Security and Privacy
Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Maintaining Security Consistency During System Development with Security-Oriented Model Federation
ICSSP '24: Proceedings of the 2024 International Conference on Software and Systems ProcessesSeptember 2024, Pages 66–76https://doi.org/10.1145/3666015.3666016Multi-modeling is an approach within the MDE realm that promotes the development of complex systems by decomposing them in sets of heterogeneous models. These models are defined using different modeling languages and constructed using diverse tools. ...
- research-articleJuly 2024
A Hitchhiker’s Guide to Jailbreaking ChatGPT via Prompt Engineering
- Yi Liu,
- Gelei Deng,
- Zhengzi Xu,
- Yuekang Li,
- Yaowen Zheng,
- Ying Zhang,
- Lida Zhao,
- Tianwei Zhang,
- Kailong Wang
SEA4DQ 2024: Proceedings of the 4th International Workshop on Software Engineering and AI for Data Quality in Cyber-Physical Systems/Internet of ThingsJuly 2024, Pages 12–21https://doi.org/10.1145/3663530.3665021Natural language prompts serve as an essential interface between users and Large Language Models (LLMs) like GPT-3.5 and GPT-4, which are employed by ChatGPT to produce outputs across various tasks. However, prompts crafted with malicious intent, known ...
- research-articleJuly 2024
Federated Genetic Algorithm: Two-Layer Privacy-Preserving Trajectory Data Publishing
GECCO '24: Proceedings of the Genetic and Evolutionary Computation ConferenceJuly 2024, Pages 749–758https://doi.org/10.1145/3638529.3654200Nowadays, trajectory data is widely available and used in various real-world applications such as urban planning, navigation services, and location-based services. However, publishing trajectory data can potentially leak sensitive information about ...
- research-articleJuly 2024
A Self-adaptive Coevolutionary Algorithm
GECCO '24: Proceedings of the Genetic and Evolutionary Computation ConferenceJuly 2024, Pages 841–849https://doi.org/10.1145/3638529.3654132Coevolutionary algorithms are helpful computational abstractions of adversarial behavior and they demonstrate multiple ways that populations of competing adversaries influence one another. We introduce the ability for each competitor's mutation rate to ...
- research-articleJuly 2024
Using Genetic Algorithms for Privacy-Preserving Optimization of Multi-Objective Assignment Problems in Time-Critical Settings: An Application in Air Traffic Flow Management
GECCO '24: Proceedings of the Genetic and Evolutionary Computation ConferenceJuly 2024, Pages 1246–1254https://doi.org/10.1145/3638529.3654128In air traffic flow management (ATFM), temporarily reduced capacity in the European air traffic network leads to the Network Manager imposing a regulation, meaning that flights are assigned new arrival times on a first-planned, first-served basis. Some ...
- research-articleJuly 2024
Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys
GECCO '24: Proceedings of the Genetic and Evolutionary Computation ConferenceJuly 2024, Pages 1309–1317https://doi.org/10.1145/3638529.3654035Microsoft Active Directory (AD) is the default security management system for Window domain network. We study the problem of placing decoys in AD network to detect potential attacks. We model the problem as a Stackelberg game between an attacker and a ...
- research-articleJuly 2024
Genetic Meta Cipher
GECCO '24: Proceedings of the Genetic and Evolutionary Computation ConferenceJuly 2024, Pages 1264–1272https://doi.org/10.1145/3638529.3654018We present a concrete application of genetic algorithm in the field of cryptography. More precisely, we provide a new and original cryptographic symmetric encryption scheme called Genetic Meta Cipher (GMC) using the non-dominated sorting-based ...
- research-articleJuly 2024
A Systematic Exploration of Evolutionary Computation for the Design of Hardware-oriented Non-cryptographic Hash Functions
GECCO '24: Proceedings of the Genetic and Evolutionary Computation ConferenceJuly 2024, Pages 1255–1263https://doi.org/10.1145/3638529.3654009Non-cryptographic (NC) hash functions are crucial in high-speed search applications and probabilistic data structures (PDS) such as Bloom filters and Count-Min sketches for efficient lookups and counting. These operations necessitate execution at line ...
- research-articleJuly 2024JUST ACCEPTED
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models
The pre-trained language models (PLMs) aim to assist computers in various domains to provide natural and efficient language interaction and text processing capabilities. However, recent studies have shown that PLMs are highly vulnerable to malicious ...
- research-articleJuly 2024
Evolutionary Multi-objective Optimization for Contextual Adversarial Example Generation
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 101, Pages 2285–2308https://doi.org/10.1145/3660808The emergence of the 'code naturalness' concept, which suggests that software code shares statistical properties with natural language, paves the way for deep neural networks (DNNs) in software engineering (SE). However, DNNs can be vulnerable to certain ...
- research-articleJuly 2024
A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 89, Pages 2005–2027https://doi.org/10.1145/3660796Deep learning (DL) is a critical tool for real-world applications, and comprehensive testing of DL models is vital to ensure their quality before deployment. However, recent studies have shown that even subtle deviations in DL operators can result in ...
Demystifying Invariant Effectiveness for Securing Smart Contracts
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 79, Pages 1772–1795https://doi.org/10.1145/3660786Smart contract transactions associated with security attacks often exhibit distinct behavioral patterns compared with historical benign transactions before the attacking events. While many runtime monitoring and guarding mechanisms have been proposed to ...
- research-articleJuly 2024
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 75, Pages 1679–1702https://doi.org/10.1145/3660782Reverse engineers would acquire valuable insights from descriptive function names, which are absent in publicly released binaries. Recent advances in binary function name prediction using data-driven machine learning show promise. However, existing ...
- research-articleJuly 2024
TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 72, Pages 1609–1631https://doi.org/10.1145/3660779C++ is crucial in software development, providing low-level memory control for performance and supporting object-oriented programming to construct modular, reusable code structures. Consequently, tackling pointer analysis for C++ becomes challenging, ...
- research-articleJuly 2024
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 65, Pages 1447–1470https://doi.org/10.1145/3660772In recent years, the importance of smart contract security has been heightened by the increasing number of attacks against them. To address this issue, a multitude of static application security testing (SAST) tools have been proposed for detecting ...
- research-articleJuly 2024
On the Contents and Utility of IoT Cybersecurity Guidelines
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 63, Pages 1400–1423https://doi.org/10.1145/3660770Cybersecurity concerns of Internet of Things (IoT) devices and infrastructure are growing each year. In response, organizations worldwide have published IoT security guidelines to protect their citizens and customers by providing recommendations on the ...
- research-articleJuly 2024
BRF: Fuzzing the eBPF Runtime
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 52, Pages 1152–1171https://doi.org/10.1145/3643778The eBPF technology in the Linux kernel has been widely adopted for different applications, such as networking, tracing, and security, thanks to the programmability it provides. By allowing user-supplied eBPF programs to be executed directly in the ...
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 46, Pages 1019–1042https://doi.org/10.1145/3643772Timing side-channel attacks exploit secret-dependent execution time to fully or partially recover secrets of cryptographic implementations, posing a severe threat to software security. Constant-time programming discipline is an effective software-based ...
Evaluating Directed Fuzzers: Are We Heading in the Right Direction?
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 15, Pages 316–337https://doi.org/10.1145/3643741Directed fuzzing recently has gained significant attention due to its ability to reconstruct proof-of-concept (PoC) test cases for target code such as buggy lines or functions. Surprisingly, however, there has been no in-depth study on the way to ...
- research-articleJuly 2024
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 4, Pages 70–91https://doi.org/10.1145/3643730Nowadays, mobile apps have greatly facilitated our daily work and lives. They are often designed to work closely and interact with each other through app components for data and functionality sharing. The security of app components has been extensively ...