Journal: ACM Trans. Inf. Syst. Secur.

Volume 24, Issue 4

0 -- 0Philipp Markert, Daniel V. Bailey, Maximilian Golla, Markus Dürmuth, Adam J. Aviv. On the Security of Smartphone Unlock PINs
0 -- 0Sana Maqsood, Sonia Chiasson. Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens
0 -- 0Luca Demetrio, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, Fabio Roli. Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
0 -- 0Simon Birnbach, Richard Baker 0008, Simon Eberz, Ivan Martinovic. #PrettyFlyForAWiFi: Real-world Detection of Privacy Invasion Attacks by Drones
0 -- 0Abbas Acar, Shoukat Ali, Koray Karabina, Cengiz Kaygusuz, Hidayet Aksu, Kemal Akkaya, Arif Selcuk Uluagac. A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA
0 -- 0Mohammed Abuhamad, Tamer AbuHmed, David A. Mohaisen, DaeHun Nyang. Large-scale and Robust Code Authorship Identification with Deep Feature Learning
0 -- 0Sarah C. Helble, Ian D. Kretz, Peter A. Loscocco, John D. Ramsdell, Paul D. Rowe, Perry Alexander. Flexible Mechanisms for Remote Attestation
0 -- 0Aleieldin Salem, Sebastian Banescu, Alexander Pretschner. Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection
0 -- 0Long Cheng 0005, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao. Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches

Volume 24, Issue 3

0 -- 0Amit Seal Ami, Kaushal Kafle, Kevin Moran, Adwait Nadkarni, Denys Poshyvanyk. Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques
0 -- 0Stanislaw Jarecki, Mohammed Jubur, Hugo Krawczyk, Nitesh Saxena, Maliheh Shirvanian. Two-factor Password-authenticated Key Exchange with End-to-end Security
0 -- 0Louma Chaddad, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi. Optimal Packet Camouflage Against Traffic Analysis
0 -- 0René Mayrhofer, Jeffrey Vander Stoep, Chad Brubaker, Nick Kralevich. The Android Platform Security Model
0 -- 0Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello. Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage
0 -- 0Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar. Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis
0 -- 0Musard Balliu, Massimo Merro, Michele Pasqua, Mikhail Shcherbakov. Friendly Fire: Cross-app Interactions in IoT Platforms
0 -- 0Meisam Mohammady, Momen Oqaily, Lingyu Wang 0001, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi. A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization
0 -- 0Rafael Veras, Christopher Collins 0001, Julie Thorpe. A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords

Volume 24, Issue 2

0 -- 0Marcus Botacin, Hojjat Aghakhani, Stefano Ortolani, Christopher Kruegel, Giovanni Vigna, Daniela A. S. de Oliveira, Paulo Lício de Geus, André Grégio. One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware
0 -- 0Vincenzo Arceri, Isabella Mastroeni. Evil Eval
0 -- 0Charlie Jacomme, Steve Kremer. An Extensive Formal Analysis of Multi-factor Authentication Protocols
0 -- 0Shameek Bhattacharjee, Venkata Praveen Kumar Madhavarapu, Simone Silvestri, Sajal K. Das 0001. Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure
0 -- 0Isabel Wagner, Iryna Yevseyeva. Designing Strong Privacy Metrics Suites Using Evolutionary Optimization
0 -- 0Michalis Papaevripides, Elias Athanasopoulos. Exploiting Mixed Binaries
0 -- 0Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Aidmar Wainakh, Max Mühlhäuser, Simin Nadjm-Tehrani. On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection

Volume 24, Issue 1

0 -- 0Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar, Francesca Trevisan, Haiyue Yuan. Exploiting Behavioral Side Channels in Observation Resilient Cognitive Authentication Schemes
0 -- 0Chuadhry Mujeeb Ahmed, Aditya P. Mathur, Martín Ochoa. NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints
0 -- 0Zhisheng Hu, Minghui Zhu, Peng Liu 0005. Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP
0 -- 0Nikolaos Alexopoulos, Sheikh Mahbub Habib, Steffen Schulz 0001, Max Mühlhäuser. The Tip of the Iceberg: On the Merits of Finding Security Bugs
0 -- 0Benjamin Shreeve, Joseph Hallett, Matthew Edwards 0001, Pauline Anthonysamy, Sylvain Frey, Awais Rashid. "So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making
0 -- 0Alexandre Meylan, Mauro Cherubini, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin. A Study on the Use of Checksums for Integrity Verification of Web Downloads