Annual Computer Security Applications Conference
banner
acsacconf.bsky.social
Annual Computer Security Applications Conference
@acsacconf.bsky.social
One of the longest-running computer security conferences, more infos at: https://www.acsac.org


This year‘s edition:

Annual Computer Security Applications Conference (ACSAC) ACSAC 2025 | December 8-12, 2025 | Waikiki, Hawaii, USA
Ending the session, we saw Sun et al.'s "ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer" showcasing a robust method enhancing ViTs' defense against diverse adversarial threats. (www.acsac.org/2024/p...) 6/6
#ComputerVision #AdversarialAI
November 6, 2025 at 3:01 PM
The fourth paper in this session was Pagnotta et al.'s "TATTOOED: A Robust Deep #NeuralNetwork #Watermarking Scheme based on Spread-Spectrum Channel Coding", exploring a novel DNN watermarking technique resistant to removal methods and easy to use. (www.acsac.org/2024/p...) 5/6
November 6, 2025 at 3:01 PM
Following that was Zhang et al.'s "CIGA: Detecting Adversarial Samples via Critical Inference Graph Analysis," which explores how different layer connections help identify adversarial samples effectively. (www.acsac.org/2024/p...) 4/6
#ML #AdversarialAttacks #CyberSecurity
November 6, 2025 at 3:01 PM
Next in the session was Morsbach et al.'s "R+R: Understanding Hyperparameter Effects in DP-SGD," highlighting how synthesizing and testing existing conjectures can elucidate hyperparameter effects on privacy-utility trade-offs. (www.acsac.org/2024/p...) 3/6
#ML #ReplicationStudy
November 6, 2025 at 3:01 PM
The session began with Feng et al.'s "TILE: Input Structure Optimization for Neural Networks to Accelerate Secure Inference" showcasing a novel system to enhance Secure Inference efficiency. (www.acsac.org/2024/p...) 2/6
#CyberSecurity #AI #ML
November 6, 2025 at 3:01 PM
Last in the session was Brucker-Hahn et al.'s "CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments," introducing a novel framework enhancing #AccessControl in #microservices without code changes. (www.acsac.org/2024/p...) 6/6
#DevSecOps
October 23, 2025 at 2:01 PM
In the session's fourth slot was Alla et al.'s "Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments," showcasing a novel authentication method using ML and hardware flaws for enhanced security. (www.acsac.org/2024/p...) 5/6
October 23, 2025 at 2:01 PM
Third up was Yilmaz et al.'s "Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War," examining 1,257 websites hit by attacks, revealing varied success and resilience. (www.acsac.org/2024/p...) 4/6
#DDoS #Cyberwarfare #Ukraine
October 23, 2025 at 2:01 PM
Then came Bi et al.'s "Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks," revealing major #OECP vulnerabilities. (www.acsac.org/2024/p...) 3/6
#EdgeComputing #Cybersecurity
October 23, 2025 at 2:01 PM
First up in the session was Crowder et al.'s "I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques," developing a framework for analyzing #censorship across datasets. (www.acsac.org/2024/p...) 2/6
October 23, 2025 at 2:01 PM
Concluding the session was Draschbacher & Maar's "Manifest Problems: Analyzing Code Transparency for Android Application Bundles" which reveals severe design flaws in Google's Code Transparency scheme. (www.acsac.org/2024/p...) 6/6
#AndroidSecurity #AppSecurity #Cybersecurity
October 16, 2025 at 2:02 PM
Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (www.acsac.org/2024/p...) 5/6
#Cybersecurity #BinaryAnalysis
October 16, 2025 at 2:02 PM
In the session's third slot was Guo et al.'s "CryptoPyt: Unraveling Python Cryptographic APIs Misuse With Precise Static Taint Analysis," a study that enhances security with a novel AST for detecting API misuse. (www.acsac.org/2024/p...) 4/6
#CryptographicAPIs #Cybersecurity
October 16, 2025 at 2:02 PM
The second paper in this session was Arasteh et al.'s "BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables," showcasing a graph-based approach to vulnerability localization. (www.acsac.org/2024/p...) 3/6
#Cybersecurity
October 16, 2025 at 2:02 PM
First up in the session was Yadav & Wilson's "R+R: Security Vulnerability Dataset Quality Is Critical" which revealed the impact of dataset issues on LLMs in vulnerability detection. (www.acsac.org/2024/p...) 2/6
#AIsecurity #LLM #Cybersecurity
October 16, 2025 at 2:02 PM
Concluding the session was Srimoungchanh et al.'s "Assessing UAV Sensor Spoofing: More Than a GNSS Problem," which explores how sensor spoofing allows adversaries to control #UAVs beyond GNSS vulnerabilities. (www.acsac.org/2024/p...) 5/5
#Cybersecurity #DroneSecurity
October 9, 2025 at 4:42 PM
In the session's third slot was Wang et al.'s "VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs," showcasing a robust system for identifying and countering sensor threats in UAVs. (www.acsac.org/2024/p...) 4/5
#Cybersecurity #UAV
October 9, 2025 at 4:42 PM
Following that, we had Park et al.'s "Leveraging Intensity as a New Feature to Detect Physical Adversarial Attacks Against LiDARs," showcasing a method that analyzes pulse intensity to enhance detection accuracy. (www.acsac.org/2024/p...) 3/5
#Cybersecurity #AutonomousVehicles
October 9, 2025 at 4:42 PM
First was Xia & Chen's "Moiré Injection Attack: Compromising Autonomous Vehicle Safety via Exploiting Camera's Color Filter Array (CFA) to Inject Hidden Traffic Sign" presenting attacks on #AutonomousVehicles, deceiving #AI without human detection. (www.acsac.org/2024/p...) 2/5
October 9, 2025 at 4:41 PM