ACSAC_Conf Profile Banner
ACSAC Profile
ACSAC

@ACSAC_Conf

Followers
2K
Following
281
Media
659
Statuses
1K

One of the longest-running computer security conferences. This year‘s edition: Annual Computer Security Applications Conference (ACSAC) ACSAC 2025 | Dec 8-12

Waikiki, Hawaii, USA
Joined March 2011
Don't wanna be here? Send us removal request.
@ACSAC_Conf
ACSAC
2 days
The last paper presented was Yen et al.'s "SECvma: Virtualization-based Linux Kernel Protection for Arm," which introduces a new system for protecting the #Linux kernel's code integrity and confidentiality using virtualization. ( https://t.co/syPgPnOqZf) 6/6 #KernelSecurity
0
0
0
@ACSAC_Conf
ACSAC
2 days
Following that was Caulfield et al.'s "SpecCFA: Enhancing Control Flow Attestation and Auditing via Application-Aware Sub-Path Speculation," a novel approach optimizing control flow attestation for resource-constrained MCUs. ( https://t.co/470u03cxcX) 5/6 #ControlFlowAttestation
1
0
0
@ACSAC_Conf
ACSAC
2 days
Third in the session was Li et al.'s "Rust for Linux: Understanding Security Impact of Rust on the Linux Kernel," highlighting Rust's ability to eliminate many safety-related vulnerabilities in device drivers. ( https://t.co/X8P9Yjmthe) 4/6 #RustLang #KernelSecurity
1
0
0
@ACSAC_Conf
ACSAC
2 days
Second up was Kleftogiorgos et al.'s "Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software", showcasing reduced latency and enhanced security using Sidecar on modern processors. ( https://t.co/iQXY2m94po) 3/6 #Debugging #CyberSecurity
1
0
0
@ACSAC_Conf
ACSAC
2 days
Kicking off the session was Rösti et al.'s "I'll Be There for You! Perpetual Availability in the A^8 MVX System," showcasing breakthroughs in attack detection and recovery for critical software. ( https://t.co/FoXbqrfSKW) 2/6 #CyberSecurity #MVX
1
0
0
@ACSAC_Conf
ACSAC
2 days
For this #ThrowbackThursday, we will look at #ACSAC2024's System Security session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/6
1
0
0
@ACSAC_Conf
ACSAC
3 days
📣 The early bird deadline for #ACSAC2025 registrations is approaching! 📣 Register by this Saturday, 15th November to get a $200 discount on the registration and also ensure your seat at the lu’au conference dinner: https://t.co/9dULp86tqP
0
0
0
@ACSAC_Conf
ACSAC
9 days
Ending the session, we saw Sun et al.'s "ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer" showcasing a robust method enhancing ViTs' defense against diverse adversarial threats. ( https://t.co/mRR2FY6g9T) 6/6 #ComputerVision #AdversarialAI
0
0
0
@ACSAC_Conf
ACSAC
9 days
The fourth paper in this session was Pagnotta et al.'s "TATTOOED: A Robust Deep #NeuralNetwork #Watermarking Scheme based on Spread-Spectrum Channel Coding", exploring a novel DNN watermarking technique resistant to removal methods and easy to use. ( https://t.co/rYPdmkoEBl) 5/6
1
0
0
@ACSAC_Conf
ACSAC
9 days
Following that was Zhang et al.'s "CIGA: Detecting Adversarial Samples via Critical Inference Graph Analysis," which explores how different layer connections help identify adversarial samples effectively. ( https://t.co/2nw3EsiTTD) 4/6 #ML #AdversarialAttacks #CyberSecurity
1
0
0
@ACSAC_Conf
ACSAC
9 days
Next in the session was Morsbach et al.'s "R+R: Understanding Hyperparameter Effects in DP-SGD," highlighting how synthesizing and testing existing conjectures can elucidate hyperparameter effects on privacy-utility trade-offs. ( https://t.co/roYstQMODf) 3/6 #ML #ReplicationStudy
1
0
0
@ACSAC_Conf
ACSAC
9 days
The session began with Feng et al.'s "TILE: Input Structure Optimization for Neural Networks to Accelerate Secure Inference" showcasing a novel system to enhance Secure Inference efficiency. ( https://t.co/OT45V9uyWq) 2/6 #CyberSecurity #AI #ML
1
0
0
@ACSAC_Conf
ACSAC
9 days
For this #ThrowbackThursday, we will look at #ACSAC2024's third Machine Learning Security session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/6
1
0
0
@ACSAC_Conf
ACSAC
10 days
📣 The program for #ACSAC2025 is now live on the website 📣 Check out all the sessions:
0
3
2
@ACSAC_Conf
ACSAC
23 days
Last in the session was Brucker-Hahn et al.'s "CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments," introducing a novel framework enhancing #AccessControl in #microservices without code changes. ( https://t.co/Uf9T3WnNfR) 6/6 #DevSecOps
0
0
0
@ACSAC_Conf
ACSAC
23 days
In the session's fourth slot was Alla et al.'s "Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments," showcasing a novel authentication method using ML and hardware flaws for enhanced security. ( https://t.co/MbRrPBrhrq) 5/6
1
0
0
@ACSAC_Conf
ACSAC
23 days
Third up was Yilmaz et al.'s "Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War," examining 1,257 websites hit by attacks, revealing varied success and resilience. ( https://t.co/cAessbM0lZ) 4/6 #DDoS #Cyberwarfare #Ukraine
1
0
0
@ACSAC_Conf
ACSAC
23 days
Then came Bi et al.'s "Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks," revealing major #OECP vulnerabilities. ( https://t.co/vlK7URkkwE) 3/6 #EdgeComputing #Cybersecurity
1
0
0
@ACSAC_Conf
ACSAC
23 days
First up in the session was Crowder et al.'s "I Can Show You the World (of Censorship): Extracting Insights from Censorship Measurement Data Using Statistical Techniques," developing a framework for analyzing #censorship across datasets. ( https://t.co/rtjMlW0lfD) 2/6
1
0
0
@ACSAC_Conf
ACSAC
23 days
For this #ThrowbackThursday, we will look at #ACSAC2024's Network Security session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/6
1
0
0