Annual Computer Security Applications Conference
banner
acsacconf.bsky.social
Annual Computer Security Applications Conference
@acsacconf.bsky.social
One of the longest-running computer security conferences, more infos at: https://www.acsac.org


This year‘s edition:

Annual Computer Security Applications Conference (ACSAC) ACSAC 2025 | December 8-12, 2025 | Waikiki, Hawaii, USA
Last but not least, came Kersten et al.'s "A Security Alert Investigation Tool Supporting Tier 1 Analysts" that aids in developing a complete understanding of security events efficiently. (www.acsac.org/2024/p...) 6/6
#CyberSecurity #IncidentResponse
November 20, 2025 at 3:01 PM
Fourth in the session was Song et al.'s "Madeline: Continuous and Low-cost Monitoring with Graph-free Representations to Combat Cyber Threats," showcasing a lightweight system for real-time #APT detection. (www.acsac.org/2024/p...) 5/6
#MachineLearning #CyberSecurity
November 20, 2025 at 3:01 PM
Next in the session was Mischinger et al.'s "IoC Stalker: Early detection of Indicators of Compromise" focusing on cybercriminal forums to preemptively identify threats. (www.acsac.org/2024/p...) 4/6
#OSINT #ThreatIntelligence #ML
November 20, 2025 at 3:01 PM
Second in the session was Zerbini et al.'s "R+R: Matrioska: A User-Centric Defense Against Virtualization-Based Repackaging Malware on Android," which presents a defense with high accuracy against Android virtualization threats. (www.acsac.org/2024/p...) 3/6
#AndroidSecurity
November 20, 2025 at 3:01 PM
The session began with Vasan et al.'s "DEEPCAPA: Identifying Malicious Capabilities in Windows Malware," highlighting an automated system that uses machine learning to detect threats in malware with high accuracy. (www.acsac.org/2024/p...) 2/6
#Malware #ML #CyberSecurity
November 20, 2025 at 3:01 PM
The last paper presented was Yen et al.'s "SECvma: Virtualization-based Linux Kernel Protection for Arm," which introduces a new system for protecting the #Linux kernel's code integrity and confidentiality using virtualization. (www.acsac.org/2024/p...) 6/6
#KernelSecurity
November 13, 2025 at 3:02 PM
Following that was Caulfield et al.'s "SpecCFA: Enhancing Control Flow Attestation and Auditing via Application-Aware Sub-Path Speculation," a novel approach optimizing control flow attestation for resource-constrained MCUs. (www.acsac.org/2024/p...) 5/6
#ControlFlowAttestation
November 13, 2025 at 3:02 PM
Third in the session was Li et al.'s "Rust for Linux: Understanding Security Impact of Rust on the Linux Kernel," highlighting Rust's ability to eliminate many safety-related vulnerabilities in device drivers. (www.acsac.org/2024/p...) 4/6
#RustLang #KernelSecurity
November 13, 2025 at 3:01 PM
Second up was Kleftogiorgos et al.'s "Sidecar: Leveraging Debugging Extensions in Commodity Processors to Secure Software", showcasing reduced latency and enhanced security using Sidecar on modern processors. (www.acsac.org/2024/p...) 3/6
#Debugging #CyberSecurity
November 13, 2025 at 3:01 PM
Kicking off the session was Rösti et al.'s "I'll Be There for You! Perpetual Availability in the A^8 MVX System," showcasing breakthroughs in attack detection and recovery for critical software. (www.acsac.org/2024/p...) 2/6
#CyberSecurity #MVX
November 13, 2025 at 3:01 PM
Ending the session, we saw Sun et al.'s "ViTGuard: Attention-aware Detection against Adversarial Examples for Vision Transformer" showcasing a robust method enhancing ViTs' defense against diverse adversarial threats. (www.acsac.org/2024/p...) 6/6
#ComputerVision #AdversarialAI
November 6, 2025 at 3:01 PM
The fourth paper in this session was Pagnotta et al.'s "TATTOOED: A Robust Deep #NeuralNetwork #Watermarking Scheme based on Spread-Spectrum Channel Coding", exploring a novel DNN watermarking technique resistant to removal methods and easy to use. (www.acsac.org/2024/p...) 5/6
November 6, 2025 at 3:01 PM
Following that was Zhang et al.'s "CIGA: Detecting Adversarial Samples via Critical Inference Graph Analysis," which explores how different layer connections help identify adversarial samples effectively. (www.acsac.org/2024/p...) 4/6
#ML #AdversarialAttacks #CyberSecurity
November 6, 2025 at 3:01 PM
Next in the session was Morsbach et al.'s "R+R: Understanding Hyperparameter Effects in DP-SGD," highlighting how synthesizing and testing existing conjectures can elucidate hyperparameter effects on privacy-utility trade-offs. (www.acsac.org/2024/p...) 3/6
#ML #ReplicationStudy
November 6, 2025 at 3:01 PM
The session began with Feng et al.'s "TILE: Input Structure Optimization for Neural Networks to Accelerate Secure Inference" showcasing a novel system to enhance Secure Inference efficiency. (www.acsac.org/2024/p...) 2/6
#CyberSecurity #AI #ML
November 6, 2025 at 3:01 PM
Last in the session was Brucker-Hahn et al.'s "CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments," introducing a novel framework enhancing #AccessControl in #microservices without code changes. (www.acsac.org/2024/p...) 6/6
#DevSecOps
October 23, 2025 at 2:01 PM
In the session's fourth slot was Alla et al.'s "Robust Device Authentication in Multi-Node Networks: ML-Assisted Hybrid PLA Exploiting Hardware Impairments," showcasing a novel authentication method using ML and hardware flaws for enhanced security. (www.acsac.org/2024/p...) 5/6
October 23, 2025 at 2:01 PM
Third up was Yilmaz et al.'s "Assessing the Silent Frontlines: Exploring the Impact of DDoS Hacktivism in the Russo-Ukrainian War," examining 1,257 websites hit by attacks, revealing varied success and resilience. (www.acsac.org/2024/p...) 4/6
#DDoS #Cyberwarfare #Ukraine
October 23, 2025 at 2:01 PM