Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- abstractNovember 2023
SCORED '23: Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3671–3672https://doi.org/10.1145/3576915.3624031Recent attacks on the software supply chain have shed light on the fragility and importance of ensuring the security and integrity of this vital ecosystem. Addressing the technical and social challenges to building trustworthy software for deployment in ...
- abstractNovember 2023
ASHES '23: Workshop on Attacks and Solutions in Hardware Security
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3664–3665https://doi.org/10.1145/3576915.3624028The workshop on "Attacks and Solutions in HardwarE Security (ASHES)" welcomes any theoretical and practical works on hardware security, including attacks, solutions, countermeasures, proofs, classification, formalization, and implementations. Besides ...
- abstractNovember 2023
CCSW '23: Cloud Computing Security Workshop
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3657–3658https://doi.org/10.1145/3576915.3624024Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting substantial fractions of corporate and ...
- abstractNovember 2023
WAHC '23: 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3651–3652https://doi.org/10.1145/3576915.3624021The 11th Workshop on Encrypted Computing and Applied Homomorphic Cryptography is held in Copenhagen, Denmark on Novem- ber 26, 2023, co-located with the ACM Conference on Computer and Communications Security (CCS). The workshop aims to bring together ...
- research-articleNovember 2023
FPT: A Fixed-Point Accelerator for Torus Fully Homomorphic Encryption
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 741–755https://doi.org/10.1145/3576915.3623159Fully Homomorphic Encryption (FHE) is a technique that allows computation on encrypted data. It has the potential to drastically change privacy considerations in the cloud, but high computational and memory overheads are preventing its broad adoption. ...
- research-articleNovember 2023
Cryptographically Enforced Memory Safety
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 889–903https://doi.org/10.1145/3576915.3623138C/C++ memory safety issues, such as out-of-bounds errors, are still prevalent in today's applications. The presence of a single exploitable software bug allows an adversary to gain unauthorized memory access and ultimately compromise the entire system. ...
- research-articleNovember 2023
Watch This Space: Securing Satellite Communication through Resilient Transmitter Fingerprinting
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 608–621https://doi.org/10.1145/3576915.3623135Due to an increase in the availability of cheap off-the-shelf radio hardware, signal spoofing and replay attacks on satellite ground systems have become more accessible than ever. This is particularly a problem for legacy systems, many of which do not ...
- research-articleNovember 2023
ParBFT: Faster Asynchronous BFT Consensus with a Parallel Optimistic Path
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 504–518https://doi.org/10.1145/3576915.3623101To reduce latency and communication overhead of asynchronous Byzantine Fault Tolerance (BFT) consensus, an optimistic path is often added, with Ditto and BDT as state-of-the-art representatives. These protocols first attempt to run an optimistic path ...
- research-articleNovember 2023
Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 1123–1137https://doi.org/10.1145/3576915.3623069Distributed Multi-exit Neural Networks (MeNNs) use partitioning and early exits to reduce the cost of neural network inference on low-power sensing systems. Existing MeNNs exhibit high inference accuracy using policies that select when to exit based on ...
- research-articleNovember 2023
TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 1317–1331https://doi.org/10.1145/3576915.3616661In autonomous driving, millimeter wave (mmWave) radar has been widely adopted for object detection because of its robustness and reliability under various weather and lighting conditions. For radar object detection, deep neural networks (DNNs) are ...
- research-articleNovember 2023
FIN: Practical Signature-Free Asynchronous Common Subset in Constant Time
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 815–829https://doi.org/10.1145/3576915.3616633Asynchronous common subset (ACS) is a powerful paradigm enabling applications such as Byzantine fault-tolerance (BFT) and multi-party computation (MPC). The most efficient ACS framework in the information-theoretic setting is due to Ben-Or, Kelmer, and ...