default search action
ACM Transactions on Privacy and Security, Volume 26
Volume 26, Number 1, February 2023
- Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu:
Differentially Private Real-Time Release of Sequential Data. 1:1-1:29 - Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. 2:1-2:44 - Shaharyar Khan, Ilya Kabanov, Yunke Hua, Stuart E. Madnick:
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned. 3:1-3:29 - Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
Industrial Control Systems Security via Runtime Enforcement. 4:1-4:41 - Kopo Marvin Ramokapane, Jose M. Such, Awais Rashid:
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study. 5:1-5:34 - Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono:
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. 6:1-6:36 - Huanran Wang, Wu Yang, Wei Wang, Dapeng Man, Jiguang Lv:
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks. 7:1-7:32 - James Lembke, Srivatsan Ravi, Pierre-Louis Roman, Patrick Eugster:
Secure and Reliable Network Updates. 8:1-8:41 - Euijin Choo, Mohamed Nabeel, Mashael AlSabah, Issa Khalil, Ting Yu, Wei Wang:
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference. 9:1-9:32 - Gonzalo Gil, Aitor Arnaiz, Marivi Higuero, Francisco Javier Díez:
Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions. 10:1-10:28
Volume 26, Number 2, May 2023
- Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk:
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure. 11:1-11:42 - Norah Mohsen T. Alotaibi, John Williamson, Mohamed Khamis:
ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards. 12:1-12:24 - David Barrera, Christopher Bellman, Paul C. van Oorschot:
Security Best Practices: A Critical Analysis Using IoT as a Case Study. 13:1-13:30 - Rodrigo Otoni, Matteo Marescotti, Leonardo Alt, Patrick Eugster, Antti E. J. Hyvärinen, Natasha Sharygina:
A Solicitous Approach to Smart Contract Verification. 15:1-15:28 - Savino Dambra, Leyla Bilge, Davide Balzarotti:
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments. 16:1-16:30 - Farzana Ahamed Bhuiyan, Akond Rahman:
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. 17:1-17:24 - Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, Michael Backes, Ben Stock, Robert Künnemann:
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. 18:1-18:36 - Ranya Aloufi, Hamed Haddadi, David Boyle:
Paralinguistic Privacy Protection at the Edge. 19:1-19:27 - Viktor Engström, Pontus Johnson, Robert Lagerström, Erik Ringdahl, Max Wällstedt:
Automated Security Assessments of Amazon Web Services Environments. 20:1-20:31 - Sohail Habib, Hassan Khan, Andrew Hamilton-Wright, Urs Hengartner:
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks. 21:1-21:30 - Ahmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas:
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework. 22:1-22:33
Volume 26, Number 3, August 2023
- Seoyeon Hwang, Ercan Ozturk, Gene Tsudik:
Balancing Security and Privacy in Genomic Range Queries. 23:1-23:28 - Sijie Zhuo, Robert Biddle, Yun Sing Koh, Danielle M. Lottridge, Giovanni Russello:
SoK: Human-centered Phishing Susceptibility. 24:1-24:27 - Andreas V. Hess, Sebastian Alexander Mödersheim, Achim D. Brucker:
Stateful Protocol Composition in Isabelle/HOL. 25:1-25:36 - Patricia Arias Cabarcos, Matin Fallahi, Thilo Habrich, Karen Schulze, Christian Becker, Thorsten Strufe:
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices. 26:1-26:36 - Nada Lachtar, Duha Ibdah, Hamza Khan, Anys Bacha:
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware. 27:1-27:30 - Litao Li, Steven H. H. Ding, Yuan Tian, Benjamin C. M. Fung, Philippe Charland, Weihan Ou, Leo Song, Congwei Chen:
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution. 28:1-28:25 - Sona Alex, Dhanaraj K. J., Deepthi P. P.:
Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network. 29:1-29:27 - Hazel Murray, David Malone:
Costs and Benefits of Authentication Advice. 30:1-30:35 - Tom Bolton, Tooska Dargahi, Sana Belguith, Carsten Maple:
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors. 31:1-31:29 - Isabel Wagner:
Privacy Policies across the Ages: Content of Privacy Policies 1996-2021. 32:1-32:32 - Yang Lu, Zhengxin Yu, Neeraj Suri:
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph. 33:1-33:39 - Jian Hou, Jing Wang, Mingyue Zhang, Zhi Jin, Chunlin Wei, Zuohua Ding:
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure. 34:1-34:22 - Isaiah J. King, H. Howie Huang:
Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction. 35:1-35:36 - Anushka Vidanage, Peter Christen, Thilina Ranbaduge, Rainer Schnell:
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage. 36:1-36:31 - Chun Guo, Xiao Wang, Xiang Xie, Yu Yu:
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets. 37:1-37:38 - Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis:
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks. 38:1-38:30 - Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg:
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs. 39:1-39:46 - Ranwa Al Mallah, Talal Halabi, Bilal Farooq:
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems. 40:1-40:27 - Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub:
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. 41:1-41:34 - Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik:
Defending Against Membership Inference Attacks on Beacon Services. 42:1-42:32
Volume 26, Number 4, November 2023
- Xueluan Gong, Yanjiao Chen, Wenbin Yang, Huayang Huang, Qian Wang:
B3: Backdoor Attacks against Black-box Machine Learning Models. 43:1-43:24 - Jinfu Chen, Luo Song, Saihua Cai, Haodi Xie, Shang Yin, Bilal Ahmad:
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism. 44:1-44:21 - Tommaso Paladini, Francesco Monti, Mario Polino, Michele Carminati, Stefano Zanero:
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies. 45:1-45:35 - Dohyun Kim, ManGi Cho, Hocheol Shin, Jaehoon Kim, Juhwan Noh, Yongdae Kim:
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting. 46:1-46:30 - Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan:
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism. 47:1-47:31 - Maksim Ekin Eren, Manish Bhattarai, Robert J. Joyce, Edward Raff, Charles Nicholas, Boian S. Alexandrov:
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection. 48:1-48:27 - Chenhan Zhang, Shiyao Zhang, James J. Q. Yu, Shui Yu:
SAM: Query-efficient Adversarial Attacks against Graph Neural Networks. 49:1-49:19 - Ayoosh Bansal, Anant Kandikuppa, Monowar Hasan, Chien-Ying Chen, Adam Bates, Sibin Mohan:
System Auditing for Real-Time Systems. 50:1-50:37 - Md Sajidul Islam Sajid, Jinpeng Wei, Ehab Al-Shaer, Qi Duan, Basel Abdeen, Latifur Khan:
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception. 51:1-51:36
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.