Loading…
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
Onwuzurike, Lucky, Mariconti, Enrico, Andriotis, Panagiotis, Cristofaro, Emiliano De, Ross, Gordon, Stringhini, Gianluca
Published in ACM transactions on privacy and security (01.04.2019)
Published in ACM transactions on privacy and security (01.04.2019)
Get full text
Journal Article
Loading…
A General Framework for Adversarial Examples with Objectives
Sharif, Mahmood, Bhagavatula, Sruti, Bauer, Lujo, Reiter, Michael K.
Published in ACM transactions on privacy and security (31.08.2019)
Published in ACM transactions on privacy and security (31.08.2019)
Get full text
Journal Article
Loading…
Scalable Private Set Intersection Based on OT Extension
Pinkas, Benny, Schneider, Thomas, Zohner, Michael
Published in ACM transactions on privacy and security (31.05.2018)
Published in ACM transactions on privacy and security (31.05.2018)
Get full text
Journal Article
Loading…
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Demetrio, Luca, Coull, Scott E., Biggio, Battista, Lagorio, Giovanni, Armando, Alessandro, Roli, Fabio
Published in ACM transactions on privacy and security (01.11.2021)
Published in ACM transactions on privacy and security (01.11.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS Spoofing
Noh, Juhwan, Kwon, Yujin, Son, Yunmok, Shin, Hocheol, Kim, Dohyun, Choi, Jaeyeong, Kim, Yongdae
Published in ACM transactions on privacy and security (01.04.2019)
Published in ACM transactions on privacy and security (01.04.2019)
Get full text
Journal Article
Loading…
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework
Amro, Ahmed, Gkioulos, Vasileios, Katsikas, Sokratis
Published in ACM transactions on privacy and security (13.03.2023)
Published in ACM transactions on privacy and security (13.03.2023)
Get full text
Journal Article
Loading…
Privacy-Preserving Decision Trees Training and Prediction
Akavia, Adi, Leibovich, Max, Resheff, Yehezkel S., Ron, Roey, Shahar, Moni, Vald, Margarita
Published in ACM transactions on privacy and security (01.08.2022)
Published in ACM transactions on privacy and security (01.08.2022)
Get full text
Journal Article
Loading…
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices
Noorman, Job, Bulck, Jo Van, Mühlberg, Jan Tobias, Piessens, Frank, Maene, Pieter, Preneel, Bart, Verbauwhede, Ingrid, Götzfried, Johannes, Müller, Tilo, Freiling, Felix
Published in ACM transactions on privacy and security (01.08.2017)
Published in ACM transactions on privacy and security (01.08.2017)
Get full text
Journal Article
Loading…
The Android Platform Security Model
Mayrhofer, René, Stoep, Jeffrey Vander, Brubaker, Chad, Kralevich, Nick
Published in ACM transactions on privacy and security (31.08.2021)
Published in ACM transactions on privacy and security (31.08.2021)
Get full text
Journal Article
Loading…
MOTION – A Framework for Mixed-Protocol Multi-Party Computation
Braun, Lennart, Demmler, Daniel, Schneider, Thomas, Tkachenko, Oleksandr
Published in ACM transactions on privacy and security (01.05.2022)
Published in ACM transactions on privacy and security (01.05.2022)
Get full text
Journal Article
Loading…
Loading…
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned
Khan, Shaharyar, Kabanov, Ilya, Hua, Yunke, Madnick, Stuart
Published in ACM transactions on privacy and security (07.11.2022)
Published in ACM transactions on privacy and security (07.11.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution
Li, Litao, Ding, Steven H. H., Tian, Yuan, Fung, Benjamin C. M., Charland, Philippe, Ou, Weihan, Song, Leo, Chen, Congwei
Published in ACM transactions on privacy and security (14.04.2023)
Published in ACM transactions on privacy and security (14.04.2023)
Get full text
Journal Article
Loading…
Loading…
SoK: Human-centered Phishing Susceptibility
Zhuo, Sijie, Biddle, Robert, Koh, Yun Sing, Lottridge, Danielle, Russello, Giovanni
Published in ACM transactions on privacy and security (14.04.2023)
Published in ACM transactions on privacy and security (14.04.2023)
Get full text
Journal Article