handmade.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
handmade.social is for all handmade artisans to create accounts for their Etsy and other handmade business shops.

Server stats:

35
active users

#acsac2024

0 posts0 participants0 posts today
Annual Computer Security Applications Conference<p>That's it folks with the <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreviews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreviews</span></a>. You can find the full program on our website: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=program.php" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=program.php</span></a></p>
Annual Computer Security Applications Conference<p>The final <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> today is Fan et al.'s work. While <a href="https://infosec.exchange/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> functions are essential but often mishandled, the authors evaluate crypto detection tools, highlighting gaps &amp; paving the way for future work: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=223" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=223</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Annual Computer Security Applications Conference<p>First up as <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> today is by Bao &amp; Bindschaedler who analyze <a href="https://infosec.exchange/tags/reproducibility" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reproducibility</span></a> of SoTA <a href="https://infosec.exchange/tags/DPML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DPML</span></a> methods. Findings are mixed. They discuss challenges and suggest best practices for future research: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=114" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=114</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://infosec.exchange/tags/deeplearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deeplearning</span></a></p>
Annual Computer Security Applications Conference<p>The second <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PreviewPaper" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PreviewPaper</span></a> today is by Hegde et al. who present MAKRUT, a model manipulation attack against the popular explanation method LIME, undermining the trustworthiness of black box <a href="https://infosec.exchange/tags/XAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>XAI</span></a>: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=304" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=304</span></a><br><a href="https://infosec.exchange/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Annual Computer Security Applications Conference<p>The first <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is Weber et al.'s work, which shows that existing HW features can be repurposed to stop ongoing <a href="https://infosec.exchange/tags/SideChannel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SideChannel</span></a> <a href="https://infosec.exchange/tags/attacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attacks</span></a> almost immediately by monitoring the victim: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=52" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=52</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Annual Computer Security Applications Conference<p>The third <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is Fu &amp; Wang's work in which they show that most <a href="https://infosec.exchange/tags/PasswordManagers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PasswordManagers</span></a> inadvertently <a href="https://infosec.exchange/tags/autofill" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>autofill</span></a> sensitive data into hidden field, revealing more serious privacy threat than previously known: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=438" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=438</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Annual Computer Security Applications Conference<p>The second <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> today is Warnecke et al.'s work in which they implant an <a href="https://infosec.exchange/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://infosec.exchange/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> within a hardware accelerator, bypassing all software defenses with no run-time overhead: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=75" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=75</span></a></p>
Annual Computer Security Applications Conference<p>Today's first <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> is Zhang et al.'s work in which they model the LLM watermark stealing attack as a constrained optimization problem to steal the details of the watermark and remove them: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=355" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=355</span></a></p>
Annual Computer Security Applications Conference<p>He final <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is Kleftogiorgos et al.'s Sidecar, a novel approach to create secure append-only channels using debugging logging, decoupling security checks to a monitor in a separate process: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=131" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=131</span></a></p>
Annual Computer Security Applications Conference<p>Up next as second <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is Kersten et al.'s work on an alert investigation support system, a widget on top of a known SIEM which aids analysts into collecting the right information: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=442" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=442</span></a><br><span class="h-card" translate="no"><a href="https://fediscience.org/@securescientist" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>securescientist</span></a></span></p>
Annual Computer Security Applications Conference<p>The first <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> today is Draschbacher &amp; Maar's work uncovering serious flaws in Google's scheme for ensuring the integrity of apps published in the new AAB distribution format: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=319" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=319</span></a></p>
Annual Computer Security Applications Conference<p>The third <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is Shen &amp; Jin's work showing that side-channel attacks on garbled circuits reveal private inputs by exploiting secret-dependent AES sequences with a high success rate: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=189" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=189</span></a></p>
Annual Computer Security Applications Conference<p>The second <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is Ferens et al.'s work, tackling the problem of secure and low-cost authentication in, e.g., IoT settings, by leveraging PUFs with adversarial ML: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=179" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=179</span></a></p>
Annual Computer Security Applications Conference<p>Today's first <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> is by Ahmad et al., whose work "Eunomia" is the first real-time privacy compliance firewall for Alexa skills. Eunomia hijacks, examines, and validates skill communications: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=194" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=194</span></a></p>
Annual Computer Security Applications Conference<p>The second <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> today is Mischinger et al.'s IoC Stalker whic detects underground forum posts containing malicious IoCs from the context ~355 days before they appear in OSINT: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=411" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=411</span></a></p>
Annual Computer Security Applications Conference<p>The first <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is Yilmaz et al.'s work which outlines the impact of <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DDoS</span></a> in modern <a href="https://infosec.exchange/tags/warfare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>warfare</span></a>, highlighting the importance of better protecting cyber infrastructure: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=338" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=338</span></a><br><a href="https://infosec.exchange/tags/cyberwar" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyberwar</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Annual Computer Security Applications Conference<p>📣 What?! You are not registered for <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> yet?! Then to time to waste! The early bird deadline has passed, but registration is still possible: <a href="https://www.acsac.org/2024/registration/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">acsac.org/2024/registration/</span><span class="invisible"></span></a></p>
Annual Computer Security Applications Conference<p>Today's third <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> is the work by Doan et al. who show “Digital” data poisoning is ineffective in the real-world based on a new DriveByFlyBy real-world test data set of <a href="https://infosec.exchange/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> attacks in the wild: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=417" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=417</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Annual Computer Security Applications Conference<p>The second <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is Xia &amp; Chen's work showing a new threat to <a href="https://infosec.exchange/tags/AutonomousVehicles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AutonomousVehicles</span></a>. MIA attacks inject invisible images into cameras, fooling <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> &amp; risking safety: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=373" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=373</span></a></p><p>An online demo is available: <a href="https://sites.google.com/view/morieinjection/home" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sites.google.com/view/morieinj</span><span class="invisible">ection/home</span></a></p>
Annual Computer Security Applications Conference<p>Our first <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> today is by Kondracki et al. who show that many <a href="https://infosec.exchange/tags/servers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>servers</span></a> start out insecure and only become <a href="https://infosec.exchange/tags/secure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secure</span></a> in the hours and days after they become publicly accessible: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=195" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=195</span></a><br><a href="https://infosec.exchange/tags/websecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websecurity</span></a> <a href="https://infosec.exchange/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a><br>@nicknikiforakis @briankon116 @sbucompsc</p>