Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2236–2250https://doi.org/10.1145/3658644.3670392With ChatGPT under the spotlight, utilizing large language models (LLMs) to assist academic writing has drawn a significant amount of debate in the community. In this paper, we aim to present a comprehensive study of the detectability of ChatGPT-...
- research-articleDecember 2024
A Comprehensive Analysis of Security Vulnerabilities and Attacks in Satellite Modems
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3287–3301https://doi.org/10.1145/3658644.3670390Satellite modems are critical components in satellite communication networks. Especially, they determine the entire communication regime in traditional systems where the satellites only act as transparent relays. However, unlike satellites that are ...
The Invisible Polyjuice Potion: an Effective Physical Adversarial Attack against Face Recognition
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3346–3360https://doi.org/10.1145/3658644.3670382Face recognition systems have been targeted by recent physical adversarial machine learning attacks, which attach or project visible patterns on adversaries' faces to trick backend FR models. While these attacks have demonstrated effectiveness in the ...
- proceedingDecember 2024
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security
It is with great enthusiasm that we, on behalf of the Organizing Committee, invite you to join us for the 31st ACM SIGSAC Conference on Computer and Communications Security (CCS), a premier security and privacy conference where researchers, practitioners,...
- ArticleSeptember 2024
Companion Apps or Backdoors? On the Security of Automotive Companion Apps
Computer Security – ESORICS 2024Pages 24–44https://doi.org/10.1007/978-3-031-70896-1_2AbstractAutomotive companion apps are mobile apps designed to remotely connect with cars to provide features such as diagnostics, logging, navigation, and safety alerts. Specifically, onboard diagnostics (OBD) based mobile applications directly ...
-
- ArticleSeptember 2024
The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking
Computer Security – ESORICS 2024Pages 311–331https://doi.org/10.1007/978-3-031-70879-4_16AbstractGenerative AI models can produce high-quality images based on text prompts. The generated images often appear indistinguishable from images generated by conventional optical photography devices or created by human artists (i.e., real images). ...
- research-articleJanuary 2025
You can obfuscate, but you cannot hide: CrossPoint attacks against network topology obfuscation
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 321, Pages 5735–5750Link-flooding attacks (LFAs) may disrupt Internet connections in targeted areas by flooding specific links. One effective mitigation strategy against these attacks is network topology obfuscation (NTO), which aims to obscure the network map and conceal ...
- research-articleJanuary 2025
d-DSE: distinct dynamic searchable encryption resisting volume leakage in encrypted databases
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 144, Pages 2563–2580Dynamic Searchable Encryption (DSE) has emerged as a solution to efficiently handle and protect large-scale data storage in encrypted databases (EDBs). Volume leakage poses a significant threat' as it enables adversaries to reconstruct search queries and ...
- research-articleJanuary 2025
FakeBehalf: imperceptible email spoofing attacks against the delegation mechanism in email systems
- Jinrui Ma,
- Lutong Chen,
- Kaiping Xue,
- Bo Luo,
- Xuanbo Huang,
- Mingrui Ai,
- Huanjie Zhang,
- David S.L. Wei,
- Yan Zhuang
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 70, Pages 1243–1260Email has become an essential service for global communication. In email protocols, a Delegation Mechanism allows emails to be sent by other entities on behalf of the email author. Specifically, the Sender field indicates the agent for email delivery (...
- research-articleJune 2024
No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS
ICPC '24: Proceedings of the 32nd IEEE/ACM International Conference on Program ComprehensionPages 358–369https://doi.org/10.1145/3643916.3644419The rise of malicious mobile applications poses a significant threat to users and app stores. While iOS apps have generally been considered more secure due to strict review processes and limited distribution avenues, developers have found ways to evade ...
- posterNovember 2023
Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3558–3560https://doi.org/10.1145/3576915.3624378Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective. In particular, we created a dataset of 3,...
- short-paperMay 2023
Poster Abstract: SmartAppZoo: a Repository of SmartThings Apps for IoT Benchmarking
IoTDI '23: Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and ImplementationPages 448–449https://doi.org/10.1145/3576842.3589162A well-organized SmartApps dataset provides a valuable resource for researchers to evaluate their work on smart home automation systems. The IoTBench dataset created by Celik et al. 1 is a significant contribution to the IoT research community [1]. ...
- research-articleMarch 2023
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 2Pages 1104–1123https://doi.org/10.1109/TDSC.2022.3149544With the development of computing and communication technologies, an extremely large amount of data has been collected, stored, utilized, and shared, while new security and privacy challenges arise. Existing access control mechanisms provided by big data ...
- research-articleNovember 2022
LoneNeuron: A Highly-Effective Feature-Domain Neural Trojan Using Invisible and Polymorphic Watermarks
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 2129–2143https://doi.org/10.1145/3548606.3560678The wide adoption of deep neural networks (DNNs) in real-world applications raises increasing security concerns. Neural Trojans embedded in pre-trained neural networks are a harmful attack against the DNN model supply chain. They generate false outputs ...
- research-articleNovember 2022
Blacktooth: Breaking through the Defense of Bluetooth in Silence
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 55–68https://doi.org/10.1145/3548606.3560668Bluetooth is a short-range wireless communication technology widely used by billions of personal computing, IoT, peripheral, and wearable devices. Bluetooth devices exchange commands and data, such as keyboard/mouse inputs, audio, and files, through a ...
- ArticleSeptember 2022
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
Computer Security – ESORICS 2022Pages 589–609https://doi.org/10.1007/978-3-031-17146-8_29AbstractThe growth of IoT apps poses increasing concerns about sensitive data leaks. While privacy policies are required to describe how IoT apps use private user data (i.e., data practice), problems such as missing, inaccurate, and inconsistent policies ...
- ArticleSeptember 2022
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems
Computer Security – ESORICS 2022Pages 343–363https://doi.org/10.1007/978-3-031-17143-7_17AbstractWith the growing popularity of artificial intelligence (AI) and machine learning (ML), a wide spectrum of attacks against deep learning (DL) models have been proposed in the literature. Both the evasion attacks and the poisoning attacks attempt to ...
- research-articleApril 2022
Semantic clustering based deduction learning for image recognition and classification
Pattern Recognition (PATT), Volume 124, Issue Chttps://doi.org/10.1016/j.patcog.2021.108440Highlights- The paper proposes a high-level semantic mapping within semantic space to increase the semantic deduction ability of the deep neural network.
The paper proposes a semantic clustering based deduction learning by mimicking the learning and thinking process of human brains. Human beings can make judgments based on experience and cognition, and as a result, no one would ...
- research-articleJanuary 2022
Analysis of English Writing Text Features Based on Random Forest and Logistic Regression Classification Algorithm
Mobile Information Systems (MOBIS), Volume 2022https://doi.org/10.1155/2022/6306025The characteristics of English writing text in natural scenes are characterized by low character detection rate, difficulty in small character detection, and various character detection categories. In order to improve the classification effect of English-...
- research-articleDecember 2021
Two Souls in an Adversarial Image: Towards Universal Adversarial Example Detection using Multi-view Inconsistency
ACSAC '21: Proceedings of the 37th Annual Computer Security Applications ConferencePages 31–44https://doi.org/10.1145/3485832.3485904In the evasion attacks against deep neural networks (DNN), the attacker generates adversarial instances that are visually indistinguishable from benign samples and sends them to the target DNN to trigger misclassifications. In this paper, we propose a ...