Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 27, Issue 3August 2024Current Issue
Editor:
  • Michael Waidner
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:2471-2566
EISSN:2471-2574
Reflects downloads up to 01 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Open Access
X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting
Article No.: 21, Pages 1–27https://doi.org/10.1145/3663569

Sound-squatting is a squatting technique that exploits similarities in word pronunciation to trick users into accessing malicious resources. It is an understudied threat that has gained traction with the popularity of smart speakers and audio-only content,...

research-article
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model
Article No.: 22, Pages 1–36https://doi.org/10.1145/3671147

Recently, several researchers motivated the need to integrate Zero Trust (ZT) principles when designing and implementing authentication and authorization systems for IoT. An integrated Zero Trust IoT system comprises the network infrastructure (physical ...

research-article
Open Access
Security Analysis of the Consumer Remote SIM Provisioning Protocol
Article No.: 23, Pages 1–36https://doi.org/10.1145/3663761

Remote SIM provisioning (RSP) for consumer devices is the protocol specified by the GSM Association for downloading SIM profiles into a secure element in a mobile device. The process is commonly known as eSIM, and it is expected to replace removable SIM ...

research-article
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models
Article No.: 24, Pages 1–26https://doi.org/10.1145/3678007

Pre-trained language models (PLMs) aim to assist computers in various domains to provide natural and efficient language interaction and text processing capabilities. However, recent studies have shown that PLMs are highly vulnerable to malicious backdoor ...

research-article
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises
Article No.: 25, Pages 1–31https://doi.org/10.1145/3677017

We introduce a novel privacy-preserving biometric authentication scheme based on irises that allows a user to enroll once at a trusted biometric certification authority (BCA) and authenticate to online service providers (SPs) multiple times without ...

research-article
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning
Article No.: 26, Pages 1–37https://doi.org/10.1145/3669901

Malware attacks are posing a significant threat to national security, cooperate network, and public endpoint security. Identifying the Advanced Persistent Threat (APT) groups behind the attacks and grouping their activities into attack campaigns help ...

Subjects

Comments