


default search action
ACSAC 2024: Honolulu, HI, USA
- Annual Computer Security Applications Conference, ACSAC 2024, Honolulu, HI, USA, December 9-13, 2024. IEEE 2024, ISBN 979-8-3315-2088-5
- Mariella Mischinger, Sergio Pastrana, Guillermo Suarez-Tangil:
IoC Stalker: Early detection of Indicators of Compromise. i-xvii - Jiayun Chen, Qihang Zhou, Xiaolong Yan, Nan Jiang, Xiaoqi Jia, Weijuan Zhang:
CubeVisor: A Multi-realm Architecture Design for Running VM with ARM CCA. 1-13 - Kerou Zhou, Jiakang Qiu, Yuehua Wang, Xiaojun Ye:
Enhancing Database Encryption: Adaptive Measures for Digital Assets Against LLMs-Based Reverse Engineering. 1-14 - Dipkamal Bhusal, Md Tanvirul Alam, Le Nguyen, Ashim Mahara, Zachary Lightcap, Rodney Frazier, Romy Fieblinger, Grace Long Torales, Benjamin A. Blakely, Nidhi Rastogi:
SECURE: Benchmarking Large Language Models for Cybersecurity. 15-30 - Changtian Song, Dongdong Zhao, Jianwen Xiang:
Not All Tokens Are Equal: Membership Inference Attacks Against Fine-tuned Language Models. 31-45 - Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill, Shirui Pan:
Stealing Watermarks of Large Language Models via Mixed Integer Programming. 46-60 - Md. Rayhanur Rahman, Brandon Wroblewski, Mahzabin Tamanna, Imranur Rahman, Andrew Anufryienak, Laurie A. Williams:
Towards a Taxonomy of Challenges in Security Control Implementation. 61-75 - Qiqing Deng, Yanqiang Zhang, Zhen Xu, Qian Tan, Yan Zhang:
ConProv: A Container-Aware Provenance System for Attack Investigation. 89-101 - Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri:
Confidential Computing with Heterogeneous Devices at Cloud-Scale. 102-116 - Andrew Fasano, Zak Estrada, Tim Leek, William K. Robertson:
Hypervisor Dissociative Execution: Programming Guests for Monitoring, Management, and Security. 117-130 - Jiamin Shen, Yao Chen, Weng-Fai Wong, Ee-Chien Chang:
T-Edge: Trusted Heterogeneous Edge Computing. 131-143 - Yousif Dafalla, Dalton A. Brucker-Hahn, Drew Davidson, Alexandru G. Bardas:
Web-Armour: Mitigating Reconnaissance and Vulnerability Scanning with Scan-Impeding Delays in Web Deployments. 144-160 - Konstantinos Solomos, Nick Nikiforakis, Jason Polakis:
Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations. 161-174 - Brian Kondracki, Michael Ferdman, Nick Nikiforakis:
Ready or Not, Here I Come: Characterizing the Security of Prematurely-public Web Applications. 175-189 - Dongwon Shin, Suyoung Lee, Sanghyun Hong, Sooel Son:
You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations. 190-206 - Emmanuel Syrmoudis, Stefan A. Mager, Jens Grossklags:
A Longitudinal Analysis of Corporate Data Portability Practices Across Industries. 207-223 - Marcell Szakály, Sebastian Köhler, Martin Strohmeier, Ivan Martinovic:
Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks. 224-239 - Yonatan Gizachew Achamyeleh, Mohamad Habib Fakih, Gabriel Garcia, Anomadarshi Barua, Mohammad Abdullah Al Faruque:
A Fly on the Wall - Exploiting Acoustic Side-Channels in Differential Pressure Sensors. 240-256 - Adam Caulfield, Antonio Joia Neto, Norrathep Rattanavipanon, Ivan De Oliveira Nunes:
TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems. 257-270 - Muhammad Ahsan, Eunice Pak, Kate Jackson, Muhammad Haris Rais, Barry Najarro-Blancas, Nastassja Lewinski, Irfan Ahmed:
BioSaFe: Bioprinting Security Framework for Detecting Sabotage Attacks on Printability and Cell Viability. 271-287 - Yanduo Fu, Ding Wang:
Leaky Autofill: An Empirical Study on the Privacy Threat of Password Managers' Autofill Functionality. 288-303 - Nicolas Huaman, Marten Oltrogge, Sabrina Klivan, Yannick Evers, Sascha Fahl:
Passwords To-Go: Investigating Multifaceted Challenges for Password Managers in the Android Ecosystem. 304-320 - Maximilian Westers, Andreas Mayer, Louis Jannett:
Single Sign-On Privacy: We Still Know What You Did Last Summer. 321-335 - Yijia Fang, Bingyu Li, Jiale Xiao, Bo Qin, Zhijintong Zhang, Qianhong Wu:
FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free. 336-352 - Mieszko Ferens, Edlira Dushku, Shreyas Srinivasa, Sokol Kosta:
Securing PUFs via a Predictive Adversarial Machine Learning System by Modeling of Attackers. 353-365 - Daniel Weber, Leonard Niemann, Lukas Gerlach, Jan Reineke, Michael Schwarz:
No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks. 366-379 - Jens Lindemann:
Faking deduplication to prevent timing side-channel attacks on memory deduplication. 380-392 - Zhiyuan Zhang, Zhenzhi Lai, Udaya Parampalli:
R+R: Demystifying ML-Assisted Side-Channel Analysis Framework: A Case of Image Reconstruction. 393-409 - Sirui Shen, Chenglu Jin:
Reading It like an Open Book: Single-trace Blind Side-channel Attacks on Garbled Circuit Frameworks. 410-424 - Si Liao, Huangxun Chen, Zhice Yang:
SecurityHub: Electromagnetic Fingerprinting USB Peripherals using Backscatter-assisted Commodity Hardware. 425-438 - Mengya Zhang, Xingyu Lyu, Jianyu Niu, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:
Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions. 439-455 - Junmo Lee, Seongjun Kim, Sanghyeon Park, Soo-Mook Moon:
RouTEE: Secure, Scalable, and Efficient Off-Chain Payments using Trusted Execution Environments. 456-472 - Frederik Armknecht, Ghassan Karame, Malcom Mohamed, Christiane Weis:
Practical Light Clients for Committee-Based Blockchains. 473-487 - Liangrong Zhao, Hans Schmiedel, Qin Wang, Jiangshan Yu:
Janus: Enhancing Asynchronous Common Subset with Trusted Hardware. 488-504 - Jing-Jie Wang, An-Jie Li, Ting-Yu Fang, Hsu-Chun Hsiao:
Verifying Loot-box Probability Without Source-code Disclosure. 505-519 - André Rösti, Stijn Volckaert, Michael Franz, Alexios Voulimeneas:
I'll Be There for You! Perpetual Availability in the A8 MVX System. 520-533 - Konstantinos Kleftogiorgos, Patrick Zielinski, Shan Huang, Jun Xu, Georgios Portokalidis:
Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software. 534-547 - Zhaofeng Li, Vikram Narayanan, Xiangdong Chen, Jerry Zhang, Anton Burtsev:
Rust for Linux: Understanding the Security Impact of Rust in the Linux Kernel. 548-562 - Adam Caulfield, Liam Tyler, Ivan De Oliveira Nunes:
SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation. 563-578 - Teh Beng Yen, Joey Li, Shih-Wei Li:
SECvma: Virtualization-based Linux Kernel Protection for Arm. 579-592 - Yihui Yan, Zhice Yang:
WiShield: Fine-grained Countermeasure Against Malicious Wi-Fi Sensing in Smart Home. 593-606 - Guoqiang Hua, Matheus E. Garbelini, Sudipta Chattopadhyay:
AirBugCatcher: Automated Wireless Reproduction of IoT Bugs. 607-620 - Geovani Benita, Leonardo Sestrem, Matheus E. Garbelini, Sudipta Chattopadhyay, Sumei Sun, Ernest Kurniawan:
VaktBLE: A Benevolent Man-in-the-Middle Bridge to Guard against Malevolent BLE Connections. 621-635 - Pierre Ayoub, Romain Cayre, Aurélien Francillon, Clémentine Maurice:
BlueScream: Screaming Channels on Bluetooth Low Energy. 636-649 - Javaria Ahmad, Fengjun Li, Razvan Beuran, Bo Luo:
Eunomia: A Real-time Privacy Compliance Firewall for Alexa Skills. 650-665 - Wenxuan Bao, Vincent Bindschaedler:
R+R: Towards Reliable and Generalizable Differentially Private Machine Learning. 666-682 - Arman Riasi, Jorge Guajardo, Thang Hoang:
Privacy-Preserving Verifiable Neural Network Inference Service. 683-698 - Jochen Schäfer, Frederik Armknecht, Youzhe Heng:
R+R: Revisiting Graph Matching Attacks on Privacy-Preserving Record Linkage. 699-715 - Basanta Chaulagain, Kyu Hyung Lee:
FA-SEAL: Forensically Analyzable Symmetric Encryption for Audit Logs. 716-732 - Daniel Günther, Joachim Schmidt, Thomas Schneider, Hossein Yalame:
FLUENT: A Tool for Efficient Mixed-Protocol Semi-Private Function Evaluation. 733-746 - Youpeng Li, Xinda Wang, Fuxun Yu, Lichao Sun, Wenbin Zhang, Xuyu Wang:
FedCAP: Robust Federated Learning via Customized Aggregation and Personalization. 747-760 - Oualid Zari, Chuan Xu, Javier Parra-Arnau, Ayse Ünsal, Melek Önen:
Link Inference Attacks in Vertical Federated Graph Learning. 761-777 - Rouzbeh Behnia, Arman Riasi, Reza Ebrahimi, Sherman S. M. Chow, Balaji Padmanabhan, Thang Hoang:
Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning. 778-793 - Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay K. Jha:
Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning. 794-809 - Tingyu Fan, Xiaojun Chen, Ye Dong, Xudong Chen, Yuexin Xuan, Weizhan Jing:
Lightweight Secure Aggregation for Personalized Federated Learning with Backdoor Resistance. 810-825 - Saastha Vasan, Hojjat Aghakhani, Stefano Ortolani, Roman Vasilenko, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna:
DEEPCAPA: Identifying Malicious Capabilities in Windows Malware. 826-842 - Simone Zerbini, Samuele Doria, Primal Wijesekera, Serge Egelman, Eleonora Losiouk:
R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android. 843-856 - Wenjia Song, Hailun Ding, Na Meng, Peng Gao, Danfeng Yao:
Madeline: Continuous and Low-cost Monitoring with Graph-free Representations to Combat Cyber Threats. 874-889 - Leon Kersten, Santiago Darré, Tom Mulders, Emmanuele Zambon, Marco Caselli, Chris Snijders, Luca Allodi:
A Security Alert Investigation Tool Supporting Tier 1 Analysts in Contextualizing and Understanding Network Security Events. 890-905 - Alexander Warnecke, Julian Speith, Jan-Niklas Möller, Konrad Rieck, Christof Paar:
Evil from Within: Machine Learning Backdoors Through Dormant Hardware Trojans. 906-922 - Guanhong Tao, Siyuan Cheng, Zhenting Wang, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang:
Exploring Inherent Backdoors in Deep Learning Models. 923-939 - Bao Gia Doan, Dang Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe:
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World. 940-956 - Chenyi Wang, Yanmao Man, Raymond Muller, Ming Li, Z. Berkay Celik, Ryan M. Gerdes, Jonathan Petit:
Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory. 957-973 - Achyut Hegde, Maximilian Noppel, Christian Wressnegger:
Model-Manipulation Attacks Against Black-Box Explanations. 974-987 - Qi Xia, Qian Chen:
Moiré Injection Attack (MIA) : Compromising Autonomous Vehicle Safety via Exploiting Camera's Color Filter Array (CFA) to Inject Hidden Traffic Sign. 988-1001 - Yeji Park, Hyunsu Cho, Dong Hoon Lee, Wonsuk Choi:
Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs. 1002-1014 - Yunbo Wang, Cong Sun, Qiaosen Liu, Bingnan Su, Zongxu Zhang, Michael Norris, Gang Tan, Jianfeng Ma:
VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs. 1015-1031 - Bailey Srimoungchanh, J. Garrett Morris, Drew Davidson:
Assessing UAV Sensor Spoofing: More Than A GNSS Problem. 1032-1046 - Anurag Swarnim Yadav, Joseph N. Wilson:
R+R: Security Vulnerability Dataset Quality Is Critical. 1047-1061 - Sima Arasteh, Jelena Mirkovic, Mukund Raghothaman, Christophe Hauser:
BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables*. 1062-1074 - Xiangxin Guo, Shijie Jia, Jingqiang Lin, Yuan Ma, Fangyu Zheng, Guangzheng Li, Bowen Xu, Yueqiang Cheng, Kailiang Ji:
CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis. 1075-1091 - Yongming Fan, Priyam Biswas, Christina Garman:
R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries. 1092-1108 - Florian Draschbacher, Lukas Maar:
Manifest Problems: Analyzing Code Transparency for Android Application Bundles. 1109-1122 - Anna Crowder, Daniel Olszewski, Patrick Traynor, Kevin R. B. Butler:
I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques. 1123-1138 - Yu Bi, Mingshuo Yang, Yong Fang, Xianghang Mi, Shanqing Guo, Shujun Tang, Haixin Duan:
Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks. 1139-1155 - Yagiz Yilmaz, Orçun Çetin, Omer Said Ozturk, Emre Ekmekcioglu, Budi Arief, Julio C. Hernandez-Castro:
Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War. 1156-1171 - Ildi Alla, Selma Yahia, Valeria Loscrì, Hossien B. Eldeeb:
Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments. 1172-1185 - Dalton A. Brucker-Hahn, Wang Feng, Shanchao Li, Matthew Petillo, Alexandru G. Bardas, Drew Davidson, Yuede Ji:
CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments. 1186-1202 - Yizhou Feng, Qiao Zhang, Yifei Cai, Hongyi Wu, Chunsheng Xin:
TILE: Input Structure Optimization for Neural Networks to Accelerate Secure Inference. 1203-1216 - Felix Morsbach, Jan Reubold, Thorsten Strufe:
R+R: Understanding Hyperparameter Effects in DP-SGD. 1217-1230 - Fei Zhang, Zhe Li, Yahang Hu, Yaohua Wang:
CIGA: Detecting Adversarial Samples via Critical Inference Graph Analysis. 1231-1244 - Giulio Pagnotta, Dorjan Hitaj, Briland Hitaj, Fernando Pérez-Cruz, Luigi V. Mancini:
TATTOOED: A Robust Deep Neural Network Watermarking Scheme based on Spread-Spectrum Channel Coding. 1245-1258 - Shihua Sun, Kenechukwu Nwodo, Shridatt Sugrim, Angelos Stavrou, Haining Wang:
ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer. 1259-1275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.