Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 5, Issue 4December 2024
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
EISSN:2576-5337
Reflects downloads up to 23 Feb 2025Bibliometrics
Skip Table Of Content Section
research-article
Open Access
VERICONDOR: End-to-End Verifiable Condorcet Voting with support for Strict Preference and Indifference
Article No.: 35, Pages 1–30https://doi.org/10.1145/3676267

Condorcet voting is widely regarded as one of the most important voting systems in social choice theory. However, it has seen little adoption in practice, due to complex tallying and the need to break ties when there is a Condorcet cycle. Several online ...

research-article
Open Access
Investigating Threats Posed by SMS Origin Spoofing to IoT Devices
Article No.: 36, Pages 1–12https://doi.org/10.1145/3696011

The short message service (SMS) is a service for exchanging texts via mobile networks that has been developed not only as a means of text communication between subscribers but also as a means to remotely manage Internet of Things (IoT) devices. However, ...

research-article
Open Access
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
Article No.: 37, Pages 1–19https://doi.org/10.1145/3696427

Understanding the modus operandi of adversaries aids organizations to employ efficient defensive strategies and share intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports. A ...

research-article
Open Access
From Embodied Abuse to Mass Disruption: Generative, Inter-Reality Threats in Social, Mixed-Reality Platforms
Article No.: 38, Pages 1–36https://doi.org/10.1145/3696015

Extended Reality (XR) platforms can expose users to novel attacks including embodied abuse and/or AI attacks-at-scale. The expanded attack surfaces of XR technologies may expose users of shared online platforms to psychological/social and physiological ...

research-article
Open Access
Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends
Article No.: 39, Pages 1–37https://doi.org/10.1145/3696014

Advanced persistent threat (APT) attacks present a significant challenge for any organization, as they are difficult to detect due to their elusive nature and characteristics. In this article, we conduct a comprehensive literature review to investigate ...

research-article
Open Access
Social Media Authentication and Combating Deepfakes Using Semi-Fragile Invisible Image Watermarking
Article No.: 40, Pages 1–30https://doi.org/10.1145/3700146

With the significant advances in deep generative models for image and video synthesis, Deepfakes and manipulated media have raised severe societal concerns. Conventional machine learning classifiers for deepfake detection often fail to cope with evolving ...

research-article
Open Access
Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments
Article No.: 41, Pages 1–33https://doi.org/10.1145/3700147

In real life, distinct runs of the same artifact lead to the exploration of different paths, due to either system’s natural randomness or malicious constructions. These variations might completely change execution outcomes (extreme case). Thus, to analyze ...

Subjects

Comments