- Julian de Gortari Briseno, Akash Deep Singh, Mani Srivastava:
InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks. ACM Trans. Priv. Secur. 25(2): 15:1-15:26 (2022) - Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen, Xiaofeng Wang, Shanqing Guo:
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems. ACM Trans. Priv. Secur. 25(3): 17:1-17:31 (2022) - Alesia Chernikova, Alina Oprea:
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments. ACM Trans. Priv. Secur. 25(4): 34:1-34:34 (2022) - Chris Clifton, Eric J. Hanson, Keith Merrill, Shawn Merrill:
Differentially Private k-Nearest Neighbor Missing Data Imputation. ACM Trans. Priv. Secur. 25(3): 16:1-16:23 (2022) - Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Valued Authorization Policy Existence Problem: Theory and Experiments. ACM Trans. Priv. Secur. 25(4): 28:1-28:32 (2022) - Jinhua Cui, Shweta Shinde, Satyaki Sen, Prateek Saxena, Pinghai Yuan:
Dynamic Binary Translation for SGX Enclaves. ACM Trans. Priv. Secur. 25(4): 32:1-32:40 (2022) - Nadia Daoudi, Kevin Allix, Tegawendé François D. Assise Bissyandé, Jacques Klein:
A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores. ACM Trans. Priv. Secur. 25(2): 13:1-13:28 (2022) - Alexandre Debant, Stéphanie Delaune, Cyrille Wiedling:
So Near and Yet So Far - Symbolic Verification of Distance-Bounding Protocols. ACM Trans. Priv. Secur. 25(2): 11:1-11:39 (2022) - Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr:
Accountable Private Set Cardinality for Distributed Measurement. ACM Trans. Priv. Secur. 25(4): 25:1-25:35 (2022) - Andreas Fischer, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, Eric Bodden:
Computation on Encrypted Data Using Dataflow Authentication. ACM Trans. Priv. Secur. 25(3): 21:1-21:36 (2022) - Lihi Idan, Joan Feigenbaum:
PRShare: A Framework for Privacy-preserving, Interorganizational Data Sharing. ACM Trans. Priv. Secur. 25(4): 29:1-29:38 (2022) - Padmavathi Iyer, Amirreza Masoumzadeh:
Learning Relationship-Based Access Control Policies from Black-Box Systems. ACM Trans. Priv. Secur. 25(3): 22:1-22:36 (2022) - Max Landauer, Florian Skopik, Markus Wurzenberger, Andreas Rauber:
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation. ACM Trans. Priv. Secur. 25(3): 18:1-18:36 (2022) - Sarah M. Lehman, Abrar S. Alrumayh, Kunal Kolhe, Haibin Ling, Chiu C. Tan:
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications. ACM Trans. Priv. Secur. 25(4): 26:1-26:35 (2022) - Cláudio Martins, Ibéria Medeiros:
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy. ACM Trans. Priv. Secur. 25(3): 19:1-19:39 (2022) - Eyal Nussbaum, Michael Segal:
Privacy Analysis of Query-Set-Size Control. ACM Trans. Priv. Secur. 25(4): 31:1-31:19 (2022) - Andrea Oliveri, Davide Balzarotti:
In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics. ACM Trans. Priv. Secur. 25(4): 27:1-27:32 (2022) - Pascal Oser, Rens W. van der Heijden, Stefan Lüders, Frank Kargl:
Risk Prediction of IoT Devices Based on Vulnerability Analysis. ACM Trans. Priv. Secur. 25(2): 14:1-14:36 (2022) - Fabio Pagani, Davide Balzarotti:
AutoProfile: Towards Automated Profile Generation for Memory Analysis. ACM Trans. Priv. Secur. 25(1): 6:1-6:26 (2022) - Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta:
Secure Selections on Encrypted Multi-writer Streams. ACM Trans. Priv. Secur. 25(1): 7:1-7:33 (2022) - Yaguan Qian, Yankai Guo, Qiqi Shao, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling, Chunming Wu:
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks. ACM Trans. Priv. Secur. 25(3): 23:1-23:24 (2022) - Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch:
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. ACM Trans. Priv. Secur. 25(1): 4:1-4:28 (2022) - Savvas Savvides, Seema Kumar, Julian James Stephen, Patrick Eugster:
C3PO: Cloud-based Confidentiality-preserving Continuous Query Processing. ACM Trans. Priv. Secur. 25(1): 1:1-1:36 (2022) - Milica Stojmenovic, Eric Spero, Milos Stojmenovic, Robert Biddle:
What is Beautiful is Secure. ACM Trans. Priv. Secur. 25(4): 30:1-30:30 (2022) - Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa:
Constrained Proximity Attacks on Mobile Targets. ACM Trans. Priv. Secur. 25(2): 10:1-10:29 (2022) - Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss:
Improving Unlinkability of Attribute-based Authentication through Game Theory. ACM Trans. Priv. Secur. 25(2): 12:1-12:36 (2022) - 2021
- Mohammed Abuhamad, Tamer AbuHmed, David Mohaisen, Daehun Nyang:
Large-scale and Robust Code Authorship Identification with Deep Feature Learning. ACM Trans. Priv. Secur. 24(4): 23:1-23:35 (2021) - Abbas Acar, Shoukat Ali, Koray Karabina, Cengiz Kaygusuz, Hidayet Aksu, Kemal Akkaya, Arif Selcuk Uluagac:
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA. ACM Trans. Priv. Secur. 24(4): 24:1-24:28 (2021) - Amit Seal Ami, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk:
Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques. ACM Trans. Priv. Secur. 24(3): 15:1-15:37 (2021) - Vincenzo Arceri, Isabella Mastroeni:
Analyzing Dynamic Code: A Sound Abstract Interpreter for Evil Eval. ACM Trans. Priv. Secur. 24(2): 10:1-10:38 (2021)