Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2020
Workflow Integration Alleviates Identity and Access Management in Serverless Computing
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 496–509https://doi.org/10.1145/3427228.3427665As serverless computing continues to revolutionize the design and deployment of web services, it has become an increasingly attractive target to attackers. These adversaries are developing novel tactics for circumventing the ephemeral nature of ...
- research-articleDecember 2020
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 582–596https://doi.org/10.1145/3427228.3427640With the development of computing and communication technologies, extremely large amount of data has been collected, stored, utilized, and shared, while new security and privacy challenges arise. Existing platforms do not provide flexible and practical ...
- research-articleDecember 2020
FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 627–642https://doi.org/10.1145/3427228.3427297Browser fingerprinting consists into collecting attributes from a web browser. Hundreds of attributes have been discovered through the years. Each one of them provides a way to distinguish browsers, but also comes with a usability cost (e.g., ...
- research-articleDecember 2020
Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 291–303https://doi.org/10.1145/3427228.3427295Recently, the Dragonblood attacks have attracted new interests on the security of WPA-3 implementation and in particular on the Dragonfly code deployed on many open-source libraries. One attack concerns the protection of users passwords during ...
- research-articleDecember 2020
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 428–441https://doi.org/10.1145/3427228.3427293Many IoT devices are geographically distributed without human administrators, which are maintained by a remote server to enforce security updates, ideally through machine-to-machine (M2M) management. However, malware often terminates the remote control ...
-
- research-articleDecember 2020
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 870–883https://doi.org/10.1145/3427228.3427289In this paper, we propose Voicefox1, a defense against the threat of automated voice synthesis attacks in machine-based and human-based speaker verification applications. Voicefox is based on a hitherto undiscovered potential of speech-to-text ...
- research-articleDecember 2020
CAPS: Smoothly Transitioning to a More Resilient Web PKI
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 655–668https://doi.org/10.1145/3427228.3427284Many recent proposals to increase the resilience of the Web PKI against misbehaving CAs face significant obstacles to deployment. These hurdles include (1) the requirement of drastic changes to the existing PKI players and their interactions, (2) the ...
- research-articleDecember 2020
VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 884–896https://doi.org/10.1145/3427228.3427281The voice user interface (VUI) has been progressively used to authenticate users to numerous devices and applications. Such massive adoption of VUIs in IoT environments like individual homes and businesses arises extensive privacy and security ...
- research-articleDecember 2020
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 706–716https://doi.org/10.1145/3427228.3427279Several sensitive operations, such as financial transactions, email construction, configurations of safety-critical devices (e.g., medical devices or smart home systems), are often performed via web interfaces from a host machine, usually a desktop or ...
- research-articleDecember 2020
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 681–693https://doi.org/10.1145/3427228.3427278Automotive communication networks, represented by the CAN bus, are acclaimed for enabling real-time communication between vehicular ECUs but also criticized for their lack of effective security mechanisms. Various attacks have demonstrated that this ...
- research-articleDecember 2020
SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 939–950https://doi.org/10.1145/3427228.3427274Speaker verification, as a biometric authentication mechanism, has been widely used due to the pervasiveness of voice control on smart devices. However, the task of “in-the-wild” speaker verification is still challenging, considering the speech samples ...
- research-articleDecember 2020
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 897–912https://doi.org/10.1145/3427228.3427264We propose Februus; a new idea to neutralize highly potent and insidious Trojan attacks on Deep Neural Network (DNN) systems at run-time. In Trojan attacks, an adversary activates a backdoor crafted in a deep neural network model using a secret trigger, ...
- research-articleDecember 2020
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 320–331https://doi.org/10.1145/3427228.3427263Wi-Fi hotspot-based data clone services are increasingly used by Android users to transfer their user data and preferred configurations while upgrading obsolete phones to new models. Unfortunately, since the data clone services need to manipulate ...
- research-articleDecember 2020
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 829–842https://doi.org/10.1145/3427228.3427259Due to the open nature of voice input, voice assistant (VA) systems (e.g., Google Home and Amazon Alexa) are vulnerable to various security and privacy leakages (e.g., credit card numbers, passwords), especially when issuing critical user commands ...
- research-articleDecember 2020
Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 219–233https://doi.org/10.1145/3427228.3427252Android unlock patterns are still commonly used, and roughly 25% of the respondents to our study use a pattern when unlocking their phone. Despite security issues, the design of the patterns have remained unchanged. We propose Double Patterns (DPatts), ...
- research-articleDecember 2020
Privacy-Preserving Production Process Parameter Exchange
- Jan Pennekamp,
- Erik Buchholz,
- Yannik Lockner,
- Markus Dahlmanns,
- Tiandong Xi,
- Marcel Fey,
- Christian Brecher,
- Christian Hopmann,
- Klaus Wehrle
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 510–525https://doi.org/10.1145/3427228.3427248Nowadays, collaborations between industrial companies always go hand in hand with trust issues, i.e., exchanging valuable production data entails the risk of improper use of potentially sensitive information. Therefore, companies hesitate to offer ...
- research-articleDecember 2020
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 813–828https://doi.org/10.1145/3427228.3427247Policy-based chameleon hash is a useful primitive for blockchain rewriting. It allows a party to create a transaction associated with an access policy, while another party who possesses enough rewriting privileges satisfying the access policy can rewrite ...
- research-articleDecember 2020
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 203–218https://doi.org/10.1145/3427228.3427243Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors additional features during login, and when observed feature values differ significantly from previously seen ones, users have to ...
- research-articleDecember 2020
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 249–262https://doi.org/10.1145/3427228.3427240Personal Identification Numbers (PINs) are widely used as an access control mechanism for digital assets (e.g., smartphones), financial assets (e.g., ATM cards), and physical assets (e.g., locks for garage doors or homes). Using semi-structured ...
- research-articleDecember 2020
Towards a Practical Differentially Private Collaborative Phone Blacklisting System
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 100–115https://doi.org/10.1145/3427228.3427239Spam phone calls have been rapidly growing from nuisance to an increasingly effective scam delivery tool. To counter this increasingly successful attack vector, a number of commercial smartphone apps that promise to block spam phone calls have appeared ...