PLAS'20: 15th Workshop on Programming Languages and Analysis for Security
Abstract
Recommendations
AISec'20: 13th Workshop on Artificial Intelligence and Security
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityRecent years have seen a dramatic increase in applications of Artificial Intelligence (AI), Machine Learning (ML), and data mining to security and privacy problems. The analytic tools and intelligent behavior provided by these techniques make AI and ML ...
ASHES 2020: 4th Workshop on Attacks and Solutions in Hardware Security
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityThe workshop on "Attacks and Solutions in HardwarE Security"(ASHES) welcomes any theoretical and practical works on hardware security, including attacks, solutions, countermeasures, proofs, classification, formalization, and implementations. Besides ...
The Invisible Shadow: How Security Cameras Leak Private Activities
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityThis paper presents a new privacy threat, the Invisible Infrared Shadow Attack (IRSA), which leverages the inconspicuous infrared (IR) light emitted by indoor security cameras, to reveal in-home human activities behind opaque curtains. The key ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Jay Ligatti,
- Xinming Ou,
- Program Chairs:
- Jonathan Katz,
- Giovanni Vigna
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 127Total Downloads
- Downloads (Last 12 months)11
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in