Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2022
RAPID: Real-Time Alert Investigation with Context-aware Prioritization for Efficient Threat Discovery
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 827–840https://doi.org/10.1145/3564625.3567997Alerts reported by intrusion detection systems (IDSes) are often the starting points for attack campaign discovery and response procedures. However, the sheer number of alerts compared to the number of real attacks, along with the complexity of alert ...
Designing a Provenance Analysis for SGX Enclaves
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 102–116https://doi.org/10.1145/3564625.3567994SGX enclaves are trusted user-space memory regions that ensure isolation from the host, which is considered malicious. However, enclaves may suffer from vulnerabilities that allow adversaries to compromise their trustworthiness. Consequently, the SGX ...
ENIDrift: A Fast and Adaptive Ensemble System for Network Intrusion Detection under Real-world Drift
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 785–798https://doi.org/10.1145/3564625.3567992Machine Learning (ML) techniques have been widely applied for network intrusion detection. However, existing ML-based network intrusion detection systems (NIDSs) suffer from fundamental limitations that hinder them from being deployed in the real ...
FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput
- Muhammad Adil Inam,
- Akul Goyal,
- Jason Liu,
- Jaron Mink,
- Noor Michael,
- Sneha Gaur,
- Adam Bates,
- Wajih Ul Hassan
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 813–826https://doi.org/10.1145/3564625.3567990System logs are invaluable to forensic audits, but grow so large that in practice fine-grained logs are quickly discarded – if captured at all – preventing the real-world use of the provenance-based investigation techniques that have gained popularity ...
CryptoGo: Automatic Detection of Go Cryptographic API Misuses
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 318–331https://doi.org/10.1145/3564625.3567989Cryptographic algorithms act as essential ingredients of all secure systems. However, the expected security guarantee from cryptographic algorithms often falls short in practice due to various cryptographic application programming interfaces (API) ...
DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 227–239https://doi.org/10.1145/3564625.3567982Macro malware has always been a severe threat to cyber security although the Microsoft Office suite applies the default macro-disabling policy. Among the defense solutions at different stages of the attack chain, document analysis is more targeted ...
SpacePhish: The Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 171–185https://doi.org/10.1145/3564625.3567980Existing literature on adversarial Machine Learning (ML) focuses either on showing attacks that break every ML model, or defenses that withstand most attacks. Unfortunately, little consideration is given to the actual cost of the attack or the defense. ...
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 841–853https://doi.org/10.1145/3564625.3567979The arm race between hardware security engineers and side-channel researchers has become more competitive with more sophisticated attacks and defenses in the last decade. While modern hardware features improve the system performance significantly, they ...
- research-articleDecember 2022
MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 769–784https://doi.org/10.1145/3564625.3567972Anomaly detection for discrete event logs can provide critical information for building secure and reliable systems in various application domains, such as large scale data centers, autonomous driving, and intrusion detection. However, the task is very ...
- research-articleDecember 2022
DRAGON: Deep Reinforcement Learning for Autonomous Grid Operation and Attack Detection
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 13–27https://doi.org/10.1145/3564625.3567969As power grids have evolved, IT has become integral to maintaining reliable power. While providing operators improved situational awareness and the ability to rapidly respond to dynamic situations, IT concurrently increases the cyberattack threat ...
Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 267–278https://doi.org/10.1145/3564625.3564661Machine learning (ML) based Malware classification provides excellent performance and has been deployed in various real-world applications. Training for malware classification often relies on crowdsourced threat feeds, which exposes a natural attack ...
- research-articleDecember 2022
On the Implications of Spoofing and Jamming Aviation Datalink Applications
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 548–560https://doi.org/10.1145/3564625.3564651Aviation datalink applications such as controller-pilot datalink communications (CPDLC) and automatic dependent surveillance-contract (ADS-C) were designed to supplement existing communication systems to accommodate increasing air traffic. These ...
StateDiver: Testing Deep Packet Inspection Systems with State-Discrepancy Guidance
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 756–768https://doi.org/10.1145/3564625.3564650Deep Packet Inspection (DPI) systems are essential for securing modern networks (e.g., blocking or logging abnormal network connections). However, DPI systems are known to be vulnerable in their implementations, which could be exploited for evasion ...
- research-articleDecember 2022
A Recent Year On the Internet: Measuring and Understanding the Threats to Everyday Internet Devices
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 251–266https://doi.org/10.1145/3564625.3564649An effective way to improve resilience to cyber attacks is to measure and understand the adversary’s capabilities. Gaining insights into the threats we are exposed to helps us build better defenses, share findings with practitioners, and identify the ...
- research-articleDecember 2022
View from Above: Exploring the Malware Ecosystem from the Upper DNS Hierarchy
- Aaron Faulkenberry,
- Athanasios Avgetidis,
- Zane Ma,
- Omar Alrawi,
- Charles Lever,
- Panagiotis Kintis,
- Fabian Monrose,
- Angelos D. Keromytis,
- Manos Antonakakis
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 240–250https://doi.org/10.1145/3564625.3564646This work explores authoritative DNS (AuthDNS) as a new measurement perspective for studying the large-scale epidemiology of the malware ecosystem—when and where infections occur, and what infrastructure spreads and controls malware. Utilizing an ...
Stepping out of the MUD: Contextual threat information for IoT devices with manufacturer-provided behavior profiles
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 467–480https://doi.org/10.1145/3564625.3564644Besides coming with unprecedented benefits, the Internet of Things (IoT) suffers deficits in security measures, leading to attacks increasing every year. In particular, network environments such as smart homes lack managed security capabilities to ...
- research-articleDecember 2022
Ripples in the Pond: Transmitting Information through Grid Frequency Modulation
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 455–466https://doi.org/10.1145/3564625.3564640The growing heterogenous ecosystem of networked consumer devices such as smart meters or IoT-connected appliances such as air conditioners is difficult to secure, unlike the utility side of the grid which can be defended effectively through rigorous IT ...
Assessing Model-free Anomaly Detection in Industrial Control Systems Against Generic Concealment Attacks
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 412–426https://doi.org/10.1145/3564625.3564633In recent years, a number of model-free process-based anomaly detection schemes for Industrial Control Systems (ICS) were proposed. Model-free anomaly detectors are trained directly from process data and do not require process knowledge. They are ...