- Ruggero Lanotte, Massimo Merro, Andrei Munteanu:
Industrial Control Systems Security via Runtime Enforcement. ACM Trans. Priv. Secur. 26(1): 4:1-4:41 (2023) - James Lembke, Srivatsan Ravi, Pierre-Louis Roman, Patrick Eugster:
Secure and Reliable Network Updates. ACM Trans. Priv. Secur. 26(1): 8:1-8:41 (2023) - Litao Li, Steven H. H. Ding, Yuan Tian, Benjamin C. M. Fung, Philippe Charland, Weihan Ou, Leo Song, Congwei Chen:
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution. ACM Trans. Priv. Secur. 26(3): 28:1-28:25 (2023) - Yang Lu, Zhengxin Yu, Neeraj Suri:
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph. ACM Trans. Priv. Secur. 26(3): 33:1-33:39 (2023) - Ranwa Al Mallah, Talal Halabi, Bilal Farooq:
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems. ACM Trans. Priv. Secur. 26(3): 40:1-40:27 (2023) - Hazel Murray, David Malone:
Costs and Benefits of Authentication Advice. ACM Trans. Priv. Secur. 26(3): 30:1-30:35 (2023) - Rodrigo Otoni, Matteo Marescotti, Leonardo Alt, Patrick Eugster, Antti E. J. Hyvärinen, Natasha Sharygina:
A Solicitous Approach to Smart Contract Verification. ACM Trans. Priv. Secur. 26(2): 15:1-15:28 (2023) - Tommaso Paladini, Francesco Monti, Mario Polino, Michele Carminati, Stefano Zanero:
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies. ACM Trans. Priv. Secur. 26(4): 45:1-45:35 (2023) - Kopo Marvin Ramokapane, Jose M. Such, Awais Rashid:
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study. ACM Trans. Priv. Secur. 26(1): 5:1-5:34 (2023) - Md Sajidul Islam Sajid, Jinpeng Wei, Ehab Al-Shaer, Qi Duan, Basel Abdeen, Latifur Khan:
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception. ACM Trans. Priv. Secur. 26(4): 51:1-51:36 (2023) - Shahnewaz Karim Sakib, George T. Amariucai, Yong Guan:
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism. ACM Trans. Priv. Secur. 26(4): 47:1-47:31 (2023) - Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg:
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs. ACM Trans. Priv. Secur. 26(3): 39:1-39:46 (2023) - Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, Michael Backes, Ben Stock, Robert Künnemann:
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. ACM Trans. Priv. Secur. 26(2): 18:1-18:36 (2023) - Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis:
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks. ACM Trans. Priv. Secur. 26(3): 38:1-38:30 (2023) - Rajagopal Venkatesaramani, Zhiyu Wan, Bradley A. Malin, Yevgeniy Vorobeychik:
Defending Against Membership Inference Attacks on Beacon Services. ACM Trans. Priv. Secur. 26(3): 42:1-42:32 (2023) - Anushka Vidanage, Peter Christen, Thilina Ranbaduge, Rainer Schnell:
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage. ACM Trans. Priv. Secur. 26(3): 36:1-36:31 (2023) - Isabel Wagner:
Privacy Policies across the Ages: Content of Privacy Policies 1996-2021. ACM Trans. Priv. Secur. 26(3): 32:1-32:32 (2023) - Huanran Wang, Wu Yang, Wei Wang, Dapeng Man, Jiguang Lv:
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks. ACM Trans. Priv. Secur. 26(1): 7:1-7:32 (2023) - Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, Luigi Lo Iacono:
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. ACM Trans. Priv. Secur. 26(1): 6:1-6:36 (2023) - Xueru Zhang, Mohammad Mahdi Khalili, Mingyan Liu:
Differentially Private Real-Time Release of Sequential Data. ACM Trans. Priv. Secur. 26(1): 1:1-1:29 (2023) - Chenhan Zhang, Shiyao Zhang, James J. Q. Yu, Shui Yu:
SAM: Query-efficient Adversarial Attacks against Graph Neural Networks. ACM Trans. Priv. Secur. 26(4): 49:1-49:19 (2023) - Sijie Zhuo, Robert Biddle, Yun Sing Koh, Danielle M. Lottridge, Giovanni Russello:
SoK: Human-centered Phishing Susceptibility. ACM Trans. Priv. Secur. 26(3): 24:1-24:27 (2023) - 2022
- Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald:
Privacy-Preserving Decision Trees Training and Prediction. ACM Trans. Priv. Secur. 25(3): 24:1-24:30 (2022) - Handan Kilinç Alper, Alptekin Küpçü:
Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation. ACM Trans. Priv. Secur. 25(1): 3:1-3:34 (2022) - Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi:
Information Leakage Games: Exploring Information as a Utility Function. ACM Trans. Priv. Secur. 25(3): 20:1-20:36 (2022) - Sibghat Ullah Bazai, Julian Jang-Jaccard, Hooman Alavizadeh:
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark. ACM Trans. Priv. Secur. 25(1): 5:1-5:25 (2022) - Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise:
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud. ACM Trans. Priv. Secur. 25(1): 2:1-2:37 (2022) - William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele:
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. ACM Trans. Priv. Secur. 25(4): 33:1-33:35 (2022) - Marcus Botacin, Francis B. Moreira, Philippe O. A. Navaux, André Grégio, Marco A. Z. Alves:
Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints. ACM Trans. Priv. Secur. 25(2): 9:1-9:34 (2022) - Lennart Braun, Daniel Demmler, Thomas Schneider, Oleksandr Tkachenko:
MOTION - A Framework for Mixed-Protocol Multi-Party Computation. ACM Trans. Priv. Secur. 25(2): 8:1-8:35 (2022)