Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
IEEE CS Standards
Career Center
About Us
Subscribe to Newsletter
0
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
0
Home
Proceedings
ACSAC-WORKSHOPS
ACSAC-WORKSHOPS 2024
Generate Citations
2024 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)
Dec. 9 2024 to Dec. 10 2024
Honolulu, HI, USA
ISBN: 979-8-3315-3281-9
Table of Contents
Title Page I
Freely available from IEEE.
pp. 1-1
Title Page III
Freely available from IEEE.
pp. 3-3
Copyright
Freely available from IEEE.
pp. 4-4
Table of Contents
Freely available from IEEE.
pp. 5-9
Message from the Conference Chairs
Freely available from IEEE.
pp. 10-11
Message from the Workshop Chairs
Freely available from IEEE.
pp. 12-12
Message from the Sponsor: Applied Computer Security Associates (ACSA)
Freely available from IEEE.
pp. 13-14
ACSA Members
Freely available from IEEE.
pp. 15-15
Inherently Interpretable and Uncertainty-Aware Models for Online Learning in Cyber-Security Problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Benjamin Kolicic
,
Alberto Caron
,
Vasilios Mavroudis
,
Chris Hicks
Dark Watchdog: A Novel RAG-Driven System for Real-Time Detection and Analysis of Data Leaks on Dark Web Forums
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-19
by
Shing-Li Hung
,
Chung-Kuan Chen
,
Keisuke Furumoto
,
Takeshi Takahashi
,
Hung-Min Sun
Intrusion Detection Simplified: A Feature-free Approach to Traffic Classification Using Transformers
Full-text access may be available. Sign in or learn about subscription options.
pp. 20-29
by
Kohei Miyamoto
,
Chansu Han
,
Tao Ban
,
Takeshi Takahashi
,
Jun’Ichi Takeuchi
Balancing Safety and Security in Autonomous Driving Systems: A Machine Learning Approach with Safety-First Prioritization
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-41
by
Afshin Hasani
,
Mehran Alidoost Nia
,
Reza Ebrahimi Atani
Restoring Unintended Model Learning by Error Correcting Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-50
by
Nami Ashizawa
,
Toshiki Shibahara
,
Naoto Kiribuchi
,
Osamu Saisho
,
Naoto Yanai
Learning to Unfix: Towards ML Robustness in Vulnerability Detection via Structure-Aware Code Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-58
by
Muhammad Fakhrur Rozi
,
Takeshi Takahashi
Does Prompt-tuning Enhance Privacy in Large Language Models?
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-72
by
Tsunato Nakai
,
Kento Oonishi
,
Takuya Higashi
The Impact of Active Learning on Availability Data Poisoning for Android Malware Classifiers
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-84
by
Shae McFadden
,
Zeliang Kan
,
Lorenzo Cavallaro
,
Fabio Pierazzi
When AI Meets Code Analysis: A Study of Adversarial Attacks on Deep Learning-based Code Models via Program Transformation
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-96
by
Avilash Rath
,
Youpeng Li
,
Troy Davis
,
Braden Bronaugh
,
Darsh Poddar
,
Sophia Li
,
Xinda Wang
AdVul: Adversarial Attack against ML-based Vulnerability Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-107
by
Marina Katoh
,
Weiping Pei
,
Youye Xie
Assurance of Application Security on IIoT Platforms with Knowledge Augmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-119
by
Yannick Landeck
,
Dian Balta
,
Martin Wimmer
,
Christian Knierim
Towards Provable Security in Industrial Control Systems Via Dynamic Protocol Attestation
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-132
by
Arthur Amorim
,
Trevor Kann
,
Max Taylor
,
Lance Joneckis
MFAA: Historical Hash Based Multi-Factor Authentication and Authorization in IIoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-144
by
Eyasu Getahun Chekole
,
Jianying Zhou
Attacks on EtherNet/IP and Migrations through CIP Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-154
by
Alexander Gebhard
,
Debbie Perouli
Conducting Attack Scenarios and Forensic Techniques in a Virtual ICS Test Bed
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-162
by
Chris Churilla
MIND-IoT: Machine Intelligence and Data-Mining for IoT Threats
Full-text access may be available. Sign in or learn about subscription options.
pp. 163-170
by
Kwabena Aboagye-Otchere
,
Jorge Castillo
A Privacy-Preserving Byzantine-Aware Swarm Learning Framework for CTI
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-177
by
Marco Arazzi
,
Dincy R. Arikkat
,
Mert Cihangiroglu
,
Sameera K. M.
The Rings of Tracking: Evaluating Security and Privacy in the Smart Ring Ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-193
by
Johannes Ludwig
,
Veelasha Moonsamy
,
Matteo Große-Kampmann
Cyber Attack Detection for Internet of Health Things through Federated Deep Learning Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-200
by
Liyakathunisa
,
Zoya Riyaz Syeda
,
Riyaz Sohale Syed
MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance Data in Industrial IoT
Full-text access may be available. Sign in or learn about subscription options.
pp. 201-207
by
Bikash Saha
,
Nanda Rani
,
Sandeep Kumar Shukla
Generating Abuse Stories and Misuse Cases using Large Language Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-215
by
Carmen Cheh
,
Nan Shing Kham Shing
,
Reuben Lim
,
Binbin Chen
Software Vulnerability Detection Using LLM: Does Additional Information Help?
Full-text access may be available. Sign in or learn about subscription options.
pp. 216-223
by
Samiha Shimmi
,
Yash Saini
,
Mark Schaefer
,
Hamed Okhravi
,
Mona Rahimi
Retrieval of Network Packets Information Using a Generated Latent Space Representation for Network Analysis in Cyber Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-231
by
Ofir Manor
,
Ortal Lavi
,
Tomer Schwartz
,
Motoyoshi Sekiya
,
Junichi Suga
,
Kenji Hikichi
,
Yuki Unno
,
Andrés F. Murillo
Formal Trust and Threat Modeling Using Large Language Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-239
by
Zhihao Yao
Fine-tuning Large Language Models for DGA and DNS Exfiltration Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-247
by
Md Abu Sayed
,
Asif Rahman
,
Christopher Kiekintveld
,
Sebastian García
Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-254
by
Brandon J Walton
,
Mst Eshita Khatun
,
James M Ghawaly
,
Aisha Ali-Gombe
Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-261
by
Reza Fayyazi
,
Rozhina Taghdimi
,
Shanchieh Jay Yang
Automated Vulnerability Detection in Smart Contracts using Control Flow Graphs and Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 262-269
by
Charles Lohest
,
Samy Bettaieb
,
Axel Legay
Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 270-279
by
Sunpreet Arora
,
Andrew Beams
,
Panagiotis Chatzigiannis
,
Sebastian Meiser
,
Karan Patel
,
Srinivasan Raghuraman
,
Peter Rindal
,
Harshal Shah
,
Yizhen Wang
,
Yuhang Wu
,
Hao Yang
,
Mahdi Zamani
Fast and Secure Consensus Protocol for Ethereum 2.0
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-287
by
Shinsaku Naito
,
Kanta Matsuura
Blockchain-based Sustainability, Traceability, and Certification of Hydrogen Production
Full-text access may be available. Sign in or learn about subscription options.
pp. 288-298
by
Sultan Alshehhi
,
Ahmad Musamih
,
Khaled Salah
,
Ahmad Mayyas
,
Raja Jayaraman
Author Index
Freely available from IEEE.
pp. 299-300
Showing 40 out of 40