Bibliometrics
Skip Table Of Content Section
research-article
ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards
Article No.: 12, pp 1–24https://doi.org/10.1145/3563693

Thermal cameras can reveal heat traces on user interfaces, such as keyboards. This can be exploited maliciously to infer sensitive input, such as passwords. While previous work considered thermal attacks that rely on visual inspection of simple image ...

research-article
Security Best Practices: A Critical Analysis Using IoT as a Case Study
Article No.: 13, pp 1–30https://doi.org/10.1145/3563392

Academic research has highlighted the failure of many Internet of Things (IoT) product manufacturers to follow accepted practices, while IoT security best practices have recently attracted considerable attention worldwide from industry and governments. ...

research-article
A Solicitous Approach to Smart Contract Verification
Article No.: 15, pp 1–28https://doi.org/10.1145/3564699

Smart contracts are tempting targets of attacks, as they often hold and manipulate significant financial assets, are immutable after deployment, and have publicly available source code, with assets estimated in the order of millions of dollars being lost ...

research-article
Open Access
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice
Article No.: 18, pp 1–36https://doi.org/10.1145/3567595

The integrity of the content a user is exposed to when browsing the web relies on a plethora of non-web technologies and an infrastructure of interdependent hosts, communication technologies, and trust relations. Incidents like the Chinese Great Cannon or ...

research-article
Open Access
Automated Security Assessments of Amazon Web Services Environments
Article No.: 20, pp 1–31https://doi.org/10.1145/3570903

Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing cloud operations, especially at large scales, can quickly become intractable. Customer-side issues such as ...

research-article
Open Access
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework
Article No.: 22, pp 1–33https://doi.org/10.1145/3571733

Autonomous transport is receiving increasing attention, with research and development activities already providing prototype implementations. In this article we focus on Autonomous Passenger Ships (APS), which are being considered as a solution for ...

Subjects

Comments

About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!