Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2020
Workflow Integration Alleviates Identity and Access Management in Serverless Computing
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 496–509https://doi.org/10.1145/3427228.3427665As serverless computing continues to revolutionize the design and deployment of web services, it has become an increasingly attractive target to attackers. These adversaries are developing novel tactics for circumventing the ephemeral nature of ...
- research-articleDecember 2020
DPIFuzz: A Differential Fuzzing Framework to Detect DPI Elusion Strategies for QUIC
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 332–344https://doi.org/10.1145/3427228.3427662QUIC is an emerging transport protocol that has the potential to replace TCP in the near future. As such, QUIC will become an important target for Deep Packet Inspection (DPI). Reliable DPI is essential, e.g., for corporate environments, to monitor ...
- research-articleDecember 2020
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems
- Alessandro Erba,
- Riccardo Taormina,
- Stefano Galelli,
- Marcello Pogliani,
- Michele Carminati,
- Stefano Zanero,
- Nils Ole Tippenhauer
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 480–495https://doi.org/10.1145/3427228.3427660Recently, reconstruction-based anomaly detection was proposed as an effective technique to detect attacks in dynamic industrial control networks. Unlike classical network anomaly detectors that observe the network traffic, reconstruction-based ...
- ArticleDecember 2020
Up2Dep: Android Tool Support to Fix Insecure Code Dependencies
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 263–276https://doi.org/10.1145/3427228.3427658Third-party libraries, especially outdated versions, can introduce and multiply security & privacy related issues to Android applications. While prior work has shown the need for tool support for developers to avoid libraries with security problems, no ...
- research-articleDecember 2020
HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 454–465https://doi.org/10.1145/3427228.3427645Use-after-free (UAF) vulnerabilities, in which dangling pointers remain after memory is released, remain a persistent problem for applications written in C and C++. In order to protect legacy code, prior work has attempted to track pointer propagation ...
-
- research-articleDecember 2020
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 582–596https://doi.org/10.1145/3427228.3427640With the development of computing and communication technologies, extremely large amount of data has been collected, stored, utilized, and shared, while new security and privacy challenges arise. Existing platforms do not provide flexible and practical ...
- research-articleDecember 2020
Guide Me to Exploit: Assisted ROP Exploit Generation for ActionScript Virtual Machine
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 386–400https://doi.org/10.1145/3427228.3427568Automatic exploit generation (AEG) is the challenge of determining the exploitability of a given vulnerability by exploring all possible execution paths that can result from triggering the vulnerability. Since typical AEG implementations might need to ...
- research-articleDecember 2020
FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 627–642https://doi.org/10.1145/3427228.3427297Browser fingerprinting consists into collecting attributes from a web browser. Hundreds of attributes have been discovered through the years. Each one of them provides a way to distinguish browsers, but also comes with a usability cost (e.g., ...
- research-articleDecember 2020
Efficient Oblivious Substring Search via Architectural Support
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 526–541https://doi.org/10.1145/3427228.3427296Performing private and efficient searches over encrypted outsourced data enables a flourishing growth of cloud based services managing sensitive data as the genomic, medical and financial ones. We tackle the problem of building an efficient indexing ...
- research-articleDecember 2020
Dragonblood is Still Leaking: Practical Cache-based Side-Channel in the Wild
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 291–303https://doi.org/10.1145/3427228.3427295Recently, the Dragonblood attacks have attracted new interests on the security of WPA-3 implementation and in particular on the Dragonfly code deployed on many open-source libraries. One attack concerns the protection of users passwords during ...
- research-articleDecember 2020
FirmAE: Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 733–745https://doi.org/10.1145/3427228.3427294One approach to assess the security of embedded IoT devices is applying dynamic analysis such as fuzz testing to their firmware in scale. To this end, existing approaches aim to provide an emulation environment that mimics the behavior of real hardware/...
- research-articleDecember 2020
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 428–441https://doi.org/10.1145/3427228.3427293Many IoT devices are geographically distributed without human administrators, which are maintained by a remote server to enforce security updates, ideally through machine-to-machine (M2M) management. However, malware often terminates the remote control ...
- research-articleDecember 2020
Practical Fine-Grained Binary Code Randomization†
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 401–414https://doi.org/10.1145/3427228.3427292Despite its effectiveness against code reuse attacks, fine-grained code randomization has not been deployed widely due to compatibility as well as performance concerns. Previous techniques often needed source code access to achieve good performance, ...
- research-articleDecember 2020
Set It and Forget It! Turnkey ECC for Instant Integration
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 760–771https://doi.org/10.1145/3427228.3427291Historically, Elliptic Curve Cryptography (ECC) is an active field of applied cryptography where recent focus is on high speed, constant time, and formally verified implementations. While there are a handful of outliers where all these concepts join ...
- research-articleDecember 2020
Security Study of Service Worker Cross-Site Scripting.
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 643–654https://doi.org/10.1145/3427228.3427290Nowadays, modern websites are utilizing service workers to provide users with app-like functionalities such as offline mode and push notifications. To handle such features, the service worker is equipped with special privileges including HTTP traffic ...
- research-articleDecember 2020
Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 870–883https://doi.org/10.1145/3427228.3427289In this paper, we propose Voicefox1, a defense against the threat of automated voice synthesis attacks in machine-based and human-based speaker verification applications. Voicefox is based on a hitherto undiscovered potential of speech-to-text ...
- research-articleDecember 2020
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 69–83https://doi.org/10.1145/3427228.3427287For parents of young children and adolescents, the digital age has introduced many new challenges, including excessive screen time, inappropriate online content, cyber predators, and cyberbullying. To address these challenges, many parents rely on ...
- research-articleDecember 2020
CAPS: Smoothly Transitioning to a More Resilient Web PKI
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 655–668https://doi.org/10.1145/3427228.3427284Many recent proposals to increase the resilience of the Web PKI against misbehaving CAs face significant obstacles to deployment. These hurdles include (1) the requirement of drastic changes to the existing PKI players and their interactions, (2) the ...
- research-articleDecember 2020
Towards Realistic Membership Inferences: The Case of Survey Data
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 116–128https://doi.org/10.1145/3427228.3427282We consider the problem of membership inference attacks on aggregate survey data through the use of several real-world datasets and a published study as a model for the survey. We apply membership inference attacks from the literature, and discover that ...
- research-articleDecember 2020
VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 884–896https://doi.org/10.1145/3427228.3427281The voice user interface (VUI) has been progressively used to authenticate users to numerous devices and applications. Such massive adoption of VUIs in IoT environments like individual homes and businesses arises extensive privacy and security ...