Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2021
FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 1861–1883https://doi.org/10.1145/3460120.3485365In the area of Internet of Things (IoT), voice assistants have become an important interface to operate smart speakers, smartphones, and even automobiles. To save power and protect user privacy, voice assistants send commands to the cloud only if a ...
- posterNovember 2021
De-identification of Unstructured Clinical Texts from Sequence to Sequence Perspective
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2438–2440https://doi.org/10.1145/3460120.3485354In this work, we propose a novel problem formulation for de-identification of unstructured clinical text. We formulate the de-identification problem as a sequence to sequence learning problem instead of a token classification problem. Our approach is ...
- demonstrationNovember 2021
DEMO: A Secure Voting System for Score Based Elections
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2399–2401https://doi.org/10.1145/3460120.3485343Dery et al. recently proposed a secure voting protocol for score-based elections, where independent talliers perform the tallying procedure. The protocol offers perfect ballot secrecy: it outputs the identity of the winner(s), but keeps all other ...
- research-articleNovember 2021
Simple, Fast Malicious Multiparty Private Set Intersection
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 1151–1165https://doi.org/10.1145/3460120.3484772We address the problem of multiparty private set intersection against a malicious adversary. First, we show that when one can assume no collusion amongst corrupted parties then there exists an extremely efficient protocol given only symmetric-key ...
- research-articleNovember 2021
The Invisible Shadow: How Security Cameras Leak Private Activities
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2780–2793https://doi.org/10.1145/3460120.3484741This paper presents a new privacy threat, the Invisible Infrared Shadow Attack (IRSA), which leverages the inconspicuous infrared (IR) light emitted by indoor security cameras, to reveal in-home human activities behind opaque curtains. The key ...
- research-articleNovember 2021
Locally Private Graph Neural Networks
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2130–2145https://doi.org/10.1145/3460120.3484565Graph Neural Networks (GNNs) have demonstrated superior performance in learning node representations for various graph inference tasks. However, learning over graph data can raise privacy concerns when nodes represent people or human-related variables ...
- research-articleNovember 2021
Secure Multi-party Computation of Differentially Private Heavy Hitters
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2361–2377https://doi.org/10.1145/3460120.3484557Private learning of top-k, i.e., the k most frequent values also called heavy hitters, is a common industry scenario: Companies want to privately learn, e.g., frequently typed new words to improve suggestions on mobile devices, often used browser ...
- research-articleNovember 2021
Verifying Table-Based Elections
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2632–2652https://doi.org/10.1145/3460120.3484555Verifiability is a key requirement for electronic voting. However, the use of cryptographic techniques to achieve it usually requires specialist knowledge to understand; hence voters cannot easily assess the validity of such arguments themselves. To ...
- research-articleNovember 2021
Consistency Analysis of Data-Usage Purposes in Mobile Apps
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2824–2843https://doi.org/10.1145/3460120.3484536While privacy laws and regulations require apps and services to disclose the purposes of their data collection to the users (i.e., why do they collect my data?), the data usage in an app's actual behavior does not always comply with the purposes stated ...
- research-articleNovember 2021
Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 825–844https://doi.org/10.1145/3460120.3484533It is known that deep neural networks, trained for the classification of non-sensitive target attributes, can reveal sensitive attributes of their input data through internal representations extracted by the classifier. We take a step forward and show ...