Skip to content

Latest commit

 

History

History
9 lines (8 loc) · 1.77 KB

ACM-SIGSAC-Conference-on-Computer-and-Communications-Security_CCS.md

File metadata and controls

9 lines (8 loc) · 1.77 KB

CCS (ACM SIGSAC Conference on Computer and Communications Security)

  • Cretu, A.M., Houssiau, F., Cully, A. and de Montjoye, Y.A., 2022, November. QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (pp. 623-637).
  • Fioraldi, A., Maier, D.C., Zhang, D. and Balzarotti, D., 2022, November. LibAFL: A framework to build modular and reusable fuzzers. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (pp. 1051-1065).
  • Deng, J., Chen, Y. and Xu, W., 2022, November. FenceSitter: Black-box, Content-Agnostic, and Synchronization-Free Enrollment-Phase Attacks on Speaker Recognition Systems. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (pp. 755-767).
  • Chen, Y., Bai, Y., Mitev, R., Wang, K., Sadeghi, A.R. and Xu, W., 2021, November. FakeWake: Understanding and mitigating fake wake-up words of voice assistants. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (pp. 1861-1883).
  • Choi, H., Kate, S., Aafer, Y., Zhang, X. and Xu, D., 2020, October. Cyber-physical inconsistency vulnerability identification for safety checks in robotic vehicles. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (pp. 263-278).
  • Bock, K., Hughey, G., Qiang, X. and Levin, D., 2019, November. Geneva: Evolving censorship evasion strategies. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (pp. 2199-2214).
  • Heelan, S., Melham, T. and Kroening, D., 2019, November. Gollum: Modular and greybox exploit generation for heap overflows in interpreters. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (pp. 1689-1706).