- Rodolfo Vieira Valentim, Idilio Drago, Marco Mellia, Federico Cerutti:
X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting. ACM Trans. Priv. Secur. 27(3): 21:1-21:27 (2024) - Li Wang, Xiangtao Meng, Dan Li, Xuhong Zhang, Shouling Ji, Shanqing Guo:
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models. ACM Trans. Priv. Secur. 27(1): 10:1-10:34 (2024) - 2023
- Sona Alex, Dhanaraj K. J., Deepthi P. P.:
Energy Efficient and Secure Neural Network-based Disease Detection Framework for Mobile Healthcare Network. ACM Trans. Priv. Secur. 26(3): 29:1-29:27 (2023) - Norah Mohsen T. Alotaibi, John Williamson, Mohamed Khamis:
ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards. ACM Trans. Priv. Secur. 26(2): 12:1-12:24 (2023) - Ranya Aloufi, Hamed Haddadi, David Boyle:
Paralinguistic Privacy Protection at the Edge. ACM Trans. Priv. Secur. 26(2): 19:1-19:27 (2023) - Ahmed Amro, Vasileios Gkioulos, Sokratis K. Katsikas:
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework. ACM Trans. Priv. Secur. 26(2): 22:1-22:33 (2023) - Ayoosh Bansal, Anant Kandikuppa, Monowar Hasan, Chien-Ying Chen, Adam Bates, Sibin Mohan:
System Auditing for Real-Time Systems. ACM Trans. Priv. Secur. 26(4): 50:1-50:37 (2023) - Manuel Barbosa, Gilles Barthe, Benjamin Grégoire, Adrien Koutsos, Pierre-Yves Strub:
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability. ACM Trans. Priv. Secur. 26(3): 41:1-41:34 (2023) - David Barrera, Christopher Bellman, Paul C. van Oorschot:
Security Best Practices: A Critical Analysis Using IoT as a Case Study. ACM Trans. Priv. Secur. 26(2): 13:1-13:30 (2023) - Farzana Ahamed Bhuiyan, Akond Rahman:
Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects. ACM Trans. Priv. Secur. 26(2): 17:1-17:24 (2023) - Tom Bolton, Tooska Dargahi, Sana Belguith, Carsten Maple:
PrivExtractor: Toward Redressing the Imbalance of Understanding between Virtual Assistant Users and Vendors. ACM Trans. Priv. Secur. 26(3): 31:1-31:29 (2023) - Patricia Arias Cabarcos, Matin Fallahi, Thilo Habrich, Karen Schulze, Christian Becker, Thorsten Strufe:
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices. ACM Trans. Priv. Secur. 26(3): 26:1-26:36 (2023) - Jinfu Chen, Luo Song, Saihua Cai, Haodi Xie, Shang Yin, Bilal Ahmad:
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism. ACM Trans. Priv. Secur. 26(4): 44:1-44:21 (2023) - Euijin Choo, Mohamed Nabeel, Mashael AlSabah, Issa Khalil, Ting Yu, Wei Wang:
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference. ACM Trans. Priv. Secur. 26(1): 9:1-9:32 (2023) - Savino Dambra, Leyla Bilge, Davide Balzarotti:
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments. ACM Trans. Priv. Secur. 26(2): 16:1-16:30 (2023) - Lesly-Ann Daniel, Sébastien Bardin, Tamara Rezk:
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure. ACM Trans. Priv. Secur. 26(2): 11:1-11:42 (2023) - Viktor Engström, Pontus Johnson, Robert Lagerström, Erik Ringdahl, Max Wällstedt:
Automated Security Assessments of Amazon Web Services Environments. ACM Trans. Priv. Secur. 26(2): 20:1-20:31 (2023) - Maksim Ekin Eren, Manish Bhattarai, Robert J. Joyce, Edward Raff, Charles Nicholas, Boian S. Alexandrov:
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection. ACM Trans. Priv. Secur. 26(4): 48:1-48:27 (2023) - Gonzalo Gil, Aitor Arnaiz, Marivi Higuero, Francisco Javier Díez:
Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions. ACM Trans. Priv. Secur. 26(1): 10:1-10:28 (2023) - Xueluan Gong, Yanjiao Chen, Wenbin Yang, Huayang Huang, Qian Wang:
B3: Backdoor Attacks against Black-box Machine Learning Models. ACM Trans. Priv. Secur. 26(4): 43:1-43:24 (2023) - Chun Guo, Xiao Wang, Xiang Xie, Yu Yu:
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets. ACM Trans. Priv. Secur. 26(3): 37:1-37:38 (2023) - Sohail Habib, Hassan Khan, Andrew Hamilton-Wright, Urs Hengartner:
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks. ACM Trans. Priv. Secur. 26(2): 21:1-21:30 (2023) - Christoph Hagen, Christian Weinert, Christoph Sendner, Alexandra Dmitrienko, Thomas Schneider:
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations. ACM Trans. Priv. Secur. 26(1): 2:1-2:44 (2023) - Andreas V. Hess, Sebastian Alexander Mödersheim, Achim D. Brucker:
Stateful Protocol Composition in Isabelle/HOL. ACM Trans. Priv. Secur. 26(3): 25:1-25:36 (2023) - Jian Hou, Jing Wang, Mingyue Zhang, Zhi Jin, Chunlin Wei, Zuohua Ding:
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure. ACM Trans. Priv. Secur. 26(3): 34:1-34:22 (2023) - Seoyeon Hwang, Ercan Ozturk, Gene Tsudik:
Balancing Security and Privacy in Genomic Range Queries. ACM Trans. Priv. Secur. 26(3): 23:1-23:28 (2023) - Shaharyar Khan, Ilya Kabanov, Yunke Hua, Stuart E. Madnick:
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned. ACM Trans. Priv. Secur. 26(1): 3:1-3:29 (2023) - Dohyun Kim, ManGi Cho, Hocheol Shin, Jaehoon Kim, Juhwan Noh, Yongdae Kim:
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting. ACM Trans. Priv. Secur. 26(4): 46:1-46:30 (2023) - Isaiah J. King, H. Howie Huang:
Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction. ACM Trans. Priv. Secur. 26(3): 35:1-35:36 (2023) - Nada Lachtar, Duha Ibdah, Hamza Khan, Anys Bacha:
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware. ACM Trans. Priv. Secur. 26(3): 27:1-27:30 (2023)