- Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, and Zhiyun Qian. 2019. App in the Middle: Demystify Application Virtualization in Android and its Security Threats. In Abstracts of the 2019 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '19).
- Luo, T., Zheng, C., Xu, Z., & Ouyang, X. (2017). Anti-Plugin: Don't let your app play as an Android plugin. Proceedings of Blackhat Asia.
- Dai, D., Li, R., Tang, J., Davanian, A., & Yin, H. (2020, June). Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (pp. 25-32).
Topic 2 (Android):
Security and Privacy Vulnerabilities Detection in Android Apps
|
| |
| |
Primary: |
- Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., & Fahl, S. (2017, October). A stitch in time: Supporting android developers in writingsecure code. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1065-1077).
|
| |
| |
Secondary: |
- Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos. 2010. Paranoid Android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10).
- Qian, C., Luo, X., Le, Y., & Gu, G. (2015). Vulhunter: toward discovering vulnerabilities in android applications. IEEE Micro, 35(1), 44-53.
-
Ghafari, M., Gadient, P., & Nierstrasz, O. (2017, September). Security smells in android. In 2017 IEEE 17th international working conference on source code analysis and manipulation (SCAM) (pp. 121-130). IEEE.
Topic 3 (Android):
Taint Analysis
|
| |
| |
Primary: |
- Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... & Sheth, A. N. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), 1-29.
|
| |
| |
Secondary: |
- Wei, F., Roy, S., & Ou, X. (2014, November). Amandroid: A precise and general inter-component data flow analysis framework for security vetting of android apps. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security (pp. 1329-1341).
- Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., ... & McDaniel, P. (2014). Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. Acm Sigplan Notices, 49(6), 259-269.
- Sun, M., Wei, T., & Lui, J. C. (2016, October). Taintart: A practical multi-level information-flow tracking system for android runtime. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 331-342).
Topic 4 (Android):
Cache Privacy Attack
|
| |
| |
Primary: |
- Acs, G., Conti, M., Gasti, P., Ghali, C., Tsudik, G., & Wood, C. A. (2017). Privacy-aware caching in information-centric networking. IEEE Transactions on Dependable and Secure Computing, 16(2), 313-328.
|
| |
| |
Secondary: |
- Mohaisen, A., Mekky, H., Zhang, X., Xie, H., & Kim, Y. (2014). Timing attacks on access privacy in information centric networks and countermeasures. IEEE Transactions on Dependable and Secure Computing, 12(6), 675-687.
- Acs, G., Conti, M., Gasti, P., Ghali, C., & Tsudik, G. (2013, July). Cache privacy in named-data networking. In 2013 IEEE 33rd International Conference on Distributed Computing Systems (pp. 41-51). IEEE.
- Compagno, A., Conti, M., Losiouk, E., Tsudik, G., & Valle, S. (2020, April). A Proactive Cache Privacy Attack on NDN. In NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium (pp. 1-7). IEEE.
Topic 5 (ICN/NDN):
Content Popularity Prediction
|
| |
| |
Primary: |
- L. Yao, Y. Zeng, X. Wang, A. Chen and G. Wu, "Detection and Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking," in IEEE Transactions on Dependable and Secure Computing.
|
| |
| |
Secondary: |
- J. Li et al., "Popularity-driven coordinated caching in Named Data Networking," 2012 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Austin, TX, USA, 2012, pp. 15-26.
- K. Cho, M. Lee, K. Park, T. T. Kwon, Y. Choi and Sangheon Pack, "WAVE: Popularity-based and collaborative in-network caching for content-oriented networks," 2012 Proceedings IEEE INFOCOM Workshops, Orlando, FL, 2012, pp. 316-321.
- R. Zhang, J. Liu, T. Huang and R. Xie, "Popularity based probabilistic caching strategy design for named data networking," 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, 2017, pp. 476-481.
Topic 6 (ICN/NDN):
Interest Flooding Attacks
|
| |
| |
Primary: |
- Compagno A., Conti M., Gasti P., Tsudik G. (2013). Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking. 10.1109/LCN.2013.6761300.
|
| |
| |
Secondary: |
- A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun and L. Zhang, "Interest flooding attack and countermeasures in Named Data Networking," 2013 IFIP Networking Conference, Brooklyn, NY, 2013, pp. 1-9.
- Salah, H., Wulfheide, J., & Strufe, T. (2015, October). Coordination supports security: A new defence mechanism against interest flooding in NDN. In 2015 IEEE 40th Conference on Local Computer Networks (LCN) (pp. 73-81). IEEE.
- Benarfa, A., Hassan, M., Compagno, A., Losiouk, E., Yagoubi, M. B., & Conti, M. (2019, June). Chokifa: A new detection and mitigation approach against interest flooding attacks in ndn. In International Conference on Wired/Wireless Internet Communication (pp. 53-65). Springer, Cham.
Topic 7 (ICN/NDN):
Coexistence of TCP/IP and ICN/NDN
|
| |
| |
Primary: |
- M. Conti, A. Gangwal, M. Hassan, C. Lal and E. Losiouk, "The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions," in IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 2104-2129, thirdquarter 2020.
|
| |
| |
Secondary: |
- Rahman, A., Trossen, D., Kutscher, D., & Ravindran, R. (2018). Deployment considerations for information-centric networking (ICN). ICNRG draft.
Topic 8 (MISC):
Misuses in Wearable Devices
|
| |
| |
Primary: |
- Naveed, M., Zhou, X. Y., Demetriou, S., Wang, X., & Gunter, C. A. (2014, February). Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. In NDSS.
|
| |
| |
Secondary: |
- H. Fereidooni, T. Frassetto, M. Miettinen, A. Sadeghi and M. Conti, "Fitness Trackers: Fit for Health but Unfit for Security and Privacy," 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), Philadelphia, PA, 2017, pp. 19-24.
- M. Rahman, B. Carbunar and U. Topkara, "Secure Management of Low Power Fitness Trackers," in IEEE Transactions on Mobile Computing, vol. 15, no. 2, pp. 447-459, 1 Feb. 2016.
- Jiska Classen, Daniel Wegemer, Paul Patras, Tom Spink, and Matthias Hollick. 2018. Anatomy of a Vulnerable Fitness Tracking System: Dissecting the Fitbit Cloud, App, and Firmware.
Topic 9 (MISC):
Runtime Remote Attestation
|
| |
| |
Primary: |
- Toffalini, F., Losiouk, E., Biondo, A., Zhou, J., & Conti, M. (2019). ScaRR: Scalable Runtime Remote Attestation for Complex Systems. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019) (pp. 121-134).
|
| |
| |
Secondary: |
- Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, and Gene Tsudik. 2016. C-FLAT: Control-Flow Attestation for Embedded Systems Software. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16).
- Abera, T., Bahmani, R., Brasser, F., Ibrahim, A., Sadeghi, A. R., & Schunter, M. (2019, January). DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. In NDSS.
- Ghada Dessouky, Shaza Zeitouni, Thomas Nyman, Andrew Paverd, Lucas Davi, Patrick Koeberl, N. Asokan, and Ahmad-Reza Sadeghi. 2017. LO-FAT: Low-Overhead Control Flow ATtestation in Hardware. In Proceedings of the 54th Annual Design Automation Conference 2017 (DAC '17).
Topic 10 (CPS):
Vehicular Security - Charging-When-Driving
|
| |
| |
Primary: |
- Roman, L. F., & Gondim, P. R. (2020). Authentication protocol in CTNs for a CWD-WPT charging system in a cloud environment. Ad Hoc Networks, 97, 102004.
|
| |
| |
Secondary: |
- Hongyang Li, G. Dán and K. Nahrstedt, "FADEC: Fast authentication for dynamic electric vehicle charging," 2013 IEEE Conference on Communications and Network Security (CNS), National Harbor, MD, 2013, pp. 369-370.
- Li, H., Dan, G., & Nahrstedt, K. (2017). Portunes+: Privacy-Preserving Fast Authentication for Dynamic Electric Vehicle Charging. IEEE Transactions on Smart Grid, 8(5), 2305-2313.
Topic 11 (CPS):
Vehicular Security - Automotive Remote Keyless Entry
|
| |
| |
Primary: |
- Garcia, F. D., Oswald, D., Kasper, T., & Pavlidès, P. (2016). Lock it and still lose it—on the (in) security of automotive remote keyless entry systems. In 25th {USENIX} Security Symposium ({USENIX} Security 16).
|
| |
| |
Secondary: |
- Benadjila, R., Renard, M., Lopes-Esteves, J., & Kasmi, C. (2017). One car, two frames: attacks on hitag-2 remote keyless entry systems revisited. In 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17).
- Wouters, L., Marin, E., Ashur, T., Gierlichs, B., & Preneel, B. (2019). Fast, furious and insecure: Passive keyless entry and start systems in modern supercars. IACR Transactions on Cryptographic Hardware and Embedded Systems, 66-85.
- Glocker, T., Mantere, T., & Elmusrati, M. (2017, April). A protocol for a secure remote keyless entry system applicable in vehicles using symmetric-key cryptography. In 2017 8th International Conference on Information and Communication Systems (ICICS) (pp. 310-315). IEEE.
Topic 12 (CPS):
Vehicular Security - CANbus network
|
| |
| |
Primary: |
- Bozdal, M., Samie, M., Aslam, S., & Jennions, I. (2020). Evaluation of CAN Bus Security Challenges. Sensors, 20(8), 2364.
|
| |
| |
Secondary: |
- Tianxiang Huang, Jianying Zhou, and Andrei Bytes. 2018. ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus. In Proceedings of the 13th International Conference on Availability, Reliability and Security (ARES 2018).
- Markovitz, M., & Wool, A. (2017). Field classification, modeling and anomaly detection in unknown CAN bus networks. Vehicular Communications, 9, 43-52.
- Gmiden, M., Gmiden, M. H., & Trabelsi, H. (2016, December). An intrusion detection method for securing in-vehicle CAN bus. In 2016 17th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA) (pp. 176-180). IEEE.
Topic 13 (CPS):
Industrial Security
|
| |
| |
Primary: |
- S. Adepu, E. Kang and A. P. Mathur, "Challenges in Secure Engineering of Critical Infrastructure Systems," 2019 34th IEEE/ACM International Conference on Automated Software Engineering Workshop (ASEW), San Diego, CA, USA, 2019, pp. 61-64.
|
| |
| |
Secondary: |
- Hemsley, K., & Fisher, R. (2018, March). A history of cyber incidents and threats involving industrial control systems. In International Conference on Critical Infrastructure Protection (pp. 215-242). Springer, Cham.
- Trend Micro. Critical Infrastructures Exposed and at Risk: Energy and Water Industries (2018). White paper.
Topic 14 (ML for Security):
ICS - Anomaly detection
|
| |
| |
Primary: |
- Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19-31.
|
| |
| |
Secondary: |
- G. Bernieri, M. Conti and F. Turrin, "Evaluation of Machine Learning Algorithms for Anomaly Detection in Industrial Networks," 2019 IEEE International Symposium on Measurements & Networking (M&N), Catania, Italy, 2019, pp. 1-6.
- G. Ditzler, M. Roveri, C. Alippi and R. Polikar, "Learning in Nonstationary Environments: A Survey," in IEEE Computational Intelligence Magazine, vol. 10, no. 4, pp. 12-25, Nov. 2015.
Topic 15 (ML for Security):
ICS - Intrusion Detection System
|
| |
| |
Primary: |
- Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., & Gan, D. (2017). Cloud-based cyber-physical intrusion detection for vehicles using deep learning. Ieee Access, 6, 3491-3508.
|
| |
| |
Secondary: |
- Mirsky, Y., Doitshman, T., Elovici, Y., & Shabtai, A. (2018). Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv preprint arXiv:1802.09089.
- Rathore, M.M., Ahmad, A. & Paul, A. Real time intrusion detection system for ultra-high-speed big data environments. J Supercomput 72, 3489–3510 (2016).
Topic 16 (ML for Security):
Ensemble of Intrusion Detection Systems
|
| |
| |
Primary: |
- Giuseppe Bernieri, Mauro Conti, and Federico Turrin. 2019. KingFisher: an Industrial Security Framework based on Variational Autoencoders. In Proceedings of the 1st Workshop on Machine Learning on Edge in Sensor Systems (SenSys-ML 2019).
|
| |
| |
Secondary: |
- Ding, J., Liu, Y., Zhang, L., Wang, J., & Liu, Y. (2016). An anomaly detection approach for multiple monitoring data series based on latent correlation probabilistic model. Applied Intelligence, 44(2), 340-361.
- Duchi, J., Mackey, L., & Wauthier, F. Anomaly Detection for Asynchronous and Incomplete Data.
Topic 17 (CPS):
Industrial Internet of Things
|
| |
| |
Primary: |
- E. Sisinni, A. Saifullah, S. Han, U. Jennehag and M. Gidlund, "Industrial Internet of Things: Challenges, Opportunities, and Directions," in IEEE Transactions on Industrial Informatics, vol. 14, no. 11, pp. 4724-4734, Nov. 2018.
|
| |
| |
Secondary: |
- Alcaraz, C. (2019). Secure Interconnection of IT-OT networks in Industry 4.0. In Critical Infrastructure Security and Resilience (pp. 201-217). Springer, Cham.
- A. Sadeghi, C. Wachsmann and M. Waidner, "Security and privacy challenges in industrial Internet of Things," 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, 2015, pp. 1-6.
Topic 18 (CPS):
Cyber-Physical System Security
|
| |
| |
Primary: |
- A. Humayed, J. Lin, F. Li and B. Luo, "Cyber-Physical Systems Security—A Survey," in IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1802-1831, Dec. 2017.
|
| |
| |
Secondary: |
- R. Atat, L. Liu, J. Wu, G. Li, C. Ye and Y. Yang, "Big Data Meet Cyber-Physical Systems: A Panoramic Survey," in IEEE Access, vol. 6, pp. 73603-73636, 2018.
- Ashibani, Y., & Mahmoud, Q. H. (2017). Cyber physical systems security: Analysis, challenges and solutions. Computers & Security, 68, 81-97.
Topic 19 (CPS):
Air - Ground communication
|
| |
| |
Primary: |
- Strohmeier, M., Martinovic, I., & Lenders, V. (2020). Securing the Air-Ground Link in Aviation. In The Security of Critical Infrastructures (pp. 131-154). Springer, Cham.
|
| |
| |
Secondary: |
- Olive, X., Tanner, A., Strohmeier, M., Schafer, M., Feridun, M., Tart, A., ... & Lenders, V. OpenSky Report 2020: Analysing in-flight emergencies using big data.
- Ala' Darabseh, Hoda AlKhzaimi, and Christina Popper. 2020. MAVPro: ADS-B message verification for aviation security with minimal numbers of on-ground sensors. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20).
- X. Ying, J. Mazer, G. Bernieri, M. Conti, L. Bushnell and R. Poovendran, "Detecting ADS-B Spoofing Attacks Using Deep Neural Networks," 2019 IEEE Conference on Communications and Network Security (CNS), Washington DC, DC, USA, 2019, pp. 187-195.
Topic 20 (CPS):
Honeypot
|
| |
| |
Primary: |
- G. Bernieri, M. Conti and F. Pascucci, "MimePot: a Model-based Honeypot for Industrial Control Networks," 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 2019.
|
| |
| |
Secondary: |
- A. V. Serbanescu, S. Obermeier and D. Yu, "A flexible architecture for Industrial Control System honeypots," 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), Colmar, 2015, pp. 16-26.
- Buza, D. I., Juhász, F., Miru, G., Félegyházi, M., & Holczer, T. (2014, February). CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot. In International Workshop on Smart Grid Security (pp. 181-192). Springer, Cham.
- E. Vasilomanolakis, S. Srinivasa and M. Mühlhäuser, "Did you really hack a nuclear power plant? An industrial control mobile honeypot," 2015 IEEE Conference on Communications and Network Security (CNS), Florence, 2015, pp. 729-730.
Topic 21 (MISC):
Traffic Measurment
|
| |
| |
Primary: |
- S. Torabi, E. Bou-Harb, C. Assi, E. B. Karbab, A. Boukhtouta and M. Debbabi, "Inferring and Investigating IoT-Generated Scanning Campaigns Targeting A Large Network Telescope," in IEEE Transactions on Dependable and Secure Computing.
|
| |
| |
Secondary: |
- Barbieri, G., Conti, M., Tippenhauer, N. O., & Turrin, F. (2020). Sorry, Shodan is not Enough! Assessing ICS Security via IXP Network Traffic Analysis. arXiv preprint arXiv:2007.01114.
- M. Nawrocki, T. C. Schmidt and M. Wählisch, "Uncovering Vulnerable Industrial Control Systems from the Internet Core," NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, Budapest, Hungary, 2020, pp. 1-9.
Topic 22 (MISC):
Mininet Extension
|
| |
| |
Primary: |
- Lantz, B., Heller, B., & McKeown, N. (2010, October). A network in a laptop: rapid prototyping for software-defined networks. In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (pp. 1-6).
|
| |
| |
Secondary: |
- Fontes, R. R., Afzal, S., Brito, S. H., Santos, M. A., & Rothenberg, C. E. (2015, November). Mininet-WiFi: Emulating software-defined wireless networks. In 2015 11th International Conference on Network and Service Management (CNSM) (pp. 384-389). IEEE.
- Daniele Antonioli and Nils Ole Tippenhauer. 2015. MiniCPS: A Toolkit for Security Research on CPS Networks. In Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy (CPS-SPC '15).
Topic 23 (MLS):
Traffic Inference
|
| |
| |
Primary: |
- M. Conti, L. V. Mancini, R. Spolaor and N. V. Verde, "Analyzing Android Encrypted Network Traffic to Identify User Actions," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 1, pp. 114-125, Jan. 2016.
|
| |
| |
Secondary: |
- Aceto, G., Ciuonzo, D., Montieri, A., & Pescapé, A. (2018). Multi-classification approaches for classifying mobile app traffic. Journal of Network and Computer Applications, 103, 131-145.
- Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-boo: i see your smart home activities, even encrypted! In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '20).
Topic 24 (MLS):
Hate Speech Detection
|
| |
| |
Primary: |
- Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, and N. Asokan. 2018. All You Need is "Love": Evading Hate Speech Detection. In Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security (AISec '18).
|
| |
| |
Secondary: |
- Waseem, Zeerak, and Dirk Hovy. "Hateful symbols or hateful people? predictive features for hate speech detection on twitter." In Proceedings of the NAACL student research workshop, pp. 88-93. 2016.
- Davidson, Thomas, Dana Warmsley, Michael Macy, and Ingmar Weber. "Automated hate speech detection and the problem of offensive language." arXiv preprint arXiv:1703.04009 (2017).
- Nemanja Djuric, Jing Zhou, Robin Morris, Mihajlo Grbovic, Vladan Radosavljevic, and Narayan Bhamidipati. 2015. Hate Speech Detection with Comment Embeddings. In Proceedings of the 24th International Conference on World Wide Web (WWW '15 Companion).
Topic 25 (AML):
GAN (Generarive Adversarial Networks)
|
| |
| |
Primary: |
- Goodfellow, Ian, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. "Generative adversarial nets." In Advances in neural information processing systems, pp. 2672-2680. 2014.
|
| |
| |
Secondary: |
- Khac-Tuan Nguyen, Dat-Thanh Dinh, Minh N. Do, and Minh-Triet Tran. 2020. Anomaly Detection in Traffic Surveillance Videos with GAN-based Future Frame Prediction. In Proceedings of the 2020 International Conference on Multimedia Retrieval (ICMR '20).
- Ma, Liqian, Xu Jia, Qianru Sun, Bernt Schiele, Tinne Tuytelaars, and Luc Van Gool. "Pose guided person image generation." In Advances in neural information processing systems, pp. 406-416. 2017.
- C. Ledig et al., "Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network," 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, 2017.
Topic 26 (AML):
Adversarial in Audio Domain
|
| |
| |
Primary: |
- N. Carlini and D. Wagner, "Audio Adversarial Examples: Targeted Attacks on Speech-to-Text," 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, 2018, pp. 1-7, doi: 10.1109/SPW.2018.00009.
|
| |
| |
Secondary: |
- Carlini, Nicholas, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou. "Hidden voice commands." In 25th {USENIX} Security Symposium ({USENIX} Security 16), pp. 513-530. 2016.
- Alzantot, Moustafa, Bharathan Balaji, and Mani Srivastava. "Did you hear that? adversarial examples against automatic speech recognition." arXiv preprint arXiv:1801.00554 (2018).
Topic 27 (AML):
Trojan Attack
|
| |
| |
Primary: |
- Gu, Tianyu, Brendan Dolan-Gavitt, and Siddharth Garg. "Badnets: Identifying vulnerabilities in the machine learning model supply chain." arXiv preprint arXiv:1708.06733 (2017).
|
| |
| |
Secondary: |
- Ruixiang Tang, Mengnan Du, Ninghao Liu, Fan Yang, and Xia Hu. 2020. An Embarrassingly Simple Approach for Trojan Attack in Deep Neural Networks. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '20).
- Liu, Kang, Brendan Dolan-Gavitt, and Siddharth Garg. "Fine-pruning: Defending against backdooring attacks on deep neural networks." In International Symposium on Research in Attacks, Intrusions, and Defenses, pp. 273-294. Springer, Cham, 2018.
- Huang, Xijie, Moustafa Alzantot, and Mani Srivastava. "NeuronInspect: Detecting Backdoors in Neural Networks via Output Explanations." arXiv preprint arXiv:1911.07399 (2019).
Topic 28 (AML):
Image Scaling Attack
|
| |
| |
Primary: |
- Xiao, Qixue, Yufei Chen, Chao Shen, Yu Chen, and Kang Li. "Seeing is not believing: Camouflage attacks on image scaling algorithms." In 28th {USENIX} Security Symposium ({USENIX} Security 19), pp. 443-460. 2019.
|
| |
| |
Secondary: |
- Quiring, Erwin, David Klein, Daniel Arp, Martin Johns, and Konrad Rieck. "Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning." In 29th {USENIX} Security Symposium ({USENIX} Security 20). 2020.
- Y. Chen, C. Shen, C. Wang, Q. Xiao, K. Li and Y. Chen, "Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications," in IEEE Transactions on Dependable and Secure Computing.
Topic 29 (AML):
Evasion Attack
|
| |
| |
Primary: |
- Biggio, B., Corona, I., Maiorca, D., Nelson, B., Šrndić, N., Laskov, P., ... & Roli, F. (2013, September). Evasion attacks against machine learning at test time. In Joint European conference on machine learning and knowledge discovery in databases (pp. 387-402). Springer, Berlin, Heidelberg.
|
| |
| |
Secondary: |
- J. Su, D. V. Vargas and K. Sakurai, "One Pixel Attack for Fooling Deep Neural Networks," in IEEE Transactions on Evolutionary Computation, vol. 23, no. 5, pp. 828-841, Oct. 2019, doi: 10.1109/TEVC.2019.2890858.
- J. Gao, J. Lanchantin, M. L. Soffa and Y. Qi, "Black-Box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers," 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, 2018, pp. 50-56, doi: 10.1109/SPW.2018.00016.
- Demontis, Ambra, Marco Melis, Maura Pintor, Matthew Jagielski, Battista Biggio, Alina Oprea, Cristina Nita-Rotaru, and Fabio Roli. "Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks." In 28th {USENIX} Security Symposium ({USENIX} Security 19), pp. 321-338. 2019.
Topic 30 (AML):
Membership Inference Attack
|
| |
| |
Primary: |
- R. Shokri, M. Stronati, C. Song and V. Shmatikov, "Membership Inference Attacks Against Machine Learning Models," 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, 2017.
|
| |
| |
Secondary: |
- Hayes, J., Melis, L., Danezis, G., & De Cristofaro, E. (2019). LOGAN: Membership inference attacks against generative models. Proceedings on Privacy Enhancing Technologies, 2019(1), 133-152.
- Jinyuan Jia, Ahmed Salem, Michael Backes, Yang Zhang, and Neil Zhenqiang Gong. 2019. MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19).
Topic 31 (MLS):
Lie Detection
|
| |
| |
Primary: |
- Monaro, M., Galante, C., Spolaor, R., Li, Q. Q., Gamberini, L., Conti, M., & Sartori, G. (2018). Covert lie detection using keyboard dynamics. Scientific reports, 8(1), 1-10.
|
| |
| |
Secondary: |
- Jia, Shan, Shuo Wang, Chuanbo Hu, Paula Webster, and Xin Li. "Detection of Genuine and Posed Facial Expressions of Emotion: A Review." arXiv preprint arXiv:2008.11353 (2020).
- Monaro, Merylin, Luciano Gamberini, and Giuseppe Sartori. "The detection of faked identity using unexpected questions and mouse dynamics." PloS one 12, no. 5 (2017): e0177851.
Topic 32 (MLS):
Continuous Authentication
|
| |
| |
Primary: |
- Feng, Huan, Kassem Fawaz, and Kang G. Shin. "Continuous authentication for voice assistants." In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, pp. 343-355. 2017.
|
| |
| |
Secondary: |
- Camara, Carmen, Pedro Peris-Lopez, Lorena Gonzalez-Manzano, and Juan Tapiador. "Real-time electrocardiogram streams for continuous authentication." Applied Soft Computing 68 (2018): 784-794.
- Y. Liang, S. Samtani, B. Guo and Z. Yu, "Behavioral Biometrics for Continuous Authentication in the Internet-of-Things Era: An Artificial Intelligence Perspective," in IEEE Internet of Things Journal, vol. 7, no. 9, pp. 9128-9143, Sept. 2020.
Topic 33 (MLS):
Behavioural Biometrics
|
| |
| |
Primary: |
- Simon Eberz, Kasper B. Rasmussen, Vincent Lenders, and Ivan Martinovic. 2017. Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17).
|
| |
| |
Secondary: |
- S. Bhatt and T. Santhanam, "Keystroke dynamics for biometric authentication — A survey," 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, Salem, 2013.
- A. Alzubaidi and J. Kalita, "Authentication of Smartphone Users Using Behavioral Biometrics," in IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 1998-2026, thirdquarter 2016.
Topic 34 (MISC):
Covert Channel
|
| |
| |
Primary: |
- S. Zander, G. Armitage and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," in IEEE Communications Surveys & Tutorials, vol. 9, no. 3, pp. 44-57, Third Quarter 2007.
|
| |
| |
Secondary: |
- Xuhang Ying, Giuseppe Bernieri, Mauro Conti, and Radha Poovendran. 2019. TACAN: transmitter authentication through covert channels in controller area networks. In Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS '19).
- J. M. Taylor and H. R. Sharif, "Enhancing integrity of modbus TCP through covert channels," 2017 11th International Conference on Signal Processing and Communication Systems (ICSPCS), Gold Coast, QLD, 2017.
Topic 35 (MLS):
Privacy in Online Gaming
|
| |
| |
Primary: |
- D. Martinovic, V. Ralevich, J. McDougall and M. Perklin, "You are what you play: Breaching privacy and identifying users in online gaming," 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, 2014.
|
| |
| |
Secondary: |
- Moon, Sumyung, Joel R. Reidenberg, and N. Cameron Russell. "Privacy in Gaming and Virtual Reality Technologies: Review of Academic Literature." (2017).
- Newman, Joe, and Joseph Jerome. "Press Start to Track Privacy and the New Questions Posed by Modern Video Game Technology." AIPLA QJ 42 (2014): 527.
Topic 36 (MISC):
Deauthentication
|
| |
| |
Primary: |
- Kaczmarek, Tyler, Ercan Ozturk, and Gene Tsudik. "Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric." In International Conference on Applied Cryptography and Network Security, pp. 616-633. Springer, Cham, 2018.
|
| |
| |
Secondary: |
- M. Conti, G. Lovisotto, I. Martinovic and G. Tsudik, "FADEWICH: Fast Deauthentication Over the Wireless Channel," 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, 2017.
- S. Mare, A. M. Markham, C. Cornelius, R. Peterson and D. Kotz, "ZEBRA: Zero-Effort Bilateral Recurring Authentication," 2014 IEEE Symposium on Security and Privacy, San Jose, CA, 2014.
- A. A. Ahmed and I. Traore, "Biometric Recognition Based on Free-Text Keystroke Dynamics," in IEEE Transactions on Cybernetics, vol. 44, no. 4, pp. 458-472, April 2014.
Topic 37 (MISC):
Blockchain applications
|
| |
| |
Primary: |
- McCorry, Patrick, Siamak F. Shahandashti, and Feng Hao. "A smart contract for boardroom voting with maximum voter privacy." In International Conference on Financial Cryptography and Data Security, pp. 357-375. Springer, Cham, 2017.
|
| |
| |
Secondary: |
- Dr. Christian Lundkvist, Rouven Heck, Joel Torstensson, Zac Mitton, Michael Sena. UPORT: A Platform for Self-Sovereign Identification.
- Ekblaw, Ariel, Asaph Azaria, John D. Halamka, and Andrew Lippman. "A Case Study for Blockchain in Healthcare: MedRec prototype for electronic health records and medical research data." In Proceedings of IEEE open & big data conference, vol. 13, p. 13. 2016.
- Maesa, Damiano Di Francesco, Paolo Mori, and Laura Ricci. "Blockchain based access control." In IFIP international conference on distributed applications and interoperable systems, pp. 206-220. Springer, Cham, 2017.
Topic 38 (CPS):
Social Network Analysis
|
| |
| |
Primary: |
- Can, Umit, and Bilal Alatas. "A new direction in social network analysis: Online social network analysis problems and applications." Physica A: Statistical Mechanics and its Applications 535 (2019): 122372.
|
| |
| |
Secondary: |
- Dominic Rout, Kalina Bontcheva, Daniel Preoţiuc-Pietro, and Trevor Cohn. 2013. Where's @wally? a classification approach to geolocating users based on their social ties. In Proceedings of the 24th ACM Conference on Hypertext and Social Media (HT '13).
- Colladon, Andrea Fronzetti, and Elisa Remondi. "Using social network analysis to prevent money laundering." Expert Systems with Applications 67 (2017): 49-58.
- J. Vosecky, D. Hong and V. Y. Shen, "User identification across multiple social networks," 2009 First International Conference on Networked Digital Technologies, Ostrava, 2009.
Topic 39 (CPS):
IoT Security
|
| |
| |
Primary: |
- R. Mahmoud, T. Yousuf, F. Aloul and I. Zualkernan, "Internet of things (IoT) security: Current status, challenges and prospective measures," 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
|
| |
| |
Secondary: |
- A. Dorri, S. S. Kanhere, R. Jurdak and P. Gauravaram, "Blockchain for IoT security and privacy: The case study of a smart home," 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
- Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, and Matthias Schunter. 2016. SANA: Secure and Scalable Aggregate Network Attestation. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16).
- L. Xiao, X. Wan, X. Lu, Y. Zhang and D. Wu, "IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?," in IEEE Signal Processing Magazine, vol. 35, no. 5, pp. 41-49, Sept. 2018.
Topic 40 (CPS):
Identity of Things
|
| |
| |
Primary: |
- Mahalle, Parikshit, Sachin Babar, Neeli R. Prasad, and Ramjee Prasad. "Identity management framework towards internet of things (IoT): Roadmap and key challenges." In International Conference on Network Security and Applications, pp. 430-439. Springer, Berlin, Heidelberg, 2010.
|
| |
| |
Secondary: |
- O. Salman, S. Abdallah, I. H. Elhajj, A. Chehab and A. Kayssi, "Identity-based authentication scheme for the Internet of Things," 2016 IEEE Symposium on Computers and Communication (ISCC), Messina, 2016.
- Lam, Kwok-Yan, and Chi-Hung Chi. "Identity in the Internet-of-Things (IoT): New challenges and opportunities." In International Conference on Information and Communications Security, pp. 18-26. Springer, Cham, 2016.
- Zhu, Xiaoyang, and Youakim Badr. "Identity management systems for the internet of things: a survey towards blockchain solutions." Sensors 18, no. 12 (2018): 4215.
Topic 41 (MISC):
Image Forensics
|
| |
| |
Primary: |
- M. Chen, J. Fridrich, M. Goljan and J. Lukas, "Determining Image Origin and Integrity Using Sensor Noise," in IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 74-90, March 2008.
|
| |
| |
Secondary: |
- I. Amerini, R. Caldelli, V. Cappellini, F. Picchioni and A. Piva, "Analysis of denoising filters for photo response non uniformity noise extraction in source camera identification," 2009 16th International Conference on Digital Signal Processing, Santorini-Hellas, 2009.
- I. Amerini, C. Li and R. Caldelli, "Social Network Identification Through Image Classification With CNN," in IEEE Access, vol. 7, pp. 35264-35273, 2019.
Topic 42 (MISC):
Side Channel Attacks
|
| |
| |
Primary: |
- M. A. Al Faruque, S. R. Chhetri, A. Canedo and J. Wan, "Acoustic Side-Channel Attacks on Additive Manufacturing Systems," 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), Vienna, 2016.
|
| |
| |
Secondary: |
- A. Gangwal and M. Conti, "Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 1630-1639, 2020.
- Hutter, M., & Schmidt, J. M. (2013, November). The temperature side channel and heating fault attacks. In International Conference on Smart Card Research and Advanced Applications (pp. 219-235). Springer, Cham.
- Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, and Yinqian Zhang. 2017. Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17).
Topic 43 (MISC):
Online Users Privacy
|
| |
| |
Primary: |
- Hasan, R., Crandall, D., Fritz, M., & Kapadia, A. (2020). Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.
|
| |
| |
Secondary: |
- E. Aghasian, S. Garg, L. Gao, S. Yu and J. Montgomery, "Scoring Users Privacy Disclosure Across Multiple Online Social Networks," in IEEE Access, vol. 5, pp. 13118-13130, 2017.
- B. Rashidi, C. Fung, A. Nguyen, T. Vu and E. Bertino, "Android User Privacy Preserving Through Crowdsourcing," in IEEE Transactions on Information Forensics and Security.
Topic 44 (MISC):
Social Networks Users Behaviours
|
| |
| |
Primary: |
- Del Vicario, et al. (2016). The spreading of misinformation online. Proceedings of the National Academy of Sciences, 113(3), 554-559.
|
| |
| |
Secondary: |
- Del Vicario, M., Vivaldo, G., Bessi, A., Zollo, F., Scala, A., Caldarelli, G., Quattrociocchi, W. (2016). Echo chambers: Emotional contagion and group polarization on facebook. Scientific reports, 6, 37825.
- Bessi, A., & Ferrara, E. (2016). Social bots distort the 2016 US Presidential election online discussion. First Monday, 21(11-7).
- Schmidt, A. L., Zollo, F., Scala, A., Betsch, C., & Quattrociocchi, W. (2018). Polarization of the vaccination debate on Facebook. Vaccine, 36(25), 3606-3612.
Topic 45 (MISC):
Clickbait
|
| |
| |
Primary: |
- A. Agrawal, "Clickbait detection using deep learning," 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, 2016.
|
| |
| |
Secondary: |
- Peter Bourgonje, Julian Moreno Schneider, Georg Rehm. From Clickbait to Fake News Detection: An Approach based on Detecting the Stance of Headlines to Articles. Proceedings of the 2017 EMNLP Workshop: Natural Language Processing meets Journalism.
- Yimin Chen, Niall J. Conroy, and Victoria L. Rubin. 2015. Misleading Online Content: Recognizing Clickbait as "False News". In Proceedings of the 2015 ACM on Workshop on Multimodal Deception Detection (WMDD '15).
- Chakraborty, Abhijnan, Bhargavi Paranjape, Sourya Kakarla, and Niloy Ganguly. "Stop clickbait: Detecting and preventing clickbaits in online news media." In 2016 ieee/acm international conference on advances in social networks analysis and mining (asonam), pp. 9-16. IEEE, 2016.
Topic 46 (MLS):
Fake News Detection
|
| |
| |
Primary: |
- Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, and Huan Liu. 2017. Fake News Detection on Social Media: A Data Mining Perspective. SIGKDD Explor. Newsl. 19, 1 (June 2017)
|
| |
| |
Secondary: |
- William Yang Wang. Liar, Liar Pants on Fire": A New Benchmark Dataset for Fake News Detection. 2017.
- Kai Shu, Limeng Cui, Suhang Wang, Dongwon Lee, and Huan Liu. 2019. DEFEND: Explainable Fake News Detection. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '19).
- Kai Shu, Suhang Wang, and Huan Liu. 2019. Beyond News Contents: The Role of Social Context for Fake News Detection. In Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining (WSDM '19).
Topic 47 (MLS / CPS):
Security in RPL (IoT)
|
| |
| |
Primary: |
- A. Raoof, A. Matrawy and C. Lung, "Routing Attacks and Mitigation Methods for RPL-Based Internet of Things," in IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1582-1606, Secondquarter 2019.
|
| |
| |
Secondary: |
- Raza, Shahid, Linus Wallgren, and Thiemo Voigt. "SVELTE: Real-time intrusion detection in the Internet of Things." Ad hoc networks 11, no. 8 (2013): 2661-2674.
- Kim, Hyung-Sin, Jeonggil Ko, David E. Culler, and Jeongyeup Paek. "Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): A survey." IEEE Communications Surveys & Tutorials 19, no. 4 (2017): 2502-2525.
Last update: 2020-09-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |