Please enable JavaScript.
Coggle requires JavaScript to display documents.
Literature Review_Sky (From Data Type (Website related data (Traffic…
Literature Review_Sky
From Data Type
Cloud data
Training data
SP17_SecureML: A System for Scalable Privacy-Preserving Machine Learning
CCS17_Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning [-61] (45) (seed)
AsiaCCS18_Protecting Intellectual Property of Deep Neural Networks with Watermarking [-27] (1)
Model themselves
CCS15_Model inversion attacks that exploit confidence information and basic countermeasures [27] (125)
USENIX16_Stealing Machine Learning Models via Prediction APIs. [83] (154)
Credentials
Password
CCS16_Targeted Online Password Guessing: An Underestimated Threat
NDSS14_On the semantic patterns of passwords and their security impact [31] (92)
Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks [24] (57)
NDSS16_VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion
CCS14_Blind recognition of touched keys on mobile devices [12] (39)
Authentication
CCS16_Forgery-Resistant Touch-based Authentication on Mobile Devices
NDSS13_Unobservable Re-authentication for Smartphones [13] (154)
CCS13_When kids’ toys breach mobile phone security [19] (57)
CCS17_Data breaches, phishing, or malware? Understanding the risks of stolen credentials
Website related data
Traffic
NDSS18_Inside Job: Applying Traffic Analysis to Measure Tor from Within
NDSS18_Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebook’s Explanations
Fingerprinting
USENIX14_Effective Attacks and Provable Defenses for Website Fingerprinting [29] (127)
USENIX16_k-fingerprinting: a Robust Scalable Website Fingerprinting Technique [14] (34)
SP17_How Unique is Your. onion?: An Analysis of the Fingerprintability of Tor Onion Services 25
Social
NDSS18_When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
SP14_Doppelgänger Finder: Taking Stylometry To The Underground [7] (55)
USENIX15_De-anonymizing programmers via code stylometry [16] (56)
-
Mobile related data
sensor data
SP16_No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
CCS15_Mitigating Storage Side Channels Using Statistical Privacy Mechanisms [47] (19)
USENIX14_Gyrophone: Recognizing Speech from Gyroscope Signals [54] (130)
CCS18_ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android [-12] (1)
USENIX15_PowerSpy: Location Tracking Using Mobile Device Power Analysis [58] (77)
NDSS18_OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS [-36] (2)
CCS15_When Good Becomes Evil: Keystroke Inference with Smartwatch [56] (69)
CCS16_Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets
USENIX17_6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
CCS14_Beware, Your Hands Reveal Your Secrets ! [67] (61)
APP data
USENIX18_FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps
CCS14_AutoCog: Measuring the Description-to-permission Fidelity in Android Applications [28] (11)
CPU caches
USENIX18_Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks
CCS16_A software approach to defeating side channels in last-level caches [62] (38)
-
From Channel
Mobile
Software (Mobile app)
SP17_Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security
USENIX18_FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps
CCS14_AutoCog: Measuring the Description-to-permission Fidelity in Android Applications [28] (11)
-
Smart Devices
CCS16_Forgery-Resistant Touch-based Authentication on Mobile Devices
NDSS13_Unobservable Re-authentication for Smartphones [13] (154)
CCS13_When kids’ toys breach mobile phone security [19] (57)
-
NDSS16_VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion
CCS14_Blind recognition of touched keys on mobile devices [12] (39)
Website (network data, network service)
CCS16_Targeted Online Password Guessing: An Underestimated Threat
NDSS14_On the semantic patterns of passwords and their security impact [31] (92)
USENIX16_Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks [24] (57)
CCS16_Data Exfiltration in the Face of CSP
NDSS18_Inside Job: Applying Traffic Analysis to Measure Tor from Within
CCS17_Data breaches, phishing, or malware? Understanding the risks of stolen credentials
NDSS18_When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
SP14_Doppelgänger Finder: Taking Stylometry To The Underground [7] (55)
USENIX15_De-anonymizing programmers via code stylometry [16] (56)
USENIX16_k-fingerprinting: a Robust Scalable Website Fingerprinting Technique [14] (34)
USENIX14_Effective Attacks and Provable Defenses for Website Fingerprinting [29] (127)
SP17_How Unique is Your. onion?: An Analysis of the Fingerprintability of Tor Onion Services [25] (6)
NDSS18_Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebook’s Explanations
Machine Learning Models
SP17_SecureML: A System for Scalable Privacy-Preserving Machine Learning [,61] (68) (seed)
CCS16_Deep learning with differential privacy [9] (231)
x CCS15_Privacy-preserving deep learning. [41,77] (191)
CCS17_Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning [-61] (45) (seed)
USENIX14_Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing [28] [123]
CCS15_Model inversion attacks that exploit confidence information and basic countermeasures [27] (125)
x USENIX16_Stealing Machine Learning Models via Prediction APIs. [83] (154)
x SP17_Membership Inference Attacks against Machine Learning Models [78] (103)
AsiaCCS18_Protecting Intellectual Property of Deep Neural Networks with Watermarking [-27] (1)
Cloud Storage
SP17_Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization
SP18_Enhancing Selectivity in Big Data [5] (0)
-