Journal: ACM Trans. Inf. Syst. Secur.

Volume 23, Issue 4

0 -- 0Michalis Diamantaris, Francesco Marcantoni, Sotiris Ioannidis, Jason Polakis. The Seven Deadly Sins of the HTML5 WebAPI: A Large-scale Study on the Risks of Mobile Sensor-based Attacks
0 -- 0Bert Abrath, Bart Coppens, Jens Van den Broeck, Brecht Wyseur, Alessandro Cabutto, Paolo Falcarin, Bjorn De Sutter. Code Renewability for Native Software Protection
0 -- 0Sagar Samtani, Hongyi Zhu, Hsinchun Chen. Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF)
0 -- 0Syed Zain R. Rizvi, Philip W. L. Fong. Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model
0 -- 0Geumhwan Cho, Jun Ho Huh, Soolin Kim, Junsung Cho, Heesung Park, Yenah Lee, Konstantin Beznosov, Hyoungshick Kim. On the Security and Usability Implications of Providing Multiple Authentication Choices on Smartphones: The More, the Better?
0 -- 0Mohamed Nabeel, Issa M. Khalil, Bei Guan, Ting Yu. Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference

Volume 23, Issue 3

0 -- 0Sanaz Taheri-Boshrooyeh, Alptekin Küpçü, Öznur Özkasap. Privado: Privacy-preserving Group-based Advertising Using Multiple Independent Social Network Providers
0 -- 0Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò 0001. Formal Analysis of Mobile Multi-Factor Authentication with Single Sign-On Login
0 -- 0Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen. Key Negotiation Downgrade Attacks on Bluetooth and Bluetooth Low Energy
0 -- 0Darren Hurley-Smith, Julio Hernandez-Castro. Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators
0 -- 0Hocheol Shin, Juhwan Noh, Dohyun Kim, Yongdae Kim. The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure

Volume 23, Issue 2

0 -- 0Fatima M. Anwar, Mani B. Srivastava. A Case for Feedforward Control with Feedback Trim to Mitigate Time Transfer Attacks
0 -- 0James Parker, Michael Hicks 0001, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton. Build It, Break It, Fix It: Contesting Secure Development
0 -- 0Moni Naor, Lior Rotem, Gil Segev 0001. The Security of Lazy Users in Out-of-Band Authentication
0 -- 0Muhammad Ikram, Rahat Masood, Gareth Tyson, Mohamed Ali Kâafar, Noha Loizon, Roya Ensafi. Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading
0 -- 0Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu 0003, XiaoJiang Chen, Jungong Han, Zheng Wang 0001. Using Generative Adversarial Networks to Break and Protect Text Captchas

Volume 23, Issue 1

0 -- 0Ruggero Lanotte, Massimo Merro, Andrei Munteanu, Luca Viganò 0001. A Formal Approach to Physics-based Attacks in Cyber-physical Systems
0 -- 0Farzaneh Karegar, John Sören Pettersson, Simone Fischer-Hübner. The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention
0 -- 0Amith K. Belman, Vir V. Phoha. Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification
0 -- 0Fang-Jing Wu, Tie Luo. CrowdPrivacy: Publish More Useful Data with Less Privacy Exposure in Crowdsourced Location-Based Services
0 -- 0Thang Hoang, Attila A. Yavuz, Jorge Guajardo. A Multi-server ORAM Framework with Constant Client Bandwidth Blowup
0 -- 0Hassan Khan, Urs Hengartner, Daniel Vogel 0001. Mimicry Attacks on Smartphone Keystroke Authentication