Journal: ACM Trans. Inf. Syst. Secur.

Volume 25, Issue 4

0 -- 0Jinhua Cui, Shweta Shinde, Satyaki Sen, Prateek Saxena, Pinghai Yuan. Dynamic Binary Translation for SGX Enclaves
0 -- 0William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson 0002, Engin Kirda, Manuel Egele. HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing
0 -- 0Alesia Chernikova, Alina Oprea. FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments
0 -- 0Andrea Oliveri, Davide Balzarotti. In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics
0 -- 0Milica Stojmenovic, Eric Spero, Milos Stojmenovic, Robert Biddle. What is Beautiful is Secure
0 -- 0Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar. Valued Authorization Policy Existence Problem: Theory and Experiments
0 -- 0Ellis Fenske, Akshaya Mani, Aaron Johnson 0001, Micah Sherr. Accountable Private Set Cardinality for Distributed Measurement
0 -- 0Lihi Idan, Joan Feigenbaum. PRShare: A Framework for Privacy-preserving, Interorganizational Data Sharing
0 -- 0Sarah M. Lehman, Abrar S. Alrumayh, Kunal Kolhe, Haibin Ling, Chiu C. Tan 0001. Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications
0 -- 0Eyal Nussbaum, Michael Segal 0001. Privacy Analysis of Query-Set-Size Control

Volume 25, Issue 3

0 -- 0Chris Clifton, Eric J. Hanson, Keith Merrill, Shawn Merrill. k-Nearest Neighbor Missing Data Imputation
0 -- 0Yaguan Qian, Yankai Guo, Qiqi Shao, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling 0001, Chunming Wu 0001. EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks
0 -- 0Cláudio Martins, Ibéria Medeiros. Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy
0 -- 0Adi Akavia, Max Leibovich, Yehezkel S. Resheff, Roey Ron, Moni Shahar, Margarita Vald. Privacy-Preserving Decision Trees Training and Prediction
0 -- 0Padmavathi Iyer, Amirreza Masoumzadeh 0001. Learning Relationship-Based Access Control Policies from Black-Box Systems
0 -- 0Yuxuan Chen, Jiangshan Zhang, Xuejing Yuan, Shengzhi Zhang, Kai Chen 0012, Xiaofeng Wang 0006, Shanqing Guo. SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems
0 -- 0Andreas Fischer 0011, Benny Fuhry, Jörn Kußmaul, Jonas Janneck, Florian Kerschbaum, Eric Bodden. Computation on Encrypted Data Using Dataflow Authentication
0 -- 0Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Yusuke Kawamoto 0001, Catuscia Palamidessi. Information Leakage Games: Exploring Information as a Utility Function
0 -- 0Max Landauer, Florian Skopik, Markus Wurzenberger, Andreas Rauber. Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation

Volume 25, Issue 2

0 -- 0Alexandre Debant, Stéphanie Delaune, Cyrille Wiedling. So Near and Yet So Far - Symbolic Verification of Distance-Bounding Protocols
0 -- 0Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Maksym Slavnenko, Robin Doss. Improving Unlinkability of Attribute-based Authentication through Game Theory
0 -- 0Marcus Botacin, Francis B. Moreira 0001, Philippe O. A. Navaux, André Grégio, Marco A. Z. Alves. Terminator: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints
0 -- 0Pascal Oser, Rens W. van der Heijden, Stefan Lüders, Frank Kargl. Risk Prediction of IoT Devices Based on Vulnerability Analysis
0 -- 0Nadia Daoudi, Kevin Allix, Tegawendé François D. Assise Bissyandé, Jacques Klein. A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores
0 -- 0Lennart Braun, Daniel Demmler, Thomas Schneider 0003, Oleksandr Tkachenko. MOTION - A Framework for Mixed-Protocol Multi-Party Computation
0 -- 0Xueou Wang, Xiaolu Hou, Ruben Rios, Nils Ole Tippenhauer, Martín Ochoa. Constrained Proximity Attacks on Mobile Targets
0 -- 0Julian de Gortari Briseno, Akash Deep Singh, Mani Srivastava 0001. InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks

Volume 25, Issue 1

0 -- 0Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta. Secure Selections on Encrypted Multi-writer Streams
0 -- 0Fabio Pagani, Davide Balzarotti. AutoProfile: Towards Automated Profile Generation for Memory Analysis
0 -- 0Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch 0001. Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study
0 -- 0Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise. Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud
0 -- 0Handan Kilinç Alper, Alptekin Küpçü. Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
0 -- 0Sibghat Ullah Bazai, Julian Jang-Jaccard, Hooman Alavizadeh. A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark
0 -- 0Savvas Savvides, Seema Kumar, Julian James Stephen, Patrick Eugster. C3PO: Cloud-based Confidentiality-preserving Continuous Query Processing