


default search action
ACSAC 2019: San Juan, PR, USA
- David M. Balenson:

Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019. ACM 2019, ISBN 978-1-4503-7628-0
IOT security
- Chenglu Jin, Zheng Yang

, Marten van Dijk
, Jianying Zhou
:
Proof of aliveness. 1-16 - Charalampos Stylianopoulos, Simon Kindström, Magnus Almgren

, Olaf Landsiedel, Marina Papatriantafilou:
Co-evaluation of pattern matching algorithms on IoT devices with embedded GPUs. 17-27 - Amit Kumar Sikder

, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
:
Aegis: a context-aware security framework for smart home systems. 28-41 - Chen Wang, S. Abhishek Anand, Jian Liu, Payton Walker

, Yingying Chen, Nitesh Saxena:
Defeating hidden audio channel attacks on voice assistants via audio-induced surface vibrations. 42-56
Binary analysis & defense
- Fangjie Jiang, Quanwei Cai

, Jingqiang Lin, Bo Luo
, Le Guan, Ziqiang Ma:
TF-BIV: transparent and fine-grained binary integrity verification in the cloud. 57-69 - Ioannis Agadakos

, Di Jin, David Williams-King, Vasileios P. Kemerlis
, Georgios Portokalidis
:
Nibbler: debloating binary shared libraries. 70-83 - Jim Alves-Foss, Jia Song:

Function boundary detection in stripped binaries. 84-96 - Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe

, Thorsten Holz, Cristiano Giuffrida
, Herbert Bos
:
VPS: excavating high-level C++ constructs from low-level binaries to protect dynamic dispatching. 97-112
AI security
- Yansong Gao, Chang Xu, Derui Wang

, Shiping Chen
, Damith Chinthana Ranasinghe, Surya Nepal:
STRIP: a defence against trojan attacks on deep neural networks. 113-125 - Zheng Li

, Chengyu Hu
, Yang Zhang
, Shanqing Guo:
How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN. 126-137 - Yu Li, Yannan Liu, Min Li, Ye Tian, Bo Luo, Qiang Xu

:
D2NN: a fine-grained dual modular redundancy framework for deep neural networks. 138-147 - Zecheng He, Tianwei Zhang, Ruby B. Lee:

Model inversion attacks against collaborative inference. 148-162
Software security I
- Sebastian Poeplau, Aurélien Francillon:

Systematic comparison of symbolic execution systems: intermediate representation and its generation. 163-176 - Mathilde Ollivier, Sébastien Bardin

, Richard Bonichon, Jean-Yves Marion:
How to kill symbolic deobfuscation for free (or: unleashing the potential of path-oriented protections). 177-189 - Christophe Hauser, Jayakrishna Menon, Yan Shoshitaishvili, Ruoyu Wang, Giovanni Vigna, Christopher Kruegel:

Sleak: automating address space layout derandomization. 190-202 - Mohsen Ahmadvand, Dennis Fischer, Sebastian Banescu

:
SIP shaker: software integrity protection composition. 203-214
Intrusion detection
- Samuel Marchal

, Sebastian Szyller
:
Detecting organized eCommerce fraud using scalable categorical clustering. 215-228 - Mahsa Foruhandeh, Yanmao Man, Ryan M. Gerdes, Ming Li, Thidapat Chantem

:
SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks. 229-244 - Frederico Araujo, Gbadebo Ayoade, Khaled Al-Naami, Yang Gao, Kevin W. Hamlen, Latifur Khan

:
Improving intrusion detectors by crook-sourcing. 245-256 - Aurore Fass, Michael Backes, Ben Stock

:
JStap: a static pre-filter for malicious JavaScript detection. 257-269
Privacy
- Huangyi Ge, Sze Yiu Chau

, Victor E. Gonsalves, Huian Li, Tianhao Wang
, Xukai Zou, Ninghui Li:
Koinonia: verifiable e-voting with long-term privacy. 270-285 - Tavish Vaidya, Timothy Walsh

, Micah Sherr:
Whisper: a unilateral defense against VoIP traffic re-identification attacks. 286-296 - Nicholas Mainardi, Alessandro Barenghi

, Gerardo Pelosi
:
Privacy preserving substring search protocol with polylogarithmic communication cost. 297-312 - Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, Dennis Goeckel:

Revisiting utility metrics for location privacy-preserving mechanisms. 313-327
Mobile security
- Stefano Cristalli

, Long Lu, Danilo Bruschi, Andrea Lanzi:
Detecting (absent) app-to-app authentication on cross-device short-distance channels. 328-338 - Siqi Ma

, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal
, Diethelm Ostry, Elisa Bertino, Robert H. Deng
, Zhuo Ma, Sanjay Jha
:
An empirical study of SMS one-time password authentication in Android apps. 339-354 - Manar Mohamed, Prakash Shrestha, Nitesh Saxena:

Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. 355-365 - Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef:

AppVeto: mobile application self-defense through resource access veto. 366-377
Big data security
- Jiaping Gui, Xusheng Xiao

, Ding Li, Chung Hwan Kim
, Haifeng Chen:
Progressive processing of system-behavioral query. 378-389 - Saeid Mofrad

, Ishtiaq Ahmed, Shiyong Lu, Ping Yang, Heming Cui, Fengwei Zhang:
SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments. 390-403 - Matthew W. Sanders, Chuan Yue:

Mining least privilege attribute based access control policies. 404-416 - Pejman Najafi, Alexander Mühle, Wenzel Pünter

, Feng Cheng
, Christoph Meinel:
MalRank: a measure of maliciousness in SIEM-based knowledge graphs. 417-429
Malware
- Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jack W. Davidson:

Cubismo: decloaking server-side malware via cubist program analysis. 430-443 - Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna:

Neurlux: dynamic malware analysis without feature engineering. 444-455 - Ziya Alper Genç, Gabriele Lenzini, Daniele Sgandurra:

A game of "Cut and Mouse": bypassing antivirus by simulating user inputs. 456-465 - Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura

:
My script engines know what you did in the dark: converting engines into script API tracers. 466-477
Web security
- Iskander Sánchez-Rola, Davide Balzarotti, Igor Santos:

BakingTimer: privacy analysis of server-side request processing time. 478-488 - Yoshimichi Nakatsuka, Andrew Paverd

, Gene Tsudik:
PDoT: private DNS-over-TLS with TEE support. 489-499 - Hao Yang, Kun Du, Yubao Zhang, Shuang Hao, Zhou Li

, Mingxuan Liu, Haining Wang, Hai-Xin Duan, Yazhou Shi, XiaoDong Su, Guang Liu, Zhifeng Geng, Jianping Wu:
Casino royale: a deep exploration of illegal online gambling. 500-513 - Luke Dickinson, Trevor Smith, Kent E. Seamons

:
Leveraging locality of reference for certificate revocation. 514-528
Network security
- Imtiaz Karim

, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones. 529-543 - Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Haoliang Lu, Longquan Liu, Chen Wang, Dandan Sun, Chao Zhang, Baoxu Liu:

SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities. 544-556 - Jan Spooren, Thomas Vissers, Peter Janssen, Wouter Joosen, Lieven Desmet

:
Premadoma: an operational solution for DNS registries to prevent malicious domain registrations. 557-567 - Vasudevan Nagendra, Vinod Yegneswaran, Phillip A. Porras, Samir R. Das:

Coordinated dataflow protection for ultra-high bandwidth science networks. 568-583
Software security II
- Paul Muntean, Matthias Neumayer, Zhiqiang Lin, Gang Tan

, Jens Grossklags, Claudia Eckert:
Analyzing control flow integrity with LLVM-CFI. 584-597 - Tapti Palit

, Fabian Monrose, Michalis Polychronakis:
Mitigating data leakage by protecting memory-resident sensitive data. 598-611 - Myoung Jin Nam, Periklis Akritidis, David J. Greaves:

FRAMER: a tagged-pointer capability system with memory safety applications. 612-626 - Joonun Jang

, Huy Kang Kim:
FuzzBuilder: automated building greybox fuzzing environment for C/C++ library. 627-637
Embedded security
- Amir Herzberg, Yehonatan Kfir:

The chatty-sensor: a provably-covert channel in cyber physical systems. 638-649 - Luis Puche Rondon, Leonardo Babun, Kemal Akkaya, A. Selcuk Uluagac

:
HDMI-walk: attacking HDMI distribution networks via consumer electronic control protocol. 650-659 - Pritam Dash, Mehdi Karimibiuki, Karthik Pattabiraman:

Out of control: stealthy attacks against robotic vehicles protected by control-based techniques. 660-672 - Ryad Benadjila, Arnauld Michelizza, Mathieu Renard, Philippe Thierry, Philippe Trebuchet:

WooKey: designing a trusted and efficient USB device. 673-686
Usability & human aspects
- Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Syogo Hayashi, Tatsuya Mori

, Koushik Sen:
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection. 687-701 - Tobias Urban

, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
"Your hashed IP address: Ubuntu.": perspectives on transparency tools for online advertising. 702-717 - Martin Ukrop

, Lydia Kraus, Vashek Matyas, Heider Ahmad Mutleq Wahsheh:
Will you trust this TLS certificate?: perceptions of people working in IT. 718-731 - Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama:

I know what you did last login: inconsistent messages tell existence of a target's account to insiders. 732-746
OS security
- Andrea Mambretti

, Matthias Neugschwandtner, Alessandro Sorniotti, Engin Kirda, William K. Robertson, Anil Kurmus:
Speculator: a tool to analyze speculative execution attacks and mitigations. 747-761 - Ronny Chevalier

, David Plaquin, Chris I. Dalton, Guillaume Hiet:
Survivor: a fine-grained intrusion response and recovery approach for commodity operating systems. 762-775
Side channels
- David Slater, Scott Novotney, Jessica Moore

, Sean Morgan, Scott Tenaglia:
Robust keystroke transcription from the acoustic side-channel. 776-787 - Ferdinand Brasser, Srdjan Capkun, Alexandra Dmitrienko, Tommaso Frassetto, Kari Kostiainen, Ahmad-Reza Sadeghi:

DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization. 788-800

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














