Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 28, Issue 1February 2025Current IssueIssue-in-Progress
Reflects downloads up to 25 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Defending Against Deep Learning-Based Traffic Fingerprinting Attacks With Adversarial Examples
Article No.: 1, Pages 1–23https://doi.org/10.1145/3698591

In an increasingly digital and interconnected world, online anonymity and privacy are paramount issues for Internet users. To address this, tools like The Onion Router (Tor) offer anonymous and private communication by routing traffic through multiple ...

research-article
ArmSpy++: Enhanced PIN Inference through Video-based Fine-grained Arm Posture Analysis
Article No.: 2, Pages 1–26https://doi.org/10.1145/3696418

As one of the most common ways for user authentication, Personal Identification Number (PIN), due to its simplicity and convenience, has suffered from plenty of side-channel attacks, which pose a severe threat to people’s privacy and property. The success ...

research-article
Open Access
Category-Based Administrative Access Control Policies
Article No.: 3, Pages 1–35https://doi.org/10.1145/3698199

As systems evolve, security administrators need to review and update access control policies. Such updates must be carefully controlled due to the risks associated with erroneous or malicious policy changes. We propose a category-based access control (...

research-article
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process
Article No.: 4, Pages 1–36https://doi.org/10.1145/3699716

FAPI 2.0 is a suite of Web protocols developed by the OpenID Foundation’s FAPI Working Group (FAPI WG) for third-party data sharing and digital identity in high-risk environments. Even though the specifications are not completely finished, several ...

research-article
Bi-objective Optimization in Role Mining
Article No.: 5, Pages 1–22https://doi.org/10.1145/3697833

Role mining is a technique that is used to derive a role-based authorization policy from an existing policy. Given a set of users U, a set of permissions P, and a user–permission authorization relation \(\mathit {UPA} \subseteq U \times P\), a role ...

research-article
Open Access
Cyber Threat Intelligence meets the Analytic Tradecraft
Article No.: 6, Pages 1–37https://doi.org/10.1145/3701299

The volumes and sophistication of cyber threats in today’s cyber threat landscape have risen to levels where automated quantitative tools for Cyber Threat Intelligence (CTI) have become an indispensable part in the cyber defense arsenals. The AI and cyber ...

research-article
DP-Poison: Poisoning Federated Learning under the Cover of Differential Privacy
Article No.: 7, Pages 1–28https://doi.org/10.1145/3702325

Federated learning (FL) enables resource-constrained node devices to learn a shared model while keeping the training data local. Since recent research has demonstrated multiple privacy leakage attacks in FL, e.g., gradient inference attacks and membership ...

research-article
Open Access
Backdoor Attacks in Peer-to-Peer Federated Learning
Article No.: 8, Pages 1–28https://doi.org/10.1145/3691633

Most machine learning applications rely on centralized learning processes, opening up the risk of exposure of their training datasets. While federated learning (FL) mitigates to some extent these privacy risks, it relies on a trusted aggregation server ...

research-article
The Effect of Domain Terms on Password Security
Article No.: 9, Pages 1–29https://doi.org/10.1145/3703350

The predominant authentication method still relies on usernames and passwords. To enhance memorability, domain terms may have been opted to include as part of passwords. However, there is little analysis of the extent to which such practice affects ...

research-article
Open Access
Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems
Article No.: 10, Pages 1–27https://doi.org/10.1145/3701725

The attacker can generate adversarial examples (AEs) to stealthily mislead automatic speech recognition (ASR) models, raising significant concerns about the security of intelligent voice control (IVC) devices. Existing adversarial attacks mainly generate ...

research-article
Open Access
AutoFR: Automated Filter Rule Generation for Adblocking
Article No.: 11, Pages 1–36https://doi.org/10.1145/3703836

Adblocking relies on filter lists, which are manually curated and maintained by a community of filter list authors. Filter list curation is a laborious process that does not scale well to a large number of sites or over time. In this article, we introduce ...

research-article
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation
Article No.: 12, Pages 1–36https://doi.org/10.1145/3705004

Secure multi-party computation has seen substantial performance improvements in recent years and is being increasingly used in commercial products. While a significant amount of work was dedicated to improving its efficiency under standard security models,...

Subjects

Comments