Default Cover Image

2024 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)

Dec. 9 2024 to Dec. 10 2024

Honolulu, HI, USA

ISBN: 979-8-3315-3281-9

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 3-3
CopyrightFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-9
Message from the Conference ChairsFreely available from IEEE.pp. 10-11
Message from the Workshop ChairsFreely available from IEEE.pp. 12-12
ACSA MembersFreely available from IEEE.pp. 15-15
Restoring Unintended Model Learning by Error Correcting CodeFull-text access may be available. Sign in or learn about subscription options.pp. 42-50
Does Prompt-tuning Enhance Privacy in Large Language Models?Full-text access may be available. Sign in or learn about subscription options.pp. 59-72
AdVul: Adversarial Attack against ML-based Vulnerability DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 97-107
Assurance of Application Security on IIoT Platforms with Knowledge AugmentationFull-text access may be available. Sign in or learn about subscription options.pp. 108-119
Towards Provable Security in Industrial Control Systems Via Dynamic Protocol AttestationFull-text access may be available. Sign in or learn about subscription options.pp. 120-132
MFAA: Historical Hash Based Multi-Factor Authentication and Authorization in IIoTFull-text access may be available. Sign in or learn about subscription options.pp. 133-144
Attacks on EtherNet/IP and Migrations through CIP SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 145-154
Conducting Attack Scenarios and Forensic Techniques in a Virtual ICS Test BedFull-text access may be available. Sign in or learn about subscription options.pp. 155-162
MIND-IoT: Machine Intelligence and Data-Mining for IoT ThreatsFull-text access may be available. Sign in or learn about subscription options.pp. 163-170
A Privacy-Preserving Byzantine-Aware Swarm Learning Framework for CTIFull-text access may be available. Sign in or learn about subscription options.pp. 171-177
The Rings of Tracking: Evaluating Security and Privacy in the Smart Ring EcosystemFull-text access may be available. Sign in or learn about subscription options.pp. 186-193
Cyber Attack Detection for Internet of Health Things through Federated Deep Learning TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 194-200
Generating Abuse Stories and Misuse Cases using Large Language ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 208-215
Software Vulnerability Detection Using LLM: Does Additional Information Help?Full-text access may be available. Sign in or learn about subscription options.pp. 216-223
Formal Trust and Threat Modeling Using Large Language ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 232-239
Fine-tuning Large Language Models for DGA and DNS Exfiltration DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 240-247
Automated Vulnerability Detection in Smart Contracts using Control Flow Graphs and Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 262-269
Fast and Secure Consensus Protocol for Ethereum 2.0Full-text access may be available. Sign in or learn about subscription options.pp. 280-287
Author IndexFreely available from IEEE.pp. 299-300
Showing 40 out of 40