Annual Computer Security Applications Conference(ACSAC)会议关注计算机应用安全领域的研究工作,与DSN, ESORICS和RAID并称为网络与信息安全领域的“四小安全顶级会议”(简称四小),代表着国际网络与信息安全学术研究的最高水平。ACSAC 2022年共收到论文303篇(2021:326, 2020:300, 2019:266, 2018:299),录取73篇(2021:80, 2020:70, 2019:60, 2018:60),录用率为24.09%(2021:24.5%, 2020:23.33%, 2019:22.56%, 2018:20.1%),所有录用论文标题如下:
国内包含南京大学、中科院软件所、中科院自动化所、中科院信工所、中国矿业大学、复旦大学、武汉大学、华中科技大学、西安电子科技大学、国防科技大学、香港科技大学、浙江大学、上海交通大学
等高校都有录用论文,可以看出国内论文的录用数量上升较快,传统的Web安全和网络安全分类论文整体数量较少
,部分小编感兴趣的论文标题已经标红:
Savio Sciancalepore, Eindhoven University of Technology (TU/e); Dominik Roy George, Eindhoven University of Technology (TU/e)
Matthew Landen, Georgia Institute of Technology; Keywhan Chung, Lawrence Livermore National Laboratory; Moses Ike, Georgia Institute of Technology; Sarah Mackay, Lawrence Livermore National Laboratory; Jean-Paul Watson, Lawrence Livermore National Laboratory; Wenke Lee, Georgia Institute of Technology
Zhuojia Shen, University of Rochester; Komail Dharsee, University of Rochester; John Criswell, University of Rochester
Maria Zhdanova, Fraunhofer SIT; Julian Urbansky, Fraunhofer UMSICHT; Anne Hagemeier, Fraunhofer UMSICHT; Daniel Zelle, Fraunhofer SIT; Isabelle Herrmann, Fraunhofer UMSICHT; Dorian Höffner, Fraunhofer UMSICHT
Qifan Zhang, University of California, Irvine; Junjie Shen, University of California, Irvine; Mingtian Tan, Fudan University; Zhe Zhou, Fudan University; Zhou Li, University of California, Irvine; Qi Alfred Chen, University of California, Irvine; Haipeng Zhang, ShanghaiTech University
Alessandro Erba, CISPA Helmholtz Center for Information Security; Nils Ole Tippenhauer, CISPA Helmholtz Center for Information Security
Yechan Bae, Georgia Institute of Technology; Sarbartha Banerjee, University of Texas at Austin; Sangho Lee, Microsoft Research; Marcus Peinado, Microsoft Research
Anomadarshi Barua, University of California, Irvine; Lelin Pan, University of California, Irvine; Mohammad Abdullah Al Faruque, University of California, Irvine
Jan Götte, TU Darmstadt; Liran Katzir, Tel Aviv University; Björn Scheuermann, TU Darmstadt
Luca Morgese Zangrandi, TNO; Thijs van Ede, University of Twente; Tim Booij, TNO; Savio Sciancalepore, Eindhoven University of Technology; Luca Allodi, Eindhoven University of Technology; Andrea Continella, University of Twente
Nik Sultana, Illinois Institute of Technology; Henry Zhu, UIUC; Ke Zhong, University of Pennsylvania; Zhilei Zheng, University of Pennsylvania; Ruijie Mao, University of Pennsylvania; Digvijaysinh Chauhan, University of Pennsylvania; Stephen Carrasquillo, University of Pennsylvania; Junyong Zhao, University of Arizona; Lei Shi, University of Pennsylvania; Nikos Vasilakis, Brown University and MIT; Boon Thau Loo, University of Pennsylvania
Yinggang Guo, State Key Laboratory for Novel Software Technology, Nanjing University; Zicheng Wang, State Key Laboratory for Novel Software Technology, Nanjing University; Bingnan Zhong, State Key Laboratory for Novel Software Technology, Nanjing University; Qingkai Zeng, State Key Laboratory for Novel Software Technology, Nanjing University
Designing a Provenance Analysis for SGX Enclaves Flavio Toffalini, EPFL; Mathias Payer, EPFL; Jianying Zhou, Singapore University of Technology and Design; Lorenzo Cavallaro, University College London
Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation
Qian Ren, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute; Yingjun Wu, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute; Han Liu, Oxford-Hainan Blockchain Research Institute, Tsinghua University; Yue Li, Oxford-Hainan Blockchain Research Institute; Anne Victor, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute; Hong Lei, Hainan University, Oxford-Hainan Blockchain Research Institute; Lei Wang, Shanghai Jiao Tong University; Bangdao Chen, SSC Holding Company Ltd., Oxford-Hainan Blockchain Research Institute
Xinshu Ma, University of Edinburgh; Florentin Rochet, University of Namur; Tariq Elahi, University of Edinburgh
Mohamad Mansouri, Thales SIX GTS / EURECOM; Melek Önen, EURECOM; Wafa Ben Jaballah, Thales SIX GTS
Yinbin Miao, Xidian University; Rongpeng Xie, Xidian University; Xinghua Li, Xidian University; Ximeng Liu, Fuzhou University; Zhuo Ma, Xidian University; Robert H. Deng, Singapore Management University
Giovanni Apruzzese, University of Liechtenstein; Mauro Conti, University of Padua; Ying Yuan, University of Padua
Chen Gong, Institute of Automation, Chinese Academy of Sciences; Zhou Yang, Singapore Management University; Yunpeng Bai, Institute of Automation, Chinese Academy of Sciences; Jieke Shi, Singapore Management University; Arunesh Sinha, Rutgers University; Bowen Xu, Singapore Management University; David Lo, Singapore Management University; Xinwen Hou, Institute of Automation, Chinese Academy of Sciences; Guoliang Fan, Institute of Automation, Chinese Academy of Sciences
Liyue Shen, University of Queensland; Yanjun Zhang, Deakin University; Jingwei Wang, University of Queensland; Guangdong Bai, University of Queensland
Minghong Fang, The Ohio State University; Jia Liu, The Ohio State University; Neil Zhenqiang Gong, Duke University; Elizabeth S. Bentley, Air Force Research Laboratory
Ning Wang, Virginia Polytechnic Institute and State University; Yang Xiao, University of Kentucky; Yimin Chen, University of Massachusetts Lowell; Ning Zhang, Washington University in St. Louis; Wenjing Lou, Virginia Polytechnic Institute and State University; Y. Thomas Hou, Virginia Polytechnic Institute and State University
Yufeng Diao, University of Glasgow; Yichi Zhang, University of Glasgow; Guodong Zhao, University of Glasgow; Mohamed Khamis, University of Glasgow
Nuo Xu, Lehigh University; Binghui Wang, Illinois Institute of Technology; Ran Ran, Lehigh University; Wujie Wen, Lehigh University; Parv Venkitasubramaniam, Lehigh University
Jing Xu, TU Delft; Rui Wang, TU Delft; Stefanos Koffas, TU Delft; Kaitai Liang, TU Delft; Stjepan Picek, Radboud University & TU Delft
YongGang Li, China University of Mining and Technology; Yeh-Ching Chung, the Chinese University of Hong Kong (CUHK), Shenzhen; Jinbiao Xing, China University of Mining and Technology; Yu Bao, China University of Mining and Technology; GuoYuan LIn, China University of Mining and Technology
Jia Yan, Institute of Software, Chinese Academy of Sciences / School of Computer Science and Technology, University of Chinese Academy of Sciences; Ming Wan, QIANXIN Group Inc.; Xiangkun Jia, Institute of Software, Chinese Academy of Sciences; Lingyun Ying, QIANXIN Group Inc.; Purui Su, Institute of Software, Chinese Academy of Sciences / School of Cyber Security, University of Chinese Academy of Sciences; Zhanyi Wang, QIANXIN Group Inc.
Aaron Faulkenberry, Georgia Institute of Technology; Athanasios Avgetidis, Georgia Institute of Technology; Zane Ma, Georgia Institute of Technology; Omar Alrawi, Georgia Institute of Technology; Charles Lever, Devo; Panagiotis Kintis, Voreas Laboratories Inc; Fabian Monrose, Georgia Institute of Technology; Angelos D. Keromytis, Georgia Institute of Technology; Manos Antonakakis, Georgia Institute of Technology
Afsah Anwar, Northeastern University; Yi Hui Chen, Northeastern University; Roy Hodgman, Rapid 7; Tom Sellers, runZero; Engin Kirda, Northeastern University; Alina Oprea, Northeastern University
Xutong Wang, Institute of Information Engineering, Chinese Academy of Sciences; Chaoge Liu, Institute of Information Engineering, Chinese Academy of Sciences; Xiaohui Hu, School of Computer Science, Beijing University of Posts and Telecommunications; Zhi Wang, Institute of Information Engineering, Chinese Academy of Sciences; Jie Yin, Institute of Information Engineering, Chinese Academy of Sciences; Xiang Cui, Zhongguancun Laboratory
Erik Buchholz, UNSW Sydney; Alsharif Abuadbba, Data61, CSIRO; Shuo Wang, Data61, CSIRO; Surya Nepal, Data61, CSIRO; Salil S. Kanhere, UNSW Sydney
Ammar Haydari, University of California, Davis; Chen-Nee Chuah, University of California, Davis; Michael Zhang, University of California, Davis; Jane Macfarlane, University of California, Berkeley; Sean Peisert, Lawrence berkeley national laboratory
Jieyu Zheng, Fudan university; Feng He, Fudan university; Shiyu Shen, Fudan university; Chenxi Xue, Fudan university; Yunlei Zhao, Fudan university
Wenqing Li, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Shijie Jia, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Limin Liu, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Fangyu Zheng, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Yuan Ma, The Institute of Information Engineering, Chinese Acadamy of Sciences.; Jingqiang Lin, School of Cyber Security, University of Science and Technology of China.
Seung Ho Na, KAIST; Hyeong Gwon Hong, KAIST; Junmo Kim, KAIST; Seungwon Shin, KAIST
Markus Bauer, CISPA – Helmholtz Center for Information Security; Ilya Grishchenko, University of California, Santa Barbara; Christian Rossow, CISPA – Helmholtz Center for Information Security
Sunwoo Ahn, Seoul National University; Seonggwan Ahn, Seoul National University; Hyungjoon Koo, Sungkyunkwan University; Yunheung Paek, Seoul National University
Elia Geretto, Vrije Universiteit Amsterdam; Cristiano Giuffrida, Vrije Universiteit Amsterdam; Herbert Bos, Vrije Universiteit Amsterdam; Erik van der Kouwe, Vrije Universiteit Amsterdam
Prashast Srivastava, Purdue University; Stefan Nagy, University of Utah; Matthew Hicks, Virginia Tech; Antonio Bianchi, Purdue University; Mathias Payer, EPFL
Carmen Cheh, Advanced Digital Sciences Center, Singapore; Nicholas Tay, Singapore University of Technology and Design; Binbin Chen, Singapore University of Technology and Design
Chandra Thapa, CSIRO Data61; Seung Ick Jang, CSIRO Data61; Muhammad Ejaz Ahmed, CSIRO Data61; Seyit Camtepe, CSIRO Data61; Josef Pieprzyk, CSIRO Data61; Surya Nepal, CSIRO Data61
Yu Luo, University of Missouri - Kansas City; Weifeng Xu, The University of Baltimore; Dianxiang Xu, University of Missouri - Kansas City
Ying Cao, Institute of Information Engineering, Chinese Academy of Sciences; Ruigang Liang, Institute of Information Engineering, Chinese Academy of Sciences; Kai Chen, Institute of Information Engineering, Chinese Academy of Sciences; Peiwei Hu, Institute of Information Engineering, Chinese Academy of Sciences
Yuki Koike, Ricerca Security, Inc.; Hiroyuki Katsura, Ricerca Security, Inc.; Hiromu Yakura, University of Tsukuba / National Institute of Advanced Industrial Science and Technology (AIST), Japan; Yuma Kurogome, Ricerca Security, Inc.
Yiru Zhao, Wuhan university; Xiaoke Wang, Wuhan university; Lei Zhao, Wuhan university; Yueqiang Cheng, NIO Security Research; Heng Yin, UC Riverside
Harshad Sathaye, Northeastern University; Guevara Noubir, Northeastern University; Aanjhan Ranganathan, Northeastern University
Evangelos Bitsikas, New York University Abu Dhabi and Northeastern University; Christina Pöpper, New York University Abu Dhabi
Samin Yaseer Mahmud, North Carolina State University; K. Virgil English, North Carolina State University; Seaver Thorn, North Carolina State University; William Enck, North Carolina State University; Adam Oest, PayPal; Muhammad Saad, PayPal
Rahel A. Fainchtein, Georgetown University; Adam J. Aviv, The George Washington University; Micah Sherr, Georgetown University
Xiaoyuan Wu, The George Washington University; Collins W. Munyendo, The George Washington University; Eddie Cosic, The George Washington University; Genevieve A. Flynn, The George Washington University; Olivia Legault, The George Washington University; Adam J. Aviv, The George Washington University
James Mattei, Tufts University; Madeline McLaughlin, Tufts University; Samantha Katcher, Tufts University; Daniel Votipka, Tufts University
Levente Csikor, Institute for Infocomm Research, ASTAR; Sriram Ramachandran, Institute for Infocomm Research, ASTAR; Anantharaman Lakshminarayanan, Institute for Infocomm Research, A*STAR
Jeongyoon Heo, Samsung Research; Sangwon Gil, Samsung Research; Youngman Jung, Samsung Research; Jinmok Kim, Samsung Research; Donguk Kim, Samsung Research; Woojin Park, Samsung Research; Yongdae Kim, KAIST; Kang G. Shin, The University of Michigan; Choong-Hoon Lee, Samsung Research
Zheng Yang, Southwest University; Chao Yin, Vrije University Amsterdam, Netherlands; Junming Ke, University of Tartu; Anh Dinh, Singapore University of Technology and Design; Jianying Zhou, Singapore University of Technology and Design
Shreyas Srinivasa, Aalborg University; Jens Myrup Pedersen, Aalborg University; Emmanouil Vasilomanolakis, Technical University of Denmark
Zhechang Zhang, Huazhong University of Science and Technology; Bin Yuan, Huazhong University of Science and Technology; Kehan Yang, Huazhong University of Science and Technology; Deqing Zou, Huazhong University of Science and Technology; Hai Jin, Huazhong University of Science and Technology
xiaolei Wang, College of Computer, National University of Defense Technology; Lin Yang, National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute, AMS; Dongyang Li, National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute, AMS; Linru Ma, National Key Laboratory of Science and Technology on Information System Security, Systems Engineering Institute, AMS; Yongzhong He, School of Computer and Information Technology,Beijing Jiaotong University; Junchao Xiao, School of Systems Science and Engineering, Sun Yat-Sen University; Jiyuan Liu, College of Computer, National University of Defense Technology; Yuexiang Yang, College of Computer, National University of Defense Technology
Xian Wang, The Hong Kong University of Science and Technology
Bingkun Wu, Technical University of Denmark, Denmark; Weizhi Meng, Technical University of Denmark, Denmark; Wei-Yang Chiu, Technical University of Denmark, Denmark
Muhammad Adil Inam, University of Illinois at Urbana-Champaign; Akul Goyal, University of Illinois at Urbana-Champaign; Jason Liu, University of Illinois at Urbana-Champaign; Jaron Mink, University of Illinois at Urbana-Champaign; Noor Michael, University of Illinois at Urbana-Champaign; Sneha Gaur, University of Illinois at Urbana-Champaign; Adam Bates, University of Illinois at Urbana-Champaign; Wajih Ul Hassan, University of Virginia
Yushan Liu, Google, Inc.; Xiaokui Shu, IBM Research; Yixin Sun, University of Virginia; Jiyong Jang, IBM Research; Prateek Mittal,
Debopriya Roy Dipta, Iowa State University; Berk Gulmezoglu, Iowa State University
Rajat Gupta, Georgia Institute of Technology; Lukas Dresel, University of California, Santa Barbara; Noah Spahn, University of California, Santa Barbara; Giovanni Vigna, University of California, Santa Barbara; Christopher Kruegel, University of California, Santa Barbara; Taesoo Kim, Georgia Institute of Technology
Yutian Yang, Zhejiang University; Wenbo Shen, Zhejiang University; Xun Xie, Zhejiang University; Kangjie Lu, Zhejiang University; Mingsen Wang, Zhejiang University; Tianyu Zhou, Zhejiang University; Chenggang Qin, Ant Group; Wang Yu, Ant Group; Kui Ren, Zhejiang University
Joana Pecholt, Fraunhofer AISEC; Sascha Wessel, Fraunhofer AISEC
Yizhuo Wang, Shanghai Jiao Tong University; Yikun Hu, Shanghai Jiao Tong University; Xuangan Xiao, Shanghai Jiao Tong University; Dawu Gu, Shanghai Jiao Tong University
Fan Lang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University ; Wei Wang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Lingjia Meng, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University ; Jingqiang Lin, University of Science and Technology of China; Qiongxiao Wang, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Linli Lu, State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences
ChangSeok Oh, Georgia Institute of Technology; Sangho Lee, Microsoft Research; Chenxiong Qian, HKU; Hyungjoon Koo, Sungkyunkwan University; Wenke Lee, Georgia Institute of Technology
Pablo Picazo, Chalmers University of Technology; Benjamin Eriksson, Chalmers University of Technology; Andrei Sabelfeld, Chalmers University of Technology
David Klein, Technische Universität Braunschweig; Marius Musch, Technische Universität Braunschweig; Thomas Barber, SAP Security Research; Moritz Kopmann, Technische Universität Braunschweig; Martin Johns, Technische Universität Braunschweig
Xiaohai Dai, Huazhong University of Science and Technology; Liping Huang, Huazhong University of Science and Technology; Jiang Xiao, Huazhong University of Science and Technology; Zhaonan Zhang, Huazhong University of Science and Technology; Xia Xie, Hainan University; Hai Jin, Huazhong University of Science and Technology
Moe Sabry, McMaster University; Reza Samavi, Toronto Metropolitan University
Minjae Seo, The Affiliated Institute of ETRI; Jaehan Kim, KAIST; Eduard Marin, Telefonica Research; Myeongsung You, KAIST; Taejune Park, Chonnam National University; Seungsoo Lee, Incheon National University; Seungwon Shin, KAIST; Jinwoo Kim
论文下载:https://dl.acm.org/doi/proceedings/10.1145/3564625
会议主页:https://www.acsac.org/
历年会议
安全学术圈招募队友-ing 有兴趣加入学术圈的请联系secdr#qq.com