


default search action
ACSAC 2020: Virtual Event / Austin, TX, USA
- ACSAC '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020. ACM 2020, ISBN 978-1-4503-8858-0

Digital Forensics and Malware Detection
- Emanuele Cozzi, Pierre-Antoine Vervier, Matteo Dell'Amico, Yun Shen, Leyla Bilge, Davide Balzarotti:

The Tangled Genealogy of IoT Malware. 1-16 - Fabian Kaczmarczyck, Bernhard Grill, Luca Invernizzi, Jennifer Pullman, Cecilia M. Procopiuc, David Tao, Borbala Benko, Elie Bursztein:

Spotlight: Malware Lead Generation at Scale. 17-27 - Aisha I. Ali-Gombe

, Alexandra Tambaoan, Angela Gurfolino, Golden G. Richard III
:
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts. 28-41 - Silvia Sebastián, Juan Caballero:

AVclass2: Massive Malware Tag Extraction from AV Labels. 42-53 - Dima Rabadi

, Sin G. Teo:
Advanced Windows Methods on Malware Detection and Classification. 54-68
Anonymity and Privacy
- Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:

Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. 69-83 - Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:

Talek: Private Group Messaging with Hidden Access Patterns. 84-99 - Daniele Ucci

, Roberto Perdisci
, Jaewoo Lee, Mustaque Ahamad:
Towards a Practical Differentially Private Collaborative Phone Blacklisting System. 100-115 - Luke A. Bauer, Vincent Bindschaedler

:
Towards Realistic Membership Inferences: The Case of Survey Data. 116-128 - André Greubel

, Steffen Pohl, Samuel Kounev:
Quantifying measurement quality and load distribution in Tor. 129-140
Enterprise Security Management
- Martin Rosso, Michele Campobasso

, Ganduulga Gankhuyag, Luca Allodi:
SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers. 141-153 - Carlos Cardoso Galhardo, Peter Mell, Irena Bojanova, Assane Gueye:

Measurements of the Most Significant Software Security Weaknesses. 154-164 - Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen

, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates:
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage. 165-178 - Yuhang Lin, Olufogorehan Tunde-Onadele

, Xiaohui Gu:
CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications. 179-188 - Noor Michael, Jaron Mink

, Jason Liu, Sneha Gaur, Wajih Ul Hassan, Adam Bates
:
On the Forensic Validity of Approximated Audit Logs. 189-202
Usability and Human-centric Security
- Stephan Wiefling

, Markus Dürmuth
, Luigi Lo Iacono:
More Than Just Good Passwords? A Study on Usability and Security Perceptions of Risk-based Authentication. 203-218 - Timothy J. Forman, Adam J. Aviv:

Double Patterns: A Usable Solution to Increase the Security of Android Unlock Patterns. 219-233 - Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti

:
Understanding User Perceptions of Security and Privacy for Group Chat: A Survey of Users in the US and UK. 234-248 - Hassan Khan, Jason Ceci, Jonah Stegman, Adam J. Aviv, Rozita Dara, Ravi Kuber:

Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond. 249-262 - Duc Cuong Nguyen, Erik Derr, Michael Backes, Sven Bugiel:

Up2Dep: Android Tool Support to Fix Insecure Code Dependencies. 263-276
Network and Wireless Security
- Carter Yagemann

, Simon P. Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, Wenke Lee:
On the Feasibility of Automating Stock Market Manipulation. 277-290 - Daniel De Almeida Braga

, Pierre-Alain Fouque
, Mohamed Sabt:
Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild. 291-303 - Nian Xue, Liang Niu, Xianbin Hong

, Zhen Li, Larissa Hoffaeller, Christina Pöpper
:
DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching. 304-319 - Siqi Ma

, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal
, Elisa Bertino:
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. 320-331 - Gaganjeet Singh Reen, Christian Rossow:

DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC. 332-344
Software Security Techniques
- Sanjeev Das, Kedrian James, Jan Werner, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:

A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs. 345-359 - Emre Güler, Philipp Görz, Elia Geretto

, Andrea Jemmett
, Sebastian Österlund
, Herbert Bos
, Cristiano Giuffrida
, Thorsten Holz:
Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing. 360-372 - James Patrick-Evans, Lorenzo Cavallaro

, Johannes Kinder:
Probabilistic Naming of Functions in Stripped Binaries. 373-385 - Fadi Yilmaz

, Meera Sridhar, Wontae Choi:
Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine. 386-400 - Soumyakant Priyadarshan, Huan Nguyen, R. Sekar:

Practical Fine-Grained Binary Code Randomization†. 401-414
System and Hardware Security
- Fritz Alder

, Jo Van Bulck
, David F. Oswald
, Frank Piessens:
Faulty Point Unit: ABI Poisoning Attacks on Intel SGX. 415-427 - Kuniyasu Suzaki

, Akira Tsukamoto, Andy Green, Mohammad Mannan:
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices. 428-441 - Shengye Wan, Mingshen Sun, Kun Sun, Ning Zhang, Xu He:

RusTEE: Developing Memory-Safe ARM TrustZone Applications. 442-453 - Zekun Shen, Brendan Dolan-Gavitt:

HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities. 454-465 - Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan

, Jens Grossklags, Claudia Eckert:
ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. 466-479
Distributed Systems and Cloud Security
- Alessandro Erba

, Riccardo Taormina
, Stefano Galelli, Marcello Pogliani, Michele Carminati
, Stefano Zanero
, Nils Ole Tippenhauer
:
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems. 480-495 - Arnav Sankaran, Pubali Datta, Adam Bates

:
Workflow Integration Alleviates Identity and Access Management in Serverless Computing. 496-509 - Jan Pennekamp

, Erik Buchholz
, Yannik Lockner, Markus Dahlmanns
, Tiandong Xi, Marcel Fey, Christian Brecher, Christian Hopmann, Klaus Wehrle
:
Privacy-Preserving Production Process Parameter Exchange. 510-525 - Nicholas Mainardi, Davide Sampietro, Alessandro Barenghi

, Gerardo Pelosi
:
Efficient Oblivious Substring Search via Architectural Support. 526-541 - Corentin Thomasset, David Barrera:

SERENIoT: Distributed Network Security Policy Management and Enforcement for Smart Homes. 542-555
Software Security and Data Protection
- Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac

:
Effect of Security Controls on Patching Window: A Causal Inference based Approach. 556-566 - Dario Ferrari, Michele Carminati

, Mario Polino, Stefano Zanero
:
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services. 567-581 - Tao Xue, Yu Wen, Bo Luo

, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li
, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. 582-596 - Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang:

Understanding Promotion-as-a-Service on GitHub. 597-610 - Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers. 611-626
Web and Network Security
- Nampoina Andriamilanto, Tristan Allard

, Gaëtan Le Guelvouit:
FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms. 627-642 - Phakpoom Chinprutthiwong, Raj Vardhan, Guangliang Yang, Guofei Gu:

Security Study of Service Worker Cross-Site Scripting. 643-654 - Stephanos Matsumoto, Jay Bosamiya, Yucheng Dai, Paul C. van Oorschot, Bryan Parno:

CAPS: Smoothly Transitioning to a More Resilient Web PKI. 655-668 - Yiming Zhang, Yiyue Qian, Yujie Fan, Yanfang Ye, Xin Li

, Qi Xiong, Fudong Shao:
dStyle-GAN: Generative Adversarial Network based on Writing and Photography Styles for Drug Identification in Darknet Markets. 669-680 - Yang Xiao, Shanghao Shi

, Ning Zhang, Wenjing Lou, Y. Thomas Hou
:
Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication. 681-693
Embedded System and IoT Security
- Richard Mitev, Anna Pazii, Markus Miettinen, William Enck

, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. 694-705 - Prakash Shrestha, Zengrui Liu, Nitesh Saxena:

IvoriWatch: Exploring Transparent Integrity Verification of Remote User Input Leveraging Wearables. 706-716 - Mahmoud Ammar, Bruno Crispo

:
Verify&Revive: Secure Detection and Recovery of Compromised Low-end Embedded Devices. 717-732 - Mingeun Kim, Dongkwan Kim

, Eunsoo Kim, Suryeon Kim, Yeongjin Jang, Yongdae Kim
:
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis. 733-745 - Chen Cao, Le Guan, Jiang Ming, Peng Liu:

Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation. 746-759
Applied Cryptography
- Dmitry Belyavsky, Billy Bob Brumley

, Jesús-Javier Chi-Domínguez
, Luis Rivera-Zamarripa, Igor Ustinov:
Set It and Forget It! Turnkey ECC for Instant Integration. 760-771 - Rasoul Akhavan Mahdavi, Thomas Humphries, Bailey Kacsmar

, Simeon Krastnikov, Nils Lukas, John A. Premkumar, Masoumeh Shafieinejad, Simon Oya, Florian Kerschbaum, Erik-Oliver Blass:
Practical Over-Threshold Multi-Party Private Set Intersection. 772-783 - Guowen Xu

, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haomiao Yang, Kan Yang
, Robert H. Deng
:
Secure and Verifiable Inference in Deep Neural Networks. 784-797 - Aman Luthra, James Cavanaugh

, Hugo Renzzo Olcese, Rina M. Hirsch, Xiang Fu
:
ZeroAUDIT. 798-812 - Yangguang Tian

, Nan Li
, Yingjiu Li, Pawel Szalachowski, Jianying Zhou
:
Policy-based Chameleon Hash for Blockchain Rewriting with Black-box Accountability. 813-828
Security of Voice Assistants
- Cong Shi, Yan Wang

, Yingying Chen, Nitesh Saxena, Chen Wang:
WearID: Low-Effort Wearable-Assisted Authentication of Voice Commands via Cross-Domain Comparison without Training. 829-842 - Lea Schönherr

, Thorsten Eisenhofer, Steffen Zeiler, Thorsten Holz, Dorothea Kolossa
:
Imperio: Robust Over-the-Air Adversarial Examples for Automatic Speech Recognition Systems. 843-855 - Song Liao

, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. 856-869 - Maliheh Shirvanian, Manar Mohamed, Nitesh Saxena, S. Abhishek Anand:

Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks. 870-883 - Linghan Zhang

, Sheng Tan, Zi Wang, Yili Ren
, Zhi Wang, Jie Yang:
VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. 884-896
Machine Learning Security
- Bao Gia Doan

, Ehsan Abbasnejad, Damith C. Ranasinghe:
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems. 897-912 - Jiameng Pu, Neal Mangaokar, Bolun Wang, Chandan K. Reddy, Bimal Viswanath:

NoiseScope: Detecting Deepfake Images in a Blind Setting. 913-927 - Tao Liu, Zihao Liu, Qi Liu, Wujie Wen

, Wenyao Xu, Ming Li:
StegoNet: Turn Deep Neural Network into a Stegomalware. 928-938 - Jianwei Tai, Xiaoqi Jia, Qingjia Huang, Weijuan Zhang, Haichao Du, Shengzhi Zhang

:
SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation. 939-950 - Xuening Xu

, Xiaojiang Du, Qiang Zeng:
Attacking Graph-Based Classification without Changing Existing Connections. 951-962

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














