


default search action
ACSAC 2024: Honolulu, HI, USA
- Annual Computer Security Applications Conference, ACSAC 2024, Honolulu, HI, USA, December 9-13, 2024. IEEE 2024, ISBN 979-8-3315-2088-5

- Mariella Mischinger, Sergio Pastrana, Guillermo Suarez-Tangil:

IoC Stalker: Early detection of Indicators of Compromise. i-xvii - Jiayun Chen

, Qihang Zhou
, Xiaolong Yan, Nan Jiang, Xiaoqi Jia, Weijuan Zhang:
CubeVisor: A Multi-realm Architecture Design for Running VM with ARM CCA. 1-13 - Kerou Zhou, Jiakang Qiu, Yuehua Wang, Xiaojun Ye:

Enhancing Database Encryption: Adaptive Measures for Digital Assets Against LLMs-Based Reverse Engineering. 1-14 - Dipkamal Bhusal, Md Tanvirul Alam, Le Nguyen, Ashim Mahara, Zachary Lightcap, Rodney Frazier, Romy Fieblinger, Grace Long Torales, Benjamin A. Blakely, Nidhi Rastogi:

SECURE: Benchmarking Large Language Models for Cybersecurity. 15-30 - Changtian Song, Dongdong Zhao, Jianwen Xiang:

Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models. 31-45 - Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill

, Shirui Pan
:
Stealing Watermarks of Large Language Models via Mixed Integer Programming. 46-60 - Md. Rayhanur Rahman, Brandon Wroblewski

, Mahzabin Tamanna, Imranur Rahman, Andrew Anufryienak, Laurie A. Williams:
Towards a Taxonomy of Challenges in Security Control Implementation. 61-75 - Qiqing Deng, Yanqiang Zhang, Zhen Xu, Qian Tan, Yan Zhang:

ConProv: A Container-Aware Provenance System for Attack Investigation. 89-101 - Aritra Dhar

, Supraja Sridhara, Shweta Shinde
, Srdjan Capkun, Renzo Andri:
Confidential Computing with Heterogeneous Devices at Cloud-Scale. 102-116 - Andrew Fasano, Zak Estrada, Tim Leek, William K. Robertson:

Hypervisor Dissociative Execution: Programming Guests for Monitoring, Management, and Security. 117-130 - Jiamin Shen

, Yao Chen, Weng-Fai Wong, Ee-Chien Chang:
T-Edge: Trusted Heterogeneous Edge Computing. 131-143 - Yousif Dafalla, Dalton A. Brucker-Hahn, Drew Davidson, Alexandru G. Bardas:

Web-Armour: Mitigating Reconnaissance and Vulnerability Scanning with Scan-Impeding Delays in Web Deployments. 144-160 - Konstantinos Solomos

, Nick Nikiforakis, Jason Polakis:
Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations. 161-174 - Brian Kondracki, Michael Ferdman, Nick Nikiforakis:

Ready or Not, Here I Come: Characterizing the Security of Prematurely-public Web Applications. 175-189 - Dongwon Shin, Suyoung Lee, Sanghyun Hong, Sooel Son:

You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations. 190-206 - Emmanuel Syrmoudis, Stefan A. Mager, Jens Grossklags:

A Longitudinal Analysis of Corporate Data Portability Practices Across Industries. 207-223 - Marcell Szakály, Sebastian Köhler, Martin Strohmeier, Ivan Martinovic:

Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks. 224-239 - Yonatan Gizachew Achamyeleh, Mohamad Habib Fakih, Gabriel Garcia, Anomadarshi Barua, Mohammad Abdullah Al Faruque:

A Fly on the Wall - Exploiting Acoustic Side-Channels in Differential Pressure Sensors. 240-256 - Adam Caulfield, Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes:

TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems. 257-270 - Muhammad Ahsan, Eunice Pak, Kate Jackson, Muhammad Haris Rais, Barry Najarro-Blancas, Nastassja Lewinski, Irfan Ahmed

:
BioSaFe: Bioprinting Security Framework for Detecting Sabotage Attacks on Printability and Cell Viability. 271-287 - Yanduo Fu, Ding Wang:

Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality. 288-303 - Nicolas Huaman, Marten Oltrogge, Sabrina Klivan, Yannick Evers, Sascha Fahl:

Passwords To-Go: Investigating Multifaceted Challenges for Password Managers in the Android Ecosystem. 304-320 - Maximilian Westers, Andreas Mayer

, Louis Jannett:
Single Sign-On Privacy: We Still Know What You Did Last Summer. 321-335 - Yijia Fang, Bingyu Li, Jiale Xiao, Bo Qin, Zhijintong Zhang, Qianhong Wu:

FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free. 336-352 - Mieszko Ferens

, Edlira Dushku, Shreyas Srinivasa
, Sokol Kosta
:
Securing PUFs via a Predictive Adversarial Machine Learning System by Modeling of Attackers. 353-365 - Daniel Weber, Leonard Niemann, Lukas Gerlach, Jan Reineke, Michael Schwarz:

No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks. 366-379 - Jens Lindemann:

Faking deduplication to prevent timing side-channel attacks on memory deduplication. 380-392 - Zhiyuan Zhang

, Zhenzhi Lai, Udaya Parampalli:
R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction. 393-409 - Sirui Shen, Chenglu Jin:

Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks. 410-424 - Si Liao, Huangxun Chen, Zhice Yang:

SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware. 425-438 - Mengya Zhang, Xingyu Lyu, Jianyu Niu, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:

Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions. 439-455 - Junmo Lee

, Seongjun Kim, Sanghyeon Park, Soo-Mook Moon:
RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments. 456-472 - Frederik Armknecht, Ghassan Karame, Malcom Mohamed, Christiane Weis:

Practical Light Clients for Committee-Based Blockchains. 473-487 - Liangrong Zhao, Hans Schmiedel, Qin Wang, Jiangshan Yu

:
Janus: Enhancing Asynchronous Common Subset with Trusted Hardware. 488-504 - Jing-Jie Wang, An-Jie Li, Ting-Yu Fang, Hsu-Chun Hsiao:

Verifying Loot-box Probability Without Source-code Disclosure. 505-519 - André Rösti, Stijn Volckaert, Michael Franz, Alexios Voulimeneas:

I'll Be There for You! Perpetual Availability in the A8 MVX System. 520-533 - Konstantinos Kleftogiorgos, Patrick Zielinski, Shan Huang, Jun Xu, Georgios Portokalidis:

Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software. 534-547 - Zhaofeng Li

, Vikram Narayanan, Xiangdong Chen, Jerry Zhang, Anton Burtsev:
Rust for Linux: Understanding the Security Impact of Rust in the Linux Kernel. 548-562 - Adam Caulfield, Liam Tyler, Ivan De Oliveira Nunes:

SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation. 563-578 - Teh Beng Yen

, Joey Li, Shih-Wei Li:
SECvma: Virtualization-based Linux Kernel Protection for Arm. 579-592 - Yihui Yan, Zhice Yang:

WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home. 593-606 - Guoqiang Hua, Matheus E. Garbelini, Sudipta Chattopadhyay:

AirBugCatcher: Automated Wireless Reproduction of IoT Bugs. 607-620 - Geovani Benita, Leonardo Sestrem, Matheus E. Garbelini, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan:

VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections. 621-635 - Pierre Ayoub, Romain Cayre, Aurélien Francillon, Clémentine Maurice:

BlueScream: Screaming Channels on Bluetooth Low Energy. 636-649 - Javaria Ahmad, Fengjun Li, Razvan Beuran, Bo Luo:

Eunomia: A Real-time Privacy Compliance Firewall for Alexa Skills. 650-665 - Wenxuan Bao, Vincent Bindschaedler:

R+R: Towards Reliable and Generalizable Differentially Private Machine Learning. 666-682 - Arman Riasi, Jorge Guajardo, Thang Hoang:

Privacy-Preserving Verifiable Neural Network Inference Service. 683-698 - Jochen Schäfer, Frederik Armknecht, Youzhe Heng:

R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage. 699-715 - Basanta Chaulagain, Kyu Hyung Lee:

FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs. 716-732 - Daniel Günther, Joachim Schmidt, Thomas Schneider

, Hossein Yalame:
FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation. 733-746 - Youpeng Li, Xinda Wang, Fuxun Yu, Lichao Sun, Wenbin Zhang

, Xuyu Wang
:
FedCAP: Robust Federated Learning via Customized Aggregation and Personalization. 747-760 - Oualid Zari, Chuan Xu, Javier Parra-Arnau, Ayse Ünsal, Melek Önen:

Link Inference Attacks in Vertical Federated Graph Learning. 761-777 - Rouzbeh Behnia, Arman Riasi, Reza Ebrahimi, Sherman S. M. Chow

, Balaji Padmanabhan, Thang Hoang:
Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning. 778-793 - Hassan Ali

, Surya Nepal
, Salil S. Kanhere, Sanjay K. Jha:
Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning. 794-809 - Tingyu Fan

, Xiaojun Chen, Ye Dong, Xudong Chen, Yuexin Xuan, Weizhan Jing:
Lightweight Secure Aggregation for Personalized Federated Learning with Backdoor Resistance. 810-825 - Saastha Vasan, Hojjat Aghakhani, Stefano Ortolani, Roman Vasilenko, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:

DEEPCAPA: Identifying Malicious Capabilities in Windows Malware. 826-842 - Simone Zerbini, Samuele Doria, Primal Wijesekera, Serge Egelman, Eleonora Losiouk

:
R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android. 843-856 - Wenjia Song, Hailun Ding, Na Meng, Peng Gao, Danfeng Yao:

Madeline: Continuous and Low-cost Monitoring with Graph-free Representations to Combat Cyber Threats. 874-889 - Leon Kersten, Santiago Darré, Tom Mulders, Emmanuele Zambon

, Marco Caselli, Chris Snijders
, Luca Allodi:
A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events. 890-905 - Alexander Warnecke, Julian Speith, Jan-Niklas Möller, Konrad Rieck, Christof Paar:

Evil from Within: Machine Learning Backdoors Through Dormant Hardware Trojans. 906-922 - Guanhong Tao, Siyuan Cheng, Zhenting Wang, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang:

Exploring Inherent Backdoors in Deep Learning Models. 923-939 - Bao Gia Doan, Dang Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier Y. de Vel, Seyit Camtepe

, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World. 940-956 - Chenyi Wang, Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes, Jonathan Petit:

Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory. 957-973 - Achyut Hegde, Maximilian Noppel, Christian Wressnegger:

Model-Manipulation Attacks Against Black-Box Explanations. 974-987 - Qi Xia, Qian Chen:

Moiré Injection Attack (MIA) : Compromising Autonomous Vehicle Safety via Exploiting Camera's Color Filter Array (CFA) to Inject Hidden Traffic Sign. 988-1001 - Yeji Park, Hyunsu Cho, Dong Hoon Lee, Wonsuk Choi:

Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs. 1002-1014 - Yunbo Wang, Cong Sun, Qiaosen Liu, Bingnan Su, Zongxu Zhang, Michael Norris, Gang Tan, Jianfeng Ma:

VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs. 1015-1031 - Bailey Srimoungchanh, J. Garrett Morris, Drew Davidson:

Assessing UAV Sensor Spoofing: More Than A GNSS Problem. 1032-1046 - Anurag Swarnim Yadav, Joseph N. Wilson:

R+R: Security Vulnerability Dataset Quality Is Critical. 1047-1061 - Sima Arasteh, Jelena Mirkovic

, Mukund Raghothaman, Christophe Hauser:
BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables*. 1062-1074 - Xiangxin Guo, Shijie Jia, Jingqiang Lin, Yuan Ma, Fangyu Zheng, Guangzheng Li, Bowen Xu, Yueqiang Cheng, Kailiang Ji:

CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis. 1075-1091 - Yongming Fan, Priyam Biswas, Christina Garman:

R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries. 1092-1108 - Florian Draschbacher, Lukas Maar:

Manifest Problems: Analyzing Code Transparency for Android Application Bundles. 1109-1122 - Anna Crowder, Daniel Olszewski, Patrick Traynor, Kevin R. B. Butler:

I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques. 1123-1138 - Yu Bi, Mingshuo Yang, Yong Fang, Xianghang Mi, Shanqing Guo, Shujun Tang, Haixin Duan:

Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks. 1139-1155 - Yagiz Yilmaz, Orçun Çetin

, Omer Said Ozturk, Emre Ekmekcioglu, Budi Arief
, Julio C. Hernandez-Castro:
Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War. 1156-1171 - Ildi Alla, Selma Yahia, Valeria Loscrì, Hossien B. Eldeeb:

Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments. 1172-1185 - Dalton A. Brucker-Hahn, Wang Feng, Shanchao Li, Matthew Petillo, Alexandru G. Bardas, Drew Davidson, Yuede Ji:

CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments. 1186-1202 - Yizhou Feng

, Qiao Zhang, Yifei Cai, Hongyi Wu, Chunsheng Xin:
TILE: Input Structure Optimization for Neural Networks to Accelerate Secure Inference. 1203-1216 - Felix Morsbach

, Jan Reubold, Thorsten Strufe:
R+R: Understanding Hyperparameter Effects in DP-SGD. 1217-1230 - Fei Zhang, Zhe Li, Yahang Hu, Yaohua Wang:

CIGA: Detecting Adversarial Samples via Critical Inference Graph Analysis. 1231-1244 - Giulio Pagnotta, Dorjan Hitaj

, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding. 1245-1258 - Shihua Sun, Kenechukwu Nwodo, Shridatt Sugrim, Angelos Stavrou, Haining Wang:

ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer. 1259-1275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














