ACSAC'22 特刊简介

Martina Lindorfer, Gianluca Stringhini
{"title":"ACSAC'22 特刊简介","authors":"Martina Lindorfer, Gianluca Stringhini","doi":"10.1145/3659210","DOIUrl":null,"url":null,"abstract":"The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. ACSAC’s core mission is to investigate practical solutions for computer and network security technology.\n \n The 38th ACSAC was held in Austin, Texas from December 5-9, 2022. As in the previous year, ACSAC especially encouraged contributions on a hard topic theme, in this year in the area of\n Trustworthy Systems\n . Trustworthy systems generally involve the development of capabilities that offer security, safety, and reliability guarantees. ACSAC has always solicited work on applied security; with this hard topic, we put great emphasize on deployable trustworthy systems, including (but not limited to) approaches applied at the intersection of operation systems, formal methods, and programming languages; approaches applied at the architecture level; trustworthy artificial intelligence with emphasize on explainability, correctness, and robustness to attacks; zero-trust solutions that assume no implicit trust, but continually assess risk; and trustworthy systems form a user’s perspective. This topic does not necessarily mean building a complete solution, but identifying key challenges, explaining the deficiencies in state-of-the-art solutions, and demonstrating the effectiveness of the proposed approaches and (potential) impact to the real world.\n \n In addition, ACSAC continues to encourage authors of accepted papers to submit software and data artifacts and make them publicly available to the entire community. Releasing software and data artifacts represents an important step towards facilitating the reproducibility of research results, and ultimately contributes to the real-world deployment of novel security solutions.\n For this special issue we invited authors of papers that appeared at ACSAC 2022 and that successfully passed an evaluation of their software and/or data artifacts to submit an extended version of their papers. This selection criteria ensured that the research has a high potential for being deployed in real-world environments and to be used to implement practical defense systems.\n This volume contains three manuscripts on topics from three different areas: IoT security and privacy, adversarial machine learning, and backdoor attacks against federated learning.\n In “SPACELORD: Private and Secure Smart Space Sharing,” Bae et al. address security and privacy issues of smart devices when installed in shared spaces, such as vacation rentals and co-working meeting rooms. Their approach allows for securely time-sharing by transferring control and the configuration of devices to temporary users, as well as resetting devices and removing any private information when a user leaves a space. The authors extended their original solution with different hardware and software configurations, a discussion of alternative designs, compatibility with existing systems, and design limitations.\n In “Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning,” Yuan et al. systematically compare adversarial attacks against machine learning systems for the detection of phishing websites. They investigate how realistic different attacks are by performing 12 different attacks and considering different models, feature spaces, and datasets. The authors also formalize and compare evasion-spaces, e.g., perturbations in the problem-space with those in the feature-space. The authors extended their original work with additional experiments and considering more perturbations, as well as the definition and investigation of multi-space attacks considering attackers that introduce perturbations across spaces.\n In “Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks,” Xu et al. investigate two types of backdoor attacks against federated learning, in particular graph neural networks: centralized backdoor attacks and distributed backdoor attacks. The authors evaluate the performance of these attacks in different scenarios, as well as their resilience to two defense mechanisms. The authors extended their original experiments with two new datasets to explore attacks in real-world application scenarios, as well investigate the effectiveness of an additional defense mechanism.\n As Associate Editors for this special issue, we are very pleased that the authors of the above papers have significantly extended and improved their ACSAC’22 publications, and that they provide their artifacts to the public to foster the reproducibility of their research results.\n We wish to thank the authors, reviewers and ACSAC’22 program committee members who have contributed to selecting the papers that appear in this special issue. We would also like to thank the DTRAP Co-Editors in Chief and the ACM for the opportunity to work on this special issue.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":" 19","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Introduction to the ACSAC’22 Special Issue\",\"authors\":\"Martina Lindorfer, Gianluca Stringhini\",\"doi\":\"10.1145/3659210\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. ACSAC’s core mission is to investigate practical solutions for computer and network security technology.\\n \\n The 38th ACSAC was held in Austin, Texas from December 5-9, 2022. As in the previous year, ACSAC especially encouraged contributions on a hard topic theme, in this year in the area of\\n Trustworthy Systems\\n . Trustworthy systems generally involve the development of capabilities that offer security, safety, and reliability guarantees. ACSAC has always solicited work on applied security; with this hard topic, we put great emphasize on deployable trustworthy systems, including (but not limited to) approaches applied at the intersection of operation systems, formal methods, and programming languages; approaches applied at the architecture level; trustworthy artificial intelligence with emphasize on explainability, correctness, and robustness to attacks; zero-trust solutions that assume no implicit trust, but continually assess risk; and trustworthy systems form a user’s perspective. This topic does not necessarily mean building a complete solution, but identifying key challenges, explaining the deficiencies in state-of-the-art solutions, and demonstrating the effectiveness of the proposed approaches and (potential) impact to the real world.\\n \\n In addition, ACSAC continues to encourage authors of accepted papers to submit software and data artifacts and make them publicly available to the entire community. Releasing software and data artifacts represents an important step towards facilitating the reproducibility of research results, and ultimately contributes to the real-world deployment of novel security solutions.\\n For this special issue we invited authors of papers that appeared at ACSAC 2022 and that successfully passed an evaluation of their software and/or data artifacts to submit an extended version of their papers. This selection criteria ensured that the research has a high potential for being deployed in real-world environments and to be used to implement practical defense systems.\\n This volume contains three manuscripts on topics from three different areas: IoT security and privacy, adversarial machine learning, and backdoor attacks against federated learning.\\n In “SPACELORD: Private and Secure Smart Space Sharing,” Bae et al. address security and privacy issues of smart devices when installed in shared spaces, such as vacation rentals and co-working meeting rooms. Their approach allows for securely time-sharing by transferring control and the configuration of devices to temporary users, as well as resetting devices and removing any private information when a user leaves a space. The authors extended their original solution with different hardware and software configurations, a discussion of alternative designs, compatibility with existing systems, and design limitations.\\n In “Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning,” Yuan et al. systematically compare adversarial attacks against machine learning systems for the detection of phishing websites. They investigate how realistic different attacks are by performing 12 different attacks and considering different models, feature spaces, and datasets. The authors also formalize and compare evasion-spaces, e.g., perturbations in the problem-space with those in the feature-space. The authors extended their original work with additional experiments and considering more perturbations, as well as the definition and investigation of multi-space attacks considering attackers that introduce perturbations across spaces.\\n In “Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks,” Xu et al. investigate two types of backdoor attacks against federated learning, in particular graph neural networks: centralized backdoor attacks and distributed backdoor attacks. The authors evaluate the performance of these attacks in different scenarios, as well as their resilience to two defense mechanisms. The authors extended their original experiments with two new datasets to explore attacks in real-world application scenarios, as well investigate the effectiveness of an additional defense mechanism.\\n As Associate Editors for this special issue, we are very pleased that the authors of the above papers have significantly extended and improved their ACSAC’22 publications, and that they provide their artifacts to the public to foster the reproducibility of their research results.\\n We wish to thank the authors, reviewers and ACSAC’22 program committee members who have contributed to selecting the papers that appear in this special issue. We would also like to thank the DTRAP Co-Editors in Chief and the ACM for the opportunity to work on this special issue.\",\"PeriodicalId\":202552,\"journal\":{\"name\":\"Digital Threats: Research and Practice\",\"volume\":\" 19\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-04-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Digital Threats: Research and Practice\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3659210\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Threats: Research and Practice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3659210","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

计算机安全应用年会(ACSAC)汇聚了来自学术界、工业界和政府部门的尖端研究人员和广泛的安全专业人士,共同展示和讨论最新的安全成果和话题。ACSAC 的核心任务是研究计算机和网络安全技术的实用解决方案。 第 38 届 ACSAC 于 2022 年 12 月 5 日至 9 日在得克萨斯州奥斯汀举行。与往年一样,ACSAC 今年特别鼓励在 "可信系统"(Trustworthy Systems)这一难点主题上投稿。可信系统一般涉及开发提供安全性、安全性和可靠性保证的能力。ACSAC 一直在征集应用安全方面的作品;在这一难点主题下,我们将重点放在可部署的可信系统上,包括(但不限于)应用于操作系统、形式化方法和编程语言交叉领域的方法;应用于架构层面的方法;强调可解释性、正确性和对攻击的鲁棒性的可信人工智能;假定没有隐含信任但持续评估风险的零信任解决方案;以及从用户角度出发的可信系统。这一主题并不一定意味着要建立一个完整的解决方案,而是要确定关键挑战,解释最先进解决方案的不足之处,并展示所建议方法的有效性以及对现实世界的(潜在)影响。 此外,ACSAC 还继续鼓励被录用论文的作者提交软件和数据成果,并向整个社区公开。发布软件和数据工件是促进研究成果可复制性的重要一步,最终有助于新型安全解决方案在现实世界中的部署。在本特刊中,我们邀请曾在 ACSAC 2022 上发表论文并成功通过软件和/或数据工件评估的作者提交其论文的扩展版本。这一选择标准确保了研究成果具有在现实环境中部署并用于实施实用防御系统的巨大潜力。本卷包含三篇手稿,涉及三个不同领域的主题:物联网安全与隐私、对抗式机器学习以及针对联合学习的后门攻击。在 "SPACELORD:私密安全的智能空间共享 "中,Bae 等人探讨了智能设备安装在共享空间(如度假出租房和联合办公会议室)时的安全和隐私问题。他们的方法通过将设备的控制和配置转移给临时用户,以及在用户离开空间时重置设备和删除任何私人信息,实现了安全的分时共享。作者通过不同的硬件和软件配置扩展了他们最初的解决方案,讨论了替代设计、与现有系统的兼容性以及设计限制。在 "Multi-SpacePhish:利用机器学习扩展针对钓鱼网站检测器的对抗性攻击的规避空间 "中,Yuan 等人系统地比较了针对钓鱼网站检测的机器学习系统的对抗性攻击。他们通过实施 12 种不同的攻击,并考虑不同的模型、特征空间和数据集,研究了不同攻击的现实性。作者还形式化并比较了规避空间,例如问题空间中的扰动与特征空间中的扰动。作者通过更多的实验和考虑更多的扰动,以及考虑到攻击者在不同空间引入扰动,对多空间攻击进行了定义和研究,从而扩展了他们的原创工作。在 "揭开威胁的面纱:研究联合图神经网络中的分布式和集中式后门攻击 "一文中,Xu 等人研究了针对联合学习(尤其是图神经网络)的两类后门攻击:集中式后门攻击和分布式后门攻击。作者评估了这些攻击在不同场景下的表现,以及它们对两种防御机制的抵御能力。作者利用两个新数据集扩展了原始实验,以探索真实世界应用场景中的攻击,并研究了一种额外防御机制的有效性。作为本特刊的副主编,我们非常高兴上述论文的作者对其在 ACSAC'22 发表的论文进行了大幅扩展和改进,并向公众提供了他们的成果,以促进其研究成果的可重复性。我们衷心感谢为遴选本特刊所载论文做出贡献的作者、审稿人和 ACSAC'22 项目委员会成员。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Introduction to the ACSAC’22 Special Issue
The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals drawn from academia, industry, and government, gathered to present and discuss the latest security results and topics. ACSAC’s core mission is to investigate practical solutions for computer and network security technology. The 38th ACSAC was held in Austin, Texas from December 5-9, 2022. As in the previous year, ACSAC especially encouraged contributions on a hard topic theme, in this year in the area of Trustworthy Systems . Trustworthy systems generally involve the development of capabilities that offer security, safety, and reliability guarantees. ACSAC has always solicited work on applied security; with this hard topic, we put great emphasize on deployable trustworthy systems, including (but not limited to) approaches applied at the intersection of operation systems, formal methods, and programming languages; approaches applied at the architecture level; trustworthy artificial intelligence with emphasize on explainability, correctness, and robustness to attacks; zero-trust solutions that assume no implicit trust, but continually assess risk; and trustworthy systems form a user’s perspective. This topic does not necessarily mean building a complete solution, but identifying key challenges, explaining the deficiencies in state-of-the-art solutions, and demonstrating the effectiveness of the proposed approaches and (potential) impact to the real world. In addition, ACSAC continues to encourage authors of accepted papers to submit software and data artifacts and make them publicly available to the entire community. Releasing software and data artifacts represents an important step towards facilitating the reproducibility of research results, and ultimately contributes to the real-world deployment of novel security solutions. For this special issue we invited authors of papers that appeared at ACSAC 2022 and that successfully passed an evaluation of their software and/or data artifacts to submit an extended version of their papers. This selection criteria ensured that the research has a high potential for being deployed in real-world environments and to be used to implement practical defense systems. This volume contains three manuscripts on topics from three different areas: IoT security and privacy, adversarial machine learning, and backdoor attacks against federated learning. In “SPACELORD: Private and Secure Smart Space Sharing,” Bae et al. address security and privacy issues of smart devices when installed in shared spaces, such as vacation rentals and co-working meeting rooms. Their approach allows for securely time-sharing by transferring control and the configuration of devices to temporary users, as well as resetting devices and removing any private information when a user leaves a space. The authors extended their original solution with different hardware and software configurations, a discussion of alternative designs, compatibility with existing systems, and design limitations. In “Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning,” Yuan et al. systematically compare adversarial attacks against machine learning systems for the detection of phishing websites. They investigate how realistic different attacks are by performing 12 different attacks and considering different models, feature spaces, and datasets. The authors also formalize and compare evasion-spaces, e.g., perturbations in the problem-space with those in the feature-space. The authors extended their original work with additional experiments and considering more perturbations, as well as the definition and investigation of multi-space attacks considering attackers that introduce perturbations across spaces. In “Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks,” Xu et al. investigate two types of backdoor attacks against federated learning, in particular graph neural networks: centralized backdoor attacks and distributed backdoor attacks. The authors evaluate the performance of these attacks in different scenarios, as well as their resilience to two defense mechanisms. The authors extended their original experiments with two new datasets to explore attacks in real-world application scenarios, as well investigate the effectiveness of an additional defense mechanism. As Associate Editors for this special issue, we are very pleased that the authors of the above papers have significantly extended and improved their ACSAC’22 publications, and that they provide their artifacts to the public to foster the reproducibility of their research results. We wish to thank the authors, reviewers and ACSAC’22 program committee members who have contributed to selecting the papers that appear in this special issue. We would also like to thank the DTRAP Co-Editors in Chief and the ACM for the opportunity to work on this special issue.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Causal Inconsistencies are Normal in Windows Memory Dumps (too) InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations Does Cyber Insurance promote Cyber Security Best Practice? An Analysis based on Insurance Application Forms Unveiling Cyber Threat Actors: A Hybrid Deep Learning Approach for Behavior-based Attribution A Framework for Enhancing Social Media Misinformation Detection with Topical-Tactics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1