


default search action
ACM Transactions on Privacy and Security, Volume 25
Volume 25, Number 1, February 2022
- Savvas Savvides, Seema Kumar, Julian James Stephen, Patrick Eugster:
C3PO: Cloud-based Confidentiality-preserving Continuous Query Processing. 1:1-1:36 - Stefano Berlato
, Roberto Carbone
, Adam J. Lee
, Silvio Ranise
:
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud. 2:1-2:37 - Handan Kilinç Alper, Alptekin Küpçü
:
Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation. 3:1-3:34 - Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch:
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. 4:1-4:28 - Sibghat Ullah Bazai, Julian Jang-Jaccard
, Hooman Alavizadeh
:
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark. 5:1-5:25 - Fabio Pagani, Davide Balzarotti:
AutoProfile: Towards Automated Profile Generation for Memory Analysis. 6:1-6:26 - Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta:
Secure Selections on Encrypted Multi-writer Streams. 7:1-7:33
Volume 25, Number 2, May 2022
- Lennart Braun, Daniel Demmler, Thomas Schneider
, Oleksandr Tkachenko:
MOTION - A Framework for Mixed-Protocol Multi-Party Computation. 8:1-8:35 - Marcus Botacin, Francis B. Moreira, Philippe O. A. Navaux, André Grégio, Marco A. Z. Alves:
Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints. 9:1-9:34 - Xueou Wang
, Xiaolu Hou
, Ruben Rios
, Nils Ole Tippenhauer
, Martín Ochoa
:
Constrained Proximity Attacks on Mobile Targets. 10:1-10:29 - Alexandre Debant
, Stéphanie Delaune
, Cyrille Wiedling
:
So Near and Yet So Far - Symbolic Verification of Distance-Bounding Protocols. 11:1-11:39 - Yevhen Zolotavkin, Jongkil Jay Jeong
, Veronika Kuchta
, Maksym Slavnenko
, Robin Doss
:
Improving Unlinkability of Attribute-based Authentication through Game Theory. 12:1-12:36 - Nadia Daoudi
, Kevin Allix, Tegawendé François D. Assise Bissyandé, Jacques Klein:
A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. 13:1-13:28 - Pascal Oser
, Rens W. van der Heijden
, Stefan Lüders
, Frank Kargl
:
Risk Prediction of IoT Devices Based on Vulnerability Analysis. 14:1-14:36 - Julian de Gortari Briseno
, Akash Deep Singh, Mani Srivastava:
InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks. 15:1-15:26
Volume 25, Number 3, August 2022
- Chris Clifton, Eric J. Hanson
, Keith Merrill
, Shawn Merrill:
Differentially Private k-Nearest Neighbor Missing Data Imputation. 16:1-16:23 - Yuxuan Chen
, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. 17:1-17:31 - Max Landauer
, Florian Skopik
, Markus Wurzenberger
, Andreas Rauber:
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation. 18:1-18:36 - Cláudio Martins
, Ibéria Medeiros
:
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy. 19:1-19:39 - Mário S. Alvim
, Konstantinos Chatzikokolakis
, Yusuke Kawamoto
, Catuscia Palamidessi
:
Information Leakage Games: Exploring Information as a Utility Function. 20:1-20:36 - Andreas Fischer
, Benny Fuhry
, Jörn Kußmaul
, Jonas Janneck
, Florian Kerschbaum
, Eric Bodden
:
Computation on Encrypted Data Using Dataflow Authentication. 21:1-21:36 - Padmavathi Iyer
, Amirreza Masoumzadeh
:
Learning Relationship-Based Access Control Policies from Black-Box Systems. 22:1-22:36 - Yaguan Qian
, Yankai Guo
, Qiqi Shao
, Jiamin Wang
, Bin Wang
, Zhaoquan Gu
, Xiang Ling
, Chunming Wu
:
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks. 23:1-23:24 - Adi Akavia
, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald:
Privacy-Preserving Decision Trees Training and Prediction. 24:1-24:30
Volume 25, Number 4, November 2022
- Ellis Fenske
, Akshaya Mani
, Aaron Johnson
, Micah Sherr
:
Accountable Private Set Cardinality for Distributed Measurement. 25:1-25:35 - Sarah M. Lehman
, Abrar S. Alrumayh, Kunal Kolhe, Haibin Ling, Chiu C. Tan:
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications. 26:1-26:35 - Andrea Oliveri
, Davide Balzarotti
:
In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics. 27:1-27:32 - Jason Crampton, Eduard Eiben, Gregory Z. Gutin
, Daniel Karapetyan, Diptapriyo Majumdar
:
Valued Authorization Policy Existence Problem: Theory and Experiments. 28:1-28:32 - Lihi Idan, Joan Feigenbaum
:
PRShare: A Framework for Privacy-preserving, Interorganizational Data Sharing. 29:1-29:38 - Milica Stojmenovic
, Eric Spero
, Milos Stojmenovic
, Robert Biddle
:
What is Beautiful is Secure. 30:1-30:30 - Eyal Nussbaum
, Michael Segal
:
Privacy Analysis of Query-Set-Size Control. 31:1-31:19 - Jinhua Cui
, Shweta Shinde
, Satyaki Sen
, Prateek Saxena
, Pinghai Yuan
:
Dynamic Binary Translation for SGX Enclaves. 32:1-32:40 - William Blair
, Andrea Mambretti
, Sajjad Arshad
, Michael Weissbacher
, William Robertson
, Engin Kirda
, Manuel Egele
:
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. 33:1-33:35 - Alesia Chernikova
, Alina Oprea
:
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments. 34:1-34:34

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.