


default search action
ACSAC 2021: Virtual Event, USA
- ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021. ACM 2021, ISBN 978-1-4503-8579-4

Machine Learning Security 1
- Hailong Hu

, Jun Pang:
Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks. 1-16 - Mingtian Tan, Zhe Zhou, Zhou Li:

The Many-faced God: Attacking Face Verification System with Embedding and Image Recovery. 17-30 - Sohaib Kiani

, Sana Awan, Chao Lan, Fengjun Li
, Bo Luo
:
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency. 31-44 - Meng Hao, Hongwei Li, Guowen Xu

, Hanxiao Chen, Tianwei Zhang:
Efficient, Private and Robust Federated Learning. 45-60 - Abderrahmen Amich, Birhanu Eshete

:
Morphence: Moving Target Defense Against Adversarial Examples. 61-75
Applied Cryptography
- Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang:

Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment. 76-90 - Stefan-Lukas Gazdag

, Sophia Grundner-Culemann, Tobias Guggemos, Tobias Heider, Daniel Loebenberger
:
A formal analysis of IKEv2's post-quantum extension. 91-105 - Huanyu Ma, Shuai Han, Hao Lei:

Optimized Paillier's Cryptosystem with Fast Encryption and Decryption. 106-118 - Rouzbeh Behnia, Attila Altay Yavuz

:
Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things. 119-130 - Jean-Pierre Münch, Thomas Schneider

, Hossein Yalame:
VASA: Vector AES Instructions for Security Applications. 131-145
Software Security 1
- David Demicco

, Rukayat Erinfolami, Aravind Prakash:
Program Obfuscation via ABI Debiasing. 146-157 - Hyungjoon Koo

, Soyeon Park, Taesoo Kim:
A Look Back on a Function Identification Problem. 158-168 - Honggoo Kang, Yonghwi Kwon, Sangjin Lee, Hyungjoon Koo

:
SoftMark: Software Watermarking via a Binary Function Relocation. 169-181 - Sebastian Banescu, Samuel Valenzuela

, Marius Guggenmos, Mohsen Ahmadvand, Alexander Pretschner:
Dynamic Taint Analysis versus Obfuscated Self-Checking. 182-193 - Hyunji Hong, Seunghoon Woo

, Heejo Lee:
Dicos: Discovering Insecure Code Snippets from Stack Overflow Posts by Leveraging User Discussions. 194-206
Privacy and Anonymity
- Pietro Tedeschi

, Savio Sciancalepore
, Roberto Di Pietro:
ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles. 207-218 - Sherman S. M. Chow

, Ming Li, Yongjun Zhao
, Wenqiang Jin:
Sipster: Settling IOU Privately and Quickly with Smart Meters. 219-234 - Mingyuan Gao, Hung Dang, Ee-Chien Chang:

TEEKAP: Self-Expiring Data Capsule using Trusted Execution Environment. 235-247 - Zhong Guan, Gang Xiong

, Gaopeng Gou, Zhen Li, Mingxin Cui, Chang Liu:
BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor. 248-259 - Qiyang Song, Jiahao Cao, Kun Sun, Qi Li, Ke Xu:

Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace. 260-272
Distributed systems
- Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert:

VIA: Analyzing Device Interfaces of Protected Virtual Machines. 273-284 - Beom Heyn Kim

, Hyoungshick Kim:
Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure. 285-296 - Zijie Yang, Binghui Wang, Haoran Li, Dong Yuan, Zhuotao Liu

, Neil Zhenqiang Gong, Chang Liu, Qi Li, Xiao Liang, Shaofeng Hu:
On Detecting Growing-Up Behaviors of Malicious Accounts in Privacy-Centric Mobile Social Networks. 297-310 - Yumei Zhang, Xinzhi Liu, Cong Sun, Dongrui Zeng, Gang Tan, Xiao Kan

, Siqi Ma
:
ReCFA: Resilient Control-Flow Attestation. 311-322 - Ismi Abidi, Vireshwar Kumar, Rijurekha Sen:

Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications. 323-336
Usability and Human-Centric Aspects of Security
- Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear

, L. Jean Camp:
Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD). 337-348 - Fumihiro Kanei, Ayako Akiyama Hasegawa, Eitaro Shioji, Mitsuaki Akiyama:

A Cross-role and Bi-national Analysis on Security Efforts and Constraints of Software Development Projects. 349-364 - Xiaofeng Lu, Zhenhan Feng, Jupeng Xia:

An Efficient Man-Machine Recognition Method Based On Mouse Trajectory Feature De-redundancy. 365-374 - Mahshid Mehr Nezhad, Feng Hao

:
OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks. 375-384 - Borce Stojkovski

, Gabriele Lenzini, Vincent Koenig, Salvador Rivas:
What's in a Cyber Threat Intelligence sharing platform?: A mixed-methods user experience investigation of MISP. 385-398
CPS and IoT
- Sebastian Köhler, Giulio Lovisotto, Simon Birnbach

, Richard Baker, Ivan Martinovic:
They See Me Rollin': Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors. 399-413 - Payton Walker

, Nitesh Saxena:
Evaluating the Effectiveness of Protection Jamming Devices in Mitigating Smart Speaker Eavesdropping Attacks Using Gaussian White Noise. 414-424 - Mert D. Pesé, Jay W. Schauer, Junhui Li, Kang G. Shin:

S2-CAN: Sufficiently Secure Controller Area Network. 425-438 - Abubakar Sadiq Sani, Dong Yuan, Elisa Bertino, Zhao Yang Dong:

Crypto-Chain: A Relay Resilience Framework for Smart Vehicles. 439-454 - Jonas Röckl, Mykolai Protsenko, Monika Huber

, Tilo Müller, Felix C. Freiling:
Advanced System Resiliency Based on Virtualization Techniques for IoT Devices. 455-467
Authentication and Passwords
- Duo Lu, Yuli Deng, Dijiang Huang:

Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication. 468-481 - Maliheh Shirvanian, Shashank Agrawal:

2D-2FA: A New Dimension in Two-Factor Authentication. 482-496 - Zheng Yang

, Chenglu Jin
, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. 497-512 - Haodong Zhang, Chuanwang Wang

, Wenqiang Ruan, Junjie Zhang, Ming Xu, Weili Han:
Digit Semantics based Optimization for Practical Password Cracking Tools. 513-527 - James Simmons, Oumar Diallo, Sean Oesch, Scott Ruoti

:
Systematization of Password ManagerUse Cases and Design Paradigms. 528-540
Machine Learning Security 2
- Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy

, Zubair Shafiq, Yu Hao
, Guoren Li, Zheng Zhang, Xiaochen Zou:
Eluding ML-based Adblockers With Actionable Adversarial Examples. 541-553 - Xiaoyi Chen

, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen
, Zhonghai Wu, Yang Zhang
:
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements. 554-569 - Panagiota Kiourti, Wenchao Li

, Anirban Roy, Karan Sikka, Susmit Jha:
MISA: Online Defense of Trojaned Models using Misattributions. 570-585 - Namgyu Park, Sangwoo Ji, Jong Kim:

Detecting Audio Adversarial Examples with Logit Noising. 586-595 - Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu:

Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection? 596-608
Hardware and Architecture
- Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:

TLB Poisoning Attacks on AMD Secure Encrypted Virtualization. 609-619 - Taejune Park, Jaehyun Nam, Seung Ho Na, Jaewoong Chung, Seungwon Shin:

Reinhardt: Real-time Reconfigurable Hardware Architecture for Regular Expression Matching in DPI. 620-633 - Xudong Pan, Mi Zhang, Yifan Yan, Min Yang:

Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains. 634-645 - Leila Delshadtehrani, Sadullah Canakci, William Blair, Manuel Egele, Ajay Joshi:

FlexFilt: Towards Flexible Instruction Filtering for Security. 646-659 - Michael Moukarzel, Matthew Hicks:

RingRAM: A Unified Hardware SecurityPrimitive for IoT Devices that Gets Better with Age. 660-674
Malware and Novel Attacks
- Md Sajidul Islam Sajid

, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md. Mazharul Islam, Walter Diong, Latifur Khan:
SODA: A System for Cyber Deception Orchestration and Automation. 675-689 - Rafael Uetz, Christian Hemminghaus, Louis Hackländer, Philipp Schlipper, Martin Henze

:
Reproducible and Adaptable Log Data Generation for Sound Cybersecurity Experiments. 690-705 - Duy-Phuc Pham

, Damien Marion
, Matthieu Mastio, Annelie Heuser:
Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification. 706-719 - Zhaohe John Zhang, Edwin Yang, Song Fang:

CommanderGabble: A Universal Attack Against ASR Systems Leveraging Fast Speech. 720-731 - Tuan Le, Sriharsha Etigowni, Sizhuang Liang, Xirui Peng

, H. Jerry Qi, Mehdi Javanmard, Saman A. Zonouz, Raheem Beyah:
Physical Logic Bombs in 3D Printers via Emerging 4D Techniques. 732-747
Cryptocurrency and Side Channels
- Zecheng Li, Yu Zhou, Songtao Guo, Bin Xiao

:
SolSaviour: A Defending Framework for Deployed Defective Smart Contracts. 748-760 - Shaltiel Eloul, Sean J. Moran, Jacob Mendel:

Improving Streaming Cryptocurrency Transaction Classification via Biased Sampling and Graph Feedback. 761-772 - Giorgia Azzurra Marson, Sébastien Andreina

, Lorenzo Alluminio, Konstantin Munichev, Ghassan Karame:
Mitosis: Practically Scaling Permissioned Blockchains. 773-783 - Patrick Cronin, Xing Gao, Haining Wang, Chase Cotton:

An Exploration of ARM System-Level Cache and GPU Side Channels. 784-795 - Niclas Kühnapfel, Stefan Preußler, Maximilian Noppel

, Thomas Schneider, Konrad Rieck, Christian Wressnegger:
LaserShark: Establishing Fast, Bidirectional Communication into Air-Gapped Systems. 796-811
Software Security 2
- Baojian Hua, Wanrong Ouyang, Chengman Jiang, Qiliang Fan, Zhizhong Pan:

Rupair: Towards Automatic Buffer Overflow Detection and Rectification for Rust. 812-823 - Elijah Rivera

, Samuel Mergendahl, Howard E. Shrobe, Hamed Okhravi
, Nathan Burow:
Keeping Safe Rust Safe with Galeed. 824-836 - Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang

, Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet:
DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment. 837-848 - Dongliang Fang, Zhanwei Song, Le Guan, Puzhuo Liu

, Anni Peng, Kai Cheng, Yaowen Zheng, Peng Liu, Hongsong Zhu, Limin Sun:
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing. 849-860 - Pallavi Sivakumaran, Jorge Blasco:

argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries. 861-876
Wireless Security
- Muhammad Taqi Raza, Yunqi Guo

, Songwu Lu, Fatima Muhammad Anwar:
On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact. 877-886 - Patrick Leu

, Martin Kotuliak, Marc Roeschlin, Srdjan Capkun:
Security of Multicarrier Time-of-Flight Ranging. 887-899 - Evangelos Bitsikas

, Christina Pöpper
:
Don't hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications. 900-915 - Yi Wu, Zhuohang Li, Nicholas Van Nostrand, Jian Liu:

Time to Rethink the Design of Qi Standard? Security and Privacy Vulnerability Analysis of Qi Wireless Charging. 916-929 - Mingxuan Liu, Yiming Zhang, Baojun Liu, Zhou Li, Haixin Duan, Donghong Sun:

Detecting and Characterizing SMS Spearphishing Attacks. 930-943
Smart Apps
- Sojhal Ismail Khan, Dominika C. Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed:

Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services. 944-956 - Yufei Han, Kevin Alejandro Roundy

, Acar Tamersoy:
Towards Stalkerware Detection with Precise Warnings. 957-969 - Antonio Ruggia, Eleonora Losiouk

, Luca Verderame, Mauro Conti
, Alessio Merlo:
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization. 970-981 - Lannan Luo, Qiang Zeng, Bokai Yang, Fei Zuo, Junzhe Wang:

Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms. 982-995 - Sean Oesch, Anuj Gautam

, Scott Ruoti
:
The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android. 996-1010
Internet Traffic
- Fatemeh Rezaei, Amir Houmansadr:

FINN: Fingerprinting Network Flows using Neural Networks. 1011-1024 - Thai-Dien Pham, Thien-Lac Ho, Tram Truong Huu, Tien-Dung Cao, Hong Linh Truong

:
MAppGraph: Mobile-App Classification on Encrypted Network Traffic using Deep Graph Convolution Neural Networks. 1025-1038 - Tianxiang Dai

, Haya Schulmann:
SMap: Internet-wide Scanning for Spoofing. 1039-1050 - Shize Zhang, Zhiliang Wang, Jiahai Yang, Xin Cheng, Xiaoqian Ma, Hui Zhang, Bo Wang, Zimu Li, Jianping Wu:

MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking. 1051-1063 - Yihe Zhang

, Xu Yuan
, Nian-Feng Tzeng:
Platform-Oblivious Anti-Spam Gateway. 1064-1077

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














