Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments
- Mohammad Reza Nosouhi,
- Zubair Baig,
- Robin Doss,
- Divyans Mahansaria,
- Debi Prasad Pati,
- Praveen Gauravaram,
- Lei Pan,
- Keshav Sood
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 145, Pages 1–11https://doi.org/10.1145/3664476.3671411Implementing strong authentication methods in a network requires stable connectivity between the service providers deployed within the network (i.e., applications that users of the network need to access) and the Identity and Access Management (IAM) ...
- research-articleJuly 2024
Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 53, Pages 1–9https://doi.org/10.1145/3664476.3670875Industrial Control Systems (ICSs) are critical in automating and controlling industrial processes. Human errors within ICSs can significantly impact the system’s underlying processes and users’ safety. Thus, it is essential to understand the factors ...
- research-articleJuly 2024
SECURA: Unified Reference Architecture for Advanced Security and Trust in Safety Critical Infrastructures
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 9, Pages 1–13https://doi.org/10.1145/3664476.3664513In the evolving landscape of safety-critical infrastructures, ensuring the integrity and security of systems has become paramount. Building upon a previously established security architecture tailored for the railway sector, this work introduces ...
- research-articleJuly 2024
SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and Security
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 44, Pages 1–12https://doi.org/10.1145/3664476.3664510In the past years, a growing number of highly-automated systems has build on Artificial-Intelligence (AI) capabilities, for example, self-driving vehicles or predictive health-state diagnoses. As for any software system, there is a risk that misbehavior ...
- research-articleJuly 2024
A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the Web
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityJuly 2024, Article No.: 4, Pages 1–12https://doi.org/10.1145/3664476.3664478HTTP client hints are a set of standardized HTTP request headers designed to modernize and potentially replace the traditional user agent string. While the user agent string exposes a wide range of information about the client’s browser and device, ...
-
- research-articleJuly 2024
Fighting with Firewalld: Architecting a Host-based Firewall Policy and the Challenges of Implementation
PEARC '24: Practice and Experience in Advanced Research Computing 2024: Human Powered ComputingJuly 2024, Article No.: 22, Pages 1–6https://doi.org/10.1145/3626203.3670523Host-based firewalling is an important part of a comprehensive security plan. This paper explores a robust solution that can be adapted and used at any institution, along with the challenges involved in its development. The solution implements custom ...
- surveyJuly 2024
Secure UAV (Drone) and the Great Promise of AI
ACM Computing Surveys (CSUR), Volume 56, Issue 11Article No.: 286, Pages 1–37https://doi.org/10.1145/3673225UAVs have found their applications in numerous applications from recreational activities to business in addition to military and strategic fields. However, research on UAVs is not going on as quickly as the technology. Especially, when it comes to the ...
- short-paperJuly 2024
Federated Learning Security: From Dusk to Dawn
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityJuly 2024, Page 1114https://doi.org/10.1145/3634737.3665025The evolution of machine learning (ML) as an enabling technology has opened a new era of possibilities and applications. Among these advancements, distributed learning, specifically federated learning (FL), emerges as a significant shift in collaborative ...
- short-paperJuly 2024
Security Of AI, By AI and For AI: Charting New Territories in AI-Centered Cybersecurity Research
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityJuly 2024, Pages 1115–1116https://doi.org/10.1145/3634737.3665024The rapid advancements in artificial intelligence (AI) technologies and the unyielding demand for their transformative applications have ushered in significant opportunities for security and privacy research and innovations. There is an urgent need for ...
- posterJuly 2024
POSTER: Defense against False Data Injection Attack in a Cyber-Physical System
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityJuly 2024, Pages 1943–1945https://doi.org/10.1145/3634737.3659431Cyber-physical systems (CPSs) are closed-loop feedback systems that efficiently control the physical processes through cyber-systems. Security threats like false data injection (FDI) attacks are increasing in CPSs. FDI attacks disrupt the system's ...
- research-articleJuly 2024
Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System
- Khaled Sarieddine,
- Mohammad Ali Sayed,
- Sadegh Torabi,
- Ribal Attallah,
- Danial Jafarigiv,
- Chadi Assi,
- Mourad Debbabi
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityJuly 2024, Pages 977–989https://doi.org/10.1145/3634737.3644999The Electric Vehicle (EV) charging infrastructure has been rapidly expanding to keep up with the increased demands of EV consumers. This government-backed infrastructure expansion resulted in the rushed integration of a significant number of insecure EV ...
- research-articleJuly 2024
Towards Understanding and Improving Security-Relevant Web Application Logging
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityJuly 2024, Pages 814–829https://doi.org/10.1145/3634737.3637647Logging of security-relevant events is crucial in software development to gain visibility into the application's runtime, and to detect suspicious and malicious behavior. Various security guidelines (such as ISO 27002, CCM) mandate the software products ...
- tutorialJune 2024
Trustworthy User Modeling and Recommendation From Technical and Regulatory Perspectives
UMAP Adjunct '24: Adjunct Proceedings of the 32nd ACM Conference on User Modeling, Adaptation and PersonalizationJune 2024, Pages 17–19https://doi.org/10.1145/3631700.3658522This tutorial provides an interdisciplinary overview of fairness, non-discrimination, transparency, privacy, and security in the context of recommender systems. According to European policies, these are essential dimensions of trustworthy AI systems but ...
- research-articleJune 2024
SEPTON Toolkit application: An overview of the security techniques used from wearable medical devices to physician’s healthcare platform
PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive EnvironmentsJune 2024, Pages 582–586https://doi.org/10.1145/3652037.3663888Now that the technology is more widely available than ever before, protecting information assets is paramount, especially in the face of escalating cyber threats. The healthcare sector has experienced a significant increase in cyber-attacks, ...
- research-articleJune 2024JUST ACCEPTED
Building Guardrails in AI Systems with Threat Modeling
Much like cars, AI technologies must undergo rigorous testing to ensure their safety and reliability. However, just as a 16-wheel truck’s brakes are different from that of a standard hatchback, AI models too may need distinct analyses based on their risk, ...
- research-articleJune 2024
FuSeBMC v4: Improving Code Coverage with Smart Seeds via BMC, Fuzzing and Static Analysis
Formal Aspects of Computing (FAC), Volume 36, Issue 2Article No.: 12, Pages 1–25https://doi.org/10.1145/3665337Bounded model checking (BMC) and fuzzing techniques are among the most effective methods for detecting errors and security vulnerabilities in software. However, there are still shortcomings in detecting these errors due to the inability of existing ...
- short-paperJune 2024
Honest Fraction Differential Privacy
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityJune 2024, Pages 247–251https://doi.org/10.1145/3658664.3659655Over the last decades, differential privacy (DP) has become a standard notion of privacy. It allows to measure how much sensitive information an adversary could infer from a result (statistical model, prediction, etc.) he obtains. In privacy-preserving ...
- research-articleJune 2024
Watermarking Text Documents With Watermarked Fonts
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityJune 2024, Pages 187–197https://doi.org/10.1145/3658664.3659640Watermarking text documents has become a cutting-edge research topic due to the increasing demand of protecting text documents from illegal copying, tampering, distribution and selling. When presenting a document on the computer screen, many existing ...
- research-articleJune 2024
Suppressing High-Frequency Artifacts for Generative Model Watermarking by Anti-Aliasing
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityJune 2024, Pages 223–234https://doi.org/10.1145/3658664.3659634Protecting deep neural networks (DNNs) against intellectual property (IP) infringement has attracted an increasing attention in recent years. Recent advances focus on IP protection of generative models, which embed the watermark information into the ...
- research-articleJune 2024
Enhanced Watermarking for Paper-Based Digital Microfluidic Biochips
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 4Article No.: 64, Pages 1–27https://doi.org/10.1145/3661309Paper-based digital microfluidic biochip (PB-DMFB) technology provides a promising solution to many biochemical applications. However, the PB-DMFB manufacturing process may suffer from potential security threats. For example, a Trojan insertion attack may ...