[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 27, Issue 1February 2024
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:2471-2566
EISSN:2471-2574
Reflects downloads up to 02 Mar 2025Bibliometrics
Skip Table Of Content Section
research-article
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems
Article No.: 1, Pages 1–25https://doi.org/10.1145/3625546

Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission has mandated telecom providers in the U.S. to implement STIR/SHAKEN, an industry-...

research-article
An Experimental Assessment of Inconsistencies in Memory Forensics
Article No.: 2, Pages 1–29https://doi.org/10.1145/3628600

Memory forensics is concerned with the acquisition and analysis of copies of volatile memory (memory dumps). Based on an empirical assessment of observable inconsistencies in 360 memory dumps of a running Linux system, we confirm a state of overwhelming ...

research-article
Forward Security with Crash Recovery for Secure Logs
Article No.: 3, Pages 1–28https://doi.org/10.1145/3631524

Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering to prevent subtle attacks leaving the system in an ...

research-article
Efficient History-Driven Adversarial Perturbation Distribution Learning in Low Frequency Domain
Article No.: 4, Pages 1–25https://doi.org/10.1145/3632293

The existence of adversarial image makes us have to doubt the credibility of artificial intelligence system. Attackers can use carefully processed adversarial images to carry out a variety of attacks. Inspired by the theory of image compressed sensing, ...

research-article
Sound-based Two-factor Authentication: Vulnerabilities and Redesign
Article No.: 5, Pages 1–27https://doi.org/10.1145/3632175

Reducing the level of user effort involved in traditional two-factor authentication (TFA) constitutes an important research topic. An interesting representative approach, Sound-Proof, leverages ambient sounds to detect the proximity between the second-...

research-article
Open Access
OptiClass: An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures
Article No.: 6, Pages 1–23https://doi.org/10.1145/3633777

Network traffic classification has many applications, such as security monitoring, quality of service, traffic engineering, and so on. For the aforementioned applications, Deep Packet Inspection (DPI) is a popularly used technique for traffic ...

research-article
Eyes See Hazy while Algorithms Recognize Who You Are
Article No.: 7, Pages 1–23https://doi.org/10.1145/3632292

Facial recognition technology has been developed and widely used for decades. However, it has also made privacy concerns and researchers’ expectations for facial recognition privacy-preserving technologies. To provide privacy, detailed or semantic ...

research-article
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications
Article No.: 8, Pages 1–37https://doi.org/10.1145/3630253

JavaScript is often rated as the most popular programming language for the development of both client-side and server-side applications. Because of its popularity, JavaScript has become a frequent target for attackers who exploit vulnerabilities in the ...

research-article
Open Access
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection
Article No.: 9, Pages 1–26https://doi.org/10.1145/3629976

With the rapid growth of DeepFake video techniques, it becomes increasingly challenging to identify them visually, posing a huge threat to our society. Unfortunately, existing detection schemes are limited to exploiting the artifacts left by DeepFake ...

research-article
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models
Article No.: 10, Pages 1–34https://doi.org/10.1145/3634914

Deepfake data contains realistically manipulated faces—its abuses pose a huge threat to the security and privacy-critical applications. Intensive research from academia and industry has produced many deepfake/detection models, leading to a constant race ...

research-article
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives
Article No.: 11, Pages 1–35https://doi.org/10.1145/3638763

Group signatures and their variants have been widely used in privacy-sensitive scenarios such as anonymous authentication and attestation. In this paper, we present a new post-quantum group signature scheme from symmetric primitives. Using only symmetric ...

research-article
Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network
Article No.: 12, Pages 1–32https://doi.org/10.1145/3639366

The Lightning Network (LN) is a second layer system for solving the scalability problem of Bitcoin transactions. In the current implementation of LN, channel capacity (i.e., the sum of individual balances held in the channel) is public information, while ...

research-article
Open Access
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs
Article No.: 13, Pages 1–26https://doi.org/10.1145/3641819

Security assessment relies on public information about products, vulnerabilities, and weaknesses. So far, databases in these categories have rarely been analyzed in combination. Yet, doing so could help predict unreported vulnerabilities and identify ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Subjects