The Wayback Machine - https://webcf.waybackmachine.org/web/20211023145508/https://dl.acm.org/toc/tops/2021/24/4
Volume 24, Issue 4November 2021Current Issue
Bibliometrics
research-article
Large-scale and Robust Code Authorship Identification with Deep Feature Learning
November 2021, Article No.: 23, pp 1–35https://doi.org/10.1145/3461666

Successful software authorship de-anonymization has both software forensics applications and privacy implications. However, the process requires an efficient extraction of authorship attributes. The extraction of such attributes is very challenging, due ...

research-article
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA
November 2021, Article No.: 24, pp 1–28https://doi.org/10.1145/3464690

As many vulnerabilities of one-time authentication systems have already been uncovered, there is a growing need and trend to adopt continuous authentication systems. Biometrics provides an excellent means for periodic verification of the authenticated ...

research-article
Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection
November 2021, Article No.: 25, pp 1–35https://doi.org/10.1145/3465361

The malware analysis and detection research community relies on the online platform VirusTotal to label Android apps based on the scan results of around 60 antiviral scanners. Unfortunately, there are no standards on how to best interpret the scan ...

research-article
Open Access
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches
November 2021, Article No.: 26, pp 1–36https://doi.org/10.1145/3462699

Data-oriented attacks manipulate non-control data to alter a program’s benign behavior without violating its control-flow integrity. It has been shown that such attacks can cause significant damage even in the presence of control-flow defense ...

research-article
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
November 2021, Article No.: 27, pp 1–31https://doi.org/10.1145/3473039

Recent work has shown that adversarial Windows malware samples—referred to as adversarial EXEmples in this article—can bypass machine learning-based detection relying on static code analysis by perturbing relatively few input bytes. To preserve ...

research-article
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens
November 2021, Article No.: 28, pp 1–37https://doi.org/10.1145/3469821

Tweens are avid users of digital media, which exposes them to various online threats. Teachers are primarily expected to teach children safe online behaviours, despite not necessarily having the required training or classroom tools to support this ...

research-article
Open Access
Flexible Mechanisms for Remote Attestation
November 2021, Article No.: 29, pp 1–23https://doi.org/10.1145/3470535

Remote attestation consists of generating evidence of a system’s integrity via measurements and reporting the evidence to a remote party for appraisal in a form that can be trusted. The parties that exchange information must agree on formats and ...

research-article
Open Access
On the Security of Smartphone Unlock PINs
November 2021, Article No.: 30, pp 1–36https://doi.org/10.1145/3473040

In this article, we provide the first comprehensive study of user-chosen four- and six-digit PINs (n=1705) collected on smartphones with participants being explicitly primed for device unlocking. We find that against a throttled attacker (with 10, 30, ...

research-article
#PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones
November 2021, Article No.: 31, pp 1–34https://doi.org/10.1145/3473672

Drones are becoming increasingly popular for hobbyists and recreational use. But with this surge in popularity comes increased risk to privacy as the technology makes it easy to spy on people in otherwise-private environments, such as an individual’s ...

Subjects

AuthenticationSystems securityMachine learningMalware and its mitigationMobile and wireless securityPrivacy-preserving protocolsSocial aspects of security and privacySoftware and application securityTrusted computingUsability in security and privacy

Comments

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!