


Остановите войну!
for scientists:


default search action
ACSAC 2018: San Juan, PR, USA
- Proceedings of the 34th Annual Computer Security Applications Conference, ACSAC 2018, San Juan, PR, USA, December 03-07, 2018. ACM 2018, ISBN 978-1-4503-6569-7
Software Hardening
- Shachee Mishra, Michalis Polychronakis:
Shredder: Breaking Exploits through API Specialization. 1-16 - Erik van der Kouwe, Taddeus Kroes
, Chris Ouwehand, Herbert Bos
, Cristiano Giuffrida
:
Type-After-Type: Practical and Complete Type-Safe Memory Reuse. 17-27 - Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi:
On the Effectiveness of Type-based Control Flow Integrity. 28-39 - Mohsen Ahmadvand, Anahit Hayrapetyan, Sebastian Banescu, Alexander Pretschner:
Practical Integrity Protection with Oblivious Hashing. 40-52
Authentication
- Ximing Liu, Yingjiu Li, Robert H. Deng
:
Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke Timings. 53-65 - Shane McCulley, Vassil Roussev:
Latent Typing Biometrics in Online Collaboration Services. 66-76 - Zhe Zhou, Di Tang, Wenhao Wang, Xiaofeng Wang, Zhou Li
, Kehuan Zhang:
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. 77-88 - Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, Zhiqiang Lin:
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites. 89-100
ML-Based Defenses
- Fady Copty, Matan Danos, Orit Edelstein, Cindy Eisner, Dov Murik, Benjamin Zeltser:
Accurate Malware Detection by Extreme Abstraction. 101-111 - Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna:
Using Loops For Malware Classification Resilient to Feature-unaware Perturbations. 112-123 - Alina Oprea, Zhou Li
, Robin Norris, Kevin D. Bowers:
MADE: Security Analytics for Enterprise Threat Detection. 124-136 - Juan Echeverría, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou:
LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers. 137-146
Side Channels
- Nicola Tuveri
, Sohaib ul Hassan, Cesar Pereida García
, Billy Bob Brumley
:
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study. 147-160 - Jan Wichelmann
, Ahmad Moghimi, Thomas Eisenbarth
, Berk Sunar:
MicroWalk: A Framework for Finding Side Channels in Binaries. 161-173 - Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
Analyzing Cache Side Channels Using Deep Neural Networks. 174-186 - Weixin Liang, Kai Bu, Ke Li, Jinhong Li, Arya Tavakoli:
MemCloak: Practical Access Obfuscation for Untrusted Memory. 187-197
Android
- Mohsin Junaid, Jiang Ming, David Chenho Kung:
StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause Verification. 198-209 - Joey Allen, Matthew Landen, Sanya Chaba, Yang Ji, Simon Pak Ho Chung, Wenke Lee:
Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness. 210-221 - Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. 222-235 - Sze Yiu Chau
, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li:
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps. 236-251
Network Security
- Akshaya Mani, Tavish Vaidya, David Dworken, Micah Sherr:
An Extensive Evaluation of the Internet's Open Proxies. 252-265 - Sivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu, Ying Zhang:
SENSS Against Volumetric DDoS Attacks. 266-277 - Jaejong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling. 278-288 - Erik Sy, Christian Burkert
, Hannes Federrath, Mathias Fischer:
Tracking Users across the Web via TLS Session Resumption. 289-299
Web Security
- Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz
:
Towards Automated Generation of Exploitation Primitives for Web Browsers. 300-312 - Juan D. Parra Rodriguez, Joachim Posegga:
RAPID: Resource and API-Based Detection Against In-Browser Miners. 313-326 - Yixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang:
A Multi-tab Website Fingerprinting Attack. 327-341 - Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld:
Raising the Bar: Evaluating Origin-wide Security Manifests. 342-354
Secure Learning
- Jan Henrik Ziegeldorf, Jan Metzke, Klaus Wehrle
:
SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained Environments. 355-370 - Manish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta:
Model Extraction Warning in MLaaS Paradigm. 371-380 - Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu:
Poisoning Attacks to Graph-Based Recommender Systems. 381-392 - Lingxiao Wei, Bo Luo, Yu Li, Yannan Liu, Qiang Xu
:
I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators. 393-406
Virtualization
- Sergej Proskurin, Tamas K. Lengyel, Marius Momeu, Claudia Eckert, Apostolis Zarras
:
Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection. 407-417 - Xin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun
, Quan Zhou:
A Measurement Study on Linux Container Security: Attacks and Countermeasures. 418-429 - Shota Futagami, Tomoya Unoki, Kenichi Kourai
:
Secure Out-of-band Remote Management of Virtual Machines with Transparent Passthrough. 430-440 - Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. 441-452
Usability
- Adam J. Aviv
, Flynn Wolf, Ravi Kuber
:
Comparing Video Based Shoulder Surfing with Live Simulation. 453-466 - Ajaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, Haley Johnson Bishop:
Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing Attacks. 467-477 - Oliver Wiese, Christoph Weinhold, Jan-Ole Malchow, Volker Roth:
I Need this Back, Later!: An Exploration of Practical Secret Sharing. 478-489 - Sadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, Peng Liu:
Take It or Leave It: A Survey Study on Operating System Upgrade Practices. 490-504
Vulnerability Detection
- Vivek Jain, Sanjay Rawat, Cristiano Giuffrida, Herbert Bos:
TIFF: Using Input Type Inference To Improve Fuzzing. 505-517 - Chengbin Pang, Yunlan Du, Bing Mao, Shanqing Guo:
Mapping to Bits: Efficiently Detecting Type Confusion Errors. 518-528 - Changming Liu, Deqing Zou, Peng Luo, Bin B. Zhu, Hai Jin:
A Heuristic Framework to Detect Concurrency Vulnerabilities. 529-541 - Yanfang Ye, Shifu Hou, Lingwei Chen, Xin Li, Liang Zhao, Shouhuai Xu, Jiabin Wang, Qi Xiong:
ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information Network. 542-552
Embedded Security
- Sriharsha Etigowni, Shamina Hossain-McKenzie, Maryam Kazerooni, Katherine R. Davis
, Saman A. Zonouz:
Crystal (ball): I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller Recovery. 553-565 - Chuadhry Mujeeb Ahmed
, Jianying Zhou, Aditya P. Mathur:
Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPS. 566-581 - John Henry Castellanos
, Martín Ochoa, Jianying Zhou
:
Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control Systems. 582-594 - Robert Schilling, Mario Werner, Pascal Nasahl, Stefan Mangard:
Pointing in the Right Direction - Securing Memory Accesses in a Faulty World. 595-604
Software & OS Security
- Fei Wang, Yonghwi Kwon, Shiqing Ma, Xiangyu Zhang, Dongyan Xu:
Lprov: Practical Library-aware Provenance Tracing. 605-617 - Franck de Goër, Sanjay Rawat, Dennis Andriesse, Herbert Bos
, Roland Groz:
Now You See Me: Real-time Dynamic Function Call Detection. 618-628 - Bumjin Im, Ang Chen, Dan S. Wallach:
An Historical Analysis of the SEAndroid Policy Evolution. 629-640 - Md. Lutfor Rahman, Ajaya Neupane, Chengyu Song
:
IAC: On the Feasibility of Utilizing Neural Signals for Access Control. 641-652
Blockchain & Smart Contracts
- Ivica Nikolic, Aashish Kolluri, Ilya Sergey
, Prateek Saxena, Aquinas Hobor:
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. 653-663 - Christof Ferreira Torres
, Julian Schütte, Radu State:
Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. 664-676 - André Greubel
, Alexandra Dmitrienko, Samuel Kounev:
SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor network. 677-691 - Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena:
Obscuro: A Bitcoin Mixer using Trusted Execution Environments. 692-701
Cloud Security
- Andrea Continella
, Mario Polino, Marcello Pogliani
, Stefano Zanero
:
There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 Buckets. 702-711 - Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo
, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou:
DeDoS: Defusing DoS with Dispersion Oriented Software. 712-722
Passwords
- Nikola K. Blanchard, Clément Malaingre, Ted Selker:
Improving security and usability of passphrases with guided word choice. 723-732 - Peter Mayer
, Christian Schwartz, Melanie Volkamer:
On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials. 733-748

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.