


default search action
ACM Transactions on Privacy and Security, Volume 24
Volume 24, Number 1, November 2020
- Benjamin Zi Hao Zhao

, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Francesca Trevisan
, Haiyue Yuan
:
Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes. 1:1-1:33 - Chuadhry Mujeeb Ahmed

, Aditya P. Mathur, Martín Ochoa:
NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints. 2:1-2:35 - Nikolaos Alexopoulos

, Sheikh Mahbub Habib
, Steffen Schulz, Max Mühlhäuser:
The Tip of the Iceberg: On the Merits of Finding Security Bugs. 3:1-3:33 - Alexandre Meylan, Mauro Cherubini

, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin
:
A Study on the Use of Checksums for Integrity Verification of Web Downloads. 4:1-4:36 - Benjamin Shreeve

, Joseph Hallett
, Matthew Edwards
, Pauline Anthonysamy, Sylvain Frey, Awais Rashid
:
"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making. 5:1-5:29 - Zhisheng Hu

, Minghui Zhu, Peng Liu:
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP. 6:1-6:25
Volume 24, Number 2, February 2021
- Michalis Papaevripides, Elias Athanasopoulos:

Exploiting Mixed Binaries. 7:1-7:29 - Carlos Garcia Cordero, Emmanouil Vasilomanolakis

, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani:
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection. 8:1-8:39 - Shameek Bhattacharjee

, Venkata Praveen Kumar Madhavarapu, Simone Silvestri, Sajal K. Das:
Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure. 9:1-9:36 - Vincenzo Arceri

, Isabella Mastroeni
:
Analyzing Dynamic Code: A Sound Abstract Interpreter for Evil Eval. 10:1-10:38 - Marcus Botacin, Hojjat Aghakhani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna, Daniela Oliveira, Paulo Lício de Geus

, André Grégio:
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware. 11:1-11:31 - Isabel Wagner

, Iryna Yevseyeva:
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization. 12:1-12:35 - Charlie Jacomme

, Steve Kremer
:
An Extensive Formal Analysis of Multi-factor Authentication Protocols. 13:1-13:34
Volume 24, Number 3, April 2021
- Meisam Mohammady

, Momen Oqaily, Lingyu Wang, Yuan Hong
, Habib Louafi, Makan Pourzandi, Mourad Debbabi
:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. 14:1-14:36 - Amit Seal Ami

, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk
:
Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques. 15:1-15:37 - Musard Balliu, Massimo Merro

, Michele Pasqua
, Mikhail Shcherbakov
:
Friendly Fire: Cross-app Interactions in IoT Platforms. 16:1-16:40 - Stanislaw Jarecki, Mohammed Jubur

, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian:
Two-factor Password-authenticated Key Exchange with End-to-end Security. 17:1-17:37 - Shujie Cui

, Xiangfu Song, Muhammad Rizwan Asghar
, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage. 18:1-18:35 - René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Nick Kralevich:

The Android Platform Security Model. 19:1-19:35 - Rafael Veras

, Christopher Collins, Julie Thorpe:
A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords. 20:1-20:21 - Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar

:
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis. 21:1-21:22 - Louma Chaddad, Ali Chehab

, Imad H. Elhajj, Ayman I. Kayssi:
Optimal Packet Camouflage Against Traffic Analysis. 22:1-22:23
Volume 24, Number 4, November 2021
- Mohammed Abuhamad

, Tamer AbuHmed
, David Mohaisen, Daehun Nyang:
Large-scale and Robust Code Authorship Identification with Deep Feature Learning. 23:1-23:35 - Abbas Acar, Shoukat Ali, Koray Karabina, Cengiz Kaygusuz, Hidayet Aksu, Kemal Akkaya, Arif Selcuk Uluagac:

A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA. 24:1-24:28 - Aleieldin Salem, Sebastian Banescu

, Alexander Pretschner:
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection. 25:1-25:35 - Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman

, Haipeng Cai
, Trent Jaeger, N. Asokan
, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. 26:1-26:36 - Luca Demetrio

, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli
:
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection. 27:1-27:31 - Sana Maqsood

, Sonia Chiasson
:
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens. 28:1-28:37 - Sarah C. Helble, Ian D. Kretz

, Peter A. Loscocco, John D. Ramsdell, Paul D. Rowe, Perry Alexander
:
Flexible Mechanisms for Remote Attestation. 29:1-29:23 - Philipp Markert

, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth
, Adam J. Aviv
:
On the Security of Smartphone Unlock PINs. 30:1-30:36 - Simon Birnbach

, Richard Baker, Simon Eberz, Ivan Martinovic:
#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones. 31:1-31:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














