Volume 4, Issue 1March 2023Current Issue
Editor:
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
ISSN:2692-1626
EISSN:2576-5337
Bibliometrics
Skip Table Of Content Section
research-article
Open Access
CVSS: Ubiquitous and Broken
Article No.: 1, pp 1–12https://doi.org/10.1145/3491263

The Common Vulnerability Scoring System is at the core of vulnerability management for systems of private corporations to highly classified government networks, allowing organizations to prioritize remediation in descending order of risk. With a lack of ...

research-article
Open Access
Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques
Article No.: 2, pp 1–28https://doi.org/10.1145/3492327

Detecting anomalous behavior on smartphones is challenging since malware evolution. Other methodologies detect malicious behavior by analyzing static features of the application code or dynamic data samples obtained from hardware or software. Static ...

research-article
Open Access
CDNs’ Dark Side: Security Problems in CDN-to-Origin Connections
Article No.: 3, pp 1–22https://doi.org/10.1145/3499428

Content Delivery Networks (CDNs) play a vital role in today’s Internet ecosystem. To reduce the latency of loading a website’s content, CDNs deploy edge servers in different geographic locations. CDN providers also offer important security features ...

research-article
Open Access
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases
Article No.: 4, pp 1–18https://doi.org/10.1145/3507682

Enterprise environment often screens large-scale (millions of lines of code) codebases with static analysis tools to find bugs and vulnerabilities. Parfait is a static code analysis tool used in Oracle to find security vulnerabilities in industrial ...

research-article
Open Access
Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters
Article No.: 5, pp 1–24https://doi.org/10.1145/3519601

We present a kernel-level infrastructure that allows systemwide detection of malicious applications attempting to exploit cache-based side-channel attacks to break the process confinement enforced by standard operating systems. This infrastructure relies ...

research-article
Open Access
General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization
Article No.: 6, pp 1–28https://doi.org/10.1145/3519602

Distinguishing malicious anomalous activities from unusual but benign activities is a fundamental challenge for cyber defenders. Prior studies have shown that statistical user behavior analysis yields accurate detections by learning behavior profiles from ...

research-article
Open Access
COVID-19 Vaccination Certificates in the Darkweb
Article No.: 7, pp 1–17https://doi.org/10.1145/3530877

COVID-19 vaccines have been rolled out in many countries and with them a number of vaccination certificates. For instance, the EU is utilizing a digital certificate in the form of a QR-code that is digitally signed and can be easily validated throughout ...

research-article
Open Access
The Role of Machine Learning in Cybersecurity
Article No.: 8, pp 1–38https://doi.org/10.1145/3545574

Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment of ML in cybersecurity is still at an early stage, revealing a significant ...

research-article
Open Access
Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing
Article No.: 9, pp 1–24https://doi.org/10.1145/3551894

Zigbee is widely adopted as a resource-efficient wireless protocol in the IoT network. IoT devices from manufacturers have recently been affected due to major vulnerabilities in Zigbee protocol implementations. Security testing of Zigbee protocol ...

research-article
Open Access
LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses
Article No.: 10, pp 1–26https://doi.org/10.1145/3555721

Enterprise Internet of Things (E-IoT) systems allow users to control audio, video, scheduled events, lightning fixtures, door access, and relays in complex smart installations. These systems are widely used in government or smart private offices, smart ...

research-article
Open Access
APTHunter: Detecting Advanced Persistent Threats in Early Stages
Article No.: 11, pp 1–31https://doi.org/10.1145/3559768

We propose APTHunter, a system for prompt detection of Advanced and Persistent Threats (APTs) in early stages. We provide an approach for representing the indicators of compromise that appear in the cyber threat intelligence reports and the relationships ...

note
Open Access
AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection
Article No.: 12, pp 1–16https://doi.org/10.1145/3567675

Cyber attacks are omnipresent and their rapid detection is crucial for system security. Signature-based intrusion detection monitors systems for attack indicators and plays an important role in recognizing and preventing such attacks. Unfortunately, it is ...

research-article
Open Access
InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems
Article No.: 13, pp 1–31https://doi.org/10.1145/3567599

With wide adaptation of open-source Android into mobile devices by different device vendors, sophisticated malware are developed to exploit security vulnerabilities. As comprehensive security analysis on physical devices are impractical and costly, ...

research-article
Open Access
An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments
Article No.: 14, pp 1–29https://doi.org/10.1145/3569958

Assurance techniques such as adversary-centric security testing are an essential part of the risk assessment process for improving risk mitigation and response capabilities against cyber attacks. While the use of these techniques, including vulnerability ...

SECTION: Field Notes
note
Open Access
Zero Trust Architecture: Risk Discussion
Article No.: 15, pp 1–6https://doi.org/10.1145/3573892

Subjects

Comments

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!