


default search action
ACSAC 2022: Austin, TX, USA
- Annual Computer Security Applications Conference, ACSAC 2022, Austin, TX, USA, December 5-9, 2022. ACM 2022, ISBN 978-1-4503-9759-9

CPS and IoT I
- Savio Sciancalepore

, Dominik Roy George
:
Privacy-Preserving Trajectory Matching on Autonomous Unmanned Aerial Vehicles. 1-12 - Matthew Landen

, Key-whan Chung
, Moses Ike
, Sarah Mackay
, Jean-Paul Watson
, Wenke Lee
:
DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection. 13-27 - Zhuojia Shen

, Komail Dharsee
, John Criswell
:
Randezvous: Making Randomization Effective on MCUs. 28-41 - Maria Zhdanova

, Julian Urbansky
, Anne Hagemeier
, Daniel Zelle
, Isabelle Herrmann
, Dorian Höffner
:
Local Power Grids at Risk - An Experimental and Simulation-based Analysis of Attacks on Vehicle-To-Grid Communication. 42-55 - Qifan Zhang

, Junjie Shen
, Mingtian Tan
, Zhe Zhou
, Zhou Li
, Qi Alfred Chen
, Haipeng Zhang
:
Play the Imitation Game: Model Extraction Attack against Autonomous Driving Localization. 56-70
Deployable Trustworthy Systems
- Nik Sultana

, Henry Zhu
, Ke Zhong
, Zhilei Zheng
, Ruijie Mao
, Digvijaysinh Chauhan
, Stephen Carrasquillo
, Junyong Zhao
, Lei Shi
, Nikos Vasilakis
, Boon Thau Loo
:
Towards Practical Application-level Support for Privilege Separation. 71-87 - Yinggang Guo

, Zicheng Wang
, Bingnan Zhong
, Qingkai Zeng
:
Formal Modeling and Security Analysis for Intra-level Privilege Separation. 88-101 - Flavio Toffalini

, Mathias Payer
, Jianying Zhou
, Lorenzo Cavallaro
:
Designing a Provenance Analysis for SGX Enclaves. 102-116 - Qian Ren

, Yingjun Wu
, Han Liu, Yue Li
, Anne Victor
, Hong Lei
, Lei Wang
, Bangdao Chen
:
Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation. 117-131 - Xinshu Ma

, Florentin Rochet
, Tariq Elahi
:
Stopping Silent Sneaks: Defending against Malicious Mixes with Topological Engineering. 132-145
Machine Learning I
- Mohamad Mansouri

, Melek Önen
, Wafa Ben Jaballah
:
Learning from Failures: Secure and Fault-Tolerant Aggregation for Federated Learning. 146-158 - Yinbin Miao

, Rongpeng Xie
, Xinghua Li
, Ximeng Liu
, Zhuo Ma
, Robert H. Deng
:
Compressed Federated Learning Based on Adaptive Local Differential Privacy. 159-170 - Giovanni Apruzzese

, Mauro Conti
, Ying Yuan
:
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning. 171-185 - Chen Gong

, Zhou Yang
, Yunpeng Bai
, Jieke Shi
, Arunesh Sinha
, Bowen Xu
, David Lo
, Xinwen Hou
, Guoliang Fan
:
Curiosity-Driven and Victim-Aware Adversarial Policies. 186-200 - Liyue Shen

, Yanjun Zhang
, Jingwei Wang
, Guangdong Bai
:
Better Together: Attaining the Triad of Byzantine-robust Federated Learning via Local Update Amplification. 201-213
Malware
- Yong-Gang Li, Yeh-Ching Chung

, Jinbiao Xing
, Yu Bao
, Guoyuan Lin
:
MProbe: Make the code probing meaningless. 214-226 - Jia Yan

, Ming Wan
, Xiangkun Jia
, Lingyun Ying
, Purui Su
, Zhanyi Wang
:
DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection. 227-239 - Aaron Faulkenberry

, Athanasios Avgetidis
, Zane Ma
, Omar Alrawi
, Charles Lever
, Panagiotis Kintis
, Fabian Monrose
, Angelos D. Keromytis
, Manos Antonakakis
:
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy. 240-250 - Afsah Anwar

, Yi Hui Chen
, Roy Hodgman
, Tom Sellers
, Engin Kirda
, Alina Oprea
:
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices. 251-266 - Xutong Wang

, Chaoge Liu
, Xiaohui Hu
, Zhi Wang
, Jie Yin, Xiang Cui:
Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks. 267-278
Applied Crypto, Privacy, and Anonymity
- Erik Buchholz

, Alsharif Abuadbba
, Shuo Wang
, Surya Nepal
, Salil Subhash Kanhere
:
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. 279-292 - Ammar Haydari

, Chen-Nee Chuah
, H. Michael Zhang
, Jane MacFarlane
, Sean Peisert
:
Differentially Private Map Matching for Mobility Trajectories. 293-303 - Jieyu Zheng

, Feng He
, Shiyu Shen
, Chenxi Xue
, Yunlei Zhao
:
Parallel Small Polynomial Multiplication for Dilithium: A Faster Design and Implementation. 304-317 - Wenqing Li

, Shijie Jia
, Limin Liu
, Fangyu Zheng
, Yuan Ma
, Jingqiang Lin
:
CryptoGo: Automatic Detection of Go Cryptographic API Misuses. 318-331 - Seung Ho Na

, Hyeong Gwon Hong
, Junmo Kim
, Seungwon Shin
:
Closing the Loophole: Rethinking Reconstruction Attacks in Federated Learning from a Privacy Standpoint. 332-345
Software Security I
- Markus Bauer

, Ilya Grishchenko
, Christian Rossow
:
TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation. 346-360 - Sunwoo Ahn

, Seonggwan Ahn
, Hyungjoon Koo
, Yunheung Paek
:
Practical Binary Code Similarity Detection with BERT-based Transferable Similarity Learning. 361-374 - Elia Geretto

, Cristiano Giuffrida
, Herbert Bos
, Erik van der Kouwe
:
Snappy: Efficient Fuzzing with Adaptive and Mutable Snapshots. 375-387 - Prashast Srivastava

, Stefan Nagy
, Matthew Hicks
, Antonio Bianchi
, Mathias Payer
:
One Fuzz Doesn't Fit All: Optimizing Directed Fuzzing via Target-tailored Program State Restriction. 388-399 - Carmen Cheh

, Nicholas Tay
, Binbin Chen
:
From Hindsight to Foresight: Enhancing Design Artifacts for Business Logic Flaw Discovery. 400-411
CPS and IoT II
- Alessandro Erba

, Nils Ole Tippenhauer
:
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks. 412-426 - Yechan Bae

, Sarbartha Banerjee, Sangho Lee, Marcus Peinado:
Spacelord: Private and Secure Smart Space Sharing. 427-439 - Anomadarshi Barua, Lelin Pan, Mohammad Abdullah Al Faruque:

BayesImposter: Bayesian Estimation Based.bss Imposter Attack on Industrial Control Systems. 440-454 - Jan Sebastian Götte

, Liran Katzir, Björn Scheuermann:
Ripples in the Pond: Transmitting Information through Grid Frequency Modulation. 455-466 - Luca Morgese Zangrandi

, Thijs van Ede
, Tim M. Booij
, Savio Sciancalepore
, Luca Allodi
, Andrea Continella
:
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles. 467-480
Software Security II
- Chandra Thapa

, Seung Ick Jang
, Muhammad Ejaz Ahmed
, Seyit Camtepe
, Josef Pieprzyk
, Surya Nepal
:
Transformer-Based Language Models for Software Vulnerability Detection. 481-496 - Yu Luo, Weifeng Xu, Dianxiang Xu:

Compact Abstract Graphs for Detecting Code Vulnerability with GNN Models. 497-507 - Ying Cao

, Ruigang Liang
, Kai Chen
, Peiwei Hu
:
Boosting Neural Networks to Decompile Optimized Binaries. 508-518 - Yuki Koike, Hiroyuki Katsura, Hiromu Yakura, Yuma Kurogome:

SLOPT: Bandit Optimization Framework for Mutation-Based Fuzzing. 519-533 - Yiru Zhao

, Xiaoke Wang
, Lei Zhao
, Yueqiang Cheng
, Heng Yin
:
Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing. 534-547
Mobile and Wireless Security
- Harshad Sathaye

, Guevara Noubir
, Aanjhan Ranganathan
:
On the Implications of Spoofing and Jamming Aviation Datalink Applications. 548-560 - Evangelos Bitsikas

, Christina Pöpper
:
You have been warned: Abusing 5G's Warning and Emergency Systems. 561-575 - Samin Yaseer Mahmud

, K. Virgil English
, Seaver Thorn
, William Enck
, Adam Oest
, Muhammad Saad
:
Analysis of Payment Service Provider SDKs in Android. 576-590
Usability and Human-Centered Security
- Rahel A. Fainchtein

, Adam J. Aviv
, Micah Sherr
:
User Perceptions of the Privacy and Usability of Smart DNS. 591-604 - Xiaoyuan Wu

, Collins W. Munyendo
, Eddie Cosic
, Genevieve A. Flynn
, Olivia Legault
, Adam J. Aviv
:
User Perceptions of Five-Word Passwords. 605-618 - James Mattei

, Madeline McLaughlin
, Samantha Katcher
, Daniel Votipka
:
A Qualitative Evaluation of Reverse Engineering Tool Usability. 619-631
Machine Learning II
- Minghong Fang

, Jia Liu
, Neil Zhenqiang Gong
, Elizabeth S. Bentley
:
AFLGuard: Byzantine-robust Asynchronous Federated Learning. 632-646 - Ning Wang

, Yang Xiao
, Yimin Chen
, Ning Zhang
, Wenjing Lou
, Y. Thomas Hou
:
Squeezing More Utility via Adaptive Clipping on Differentially Private Gradients in Federated Meta-Learning. 647-657 - Yufeng Diao

, Yichi Zhang
, Guodong Zhao
, Mohamed Khamis
:
Drone Authentication via Acoustic Fingerprint. 658-668 - Nuo Xu

, Binghui Wang
, Ran Ran
, Wujie Wen
, Parv Venkitasubramaniam
:
NeuGuard: Lightweight Neuron-Guided Defense against Membership Inference Attacks. 669-683 - Jing Xu

, Rui Wang
, Stefanos Koffas
, Kaitai Liang
, Stjepan Picek
:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. 684-698
Network Security
- Levente Csikor

, Sriram Ramachandran
, Anantharaman Lakshminarayanan
:
ZeroDNS: Towards Better Zero Trust Security using DNS. 699-713 - Jeongyoon Heo

, Sangwon Gil
, Youngman Jung
, Jinmok Kim
, Donguk Kim
, Woojin Park
, Yongdae Kim
, Kang G. Shin
, Choong-Hoon Lee
:
Are There Wireless Hidden Cameras Spying on Me? 714-726 - Zheng Yang

, Chao Yin
, Junming Ke
, Tien Tuan Anh Dinh
, Jianying Zhou
:
If You Can't Beat Them, Pay Them: Bitcoin Protection Racket is Profitable. 727-741 - Shreyas Srinivasa

, Jens Myrup Pedersen
, Emmanouil Vasilomanolakis
:
Interaction matters: a comprehensive analysis and a dataset of hybrid IoT/OT honeypots. 742-755 - Zhechang Zhang

, Bin Yuan
, Kehan Yang
, Deqing Zou
, Hai Jin
:
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance. 756-768
Anomaly, Intrusion, and Threat Detection
- Xiaolei Wang

, Lin Yang
, Dongyang Li
, Linru Ma
, Yongzhong He
, Junchao Xiao
, Jiyuan Liu
, Yuexiang Yang
:
MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs. 769-784 - Xian Wang

:
ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift. 785-798 - Bingkun Wu

, Weizhi Meng
, Wei-Yang Chiu
:
Towards Enhanced EEG-based Authentication with Motor Imagery Brain-Computer Interface. 799-812 - Muhammad Adil Inam

, Akul Goyal
, Jason Liu
, Jaron Mink
, Noor Michael
, Sneha Gaur
, Adam Bates
, Wajih Ul Hassan
:
FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput. 813-826 - Yushan Liu

, Xiaokui Shu
, Yixin Sun
, Jiyong Jang
, Prateek Mittal
:
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery. 827-840
OS Security I
- Debopriya Roy Dipta

, Berk Gülmezoglu
:
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical. 841-853 - Rajat Gupta

, Lukas Patrick Dresel
, Noah Spahn
, Giovanni Vigna
, Christopher Kruegel
, Taesoo Kim
:
POPKORN: Popping Windows Kernel Drivers At Scale. 854-868 - Yutian Yang

, Wenbo Shen
, Xun Xie
, Kangjie Lu
, Mingsen Wang
, Tianyu Zhou
, Chenggang Qin
, Wang Yu
, Kui Ren
:
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms. 869-880
Web Security
- ChangSeok Oh

, Sangho Lee
, Chenxiong Qian
, Hyungjoon Koo
, Wenke Lee
:
DeView: Confining Progressive Web Applications by Debloating Web APIs. 881-895 - Pablo Picazo-Sanchez

, Benjamin Eriksson
, Andrei Sabelfeld
:
No Signal Left to Chance: Driving Browser Extension Analysis by Download Patterns. 896-910 - David Klein

, Marius Musch
, Thomas Barber
, Moritz Kopmann
, Martin Johns
:
Accept All Exploits: Exploring the Security Impact of Cookie Banners. 911-922
Resilience and Data Protection
- Xiaohai Dai

, Liping Huang
, Jiang Xiao
, Zhaonan Zhang
, Xia Xie
, Hai Jin
:
Trebiz: Byzantine Fault Tolerance with Byzantine Merchants. 923-935 - Moe Sabry

, Reza Samavi
:
ArchiveSafe LT: Secure Long-term Archiving System. 936-948 - Minjae Seo

, Jaehan Kim
, Eduard Marin
, Myoungsung You
, Taejune Park
, Seungsoo Lee
, Seungwon Shin
, Jinwoo Kim
:
Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic. 949-963
OS Security II
- Yizhuo Wang

, Yikun Hu
, Xuangan Xiao
, Dawu Gu
:
iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOS. 964-977 - Fan Lang

, Wei Wang
, Lingjia Meng
, Jingqiang Lin
, Qiongxiao Wang
, Linli Lu
:
MoLE: Mitigation of Side-channel Attacks against SGX via Dynamic Data Location Escape. 978-988 - Joana Pecholt

, Sascha Wessel
:
CoCoTPM: Trusted Platform Modules for Virtual Machines in Confidential Computing Environments. 989-998

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














