


default search action
ACM Transactions on Privacy and Security, Volume 26
Volume 26, Number 1, February 2023
- Xueru Zhang

, Mohammad Mahdi Khalili
, Mingyan Liu
:
Differentially Private Real-Time Release of Sequential Data. 1:1-1:29 - Christoph Hagen, Christian Weinert

, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider
:
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. 2:1-2:44 - Shaharyar Khan

, Ilya Kabanov
, Yunke Hua
, Stuart E. Madnick
:
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned. 3:1-3:29 - Ruggero Lanotte

, Massimo Merro
, Andrei Munteanu
:
Industrial Control Systems Security via Runtime Enforcement. 4:1-4:41 - Kopo Marvin Ramokapane

, Jose M. Such
, Awais Rashid
:
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study. 5:1-5:34 - Stephan Wiefling

, Paul René Jørgensen
, Sigurd Thunem
, Luigi Lo Iacono
:
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. 6:1-6:36 - Huanran Wang

, Wu Yang
, Wei Wang
, Dapeng Man
, Jiguang Lv
:
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks. 7:1-7:32 - James Lembke

, Srivatsan Ravi
, Pierre-Louis Roman
, Patrick Eugster
:
Secure and Reliable Network Updates. 8:1-8:41 - Euijin Choo

, Mohamed Nabeel
, Mashael AlSabah
, Issa Khalil
, Ting Yu
, Wei Wang
:
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference. 9:1-9:32 - Gonzalo Gil

, Aitor Arnaiz
, Marivi Higuero
, Francisco Javier Díez
:
Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions. 10:1-10:28
Volume 26, Number 2, May 2023
- Lesly-Ann Daniel

, Sébastien Bardin
, Tamara Rezk
:
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure. 11:1-11:42 - Norah Mohsen T. Alotaibi

, John Williamson
, Mohamed Khamis
:
ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards. 12:1-12:24 - David Barrera

, Christopher Bellman
, Paul C. van Oorschot
:
Security Best Practices: A Critical Analysis Using IoT as a Case Study. 13:1-13:30 - Rodrigo Otoni

, Matteo Marescotti
, Leonardo Alt
, Patrick Eugster
, Antti E. J. Hyvärinen, Natasha Sharygina
:
A Solicitous Approach to Smart Contract Verification. 15:1-15:28 - Savino Dambra, Leyla Bilge, Davide Balzarotti:

A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments. 16:1-16:30 - Farzana Ahamed Bhuiyan

, Akond Rahman
:
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. 17:1-17:24 - Giorgio Di Tizio

, Patrick Speicher
, Milivoj Simeonovski
, Michael Backes
, Ben Stock
, Robert Künnemann
:
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. 18:1-18:36 - Ranya Aloufi

, Hamed Haddadi
, David Boyle
:
Paralinguistic Privacy Protection at the Edge. 19:1-19:27 - Viktor Engström

, Pontus Johnson
, Robert Lagerström
, Erik Ringdahl
, Max Wällstedt
:
Automated Security Assessments of Amazon Web Services Environments. 20:1-20:31 - Sohail Habib

, Hassan Khan
, Andrew Hamilton-Wright
, Urs Hengartner
:
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks. 21:1-21:30 - Ahmed Amro

, Vasileios Gkioulos
, Sokratis K. Katsikas
:
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework. 22:1-22:33
Volume 26, Number 3, August 2023
- Seoyeon Hwang

, Ercan Ozturk
, Gene Tsudik
:
Balancing Security and Privacy in Genomic Range Queries. 23:1-23:28 - Sijie Zhuo

, Robert Biddle
, Yun Sing Koh
, Danielle M. Lottridge
, Giovanni Russello
:
SoK: Human-centered Phishing Susceptibility. 24:1-24:27 - Andreas V. Hess

, Sebastian Alexander Mödersheim
, Achim D. Brucker
:
Stateful Protocol Composition in Isabelle/HOL. 25:1-25:36 - Patricia Arias Cabarcos

, Matin Fallahi
, Thilo Habrich
, Karen Schulze
, Christian Becker
, Thorsten Strufe
:
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices. 26:1-26:36 - Nada Lachtar

, Duha Ibdah
, Hamza Khan
, Anys Bacha
:
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware. 27:1-27:30 - Litao Li

, Steven H. H. Ding
, Yuan Tian
, Benjamin C. M. Fung
, Philippe Charland
, Weihan Ou
, Leo Song
, Congwei Chen
:
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution. 28:1-28:25 - Sona Alex

, Dhanaraj K. J.
, Deepthi P. P.
:
Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network. 29:1-29:27 - Hazel Murray

, David Malone
:
Costs and Benefits of Authentication Advice. 30:1-30:35 - Tom Bolton

, Tooska Dargahi
, Sana Belguith
, Carsten Maple
:
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors. 31:1-31:29 - Isabel Wagner

:
Privacy Policies across the Ages: Content of Privacy Policies 1996-2021. 32:1-32:32 - Yang Lu

, Zhengxin Yu
, Neeraj Suri
:
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph. 33:1-33:39 - Jian Hou

, Jing Wang
, Mingyue Zhang
, Zhi Jin
, Chunlin Wei
, Zuohua Ding
:
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure. 34:1-34:22 - Isaiah J. King

, H. Howie Huang
:
Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction. 35:1-35:36 - Anushka Vidanage

, Peter Christen
, Thilina Ranbaduge
, Rainer Schnell
:
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage. 36:1-36:31 - Chun Guo

, Xiao Wang
, Xiang Xie
, Yu Yu
:
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets. 37:1-37:38 - Dmitrii Usynin

, Daniel Rueckert
, Georgios Kaissis
:
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks. 38:1-38:30 - Gianluca Scopelliti

, Sepideh Pouyanrad
, Job Noorman
, Fritz Alder
, Christoph Baumann
, Frank Piessens
, Jan Tobias Mühlberg
:
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs. 39:1-39:46 - Ranwa Al Mallah

, Talal Halabi
, Bilal Farooq
:
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems. 40:1-40:27 - Manuel Barbosa

, Gilles Barthe
, Benjamin Grégoire
, Adrien Koutsos
, Pierre-Yves Strub
:
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. 41:1-41:34 - Rajagopal Venkatesaramani

, Zhiyu Wan
, Bradley A. Malin
, Yevgeniy Vorobeychik
:
Defending Against Membership Inference Attacks on Beacon Services. 42:1-42:32
Volume 26, Number 4, November 2023
- Xueluan Gong

, Yanjiao Chen
, Wenbin Yang
, Huayang Huang
, Qian Wang
:
B3: Backdoor Attacks against Black-box Machine Learning Models. 43:1-43:24 - Jinfu Chen

, Luo Song
, Saihua Cai
, Haodi Xie
, Shang Yin
, Bilal Ahmad
:
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism. 44:1-44:21 - Tommaso Paladini

, Francesco Monti
, Mario Polino
, Michele Carminati
, Stefano Zanero
:
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies. 45:1-45:35 - Dohyun Kim

, ManGi Cho
, Hocheol Shin
, Jaehoon Kim
, Juhwan Noh
, Yongdae Kim
:
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting. 46:1-46:30 - Shahnewaz Karim Sakib

, George T. Amariucai
, Yong Guan
:
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism. 47:1-47:31 - Maksim Ekin Eren

, Manish Bhattarai
, Robert J. Joyce
, Edward Raff
, Charles Nicholas
, Boian S. Alexandrov
:
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection. 48:1-48:27 - Chenhan Zhang

, Shiyao Zhang
, James J. Q. Yu
, Shui Yu
:
SAM: Query-efficient Adversarial Attacks against Graph Neural Networks. 49:1-49:19 - Ayoosh Bansal

, Anant Kandikuppa
, Monowar Hasan
, Chien-Ying Chen
, Adam Bates
, Sibin Mohan
:
System Auditing for Real-Time Systems. 50:1-50:37 - Md Sajidul Islam Sajid

, Jinpeng Wei
, Ehab Al-Shaer
, Qi Duan
, Basel Abdeen
, Latifur Khan
:
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception. 51:1-51:36

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














