Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleAugust 2024
On Portfolio Assessment, Group Work, and Quasi-Anonymization: What Structural Information Do Anonymized Reports Reveal?
Innovative Technologies and LearningAug 2024, Pages 149–158https://doi.org/10.1007/978-3-031-65881-5_16AbstractWith traditional summative exams students’ identities are often hidden from the examiners. However, achieving anonymity can be challenging with portfolio and coursework-based assessments. This study was motivated by a discussion of whether ...
- research-articleJuly 2024
Future-proofing Secure V2V Communication against Clogging DoS Attacks
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 94, Pages 1–8https://doi.org/10.1145/3664476.3670932Clogging Denial of Service (DoS) attacks have disrupted or disabled various networks, in spite of security mechanisms. External adversaries can severely harm networks, especially when high-overhead security mechanisms are deployed in resource-...
- research-articleJuly 2024
DealSecAgg: Efficient Dealer-Assisted Secure Aggregation for Federated Learning
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 183, Pages 1–11https://doi.org/10.1145/3664476.3670873Federated learning eliminates the necessity of transferring private training data and instead relies on the aggregation of model updates. Several publications on privacy attacks show how these individual model updates are vulnerable to the extraction of ...
- research-articleJuly 2024
If It Looks Like a Rootkit and Deceives Like a Rootkit: A Critical Examination of Kernel-Level Anti-Cheat Systems
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 62, Pages 1–11https://doi.org/10.1145/3664476.3670433Addressing a critical aspect of cybersecurity in online gaming, this paper systematically evaluates the extent to which kernel-level anti-cheat systems mirror the properties of rootkits, highlighting the importance of distinguishing between protective ...
- research-articleJuly 2024
SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and Challenges
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 42, Pages 1–13https://doi.org/10.1145/3664476.36645005G brings significant advancement, offering lower latency, and improved connectivity. Yet, its complexity, stemming from factors such as integrating advanced technologies like Software Defined Networking (SDN) and slicing, introduces challenges in ...
-
- research-articleJuly 2024
Continuous Authentication Leveraging Matrix Profile
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 7, Pages 1–13https://doi.org/10.1145/3664476.3664481Continuous Authentication (CA) mechanisms involve managing sensitive data from users which may change over time. Both requirements (privacy and adapting to new users) lead to a tension in the amount and granularity of the data at stake. However, no ...
- research-articleJuly 2024
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 4, Pages 1–12https://doi.org/10.1145/3664476.3664478HTTP client hints are a set of standardized HTTP request headers designed to modernize and potentially replace the traditional user agent string. While the user agent string exposes a wide range of information about the client’s browser and device, ...
- research-articleJuly 2024JUST ACCEPTED
A Survey of Trustworthy Federated Learning: Issues, Solutions, and Challenges
ACM Transactions on Intelligent Systems and Technology (TIST), Just Accepted https://doi.org/10.1145/3678181Trustworthy Artificial Intelligence (TAI) has proven invaluable in curbing potential negative repercussions tied to AI applications. Within the TAI spectrum, Federated Learning (FL) emerges as a promising solution to safeguard personal information in ...
- ArticleJuly 2024
Listening Between the Bits: Privacy Leaks in Audio Fingerprints
Detection of Intrusions and Malware, and Vulnerability AssessmentJul 2024, Pages 184–204https://doi.org/10.1007/978-3-031-64171-8_10AbstractAudio content recognition is an emerging technology that forms the basis for mobile services, such as automatic song recognition, second-screen synchronization, and broadcast monitoring. The technology utilizes audio fingerprints, short patterns ...
- research-articleJuly 2024
Investigating Documented Privacy Changes in Android OS
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 119, Pages 2701–2724https://doi.org/10.1145/3660826Android has empowered third-party apps to access data and services on mobile devices since its genesis.This involves a wide spectrum of user privacy-sensitive data, such as the device ID and location. In recent years, Android has taken proactive measures ...
- research-articleJuly 2024JUST ACCEPTED
Connecting in Crisis: Investigating Equitable Community Internet Access in the US During the COVID-19 Pandemic
ACM Journal on Computing and Sustainable Societies (ACMJCSS), Just Accepted https://doi.org/10.1145/3677326Although internet access and affordability are increasingly at the center of policy decisions around issues of the “digital divide” in the US, the complex nature of usage as it relates to structural inequality is not well-understood. We partnered with ...
- research-articleJuly 2024
Unmasking Privacy: A Reproduction and Evaluation Study of Obfuscation-based Perturbation Techniques for Collaborative Filtering
SIGIR '24: Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information RetrievalJuly 2024, Pages 1753–1762https://doi.org/10.1145/3626772.3657858Recommender systems (RecSys) solve personalisation problems and therefore heavily rely on personal data - demographics, user preferences, user interactions - each baring important privacy risks. It is also widely accepted that in RecSys performance and ...
- extended-abstractJuly 2024
Beyond Individual Concerns: Multi-user Privacy in Large Language Models
CUI '24: Proceedings of the 6th ACM Conference on Conversational User InterfacesJuly 2024, Article No.: 34, Pages 1–6https://doi.org/10.1145/3640794.3665883In this paper, we explore the nuanced and increasingly relevant issue of Multi-user Privacy (MP) in the context of Large Language Models (LLMs). Addressing the gap in current research, we examine how LLMs can inadvertently compromise the privacy of ...
- Work in ProgressJuly 2024
Embedding Large Language Models into Extended Reality: Opportunities and Challenges for Inclusion, Engagement, and Privacy
CUI '24: Proceedings of the 6th ACM Conference on Conversational User InterfacesJuly 2024, Article No.: 38, Pages 1–7https://doi.org/10.1145/3640794.3665563Advances in artificial intelligence and human-computer interaction will likely lead to extended reality (XR) becoming pervasive. While XR can provide users with interactive, engaging, and immersive experiences, non-player characters are often utilized ...
- research-articleJuly 2024JUST ACCEPTED
This Is Going on Your Permanent Record: A Legal Analysis of Educational Data in the Cloud
Moving operations to the cloud has become a way of life for many educational institutions. Much of the information these institutions store in the cloud is protected by Family Educational Rights and Privacy Act (FERPA), which was last amended in 2002, ...
- research-articleJuly 2024
Design and Use of Privacy Capture-the-Flag Challenges in an Introductory Class on Information Privacy and Security
ITiCSE 2024: Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1July 2024, Pages 618–624https://doi.org/10.1145/3649217.3653572With the advancement of data-intensive technologies and online tracking opportunities, education on privacy is becoming a bigger priority in cybersecurity curricula. Owing to its multidimensional and context-dependent nature, privacy and its protection ...
- research-articleJuly 2024
Data of/by/for the People: Designing Participatory Approaches to Data Governance
- Harriet Simms,
- Aditi Surana,
- Carlos Guerrero Millan,
- Natalia-Rozalia Avlona,
- SJ Bennett,
- Ewa Luger,
- Bettina Nissen
DIS '24 Companion: Companion Publication of the 2024 ACM Designing Interactive Systems ConferenceJuly 2024, Pages 405–408https://doi.org/10.1145/3656156.3658402Current frameworks of data governance often fail to account for the plurality of the publics they are required to safeguard. Several alternative structures are emerging to democratise and rethink data governance to involve and protect people and their ...
- research-articleJuly 2024Honorable Mention
Manual, Hybrid, and Automatic Privacy Covers for Smart Home Cameras
DIS '24: Proceedings of the 2024 ACM Designing Interactive Systems ConferenceJuly 2024, Pages 3453–3470https://doi.org/10.1145/3643834.3661569Smart home cameras (SHCs) offer convenience and security to users, but also cause greater privacy concerns than other sensors due to constant collection and processing of sensitive data. Moreover, privacy perceptions may differ between primary users and ...
- research-articleJuly 2024
Ratel: MPC-extensions for Smart Contracts
- Yunqi Li,
- Kyle Soska,
- Zhen Huang,
- Sylvain Bellemare,
- Mikerah Quintyne-Collins,
- Lun Wang,
- Xiaoyuan Liu,
- Dawn Song,
- Andrew Miller
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityJuly 2024, Pages 336–352https://doi.org/10.1145/3634737.3661142Enhancing privacy on smart contract-enabled blockchains has garnered much attention in recent research. Zero-knowledge proofs (ZKPs) is one of the most popular approaches, however, they fail to provide full expressiveness and fine-grained privacy. To ...
- research-articleJuly 2024
From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser Extensions
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityJuly 2024, Pages 1753–1769https://doi.org/10.1145/3634737.3657028The rapid growth of web tracking via advertisements has led to an increased adoption of privacy-preserving browser extensions. These extensions are crucial for blocking trackers and enhancing the overall web browsing experience. The advertising industry ...