume 56, Issue 9Article No.: 242, Pages 1–39https://doi.org/10.1145/3657288Blockchain has attracted significant attention in recent years due to its potential to revolutionize various industries by providing trustlessness. To comprehensively examine blockchain systems, this article presents both a macro-level overview on the ...
-
- research-articleApril 2024
eHealth Data Security and Privacy: Perspectives from Diverse Stakeholders in Malawi
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 8, Issue CSCW1Article No.: 46, Pages 1–26https://doi.org/10.1145/3637323The development and adoption of eHealth in low- and middle-income countries has potential to advance the quality of care in healthcare settings that are challenged by weak infrastructure. Especially in the countries where HIV rates are high, there is ...
- research-articleApril 2024
An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives
ICSE '24: Proceedings of the IEEE/ACM 46th International Conference on Software EngineeringArticle No.: 159, Pages 1–13https://doi.org/10.1145/3597503.3639082Although Virtual Reality (VR) has accelerated its prevalent adoption in emerging metaverse applications, it is not a fundamentally new technology. On one hand, most VR operating systems (OS) are based on off-the-shelf mobile OS (e.g., Android). As a ...
- research-articleMarch 2024
Smart Use of Smart Devices in Your Home: A Smart Home Security and Privacy Workshop for the General Public
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1Pages 611–617https://doi.org/10.1145/3626252.3630925With 'smart' technology becoming more prevalent in homes, computing is increasingly embedded into everyday life. The benefits are well-advertised, but the risks associated with these technologies are not as clearly articulated. We aim to address this gap ...
- research-articleFebruary 2024
Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network
ACM Transactions on Privacy and Security (TOPS), Volume 27, Issue 1Article No.: 12, Pages 1–32https://doi.org/10.1145/3639366The Lightning Network (LN) is a second layer system for solving the scalability problem of Bitcoin transactions. In the current implementation of LN, channel capacity (i.e., the sum of individual balances held in the channel) is public information, while ...
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks
ACSAC '23: Proceedings of the 39th Annual Computer Security Applications ConferencePages 647–661https://doi.org/10.1145/3627106.3627194Federated learning (FL) is a distributed learning process that uses a trusted aggregation server to allow multiple parties (or clients) to collaboratively train a machine learning model without having them share their private data. Recent research, ...
- research-articleNovember 2023
Canaries and Whistles: Resilient Drone Communication Networks with (or without) Deep Reinforcement Learning
AISec '23: Proceedings of the 16th ACM Workshop on Artificial Intelligence and SecurityPages 91–101https://doi.org/10.1145/3605764.3623986Communication networks able to withstand hostile environments are critically important for disaster relief operations. In this paper, we consider a challenging scenario where drones have been compromised in the supply chain, during their manufacture, and ...
- abstractNovember 2023
CCSW '23: Cloud Computing Security Workshop
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3657–3658https://doi.org/10.1145/3576915.3624024Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting substantial fractions of corporate and ...
- research-articleNovember 2023
On the Security of Rate-limited Privacy Pass
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 2871–2885https://doi.org/10.1145/3576915.3616619The privacy pass protocol allows users to redeem anonymously issued cryptographic tokens instead of solving annoying CAPTCHAs. The issuing authority verifies the credibility of the user, who can later use the pass while browsing the web using an ...
- surveyNovember 2023
Generative Adversarial Networks: A Survey on Attack and Defense Perspective
ACM Computing Surveys (CSUR), Volume 56, Issue 4Article No.: 91, Pages 1–35https://doi.org/10.1145/3615336Generative Adversarial Networks (GANs) are a remarkable creation with regard to deep generative models. Thanks to their ability to learn from complex data distributions, GANs have been credited with the capacity to generate plausible data examples, which ...
- research-articleOctober 2023
How to Operate a Meta-Telescope in your Spare Time
- Daniel Wagner,
- Sahil Ashish Ranadive,
- Harm Griffioen,
- Michalis Kallitsis,
- Alberto Dainotti,
- Georgios Smaragdakis,
- Anja Feldmann
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 328–343https://doi.org/10.1145/3618257.3624831Unsolicited traffic sent to advertised network space that does not host active services provides insights about misconfigurations as well as potentially malicious activities, including the spread of Botnets, DDoS campaigns, and exploitation of ...
- research-articleOctober 2023
Detect-IoT: A Comparative Analysis of Machine Learning Algorithms for Detecting Compromised IoT Devices
MobiHoc '23: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile ComputingPages 370–375https://doi.org/10.1145/3565287.3616529The rapid expansion of IoT brings unmatched convenience and connectivity, but it also raises significant security concerns. The prioritization of functionality over security in IoT devices exposes vulnerabilities like default credentials, outdated ...
- short-paperAugust 2023
Modeling Tor Network Growth by Extrapolating Consensus Data
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 29, Pages 1–7https://doi.org/10.1145/3600160.3600164Since the Tor network is evolving into an infrastructure for anonymous communication, analyzing the consequences of network growth is becoming more relevant than ever. In particular, adding large amounts of resources may have unintentional consequences ...
- research-articleAugust 2023
Towards Understanding and Enhancing Robustness of Deep Learning Models against Malicious Unlearning Attacks
KDD '23: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 1932–1942https://doi.org/10.1145/3580305.3599526Given the availability of abundant data, deep learning models have been advanced and become ubiquitous in the past decade. In practice, due to many different reasons (e.g., privacy, usability, and fidelity), individuals also want the trained deep models ...
- surveyJuly 2023
Device Fingerprinting for Cyber-Physical Systems: A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 14sArticle No.: 302, Pages 1–41https://doi.org/10.1145/3584944The continued growth of the cyber-physical system (CPS) and Internet of Things technologies raises device security and monitoring concerns. For device identification, authentication, conditioning, and security, device fingerprint/fingerprinting (DFP) is ...
- research-articleJune 2023
Data Block Matrix and Hyperledger Implementation: Extending Distributed Ledger Technology for Privacy Requirements
Distributed Ledger Technologies: Research and Practice (DLT), Volume 2, Issue 2Article No.: 16, Pages 1–11https://doi.org/10.1145/3585539Distributed ledger technology (DLT), including blockchain, has a number of properties that make it useful for distributed systems. However, the immutability of blockchain and most forms of DLT make it impossible to delete data, as is required for ...