Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Governing Open Vocabulary Data Leaks Using an Edge LLM through Programming by Example
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 4Article No.: 179, Pages 1–31https://doi.org/10.1145/3699760A major concern with integrating large language model (LLM) services (e.g., ChatGPT) into workplaces is that employees may inadvertently leak sensitive information through their prompts. Since user prompts can involve arbitrary vocabularies, conventional ...
- research-articleDecember 2023
AutoCC: Automatic Discovery of Covert Channels in Time-Shared Hardware
- Marcelo Orenes-Vera,
- Hyunsung Yun,
- Nils Wistoff,
- Gernot Heiser,
- Luca Benini,
- David Wentzlaff,
- Margaret Martonosi
MICRO '23: Proceedings of the 56th Annual IEEE/ACM International Symposium on MicroarchitecturePages 871–885https://doi.org/10.1145/3613424.3614254Covert channels enable information leakage between security domains that should be isolated by observing execution differences in shared hardware. These channels can appear in any stateful shared resource, including caches, predictors, and accelerators. ...
- research-articleNovember 2020
C‐NSA: a hybrid approach based on artificial immune algorithms for anomaly detection in web traffic
IET Information Security (ISE2), Volume 14, Issue 6Pages 683–693https://doi.org/10.1049/iet-ifs.2019.0567Security vulnerabilities in web traffic can directly lead to data leak. Preventing these data leaks to a large extent has become an important problem to solve. Besides, the accurate detection and prevention of abnormal changes in web traffic is of great ...
- research-articleAugust 2017
Insider Misuse Attribution using Biometrics
ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and SecurityArticle No.: 42, Pages 1–7https://doi.org/10.1145/3098954.3103160Insider misuse has become a major risk for many organizations. One of the most common forms of misuses is data leakage. Such threats have turned into a real challenge to overcome and mitigate. Whilst prevention is important, incidents will inevitably ...
- ArticleMay 2015
Effective Real-Time Android Application Auditing
SP '15: Proceedings of the 2015 IEEE Symposium on Security and PrivacyPages 899–914https://doi.org/10.1109/SP.2015.60Mobile applications can access both sensitive personal data and the network, giving rise to threats of data leaks. App auditing is a fundamental program analysis task to reveal such leaks. Currently, static analysis is the de facto technique which ...
- research-articleOctober 2014
Designing and developing a free Data Loss Prevention system
PCI '14: Proceedings of the 18th Panhellenic Conference on InformaticsPages 1–5https://doi.org/10.1145/2645791.2645833This paper presents a free data loss prevention solution that is based on two widely known and publicly available and free data loss prevention software tools, namely MyDLP and OpenDLP. A system architecture is proposed, which has been designed to ...