ACSAC 2023

Web Security

  1. PhishReplicant: A Language Model-based Approach to Detect Generated Squatting Domain Names.

PhishReplicant:一种基于语言模型的检测生成的领域名抢注的方法。

  1. From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!

从附件到SEO:点击这里了解更多关于点击诱饵PDF的信息!

  1. Scamdog Millionaire: Detecting E-commerce Scams in the Wild.

骗子百万富翁:在野外检测电商骗局。

  1. When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the Wild.

当推送变得紧迫:野外Web推送实施的实证分析。

Application and Software Security

  1. Triereme: Speeding up hybrid fuzzing through efficient query scheduling.

Triereme:通过高效查询调度加速混合模糊测试。

  1. On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI.

论npm和PyPI中跨语言检测恶意包的可行性。

  1. Artemis: Defanging Software Supply Chain Attacks in Multi-repository Update Systems.

Artemis:在多仓库更新系统中防御软件供应链攻击。

  1. ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications.

ANDetect:一个用于Android应用的第三方广告网络库检测框架。

Network and Enterprise Security

  1. Delegation of TLS Authentication to CDNs using Revocable Delegated Credentials.

使用可撤销的委托凭证将TLS认证委托给CDN。

  1. Domain and Website Attribution beyond WHOIS.

超越WHOIS的域名和网站归属。

  1. FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks.

FS3:物联网网络中高效入侵检测的少样本和自监督框架。

  1. An Empirical Analysis of Enterprise-Wide Mandatory Password Updates.

企业范围强制密码更新的实证分析。

IoT and Cyber-Physical Systems Security

  1. SealClub: Computer-aided Paper Document Authentication.

SealClub:计算机辅助的纸质文件认证。

  1. Lightweight Privacy-Preserving Proximity Discovery for Remotely-Controlled Drones.

轻量级隐私保护的远程控制无人机邻近发现。

  1. Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats.

解放物联网安全:评估最佳实践在防御威胁中的有效性。

  1. A Tagging Solution to Discover IoT Devices in Apartments.

在公寓中发现物联网设备的标签解决方案。

Authentication and Access Control

  1. Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance.

Hades:具有完全责任性和细粒度伪造抵抗的实用去中心化身份。

  1. Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch.

Log2Policy:从头开始为微服务生成细粒度访问控制规则的方法。

  1. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms.

皇后卫队:分布式数据分析平台中细粒度访问控制的安全执行。

  1. OAuth 2.0 Redirect URI Validation Falls Short, Literally.

OAuth 2.0重定向URI验证不足,字面意义上的。

Connected Vehicles and Industrial Control Systems Security

  1. Secure and Lightweight Over-the-Air Software Update Distribution for Connected Vehicles.

连接车辆的安全且轻量级的空中软件更新分发。

  1. Secure and Lightweight ECU Attestations for Resilient Over-the-Air Updates in Connected Vehicles.

连接车辆中的安全且轻量级ECU认证以实现弹性空中更新。

  1. Detection of Anomalies in Electric Vehicle Charging Sessions.

电动车充电会话中异常检测。

  1. SePanner: Analyzing Semantics of Controller Variables in Industrial Control Systems based on Network Traffic.

SePanner:基于网络流量分析工业控制系统中控制器变量的语义。

Security and Machine Learning I

  1. FraudLens: Graph Structural Learning for Bitcoin Illicit Activity Identification.

FraudLens:用于比特币非法活动识别的图结构学习。

  1. Poisoning Network Flow Classifiers.

污染网络流分类器。

  1. TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection.

TGC:以太坊钓鱼诈骗检测的交易图对比网络。

Security and Machine Learning II

  1. Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions.

大型语言模型能提供安全和隐私建议吗?测量LLMs反驳误解的能力。

  1. DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection.

DefWeb:用智能噪声注入防御基于缓存的网站指纹攻击来保护用户隐私。

  1. Protecting Your Voice from Speech Synthesis Attacks.

保护你的声音免受语音合成攻击。

Wireless and Cyberphysical-Systems Security

  1. Continuous Authentication Using Human-Induced Electric Potential.

使用人体诱发的电势进行连续认证。

  1. Cross Body Signal Pairing (CBSP): A Key Generation Protocol for Pairing Wearable Devices with Cardiac and Respiratory Sensors.

跨身体信号配对(CBSP):一个用于将可穿戴设备与心脏和呼吸传感器配对的密钥生成协议。

  1. The Day-After-Tomorrow: On the Performance of Radio Fingerprinting over Time.

后天:关于随时间变化的无线电指纹的性能。

  1. Enhanced In-air Signature Verification via Hand Skeleton Tracking to Defeat Robot-level Replays.

通过手骨骼跟踪进行空中签名验证以击败机器人级重放。

Machine Learning Security I

  1. Secure Softmax/Sigmoid for Machine-learning Computation.

用于机器学习计算的安全Softmax/Sigmoid。

  1. Link Membership Inference Attacks against Unsupervised Graph Representation Learning.

针对无监督图表示学习的链接成员推断攻击。

  1. FLARE: Fingerprinting Deep Reinforcement Learning Agents using Universal Adversarial Masks.

FLARE:使用通用对抗性掩模对深度强化学习代理进行指纹识别。

Machine Learning Security II

  1. On the Detection of Image-Scaling Attacks in Machine Learning.

关于机器学习中图像缩放攻击的检测。

  1. A First Look at Toxicity Injection Attacks on Open-domain Chatbots.

首次探讨对开放领域聊天机器人的毒性注入攻击。

  1. DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.

DeepTaster:基于对抗性扰动的指纹技术识别深度神经网络中专有数据集的使用。

Malware

  1. Prioritizing Remediation of Enterprise Hosts by Malware Execution Risk.

通过恶意软件执行风险优先修复企业主机。

  1. Global Analysis with Aggregation-based Beaconing Detection across Large Campus Networks.

在大型校园网络中使用基于聚合的信标检测进行全球分析。

  1. PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior.

基于Shapley先验的优先级体验的强化学习逃避恶意软件检测。

  1. Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons.

二进制观光:通过兴趣点信标加速逆向工程。

Trustworthy Machine Learning

  1. DeepContract: Controllable Authorization of Deep Learning Models.

DeepContract:深度学习模型的可控授权。

  1. Secure MLaaS with Temper: Trusted and Efficient Model Partitioning and Enclave Reuse.

Temper的安全MLaaS:可信且高效的模型分区和飞地重用。

  1. ABFL: A Blockchain-enabled Robust Framework for Secure and Trustworthy Federated Learning.

ABFL:一个区块链启用的安全可信的联合学习稳健框架。

  1. FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks.

FLEDGE:基于账本的对推理和后门攻击具有弹性的联合学习。

OS and Software Security

  1. DOPE: DOmain Protection Enforcement with PKS.

DOPE:使用PKS的域保护执行。

  1. RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis.

RandCompile:从Linux内核中移除取证工具以对抗其分析。

  1. Attack of the Knights: Non Uniform Cache Side Channel Attack.

骑士的攻击:非统一缓存侧信道攻击。

  1. PAVUDI: Patch-based Vulnerability Discovery using Machine Learning.

PAVUDI:使用机器学习的基于补丁的漏洞发现。

Trustworthy Systems

  1. Remote Attestation with Constrained Disclosure.

限制性披露的远程认证。

  1. Remote attestation of confidential VMs using ephemeral vTPMs.

使用短暂的vTPM远程认证机密VM。

  1. No Forking Way: Detecting Cloning Attacks on Intel SGX Applications.

不允许分叉:检测对Intel SGX应用的克隆攻击。

  1. Detecting Weak Keys in Manufacturing Certificates: A Case Study.

检测制造证书中的弱密钥:一个案例研究。

Privacy

  1. Differentially Private Resource Allocation.

差分隐私资源分配。

  1. Mitigating Membership Inference Attacks via Weighted Smoothing.

通过加权平滑缓解成员推断攻击。

  1. Mostree: Malicious Secure Private Decision Tree Evaluation with Sublinear Communication.

Mostree:具有亚线性通信的恶意安全私有决策树评估。

相关推荐
此星光明7 个月前
GEE数据集——汉森全球森林变化数据集Hansen Global Forest Change v1.11 (2000-2023)
云计算·数据集·gee·2023·森林·全球·损失
岁月标记8 个月前
CCS 2023
2023·ccs
岁月标记8 个月前
S&P 2023
2023·sp
ladymorgana8 个月前
JetBrains全家桶激活,分享 CLion 2024 激活的方案
jetbrains·2023·clion·2024·激活方法·3.2·3.4
ladymorgana8 个月前
2024 PhpStorm激活,分享几个PhpStorm激活的方案
phpstorm·2023·2024·激活方法·3.2·3.4
ladymorgana8 个月前
2024 RubyMine 激活,分享几个RubyMine 激活的方案
2023·rubymine·2024·激活方法·3.2·3.4
webmote10 个月前
2023年总结我所经历的技术大变革
chatgpt·webrtc·2023·总结·技术变革
TechMerger10 个月前
毕业 10 年,也成了 Android 10 年老开发|紧张充实的 2023
android·kotlin·鸿蒙·2023·总结
深竹清风1 年前
2023我的编程之旅-地质人的山和水
2023·总结