Table of contents for issues of ACM Transactions on Privacy and Security (TOPS)

Last update: Thu Feb 15 10:27:57 MST 2024                Valid HTML 3.2!

Volume 19, Number 1, August, 2016
Volume 19, Number 2, September, 2016
Volume 19, Number 3, December, 2016
Volume 19, Number 4, February, 2017
Volume 20, Number 1, February, 2017
Volume 20, Number 2, March, 2017
Volume 20, Number 3, August, 2017
Volume 20, Number 4, October, 2017
Volume 21, Number 1, January, 2018
Volume 21, Number 2, February, 2018
Volume 21, Number 3, June, 2018
Volume 21, Number 4, October, 2018
Volume 22, Number 1, January, 2018
Volume 22, Number 2, April, 2019
Volume 22, Number 3, July, 2019
Volume 22, Number 4, December, 2019
Volume 23, Number 1, February, 2020
Volume 23, Number 2, May, 2020
Volume 23, Number 3, July, 2020
Volume 23, Number 4, August, 2020
Volume 24, Number 1, January, 2021
Volume 24, Number 2, February, 2021
Volume 24, Number 3, April, 2021
Volume 24, Number 4, November, 2021
Volume 25, Number 1, February, 2022
Volume 25, Number 2, May, 2022
Volume 25, Number 3, August, 2022
Volume 25, Number 4, November, 2022
Volume 26, Number 1, February, 2023
Volume 26, Number 2, May, 2023
Volume 26, Number 3, August, 2023
Volume 26, Number 4, November, 2023
Volume 27, Number 1, February, 2024


ACM Transactions on Privacy and Security (TOPS)
Volume 19, Number 1, August, 2016

                Simon Eberz and   
        Kasper B. Rasmussen and   
            Vincent Lenders and   
                Ivan Martinovic   Looks Like Eve: Exposing Insider Threats
                                  Using Eye Movement Biometrics  . . . . . 1:1--1:??
       Dimitris Mitropoulos and   
    Konstantinos Stroggylos and   
         Diomidis Spinellis and   
           Angelos D. Keromytis   How to Train Your Browser: Preventing
                                  XSS Attacks Using Contextual Script
                                  Fingerprints . . . . . . . . . . . . . . 2:1--2:??
    Pól Mac Aonghusa and   
               Douglas J. Leith   Don't Let Google Know I'm Lonely . . . . 3:1--3:??

ACM Transactions on Privacy and Security (TOPS)
Volume 19, Number 2, September, 2016

           Babak Rahbarinia and   
           Roberto Perdisci and   
              Manos Antonakakis   Efficient and Accurate Behavior-Based
                                  Tracking of Malware-Control Domains in
                                  Large ISP Networks . . . . . . . . . . . 4:1--4:??
                 Zheng Dong and   
                 Kevin Kane and   
                   L. Jean Camp   Detection of Rogue Certificates from
                                  Trusted Certificate Authorities Using
                                  Deep Neural Networks . . . . . . . . . . 5:1--5:??
              Juan A. Garay and   
        Vladimir Kolesnikov and   
                   Rae Mclellan   MAC Precomputation with Applications to
                                  Secure Memory  . . . . . . . . . . . . . 6:1--6:??

ACM Transactions on Privacy and Security (TOPS)
Volume 19, Number 3, December, 2016

                Ismet Ozalp and   
         Mehmet Emre Gursoy and   
        Mehmet Ercan Nergiz and   
                   Yucel Saygin   Privacy-Preserving Publishing of
                                  Hierarchical Data  . . . . . . . . . . . 7:1--7:??
             Jason Crampton and   
             Andrei Gagarin and   
              Gregory Gutin and   
                 Mark Jones and   
          Magnus Wahlström   On the Workflow Satisfiability Problem
                                  with Class-Independent Constraints for
                                  Hierarchical Organizations . . . . . . . 8:1--8:??
   Christopher N. Gutierrez and   
     Mohammed H. Almeshekah and   
         Eugene H. Spafford and   
         Mikhail J. Atallah and   
                     Jeff Avery   Inhibiting and Detecting Offline
                                  Password Cracking Using ErsatzPasswords  9:1--9:??

ACM Transactions on Privacy and Security (TOPS)
Volume 19, Number 4, February, 2017

           Hendrik Meutzner and   
              Santosh Gupta and   
           Viet-Hung Nguyen and   
              Thorsten Holz and   
               Dorothea Kolossa   Toward Improved Audio CAPTCHAs Based on
                                  Auditory Perception and Language
                                  Understanding  . . . . . . . . . . . . . 10:1--10:??
                Reza Shokri and   
    George Theodorakopoulos and   
               Carmela Troncoso   Privacy Games Along Location Traces: a
                                  Game-Theoretic Framework for Optimizing
                                  Location Privacy . . . . . . . . . . . . 11:1--11:??
             George Argyros and   
          Theofilos Petsios and   
         Suphannee Sivakorn and   
       Angelos D. Keromytis and   
                  Jason Polakis   Evaluating the Privacy Guarantees of
                                  Location Proximity Services  . . . . . . 12:1--12:??


ACM Transactions on Privacy and Security (TOPS)
Volume 20, Number 1, February, 2017

        Stephanos Matsumoto and   
        Raphael M. Reischuk and   
         Pawel Szalachowski and   
       Tiffany Hyun-Jin Kim and   
                  Adrian Perrig   Authentication Challenges in a Global
                                  Environment  . . . . . . . . . . . . . . 1:1--1:??
                  Isabel Wagner   Evaluating the Strength of Genomic
                                  Privacy Metrics  . . . . . . . . . . . . 2:1--2:??
            Mathias Humbert and   
                Erman Ayday and   
         Jean-Pierre Hubaux and   
                 Amalio Telenti   Quantifying Interdependent Risks in
                                  Genomic Privacy  . . . . . . . . . . . . 3:1--3:??

ACM Transactions on Privacy and Security (TOPS)
Volume 20, Number 2, March, 2017

          Leon J. Osterweil and   
                Matt Bishop and   
          Heather M. Conboy and   
                 Huong Phan and   
   Borislava I. Simidchieva and   
          George S. Avrunin and   
             Lori A. Clarke and   
                   Sean Peisert   Iterative Analysis to Improve Key
                                  Properties of Critical Human-Intensive
                                  Processes: an Election Security Example  5:1--5:??

ACM Transactions on Privacy and Security (TOPS)
Volume 20, Number 3, August, 2017

                Job Noorman and   
               Jo Van Bulck and   
   Jan Tobias Mühlberg and   
             Frank Piessens and   
               Pieter Maene and   
               Bart Preneel and   
         Ingrid Verbauwhede and   
    Johannes Götzfried and   
           Tilo Müller and   
                 Felix Freiling   Sancus 2.0: a Low-Cost Security
                                  Architecture for IoT Devices . . . . . . 7:1--7:??
       Marcus Brandenburger and   
           Christian Cachin and   
              Nikola Knezevi\'c   Don't Trust the Cloud, Verify: Integrity
                                  and Consistency for Cloud Object Stores  8:1--8:??
              Ehsan Toreini and   
     Siamak F. Shahandashti and   
                       Feng Hao   Texture to the Rescue: Practical Paper
                                  Fingerprinting Based on Texture Patterns 9:1--9:??
Luis Muñoz-González and   
          Daniele Sgandurra and   
             Andrea Paudice and   
                   Emil C. Lupu   Efficient Attack Graph Analysis through
                                  Approximate Inference  . . . . . . . . . 10:1--10:??
             Bradley Reaves and   
             Jasmine Bowers and   
               Nolen Scaife and   
                 Adam Bates and   
             Arnav Bhartiya and   
            Patrick Traynor and   
             Kevin R. B. Butler   Mo(bile) Money, Mo(bile) Problems:
                                  Analysis of Branchless Banking
                                  Applications . . . . . . . . . . . . . . 11:1--11:??

ACM Transactions on Privacy and Security (TOPS)
Volume 20, Number 4, October, 2017

                Xiaokui Shu and   
       Danfeng (Daphne) Yao and   
         Naren Ramakrishnan and   
                   Trent Jaeger   Long-Span Program Behavior Modeling and
                                  Attack Detection . . . . . . . . . . . . 12:1--12:??
             Muhammad Ikram and   
           Lucky Onwuzurike and   
           Shehroze Farooqi and   
     Emiliano De Cristofaro and   
              Arik Friedman and   
          Guillaume Jourjon and   
        Mohammed Ali Kaafar and   
               M. Zubair Shafiq   Measuring, Characterizing, and Detecting
                                  Facebook Like Farms  . . . . . . . . . . 13:1--13:??
             Yuriy Polyakov and   
               Kurt Rohloff and   
                 Gyana Sahu and   
           Vinod Vaikuntanathan   Fast Proxy Re-Encryption for
                                  Publish/Subscribe Systems  . . . . . . . 14:1--14:??
             Antonino Rullo and   
               Daniele Midi and   
              Edoardo Serra and   
                  Elisa Bertino   Pareto Optimal Security Resource
                                  Allocation for Internet of Things  . . . 15:1--15:??
                    Dong Su and   
               Jianneng Cao and   
                 Ninghui Li and   
              Elisa Bertino and   
                    Min Lyu and   
                    Hongxia Jin   Differentially Private $K$-Means
                                  Clustering and a Hybrid Approach to
                                  Private Optimization . . . . . . . . . . 16:1--16:??


ACM Transactions on Privacy and Security (TOPS)
Volume 21, Number 1, January, 2018

          Abdelrahman Abdou and   
             P. C. Van Oorschot   Server Location Verification (SLV) and
                                  Server Location Pinning: Augmenting TLS
                                  Authentication . . . . . . . . . . . . . 1:1--1:??
                    Hao Shi and   
            Jelena Mirkovic and   
                Abdulla Alwabel   Handling Anti-Virtual Machine Techniques
                                  in Malicious Software  . . . . . . . . . 2:1--2:??
        Neil Zhenqiang Gong and   
                        Bin Liu   Attribute Inference Attacks in Online
                                  Social Networks  . . . . . . . . . . . . 3:1--3:??
             Marcus Botacin and   
 Paulo Lício De Geus and   
     André Grégio   Enhancing Branch Monitoring for Security
                                  Purposes: From Control Flow Integrity to
                                  Malware Analysis and Debugging . . . . . 4:1--4:??
        Sarani Bhattacharya and   
           Debdeep Mukhopadhyay   Utilizing Performance Counters for
                                  Compromising Public Key Ciphers  . . . . 5:1--5:??

ACM Transactions on Privacy and Security (TOPS)
Volume 21, Number 2, February, 2018

                Yihua Zhang and   
             Marina Blanton and   
              Ghada Almashaqbeh   Implementing Support for Pointers to
                                  Private Data in a General-Purpose Secure
                                  Multi-Party Compiler . . . . . . . . . . 6:1--6:??
               Benny Pinkas and   
           Thomas Schneider and   
                 Michael Zohner   Scalable Private Set Intersection Based
                                  on OT Extension  . . . . . . . . . . . . 7:1--7:??
              Saed Alrabaee and   
              Paria Shirani and   
                Lingyu Wang and   
                 Mourad Debbabi   FOSSIL: A Resilient and Efficient System
                                  for Identifying FOSS Functions in
                                  Malware Binaries . . . . . . . . . . . . 8:1--8:??
         Roberto Giacobazzi and   
             Isabella Mastroeni   Abstract Non-Interference: A Unifying
                                  Framework for Weakening Information-flow 9:1--9:??
                 Yunmok Son and   
                 Juhwan Noh and   
              Jaeyeong Choi and   
                    Yongdae Kim   GyrosFinger: Fingerprinting Drones for
                                  Location Tracking Based on the Outputs
                                  of MEMS Gyroscopes . . . . . . . . . . . 10:1--10:??

ACM Transactions on Privacy and Security (TOPS)
Volume 21, Number 3, June, 2018

          Michele Carminati and   
               Mario Polino and   
          Andrea Continella and   
               Andrea Lanzi and   
             Federico Maggi and   
                 Stefano Zanero   Security Evaluation of a Banking Fraud
                                  Analysis System  . . . . . . . . . . . . 11:1--11:??
            Florian Kelbert and   
           Alexander Pretschner   Data Usage Control for Distributed
                                  Systems  . . . . . . . . . . . . . . . . 12:1--12:??
          Elizabeth Stobert and   
                  Robert Biddle   The Password Life Cycle  . . . . . . . . 13:1--13:??
                Fengguo Wei and   
              Sankardas Roy and   
                 Xinming Ou and   
                          Robby   Amandroid: A Precise and General
                                  Inter-component Data Flow Analysis
                                  Framework for Security Vetting of
                                  Android Apps . . . . . . . . . . . . . . 14:1--14:??
                  Siqi Zhao and   
                     Xuhua Ding   FIMCE: A Fully Isolated Micro-Computing
                                  Environment for Multicore Systems  . . . 15:1--15:??

ACM Transactions on Privacy and Security (TOPS)
Volume 21, Number 4, October, 2018

         Katheryn A. Farris and   
                 Ankit Shah and   
             George Cybenko and   
             Rajesh Ganesan and   
                 Sushil Jajodia   VULCON: A System for Vulnerability
                                  Prioritization, Mitigation, and
                                  Management . . . . . . . . . . . . . . . 16:1--16:??
                  Jinsu Kim and   
              Dongyoung Koo and   
                   Yuna Kim and   
               Hyunsoo Yoon and   
                Junbum Shin and   
                   Sungwook Kim   Efficient Privacy-Preserving Matrix
                                  Factorization for Recommendation via
                                  Fully Homomorphic Encryption . . . . . . 17:1--17:??
Fanny Lalonde Lévesque and   
             Sonia Chiasson and   
              Anil Somayaji and   
       José M. Fernandez   Technological and Human Factors of
                                  Malware Attacks: A Computer Security
                                  Clinical Trial Approach  . . . . . . . . 18:1--18:??
                  Guixin Ye and   
              Zhanyong Tang and   
                Dingyi Fang and   
             Xiaojiang Chen and   
                Willy Wolff and   
               Adam J. Aviv and   
                     Zheng Wang   A Video-based Attack for Android Pattern
                                  Lock . . . . . . . . . . . . . . . . . . 19:1--19:??
               Yupeng Zhang and   
    Charalampos Papamanthou and   
                  Jonathan Katz   Verifiable Graph Processing  . . . . . . 20:1--20:??


ACM Transactions on Privacy and Security (TOPS)
Volume 22, Number 1, January, 2018

                 Taous Madi and   
               Yosr Jarraya and   
       Amir Alimohammadifar and   
        Suryadipta Majumdar and   
                Yushun Wang and   
            Makan Pourzandi and   
                Lingyu Wang and   
                 Mourad Debbabi   ISOTOP: Auditing Virtual Networks
                                  Isolation Across Cloud Layers in
                                  OpenStack  . . . . . . . . . . . . . . . 1:1--1:??
             Bradley Reaves and   
                Luis Vargas and   
               Nolen Scaife and   
                  Dave Tian and   
                 Logan Blue and   
            Patrick Traynor and   
             Kevin R. B. Butler   Characterizing the Security of the SMS
                                  Ecosystem with Public Gateways . . . . . 2:1--2:??
                 Rob Jansen and   
             Matthew Traudt and   
                John Geddes and   
                Chris Wacek and   
                Micah Sherr and   
                  Paul Syverson   KIST: Kernel-Informed Socket Transport
                                  for Tor  . . . . . . . . . . . . . . . . 3:1--3:??
             Ivo Sluganovic and   
             Marc Roeschlin and   
        Kasper B. Rasmussen and   
                Ivan Martinovic   Analysis of Reflexive Eye Movements for
                                  Fast Replay-Resistant Biometric
                                  Authentication . . . . . . . . . . . . . 4:1--4:??
             Marios Pomonis and   
          Theofilos Petsios and   
       Angelos D. Keromytis and   
     Michalis Polychronakis and   
          Vasileios P. Kemerlis   Kernel Protection Against Just-In-Time
                                  Code Reuse . . . . . . . . . . . . . . . 5:1--5:??
      Xabier Ugarte-Pedrero and   
           Mariano Graziano and   
              Davide Balzarotti   A Close Look at a Daily Dataset of
                                  Malware Samples  . . . . . . . . . . . . 6:1--6:??
  Sebastian Mödersheim and   
                  Luca Vigan\`o   Alpha--Beta Privacy  . . . . . . . . . . 7:1--7:??

ACM Transactions on Privacy and Security (TOPS)
Volume 22, Number 2, April, 2019

               Diego Kreutz and   
               Jiangshan Yu and   
       Fernando M. V. Ramos and   
        Paulo Esteves-Verissimo   ANCHOR: Logically Centralized Security
                                  for Software-Defined Networks  . . . . . 8:1--8:??
               Fabio Pagani and   
            Oleksii Fedorov and   
              Davide Balzarotti   Introducing the Temporal Dimension to
                                  Memory Forensics . . . . . . . . . . . . 9:1--9:??
              Donghyun Kwon and   
                  Hayoon Yi and   
               Yeongpil Cho and   
                  Yunheung Paek   Safe and Efficient Implementation of a
                                  Security System on ARM using Intra-level
                                  Privilege Separation . . . . . . . . . . 10:1--10:??
               Simon S. Woo and   
               Ron Artstein and   
                Elsi Kaiser and   
                    Xiao Le and   
                Jelena Mirkovic   Using Episodic Memory for User
                                  Authentication . . . . . . . . . . . . . 11:1--11:??
                 Juhwan Noh and   
                 Yujin Kwon and   
                 Yunmok Son and   
               Hocheol Shin and   
                 Dohyun Kim and   
              Jaeyeong Choi and   
                    Yongdae Kim   Tractor Beam: Safe-hijacking of Consumer
                                  Drones with Adaptive GPS Spoofing  . . . 12:1--12:??
                Scott Ruoti and   
              Jeff Andersen and   
             Luke Dickinson and   
            Scott Heidbrink and   
               Tyler Monson and   
               Mark O'Neill and   
                  Ken Reese and   
             Brad Spendlove and   
           Elham Vaziripour and   
                  Justin Wu and   
             Daniel Zappala and   
                   Kent Seamons   A Usability Study of Four Secure Email
                                  Tools Using Paired Participants  . . . . 13:1--13:??
           Lucky Onwuzurike and   
           Enrico Mariconti and   
       Panagiotis Andriotis and   
     Emiliano De Cristofaro and   
                Gordon Ross and   
            Gianluca Stringhini   MaMaDroid: Detecting Android Malware by
                                  Building Markov Chains of Behavioral
                                  Models (Extended Version)  . . . . . . . 14:1--14:??

ACM Transactions on Privacy and Security (TOPS)
Volume 22, Number 3, July, 2019

                Fang-Yu Rao and   
               Jianneng Cao and   
              Elisa Bertino and   
             Murat Kantarcioglu   Hybrid Private Record Linkage:
                                  Separating Differentially Private
                                  Synopses from Matching Records . . . . . 15:1--15:??
             Mahmood Sharif and   
          Sruti Bhagavatula and   
                 Lujo Bauer and   
              Michael K. Reiter   A General Framework for Adversarial
                                  Examples with Objectives . . . . . . . . 16:1--16:??
                   Chao Yan and   
                      Bo Li and   
       Yevgeniy Vorobeychik and   
                Aron Laszka and   
              Daniel Fabbri and   
                  Bradley Malin   Database Audit Workload Prioritization
                                  via Game Theory  . . . . . . . . . . . . 17:1--17:??
        Alexander V. Outkin and   
           Brandon K. Eames and   
         Meghan A. Galiardi and   
                Sarah Walsh and   
             Eric D. Vugrin and   
             Byron Heersink and   
                Jacob Hobbs and   
                Gregory D. Wyss   GPLADD: Quantifying Trust in Government
                                  and Commercial Systems: a Game-Theoretic
                                  Approach . . . . . . . . . . . . . . . . 18:1--18:??
               Samuel Wedaj and   
                 Kolin Paul and   
               Vinay J. Ribeiro   DADS: Decentralized Attestation for
                                  Device Swarms  . . . . . . . . . . . . . 19:1--19:??

ACM Transactions on Privacy and Security (TOPS)
Volume 22, Number 4, December, 2019

             Gokcan Cantali and   
                Orhan Ermis and   
Mehmet Ufuk Çaglayan and   
                      Cem Ersoy   Analytical Models for the Scalability of
                                  Dynamic Group-key Agreement Protocols
                                  and Secure File Sharing Systems  . . . . 20:1--20:??
                 Hongyu Jin and   
           Panos Papadimitratos   Resilient Privacy Protection for
                                  Location-Based Services through
                                  Decentralization . . . . . . . . . . . . 21:1--21:??
                Brian A. Powell   Malicious Overtones: Hunting Data Theft
                                  in the Frequency Domain with One-class
                                  Learning . . . . . . . . . . . . . . . . 22:1--22:??
         Awanthika Senarath and   
            Marthie Grobler and   
Nalin Asanka Gamagedara Arachchilage   Will They Use It or Not? Investigating
                                  Software Developers' Intention to Follow
                                  Privacy Engineering Methodologies  . . . 23:1--23:??
         Stefano Cecconello and   
           Alberto Compagno and   
                Mauro Conti and   
               Daniele Lain and   
                    Gene Tsudik   Skype & Type: Keyboard Eavesdropping in
                                  Voice-over-IP  . . . . . . . . . . . . . 24:1--24:??


ACM Transactions on Privacy and Security (TOPS)
Volume 23, Number 1, February, 2020

                Thang Hoang and   
            Attila A. Yavuz and   
                 Jorge Guajardo   A Multi-server ORAM Framework with
                                  Constant Client Bandwidth Blowup . . . . 1:1--1:35
                Hassan Khan and   
             Urs Hengartner and   
                   Daniel Vogel   Mimicry Attacks on Smartphone Keystroke
                                  Authentication . . . . . . . . . . . . . 2:1--2:34
            Ruggero Lanotte and   
              Massimo Merro and   
            Andrei Munteanu and   
                  Luca Vigan\`o   A Formal Approach to Physics-based
                                  Attacks in Cyber-physical Systems  . . . 3:1--3:41
            Amith K. Belman and   
                   Vir V. Phoha   Discriminative Power of Typing Features
                                  on Desktops, Tablets, and Phones for
                                  User Identification  . . . . . . . . . . 4:1--4:36
           Farzaneh Karegar and   
 John Sören Pettersson and   
     Simone Fischer-Hübner   The Dilemma of User Engagement in
                                  Privacy Notices: Effects of Interaction
                                  Modes and Habituation on User Attention  5:1--5:38
               Fang-Jing Wu and   
                        Tie Luo   CrowdPrivacy: Publish More Useful Data
                                  with Less Privacy Exposure in
                                  Crowdsourced Location-Based Services . . 6:1--6:25

ACM Transactions on Privacy and Security (TOPS)
Volume 23, Number 2, May, 2020

                  Guixin Ye and   
              Zhanyong Tang and   
                Dingyi Fang and   
               Zhanxing Zhu and   
               Yansong Feng and   
                 Pengfei Xu and   
             Xiaojiang Chen and   
                Jungong Han and   
                     Zheng Wang   Using Generative Adversarial Networks to
                                  Break and Protect Text Captchas  . . . . 7:1--7:29
             Muhammad Ikram and   
               Rahat Masood and   
               Gareth Tyson and   
         Mohamed Ali Kaafar and   
                Noha Loizon and   
                    Roya Ensafi   Measuring and Analysing the Chain of
                                  Implicit Trust: a Study of Third-party
                                  Resources Loading  . . . . . . . . . . . 8:1--8:27
                  Moni Naor and   
                 Lior Rotem and   
                      Gil Segev   The Security of Lazy Users in
                                  Out-of-Band Authentication . . . . . . . 9:1--9:32
               James Parker and   
              Michael Hicks and   
                Andrew Ruef and   
        Michelle L. Mazurek and   
                 Dave Levin and   
             Daniel Votipka and   
             Piotr Mardziel and   
               Kelsey R. Fulton   Build It, Break It, Fix It: Contesting
                                  Secure Development . . . . . . . . . . . 10:1--10:36
            Fatima M. Anwar and   
                Mani Srivastava   A Case for Feedforward Control with
                                  Feedback Trim to Mitigate Time Transfer
                                  Attacks  . . . . . . . . . . . . . . . . 11:1--11:25

ACM Transactions on Privacy and Security (TOPS)
Volume 23, Number 3, July, 2020

    Sanaz Taheri Boshrooyeh and   
Alptekin Küpçü and   
        Öznur Özkasap   Privado: Privacy-preserving Group-based
                                  Advertising Using Multiple Independent
                                  Social Network Providers . . . . . . . . 12:1--12:36
           Giada Sciarretta and   
            Roberto Carbone and   
              Silvio Ranise and   
                  Luca Vigan\`o   Formal Analysis of Mobile Multi-Factor
                                  Authentication with Single Sign-On Login 13:1--13:37
          Daniele Antonioli and   
       Nils Ole Tippenhauer and   
               Kasper Rasmussen   Key Negotiation Downgrade Attacks on
                                  Bluetooth and Bluetooth Low Energy . . . 14:1--14:28
               Hocheol Shin and   
                 Juhwan Noh and   
                 Dohyun Kim and   
                    Yongdae Kim   The System That Cried Wolf: Sensor
                                  Security Analysis of Wide-area Smoke
                                  Detectors for Critical Infrastructure    15:1--15:32
        Darren Hurley-Smith and   
         Julio Hernandez-Castro   Quantum Leap and Crash: Searching and
                                  Finding Bias in Quantum Random Number
                                  Generators . . . . . . . . . . . . . . . 16:1--16:25

ACM Transactions on Privacy and Security (TOPS)
Volume 23, Number 4, August, 2020

             Mohamed Nabeel and   
             Issa M. Khalil and   
                   Bei Guan and   
                        Ting Yu   Following Passive DNS Traces to Detect
                                  Stealthy Malicious Domains Via Graph
                                  Inference  . . . . . . . . . . . . . . . 17:1--17:36
       Syed Zain Raza Rizvi and   
              Philip W. L. Fong   Efficient Authorization of
                                  Graph-database Queries in an
                                  Attribute-supporting ReBAC Model . . . . 18:1--18:33
       Michalis Diamantaris and   
       Francesco Marcantoni and   
          Sotiris Ioannidis and   
                  Jason Polakis   The Seven Deadly Sins of the HTML5
                                  WebAPI: a Large-scale Study on the Risks
                                  of Mobile Sensor-based Attacks . . . . . 19:1--19:31
                Bert Abrath and   
               Bart Coppens and   
        Jens Van Den Broeck and   
              Brecht Wyseur and   
         Alessandro Cabutto and   
             Paolo Falcarin and   
                Bjorn De Sutter   Code Renewability for Native Software
                                  Protection . . . . . . . . . . . . . . . 20:1--20:31
              Sagar Samtani and   
                 Hongyi Zhu and   
                  Hsinchun Chen   Proactively Identifying Emerging Hacker
                                  Threats from the Dark Web: a Diachronic
                                  Graph Embedding Framework (D-GEF)  . . . 21:1--21:33
               Geumhwan Cho and   
                 Jun Ho Huh and   
                 Soolin Kim and   
                Junsung Cho and   
               Heesung Park and   
                  Yenah Lee and   
        Konstantin Beznosov and   
                Hyoungshick Kim   On the Security and Usability
                                  Implications of Providing Multiple
                                  Authentication Choices on Smartphones:
                                  The More, the Better?  . . . . . . . . . 22:1--22:32


ACM Transactions on Privacy and Security (TOPS)
Volume 24, Number 1, January, 2021

       Benjamin Zi Hao Zhao and   
       Hassan Jameel Asghar and   
         Mohamed Ali Kaafar and   
         Francesca Trevisan and   
                    Haiyue Yuan   Exploiting Behavioral Side Channels in
                                  Observation Resilient Cognitive
                                  Authentication Schemes . . . . . . . . . 1:1--1:33
      Chuadhry Mujeeb Ahmed and   
           Aditya P. Mathur and   
            Martín Ochoa   NoiSense Print: Detecting Data Integrity
                                  Attacks on Sensor Measurements Using
                                  Hardware-based Fingerprints  . . . . . . 2:1--2:35
       Nikolaos Alexopoulos and   
        Sheikh Mahbub Habib and   
             Steffen Schulz and   
       Max Mühlhäuser   The Tip of the Iceberg: On the Merits of
                                  Finding Security Bugs  . . . . . . . . . 3:1--3:33
           Alexandre Meylan and   
            Mauro Cherubini and   
             Bertil Chapuis and   
            Mathias Humbert and   
            Igor Bilogrevic and   
          Kévin Huguenin   A Study on the Use of Checksums for
                                  Integrity Verification of Web Downloads  4:1--4:36
           Benjamin Shreeve and   
             Joseph Hallett and   
            Matthew Edwards and   
        Pauline Anthonysamy and   
               Sylvain Frey and   
                   Awais Rashid   ``So if Mr Blue Head here clicks the
                                  link\ldots'' Risk Thinking in Cyber
                                  Security Decision Making . . . . . . . . 5:1--5:29
                Zhisheng Hu and   
                Minghui Zhu and   
                       Peng Liu   Adaptive Cyber Defense Against
                                  Multi-Stage Attacks Using Learning-Based
                                  POMDP  . . . . . . . . . . . . . . . . . 6:1--6:25

ACM Transactions on Privacy and Security (TOPS)
Volume 24, Number 2, February, 2021

     Michalis Papaevripides and   
           Elias Athanasopoulos   Exploiting Mixed Binaries  . . . . . . . 7:1--7:29
      Carlos Garcia Cordero and   
  Emmanouil Vasilomanolakis and   
             Aidmar Wainakh and   
   Max Mühlhäuser and   
            Simin Nadjm-Tehrani   On Generating Network Traffic Datasets
                                  with Synthetic Attacks for Intrusion
                                  Detection  . . . . . . . . . . . . . . . 8:1--8:39
      Shameek Bhattacharjee and   
Venkata Praveen Kumar Madhavarapu and   
           Simone Silvestri and   
                   Sajal K. Das   Attack Context Embedded Data Driven
                                  Trust Diagnostics in Smart Metering
                                  Infrastructure . . . . . . . . . . . . . 9:1--9:36
            Vincenzo Arceri and   
             Isabella Mastroeni   Analyzing Dynamic Code: a Sound Abstract
                                  Interpreter for Evil Eval  . . . . . . . 10:1--10:38
             Marcus Botacin and   
           Hojjat Aghakhani and   
           Stefano Ortolani and   
        Christopher Kruegel and   
             Giovanni Vigna and   
           Daniela Oliveira and   
 Paulo Lício De Geus and   
     André Grégio   One Size Does Not Fit All: a
                                  Longitudinal Analysis of Brazilian
                                  Financial Malware  . . . . . . . . . . . 11:1--11:31
              Isabel Wagner and   
                Iryna Yevseyeva   Designing Strong Privacy Metrics Suites
                                  Using Evolutionary Optimization  . . . . 12:1--12:35
            Charlie Jacomme and   
                   Steve Kremer   An Extensive Formal Analysis of
                                  Multi-factor Authentication Protocols    13:1--13:34

ACM Transactions on Privacy and Security (TOPS)
Volume 24, Number 3, April, 2021

           Meisam Mohammady and   
               Momen Oqaily and   
                Lingyu Wang and   
                  Yuan Hong and   
               Habib Louafi and   
            Makan Pourzandi and   
                 Mourad Debbabi   A Multi-view Approach to Preserve
                                  Privacy and Utility in Network Trace
                                  Anonymization  . . . . . . . . . . . . . 14:1--14:36
              Amit Seal Ami and   
              Kaushal Kafle and   
                Kevin Moran and   
            Adwait Nadkarni and   
               Denys Poshyvanyk   Systematic Mutation-Based Evaluation of
                                  the Soundness of Security-Focused
                                  Android Static Analysis Techniques . . . 15:1--15:37
              Musard Balliu and   
              Massimo Merro and   
             Michele Pasqua and   
            Mikhail Shcherbakov   Friendly Fire: Cross-app Interactions in
                                  IoT Platforms  . . . . . . . . . . . . . 16:1--16:40
          Stanislaw Jarecki and   
             Mohammed Jubur and   
              Hugo Krawczyk and   
              Nitesh Saxena and   
             Maliheh Shirvanian   Two-factor Password-authenticated Key
                                  Exchange with End-to-end Security  . . . 17:1--17:37
                 Shujie Cui and   
               Xiangfu Song and   
     Muhammad Rizwan Asghar and   
        Steven D. Galbraith and   
              Giovanni Russello   Privacy-preserving Dynamic Symmetric
                                  Searchable Encryption with Controllable
                                  Leakage  . . . . . . . . . . . . . . . . 18:1--18:35
      René Mayrhofer and   
       Jeffrey Vander Stoep and   
              Chad Brubaker and   
                 Nick Kralevich   The Android Platform Security Model  . . 19:1--19:35
               Rafael Veras and   
        Christopher Collins and   
                   Julie Thorpe   A Large-Scale Analysis of the Semantic
                                  Password Model and Linguistic Patterns
                                  in Passwords . . . . . . . . . . . . . . 20:1--20:21

ACM Transactions on Privacy and Security (TOPS)
Volume 24, Number 4, November, 2021

          Mohammed Abuhamad and   
              Tamer Abuhmed and   
             David Mohaisen and   
                   Daehun Nyang   Large-scale and Robust Code Authorship
                                  Identification with Deep Feature
                                  Learning . . . . . . . . . . . . . . . . 23:1--23:35
                 Abbas Acar and   
                Shoukat Ali and   
             Koray Karabina and   
            Cengiz Kaygusuz and   
               Hidayet Aksu and   
               Kemal Akkaya and   
                 Selcuk Uluagac   A Lightweight Privacy-Aware Continuous
                                  Authentication Protocol --- PACA . . . . 24:1--24:28
            Aleieldin Salem and   
          Sebastian Banescu and   
           Alexander Pretschner   \pkgMaat: Automatically Analyzing
                                  VirusTotal for Accurate Labeling and
                                  Effective Malware Detection  . . . . . . 25:1--25:35
                 Long Cheng and   
               Salman Ahmed and   
           Hans Liljestrand and   
               Thomas Nyman and   
                Haipeng Cai and   
               Trent Jaeger and   
                  N. Asokan and   
           Danfeng (Daphne) Yao   Exploitation Techniques for
                                  Data-oriented Attacks with Existing and
                                  Potential Defense Approaches . . . . . . 26:1--26:36
              Luca Demetrio and   
             Scott E. Coull and   
            Battista Biggio and   
           Giovanni Lagorio and   
         Alessandro Armando and   
                     Fabio Roli   Adversarial EXEmples: a Survey and
                                  Experimental Evaluation of Practical
                                  Attacks on Machine Learning for Windows
                                  Malware Detection  . . . . . . . . . . . 27:1--27:31
               Sana Maqsood and   
                 Sonia Chiasson   Design, Development, and Evaluation of a
                                  Cybersecurity, Privacy, and Digital
                                  Literacy Game for Tweens . . . . . . . . 28:1--28:37
            Sarah C. Helble and   
               Ian D. Kretz and   
          Peter A. Loscocco and   
           John D. Ramsdell and   
               Paul D. Rowe and   
                Perry Alexander   Flexible Mechanisms for Remote
                                  Attestation  . . . . . . . . . . . . . . 29:1--29:23
            Philipp Markert and   
           Daniel V. Bailey and   
           Maximilian Golla and   
        Markus Dürmuth and   
                   Adam J. Aviv   On the Security of Smartphone Unlock
                                  PINs . . . . . . . . . . . . . . . . . . 30:1--30:36
             Simon Birnbach and   
              Richard Baker and   
                Simon Eberz and   
                Ivan Martinovic   #PrettyFlyForAWiFi: Real-world Detection
                                  of Privacy Invasion Attacks by Drones    31:1--31:34


ACM Transactions on Privacy and Security (TOPS)
Volume 25, Number 1, February, 2022

            Savvas Savvides and   
                Seema Kumar and   
       Julian James Stephen and   
                Patrick Eugster   C3PO: Cloud-based
                                  Confidentiality-preserving Continuous
                                  Query Processing . . . . . . . . . . . . 1:1--1:36
            Stefano Berlato and   
            Roberto Carbone and   
                Adam J. Lee and   
                  Silvio Ranise   Formal Modelling and Automated Trade-off
                                  Analysis of Enforcement Architectures
                                  for Cryptographic Access Control in the
                                  Cloud  . . . . . . . . . . . . . . . . . 2:1--2:37
 Handan Kilinç Alper and   
Alptek\.\in Küpçü   Optimally Efficient Multi-party Fair
                                  Exchange and Fair Secure Multi-party
                                  Computation  . . . . . . . . . . . . . . 3:1--3:34
                     Le Qin and   
                   Fei Peng and   
                   Min Long and   
    Raghavendra Ramachandra and   
                Christoph Busch   Vulnerabilities of Unattended Face
                                  Verification Systems to Facial
                                  Components-based Presentation Attacks:
                                  an Empirical Study . . . . . . . . . . . 4:1--4:28
        Sibghat Ullah Bazai and   
        Julian Jang-Jaccard and   
              Hooman Alavizadeh   A Novel Hybrid Approach for
                                  Multi-Dimensional Data Anonymization for
                                  Apache Spark . . . . . . . . . . . . . . 5:1--5:25
               Fabio Pagani and   
              Davide Balzarotti   AutoProfile: Towards Automated Profile
                                  Generation for Memory Analysis . . . . . 6:1--6:26
     Angelo Massimo Perillo and   
          Giuseppe Persiano and   
              Alberto Trombetta   Secure Selections on Encrypted
                                  Multi-writer Streams . . . . . . . . . . 7:1--7:33

ACM Transactions on Privacy and Security (TOPS)
Volume 25, Number 2, May, 2022

              Lennart Braun and   
             Daniel Demmler and   
           Thomas Schneider and   
            Oleksandr Tkachenko   MOTION --- A Framework for
                                  Mixed-Protocol Multi-Party Computation   8:1--8:35
             Marcus Botacin and   
         Francis B. Moreira and   
      Philippe O. A. Navaux and   
 André Grégio and   
              Marco A. Z. Alves   Terminator: a Secure Coprocessor to
                                  Accelerate Real-Time AntiViruses Using
                                  Inspection Breakpoints . . . . . . . . . 9:1--9:34
                 Xueou Wang and   
                 Xiaolu Hou and   
                 Ruben Rios and   
       Nils Ole Tippenhauer and   
            Martín Ochoa   Constrained Proximity Attacks on Mobile
                                  Targets  . . . . . . . . . . . . . . . . 10:1--10:29
           Alexandre Debant and   
   Stéphanie Delaune and   
               Cyrille Wiedling   So Near and Yet So Far --- Symbolic
                                  Verification of Distance-Bounding
                                  Protocols  . . . . . . . . . . . . . . . 11:1--11:39
          Yevhen Zolotavkin and   
          Jongkil Jay Jeong and   
            Veronika Kuchta and   
           Maksym Slavnenko and   
                     Robin Doss   Improving Unlinkability of
                                  Attribute-based Authentication through
                                  Game Theory  . . . . . . . . . . . . . . 12:1--12:36
               Nadia Daoudi and   
                Kevin Allix and   
Tegawendé François Bissyandé and   
                  Jacques Klein   A Deep Dive Inside DREBIN: an
                                  Explorative Analysis beyond Android
                                  Malware Detection Scores . . . . . . . . 13:1--13:28
                Pascal Oser and   
    Rens W. van der Heijden and   
         Stefan Lüders and   
                    Frank Kargl   Risk Prediction of IoT Devices Based on
                                  Vulnerability Analysis . . . . . . . . . 14:1--14:36
  Julian de Gortari Briseno and   
           Akash Deep Singh and   
                Mani Srivastava   InkFiltration: Using Inkjet Printers for
                                  Acoustic Data Exfiltration from
                                  Air-Gapped Networks  . . . . . . . . . . 15:1--15:26

ACM Transactions on Privacy and Security (TOPS)
Volume 25, Number 3, August, 2022

              Chris Clifton and   
             Eric J. Hanson and   
              Keith Merrill and   
                  Shawn Merrill   Differentially Private $k$-Nearest
                                  Neighbor Missing Data Imputation . . . . 16:1--16:23
                Yuxuan Chen and   
            Jiangshan Zhang and   
               Xuejing Yuan and   
             Shengzhi Zhang and   
                   Kai Chen and   
              Xiaofeng Wang and   
                   Shanqing Guo   SoK: a Modularized Approach to Study the
                                  Security of Automatic Speech Recognition
                                  Systems  . . . . . . . . . . . . . . . . 17:1--17:31
               Max Landauer and   
             Florian Skopik and   
        Markus Wurzenberger and   
                 Andreas Rauber   Dealing with Security Alert Flooding:
                                  Using Machine Learning for
                                  Domain-independent Alert Aggregation . . 18:1--18:36
     Cláudio Martins and   
         Ibéria Medeiros   Generating Quality Threat Intelligence
                                  Leveraging OSINT and a Cyber Threat
                                  Unified Taxonomy . . . . . . . . . . . . 19:1--19:39
      Mário S. Alvim and   
Konstantinos Chatzikokolakis and   
            Yusuke Kawamoto and   
           Catuscia Palamidessi   Information Leakage Games: Exploring
                                  Information as a Utility Function  . . . 20:1--20:36
            Andreas Fischer and   
                Benny Fuhry and   
    Jörn Kußmaul and   
              Jonas Janneck and   
         Florian Kerschbaum and   
                    Eric Bodden   Computation on Encrypted Data Using
                                  Dataflow Authentication  . . . . . . . . 21:1--21:36
            Padmavathi Iyer and   
           Amirreza Masoumzadeh   Learning Relationship-Based Access
                                  Control Policies from Black-Box Systems  22:1--22:36
                Yaguan Qian and   
                 Yankai Guo and   
                  Qiqi Shao and   
                Jiamin Wang and   
                   Bin Wang and   
                Zhaoquan Gu and   
                 Xiang Ling and   
                    Chunming Wu   EI-MTD: Moving Target Defense for Edge
                                  Intelligence against Adversarial Attacks 23:1--23:24
                 Adi Akavia and   
              Max Leibovich and   
        Yehezkel S. Resheff and   
                   Roey Ron and   
                Moni Shahar and   
                 Margarita Vald   Privacy-Preserving Decision Trees
                                  Training and Prediction  . . . . . . . . 24:1--24:30

ACM Transactions on Privacy and Security (TOPS)
Volume 25, Number 4, November, 2022

               Ellis Fenske and   
               Akshaya Mani and   
              Aaron Johnson and   
                    Micah Sherr   Accountable Private Set Cardinality for
                                  Distributed Measurement  . . . . . . . . 25:1--25:??
            Sarah M. Lehman and   
          Abrar S. Alrumayh and   
                Kunal Kolhe and   
                Haibin Ling and   
                    Chiu C. Tan   Hidden in Plain Sight: Exploring Privacy
                                  Risks of Mobile Augmented Reality
                                  Applications . . . . . . . . . . . . . . 26:1--26:??
             Andrea Oliveri and   
              Davide Balzarotti   In the Land of MMUs: Multiarchitecture
                                  OS-Agnostic Virtual Memory Forensics . . 27:1--27:??
             Jason Crampton and   
               Eduard Eiben and   
              Gregory Gutin and   
          Daniel Karapetyan and   
            Diptapriyo Majumdar   Valued Authorization Policy Existence
                                  Problem: Theory and Experiments  . . . . 28:1--28:??
                  Lihi Idan and   
                Joan Feigenbaum   PRShare: a Framework for
                                  Privacy-preserving, Interorganizational
                                  Data Sharing . . . . . . . . . . . . . . 29:1--29:??
       Milica Stojmenovi\'c and   
                 Eric Spero and   
        Milos Stojmenovi\'c and   
                  Robert Biddle   What is Beautiful is Secure  . . . . . . 30:1--30:??
              Eyal Nussbaum and   
                  Michael Segal   Privacy Analysis of Query-Set-Size
                                  Control  . . . . . . . . . . . . . . . . 31:1--31:??
                 Jinhua Cui and   
              Shweta Shinde and   
                Satyaki Sen and   
             Prateek Saxena and   
                   Pinghai Yuan   Dynamic Binary Translation for SGX
                                  Enclaves . . . . . . . . . . . . . . . . 32:1--32:??
              William Blair and   
           Andrea Mambretti and   
              Sajjad Arshad and   
        Michael Weissbacher and   
          William Robertson and   
                Engin Kirda and   
                   Manuel Egele   HotFuzz: Discovering Temporal and
                                  Spatial Denial-of-Service
                                  Vulnerabilities Through Guided
                                  Micro-Fuzzing  . . . . . . . . . . . . . 33:1--33:??
          Alesia Chernikova and   
                    Alina Oprea   FENCE: Feasible Evasion Attacks on
                                  Neural Networks in Constrained
                                  Environments . . . . . . . . . . . . . . 34:1--34:??


ACM Transactions on Privacy and Security (TOPS)
Volume 26, Number 1, February, 2023

                Xueru Zhang and   
     Mohammad Mahdi Khalili and   
                    Mingyan Liu   Differentially Private Real-Time Release
                                  of Sequential Data . . . . . . . . . . . 1:1--1:??
            Christoph Hagen and   
          Christian Weinert and   
          Christoph Sendner and   
       Alexandra Dmitrienko and   
               Thomas Schneider   Contact Discovery in Mobile Messengers:
                                  Low-cost Attacks, Quantitative Analyses,
                                  and Efficient Mitigations  . . . . . . . 2:1--2:??
             Shaharyar Khan and   
               Ilya Kabanov and   
                  Yunke Hua and   
                 Stuart Madnick   A Systematic Analysis of the Capital One
                                  Data Breach: Critical Lessons Learned    3:1--3:??
            Ruggero Lanotte and   
              Massimo Merro and   
                Andrei Munteanu   Industrial Control Systems Security via
                                  Runtime Enforcement  . . . . . . . . . . 4:1--4:??
     Kopo Marvin Ramokapane and   
                  Jose Such and   
                   Awais Rashid   What Users Want From Cloud Deletion and
                                  the Information They Need: a
                                  Participatory Action Study . . . . . . . 5:1--5:??
           Stephan Wiefling and   
Paul René Jòrgensen and   
              Sigurd Thunem and   
                Luigi Lo Iacono   Pump Up Password Security! Evaluating
                                  and Enhancing Risk-Based Authentication
                                  on a Real-World Large-Scale Online
                                  Service  . . . . . . . . . . . . . . . . 6:1--6:??
               Huanran Wang and   
                    Wu Yang and   
                   Wei Wang and   
                 Dapeng Man and   
                     Jiguang Lv   A Novel Cross-Network Embedding for
                                  Anchor Link Prediction with Social
                                  Adversarial Attacks  . . . . . . . . . . 7:1--7:??
               James Lembke and   
             Srivatsan Ravi and   
         Pierre-Louis Roman and   
                Patrick Eugster   Secure and Reliable Network Updates  . . 8:1--8:??
                Euijin Choo and   
             Mohamed Nabeel and   
            Mashael Alsabah and   
                Issa Khalil and   
                    Ting Yu and   
                       Wei Wang   DeviceWatch: a Data-Driven Network
                                  Analysis Approach to Identifying
                                  Compromised Mobile Devices with
                                  Graph-Inference  . . . . . . . . . . . . 9:1--9:??
                Gonzalo Gil and   
               Aitor Arnaiz and   
      Mariví Higuero and   
          Francisco Javier Diez   Assessment Framework for the
                                  Identification and Evaluation of Main
                                  Features for Distributed Usage Control
                                  Solutions  . . . . . . . . . . . . . . . 10:1--10:??

ACM Transactions on Privacy and Security (TOPS)
Volume 26, Number 2, May, 2023

           Lesly-Ann Daniel and   
    Sébastien Bardin and   
                    Tamara Rezk   Binsec/Rel: Symbolic Binary Analyzer for
                                  Security with Applications to
                                  Constant-Time and Secret-Erasure . . . . 11:1--11:??
             Norah Alotaibi and   
            John Williamson and   
                 Mohamed Khamis   ThermoSecure: Investigating the
                                  Effectiveness of AI-Driven Thermal
                                  Attacks on Commonly Used Computer
                                  Keyboards  . . . . . . . . . . . . . . . 12:1--12:??
              David Barrera and   
        Christopher Bellman and   
              Paul Van Oorschot   Security Best Practices: a Critical
                                  Analysis Using IoT as a Case Study . . . 13:1--13:??
               Anh-Tu Hoang and   
          Barbara Carminati and   
                  Elena Ferrari   Time-aware Anonymization of Knowledge
                                  Graphs . . . . . . . . . . . . . . . . . 14:1--14:??
              Rodrigo Otoni and   
          Matteo Marescotti and   
               Leonardo Alt and   
            Patrick Eugster and   
       Antti Hyvärinen and   
              Natasha Sharygina   A Solicitous Approach to Smart Contract
                                  Verification . . . . . . . . . . . . . . 15:1--15:??
              Savino Dambra and   
                Leyla Bilge and   
              Davide Balzarotti   A Comparison of Systemic and Systematic
                                  Risks of Malware Encounters in Consumer
                                  and Enterprise Environments  . . . . . . 16:1--16:??
     Farzana Ahamed Bhuiyan and   
                   Akond Rahman   Log-related Coding Patterns to Conduct
                                  Postmortems of Attacks in Supervised
                                  Learning-based Projects  . . . . . . . . 17:1--17:??
           Giorgio Di Tizio and   
           Patrick Speicher and   
        Milivoj Simeonovski and   
             Michael Backes and   
                  Ben Stock and   
          Robert Künnemann   Pareto-optimal Defenses for the Web
                                  Infrastructure: Theory and Practice  . . 18:1--18:??
               Ranya Aloufi and   
              Hamed Haddadi and   
                    David Boyle   Paralinguistic Privacy Protection at the
                                  Edge . . . . . . . . . . . . . . . . . . 19:1--19:??
       Viktor Engström and   
             Pontus Johnson and   
     Robert Lagerström and   
              Erik Ringdahl and   
             Max Wällstedt   Automated Security Assessments of Amazon
                                  Web Services Environments  . . . . . . . 20:1--20:??
               Sohail Habib and   
                Hassan Khan and   
     Andrew Hamilton-Wright and   
                 Urs Hengartner   Revisiting the Security of Biometric
                                  Authentication Systems Against
                                  Statistical Attacks  . . . . . . . . . . 21:1--21:??
                 Ahmed Amro and   
         Vasileios Gkioulos and   
              Sokratis Katsikas   Assessing Cyber Risk in Cyber-Physical
                                  Systems Using the ATT&CK Framework  . . . 22:1--22:??

ACM Transactions on Privacy and Security (TOPS)
Volume 26, Number 3, August, 2023

              Seoyeon Hwang and   
               Ercan Ozturk and   
                    Gene Tsudik   Balancing Security and Privacy in
                                  Genomic Range Queries  . . . . . . . . . 23:1--23:??
                 Sijie Zhuo and   
              Robert Biddle and   
               Yun Sing Koh and   
         Danielle Lottridge and   
              Giovanni Russello   SoK: Human-centered Phishing
                                  Susceptibility . . . . . . . . . . . . . 24:1--24:??
            Andreas V. Hess and   
Sebastian A. MÖdersheim and   
               Achim D. Brucker   Stateful Protocol Composition in
                                  Isabelle/HOL . . . . . . . . . . . . . . 25:1--25:??
    Patricia Arias-Cabarcos and   
              Matin Fallahi and   
              Thilo Habrich and   
              Karen Schulze and   
           Christian Becker and   
                Thorsten Strufe   Performance and Usability Evaluation of
                                  Brainwave Authentication Techniques with
                                  Consumer Devices . . . . . . . . . . . . 26:1--26:??
               Nada Lachtar and   
                 Duha Ibdah and   
                 Hamza Khan and   
                     Anys Bacha   RansomShield: a Visualization Approach
                                  to Defending Mobile Systems Against
                                  Ransomware . . . . . . . . . . . . . . . 27:1--27:??
                   Litao Li and   
          Steven H. H. Ding and   
                  Yuan Tian and   
        Benjamin C. M. Fung and   
          Philippe Charland and   
                  Weihan Ou and   
                   Leo Song and   
                   Congwei Chen   VulANalyzeR: Explainable Binary
                                  Vulnerability Detection with Multi-task
                                  Learning and Attentional Graph
                                  Convolution  . . . . . . . . . . . . . . 28:1--28:??
                  Sona Alex and   
             Dhanaraj K. J. and   
                  Deepthi P. P.   Energy Efficient and Secure Neural
                                  Network-based Disease Detection
                                  Framework for Mobile Healthcare Network  29:1--29:??
               Hazel Murray and   
                   David Malone   Costs and Benefits of Authentication
                                  Advice . . . . . . . . . . . . . . . . . 30:1--30:??
                 Tom Bolton and   
             Tooska Dargahi and   
              Sana Belguith and   
                  Carsten Maple   PrivExtractor: Toward Redressing the
                                  Imbalance of Understanding between
                                  Virtual Assistant Users and Vendors  . . 31:1--31:??
                  Isabel Wagner   Privacy Policies across the Ages:
                                  Content of Privacy Policies 1996--2021   32:1--32:??
                    Yang Lu and   
                Zhengxin Yu and   
                    Neeraj Suri   Privacy-preserving Decentralized
                                  Federated Learning over Time-varying
                                  Communication Graph  . . . . . . . . . . 33:1--33:??
                   Jian Hou and   
                  Jing Wang and   
              Mingyue Zhang and   
                    Zhi Jin and   
                Chunlin Wei and   
                    Zuohua Ding   Privacy-preserving Resilient Consensus
                                  for Multi-agent Systems in a General
                                  Topology Structure . . . . . . . . . . . 34:1--34:??
             Isaiah J. King and   
                 H. Howie Huang   Euler: Detecting Network Lateral
                                  Movement via Scalable Temporal Link
                                  Prediction . . . . . . . . . . . . . . . 35:1--35:??
           Anushka Vidanage and   
             Peter Christen and   
          Thilina Ranbaduge and   
                 Rainer Schnell   A Vulnerability Assessment Framework for
                                  Privacy-preserving Record Linkage  . . . 36:1--36:??
                   Chun Guo and   
                  Xiao Wang and   
                  Xiang Xie and   
                          Yu Yu   The Multi-User Constrained Pseudorandom
                                  Function Security of Generalized GGM
                                  Trees for MPC and Hierarchical Wallets   37:1--37:??
             Dmitrii Usynin and   
            Daniel Rueckert and   
               Georgios Kaissis   Beyond Gradients: Exploiting Adversarial
                                  Priors in Model Inversion Attacks  . . . 38:1--38:??
        Gianluca Scopelliti and   
          Sepideh Pouyanrad and   
                Job Noorman and   
                Fritz Alder and   
          Christoph Baumann and   
             Frank Piessens and   
       Jan Tobias Mühlberg   End-to-End Security for Distributed
                                  Event-driven Enclave Applications on
                                  Heterogeneous TEEs . . . . . . . . . . . 39:1--39:??
            Ranwa Al Mallah and   
               Talal Halabi and   
                   Bilal Farooq   Resilience-by-design in Adaptive
                                  Multi-agent Traffic Control Systems  . . 40:1--40:??
             Manuel Barbosa and   
              Gilles Barthe and   
   Benjamin Grégoire and   
             Adrien Koutsos and   
              Pierre-Yves Strub   Mechanized Proofs of Adversarial
                                  Complexity and Application to Universal
                                  Composability  . . . . . . . . . . . . . 41:1--41:??
  Rajagopal Venkatesaramani and   
                  Zhiyu Wan and   
           Bradley A. Malin and   
           Yevgeniy Vorobeychik   Defending Against Membership Inference
                                  Attacks on Beacon Services . . . . . . . 42:1--42:??

ACM Transactions on Privacy and Security (TOPS)
Volume 26, Number 4, November, 2023

               Xueluan Gong and   
               Yanjiao Chen and   
                Wenbin Yang and   
              Huayang Huang and   
                      Qian Wang   $ B^3 $: Backdoor Attacks against
                                  Black-box Machine Learning Models  . . . 43:1--43:??
                 Jinfu Chen and   
                   Luo Song and   
                 Saihua Cai and   
                  Haodi Xie and   
                  Shang Yin and   
                    Bilal Ahmad   TLS-MHSA: an Efficient Detection Model
                                  for Encrypted Malicious Traffic based on
                                  Multi-Head Self-Attention Mechanism  . . 44:1--44:??
           Tommaso Paladini and   
            Francesco Monti and   
               Mario Polino and   
          Michele Carminati and   
                 Stefano Zanero   Fraud Detection under Siege: Practical
                                  Poisoning Attacks and Defense Strategies 45:1--45:??
                 Dohyun Kim and   
                  Mangi Cho and   
               Hocheol Shin and   
                Jaehoon Kim and   
                 Juhwan Noh and   
                    Yongdae Kim   Lightbox: Sensor Attack Detection for
                                  Photoelectric Sensors via Spectrum
                                  Fingerprinting . . . . . . . . . . . . . 46:1--46:??
      Shahnewaz Karim Sakib and   
        George T. Amariucai and   
                      Yong Guan   Measures of Information Leakage for
                                  Incomplete Statistical Information:
                                  Application to a Binary Privacy
                                  Mechanism  . . . . . . . . . . . . . . . 47:1--47:??
             Maksim E. Eren and   
           Manish Bhattarai and   
            Robert J. Joyce and   
                Edward Raff and   
           Charles Nicholas and   
            Boian S. Alexandrov   Semi-Supervised Classification of
                                  Malware Families Under Extreme Class
                                  Imbalance via Hierarchical Non-Negative
                                  Matrix Factorization with Automatic
                                  Model Selection  . . . . . . . . . . . . 48:1--48:??
              Chenhan Zhang and   
               Shiyao Zhang and   
             James J. Q. Yu and   
                        Shui Yu   SAM: Query-efficient Adversarial Attacks
                                  against Graph Neural Networks  . . . . . 49:1--49:??
              Ayoosh Bansal and   
           Anant Kandikuppa and   
              Monowar Hasan and   
            Chien-Ying Chen and   
                 Adam Bates and   
                    Sibin Mohan   System Auditing for Real-Time Systems    50:1--50:??
     Md Sajidul Islam Sajid and   
                Jinpeng Wei and   
              Ehab Al-Shaer and   
                    Qi Duan and   
               Basel Abdeen and   
                   Latifur Khan   symbSODA: Configurable and Verifiable
                                  Orchestration Automation for Active
                                  Malware Deception  . . . . . . . . . . . 51:1--51:??


ACM Transactions on Privacy and Security (TOPS)
Volume 27, Number 1, February, 2024

                  Shen Wang and   
            Mahshid Delavar and   
        Muhammad Ajmal Azad and   
          Farshad Nabizadeh and   
                Steve Smith and   
                       Feng Hao   Spoofing Against Spoofing: Toward Caller
                                  ID Verification in Heterogeneous
                                  Telecommunication Systems  . . . . . . . 1:1--1:??
              Jenny Ottmann and   
           Frank Breitinger and   
                 Felix Freiling   An Experimental Assessment of
                                  Inconsistencies in Memory Forensics  . . 2:1--2:??
          Erik-Oliver Blass and   
                 Guevara Noubir   Forward Security with Crash Recovery for
                                  Secure Logs  . . . . . . . . . . . . . . 3:1--3:??
                    Han Cao and   
                Qindong Sun and   
                    Yaqi Li and   
                  Rong Geng and   
                 Xiaoxiong Wang   Efficient History-Driven Adversarial
                                  Perturbation Distribution Learning in
                                  Low Frequency Domain . . . . . . . . . . 4:1--4:??
           Prakash Shrestha and   
        Ahmed Tanvir Mahdad and   
                  Nitesh Saxena   Sound-based Two-factor Authentication:
                                  Vulnerabilities and Redesign . . . . . . 5:1--5:??
            Mayank Swarnkar and   
                    Neha Sharma   OptiClass: an Optimized Classifier for
                                  Application Layer Protocols Using Bit
                                  Level Signatures . . . . . . . . . . . . 6:1--6:??
                  Yong Zeng and   
                  Jiale Liu and   
                  Tong Dong and   
                 Qingqi Pei and   
                Jianfeng Ma and   
                        Yao Liu   Eyes See Hazy while Algorithms Recognize
                                  Who You Are  . . . . . . . . . . . . . . 7:1--7:??
              Maryna Kluban and   
            Mohammad Mannan and   
                    Amr Youssef   On Detecting and Measuring Exploitable
                                  JavaScript Functions in Real-world
                                  Applications . . . . . . . . . . . . . . 8:1--8:??
                    Li Tang and   
                Qingqing Ye and   
                   Haibo Hu and   
                   Qiao Xue and   
                 Yaxin Xiao and   
                         Jin Li   DeepMark: a Scalable and Robust
                                  Framework for DeepFake Video Detection   9:1--9:??
                    Li Wang and   
              Xiangtao Meng and   
                     Dan Li and   
               Xuhong Zhang and   
                Shouling Ji and   
                   Shanqing Guo   DEEPFAKER: a Unified Evaluation Platform
                                  for Facial Deepfake and Detection Models 10:1--10:??
                 Liqun Chen and   
               Changyu Dong and   
   Christopher J. P. Newton and   
                     Yalan Wang   Sphinx-in-the-Head: Group Signatures
                                  from Symmetric Primitives  . . . . . . . 11:1--11:??
                   Yan Qiao and   
                     Kui Wu and   
               Majid Khabbazian   Non-intrusive Balance Tomography Using
                                  Reinforcement Learning in the Lightning
                                  Network  . . . . . . . . . . . . . . . . 12:1--12:??
               Zhenpeng Shi and   
           Nikolay Matyunin and   
              Kalman Graffi and   
              David Starobinski   Uncovering CWE-CVE-CPE Relations with
                                  Threat Knowledge Graphs  . . . . . . . . 13:1--13:??