Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2024
OptiClass: An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures
ACM Transactions on Privacy and Security (TOPS), Volume 27, Issue 1Article No.: 6, Pages 1–23https://doi.org/10.1145/3633777Network traffic classification has many applications, such as security monitoring, quality of service, traffic engineering, and so on. For the aforementioned applications, Deep Packet Inspection (DPI) is a popularly used technique for traffic ...
- research-articleJune 2023
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets
ACM Transactions on Privacy and Security (TOPS), Volume 26, Issue 3Article No.: 37, Pages 1–38https://doi.org/10.1145/3592608Multi-user (mu) security considers large-scale attackers that, given access to a number of cryptosystem instances, attempt to compromise at least one of them. We initiate the study of mu security of the so-called GGM tree that stems from the pseudorandom ...
- research-articleMay 2022
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks
ACM Transactions on Privacy and Security (TOPS), Volume 25, Issue 3Article No.: 23, Pages 1–24https://doi.org/10.1145/3517806Edge intelligence has played an important role in constructing smart cities, but the vulnerability of edge nodes to adversarial attacks becomes an urgent problem. A so-called adversarial example can fool a deep learning model on an edge node for ...
- research-articleAugust 2021
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis
ACM Transactions on Privacy and Security (TOPS), Volume 24, Issue 3Article No.: 21, Pages 1–22https://doi.org/10.1145/3450768User authorization queries in the context of role-based access control have attracted considerable interest in the past 15 years. Such queries are used to determine whether it is possible to allocate a set of roles to a user that enables the user to ...
- research-articleNovember 2019
Will They Use It or Not? Investigating Software Developers’ Intention to Follow Privacy Engineering Methodologies
ACM Transactions on Privacy and Security (TOPS), Volume 22, Issue 4Article No.: 23, Pages 1–30https://doi.org/10.1145/3364224With the increasing concerns over privacy in software systems, there is a growing enthusiasm to develop methods to support the development of privacy aware software systems. Inadequate privacy in software system designs could result in users losing ...
- research-articleApril 2019
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing
ACM Transactions on Privacy and Security (TOPS), Volume 22, Issue 2Article No.: 12, Pages 1–26https://doi.org/10.1145/3309735The consumer drone market is booming. Consumer drones are predominantly used for aerial photography; however, their use has been expanding because of their autopilot technology. Unfortunately, terrorists have also begun to use consumer drones for ...
- research-articleJuly 2017
Efficient Attack Graph Analysis through Approximate Inference
ACM Transactions on Privacy and Security (TOPS), Volume 20, Issue 3Article No.: 10, Pages 1–30https://doi.org/10.1145/3105760Attack graphs provide compact representations of the attack paths an attacker can follow to compromise network resources from the analysis of network vulnerabilities and topology. These representations are a powerful tool for security risk assessment. ...