default search action
ACSAC 2020: Virtual Event / Austin, TX, USA
- ACSAC '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020. ACM 2020, ISBN 978-1-4503-8858-0
Digital Forensics and Malware Detection
- Emanuele Cozzi, Pierre-Antoine Vervier, Matteo Dell'Amico, Yun Shen, Leyla Bilge, Davide Balzarotti:
The Tangled Genealogy of IoT Malware. 1-16 - Fabian Kaczmarczyck, Bernhard Grill, Luca Invernizzi, Jennifer Pullman, Cecilia M. Procopiuc, David Tao, Borbala Benko, Elie Bursztein:
Spotlight: Malware Lead Generation at Scale. 17-27 - Aisha I. Ali-Gombe, Alexandra Tambaoan, Angela Gurfolino, Golden G. Richard III:
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts. 28-41 - Silvia Sebastián, Juan Caballero:
AVclass2: Massive Malware Tag Extraction from AV Labels. 42-53 - Dima Rabadi, Sin G. Teo:
Advanced Windows Methods on Malware Detection and Classification. 54-68
Anonymity and Privacy
- Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. 69-83 - Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. 84-99 - Daniele Ucci, Roberto Perdisci, Jaewoo Lee, Mustaque Ahamad:
Towards a Practical Differentially Private Collaborative Phone Blacklisting System. 100-115 - Luke A. Bauer, Vincent Bindschaedler:
Towards Realistic Membership Inferences: The Case of Survey Data. 116-128 - André Greubel, Steffen Pohl, Samuel Kounev:
Quantifying measurement quality and load distribution in Tor. 129-140
Enterprise Security Management
- Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag, Luca Allodi:
SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers. 141-153 - Carlos Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye:
Measurements of the Most Significant Software Security Weaknesses. 154-164 - Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates:
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage. 165-178 - Yuhang Lin, Olufogorehan Tunde-Onadele, Xiaohui Gu:
CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications. 179-188 - Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, Adam Bates:
On the Forensic Validity of Approximated Audit Logs. 189-202
Usability and Human-centric Security
- Stephan Wiefling, Markus Dürmuth, Luigi Lo Iacono:
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication. 203-218 - Timothy J. Forman, Adam J. Aviv:
Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns. 219-233 - Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti:
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK. 234-248 - Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber:
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond. 249-262 - Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies. 263-276
Network and Wireless Security
- Carter Yagemann, Simon P. Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
On the Feasibility of Automating Stock Market Manipulation. 277-290 - Daniel De Almeida Braga, Pierre-Alain Fouque, Mohamed Sabt:
Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild. 291-303 - Nian Xue, Liang Niu, Xianbin Hong, Zhen Li, Larissa Hoffaeller, Christina Pöpper:
DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching. 304-319 - Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal, Elisa Bertino:
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. 320-331 - Gaganjeet Singh Reen, Christian Rossow:
DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC. 332-344
Software Security Techniques
- Sanjeev Das, Kedrian James, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs. 345-359 - Emre Güler, Philipp Görz, Elia Geretto, Andrea Jemmett, Sebastian Österlund, Herbert Bos, Cristiano Giuffrida, Thorsten Holz:
Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing. 360-372 - James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder:
Probabilistic Naming of Functions in Stripped Binaries. 373-385 - Fadi Yilmaz, Meera Sridhar, Wontae Choi:
Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine. 386-400 - Soumyakant Priyadarshan, Huan Nguyen, R. Sekar:
Practical Fine-Grained Binary Code Randomization†. 401-414
System and Hardware Security
- Fritz Alder, Jo Van Bulck, David F. Oswald, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Intel SGX. 415-427 - Kuniyasu Suzaki, Akira Tsukamoto, Andy Green, Mohammad Mannan:
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices. 428-441 - Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, Xu He:
RusTEE: Developing Memory-Safe ARM TrustZone Applications. 442-453 - Zekun Shen, Brendan Dolan-Gavitt:
HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities. 454-465 - Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan, Jens Grossklags, Claudia Eckert:
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. 466-479
Distributed Systems and Cloud Security
- Alessandro Erba, Riccardo Taormina, Stefano Galelli, Marcello Pogliani, Michele Carminati, Stefano Zanero, Nils Ole Tippenhauer:
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems. 480-495 - Arnav Sankaran, Pubali Datta, Adam Bates:
Workflow Integration Alleviates Identity and Access Management in Serverless Computing. 496-509 - Jan Pennekamp, Erik Buchholz, Yannik Lockner, Markus Dahlmanns, Tiandong Xi, Marcel Fey, Christian Brecher, Christian Hopmann, Klaus Wehrle:
Privacy-Preserving Production Process Parameter Exchange. 510-525 - Nicholas Mainardi, Davide Sampietro, Alessandro Barenghi, Gerardo Pelosi:
Efficient Oblivious Substring Search via Architectural Support. 526-541 - Corentin Thomasset, David Barrera:
SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes. 542-555
Software Security and Data Protection
- Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac:
Effect of Security Controls on Patching Window: A Causal Inference based Approach. 556-566 - Dario Ferrari, Michele Carminati, Mario Polino, Stefano Zanero:
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services. 567-581 - Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. 582-596 - Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang:
Understanding Promotion-as-a-Service on GitHub. 597-610 - Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers. 611-626
Web and Network Security
- Nampoina Andriamilanto, Tristan Allard, Gaëtan Le Guelvouit:
FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms. 627-642 - Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Guofei Gu:
Security Study of Service Worker Cross-Site Scripting. 643-654 - Stephanos Matsumoto, Jay Bosamiya, Yucheng Dai, Paul C. van Oorschot, Bryan Parno:
CAPS: Smoothly Transitioning to a More Resilient Web PKI. 655-668 - Yiming Zhang, Yiyue Qian, Yujie Fan, Yanfang Ye, Xin Li, Qi Xiong, Fudong Shao:
dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets. 669-680 - Yang Xiao, Shanghao Shi, Ning Zhang, Wenjing Lou, Y. Thomas Hou:
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication. 681-693
Embedded System and IoT Security
- Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. 694-705 - Prakash Shrestha, Zengrui Liu, Nitesh Saxena:
IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables. 706-716 - Mahmoud Ammar, Bruno Crispo:
Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices. 717-732 - Mingeun Kim, Dongkwan Kim, Eunsoo Kim, Suryeon Kim, Yeongjin Jang, Yongdae Kim:
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis. 733-745 - Chen Cao, Le Guan, Jiang Ming, Peng Liu:
Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation. 746-759
Applied Cryptography
- Dmitry Belyavsky, Billy Bob Brumley, Jesús-Javier Chi-Domínguez, Luis Rivera-Zamarripa, Igor Ustinov:
Set It and Forget It! Turnkey ECC for Instant Integration. 760-771 - Rasoul Akhavan Mahdavi, Thomas Humphries, Bailey Kacsmar, Simeon Krastnikov, Nils Lukas, John A. Premkumar, Masoumeh Shafieinejad, Simon Oya, Florian Kerschbaum, Erik-Oliver Blass:
Practical Over-Threshold Multi-Party Private Set Intersection. 772-783 - Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haomiao Yang, Kan Yang, Robert H. Deng:
Secure and Verifiable Inference in Deep Neural Networks. 784-797 - Aman Luthra, James Cavanaugh, Hugo Renzzo Oclese, Rina M. Hirsch, Xiang Fu:
ZeroAUDIT. 798-812 - Yangguang Tian, Nan Li, Yingjiu Li, Pawel Szalachowski, Jianying Zhou:
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. 813-828
Security of Voice Assistants
- Cong Shi, Yan Wang, Yingying Chen, Nitesh Saxena, Chen Wang:
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training. 829-842 - Lea Schönherr, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa:
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. 843-855 - Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. 856-869 - Maliheh Shirvanian, Manar Mohamed, Nitesh Saxena, S. Abhishek Anand:
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks. 870-883 - Linghan Zhang, Sheng Tan, Zi Wang, Yili Ren, Zhi Wang, Jie Yang:
VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. 884-896
Machine Learning Security
- Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe:
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems. 897-912 - Jiameng Pu, Neal Mangaokar, Bolun Wang, Chandan K. Reddy, Bimal Viswanath:
NoiseScope: Detecting Deepfake Images in a Blind Setting. 913-927 - Tao Liu, Zihao Liu, Qi Liu, Wujie Wen, Wenyao Xu, Ming Li:
StegoNet: Turn Deep Neural Network into a Stegomalware. 928-938 - Jianwei Tai, Xiaoqi Jia, Qingjia Huang, Weijuan Zhang, Haichao Du, Shengzhi Zhang:
SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation. 939-950 - Xuening Xu, Xiaojiang Du, Qiang Zeng:
Attacking Graph-Based Classification without Changing Existing Connections. 951-962
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.