Annual Computer Security Applications Conference

@ACSAC_Conf@infosec.exchange
18 Followers
0 Following
301 Posts
One of the longest-running computer security conferences.
This year‘s edition:
Annual Computer Security Applications Conference (ACSAC) ACSAC 2025 | December 8–12, 2025 | Waikiki, Hawaii, USA
Websitehttps://www.acsac.org/
Concluding the session was Syrmoudis et al.'s "A Longitudinal Analysis of Corporate Data Portability Practices Across Industries," revealing stagnation in #DataPortability compliance and challenges in fostering competition. (https://www.acsac.org/2024/program/final/s53.html) 6/6
#DigitalMarket
Thereafter came Shin et al.'s "You Only Perturb Once: Bypassing (Robust) Ad-Blockers Using Universal Adversarial Perturbations", revealing vulnerabilities in ATS models to universal adversarial attacks. (https://www.acsac.org/2024/program/final/s363.html) 5/6
#Privacy #AdversarialAttacks #WebSecurity
Following that was Kondracki et al.'s "Ready or Not, Here I Come: Characterizing the Security of Prematurely-public Web Applications," revealing insights into web security gaps due to early #TLS certificate announcements. (https://www.acsac.org/2024/program/final/s195.html) 4/6
#WebSecurity #WebScanning
Continuing the session, we had Solomos et al.'s "Harnessing Multiplicity: Granular Browser Extension Fingerprinting through User Configurations," exploring the #PrivacyRisks of browser extension fingerprinting. (https://www.acsac.org/2024/program/final/s193.html) 3/6
#Cybersecurity #BrowserFingerprinting
First in the session came Dafalla et al.'s "Web-Armour: Mitigating Reconnaissance and Vulnerability Scanning with Scan-Impeding Delays in Web Deployments," which incurs delays of up to 396x in online settings. (https://www.acsac.org/2024/program/final/s190.html) 2/6
#InternetSecurity #CyberDefense
For this #ThrowbackThursday, we will look at #ACSAC2024's Web Security and Privacy session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/6
The final talk in the session was Shen et al.'s "T-Edge: Trusted Heterogeneous Edge Computing," detailing a secure ARM/FPGA design using TrustZone for cloud resources. (https://www.acsac.org/2024/program/final/s282.html) 6/6
#TrustedExecution #CloudComputing #ARM #FPGA
The fourth paper in this session was Fasano et al.'s "Hypervisor Dissociative Execution: Programming Guests for Monitoring, Management, and Security," detailing HyDE, a method for external program control of guest systems. (https://www.acsac.org/2024/program/final/s236.html) 5/6
#CloudSecurity #VMs
After that came Dhar et al.'s "Confidential Computing with Heterogeneous Devices at Cloud-Scale", proposing a security controller to protect non-TEE DSA nodes in cloud workloads. (https://www.acsac.org/2024/program/final/s297.html) 4/6
#CloudSecurity #ConfidentialCloud
The second paper was Deng et al.'s "ConProv: A Container-Aware Provenance System for Attack Investigation," presenting a novel approach to enhance container security investigations through precise provenance analysis. (https://www.acsac.org/2024/program/final/s230.html) 3/6
#ContainerSecurity #Provenance
×
Congratulations to Shriti Priya and Julian James Stephen for winning the Best Case Studies Presentation Award with their talk "A Policy Framework for Securing Cloud APIs by Combining Application Context with Generative AI" 👏👏👏