26
A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 01 October 2021 Version 1.11 Title word cross-reference #PrettyFlyForAWiFi [BBEM21]. K [SCL + 17]. -Means [SCL + 17]. 2.0 [NVM + 17]. Abstract [AM21, GM18]. Accurate [RPA16, SBP21]. Across [MJA + 18]. Adaptive [HZL21, NKS + 19]. Adversarial [DCB + 21, SBBR19, YTF + 20]. Advertising [BK ¨ O20]. Against [HZL21, PPK + 18]. Agreement [CE ¸ CE19]. Allocation [RMSB17]. Along [STT17]. Alpha [MV18]. Amandroid [WROR18]. Analysing [IMT + 20]. Analysis [AKM + 21, BDG18, BAO + 21, CPC + 18, JK21, MGSPL17, OBC + 17, RBS + 17, SCRV20, SNKK20, SRRM18, VCT21, WROR18]. Analytical [CE ¸ CE19]. Analyzing [AM21, SBP21]. ANCHOR [KYREV19]. Android [AKM + 21, MVBK21, OMA + 19, WROR18, YTF + 18]. Anonymization [MOW + 21]. Anti [SMA18]. Anti-Virtual [SMA18]. app [BMPS21]. Applications [GKM16, RBS + 17]. Approach [LMMV20, LCSF18, MOW + 21, OEG + 19, SCL + 17]. Approaches [CAL + 21]. Approximate [MGSPL17]. Apps [WROR18]. Architecture [NVM + 17]. area [SNKK20]. ARM [KYCP19]. Attack [BMSD21, MGSPL17, SYRJ17, YTF + 18]. 1

A Complete Bibliography of ACM Transactions on Privacy and

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

A Complete Bibliography of ACM Transactions onPrivacy and Security (TOPS)

Nelson H. F. BeebeUniversity of Utah

Department of Mathematics, 110 LCB155 S 1400 E RM 233

Salt Lake City, UT 84112-0090USA

Tel: +1 801 581 5254FAX: +1 801 581 4148

E-mail: [email protected], [email protected],[email protected] (Internet)

WWW URL: http://www.math.utah.edu/~beebe/

01 October 2021Version 1.11

Title word cross-reference

#PrettyFlyForAWiFi [BBEM21].

K [SCL+17].

-Means [SCL+17].

2.0 [NVM+17].

Abstract [AM21, GM18]. Accurate[RPA16, SBP21]. Across [MJA+18].Adaptive [HZL21, NKS+19]. Adversarial[DCB+21, SBBR19, YTF+20]. Advertising[BKO20]. Against [HZL21, PPK+18].Agreement [CECE19]. Allocation[RMSB17]. Along [STT17]. Alpha [MV18].

Amandroid [WROR18]. Analysing[IMT+20]. Analysis[AKM+21, BDG18, BAO+21, CPC+18, JK21,MGSPL17, OBC+17, RBS+17, SCRV20,SNKK20, SRRM18, VCT21, WROR18].Analytical [CECE19]. Analyzing[AM21, SBP21]. ANCHOR [KYREV19].Android [AKM+21, MVBK21, OMA+19,WROR18, YTF+18]. Anonymization[MOW+21]. Anti [SMA18]. Anti-Virtual[SMA18]. app [BMPS21]. Applications[GKM16, RBS+17]. Approach [LMMV20,LCSF18, MOW+21, OEG+19, SCL+17].Approaches [CAL+21]. Approximate[MGSPL17]. Apps [WROR18].Architecture [NVM+17]. area [SNKK20].ARM [KYCP19]. Attack[BMSD21, MGSPL17, SYRJ17, YTF+18].

1

2

Attacks[AMO21, ATR20, AS20, BBEM21, CAL+21,CVW+21, DCB+21, DMIP20, GL18, HZL21,KHV20, LMMV20, LCSF18, MSSK16].Attention [KPFH20]. Attestation[HKL+21, WPR19]. Attribute[GL18, RF20]. Attribute-supporting[RF20]. Audio [MGN+17]. Audit[YLV+19]. Auditing [MJA+18]. Auditory[MGN+17]. Augmenting [AV18].authenticated [JJK+21]. Authentication[AV18, AAK+21, CHK+20, JK21, KHV20,MRS+17, NRS20, SCRV20, SRRM18,WAK+19, ZAK+21]. Authorities [DKC16].Authorization [RF20]. Authorship[AAMN21]. Automatically [SBP21].Aware [AAK+21].

Band [NRS20]. Bandwidth [HYG20].Banking [CPC+18, RBS+17]. Based[AKM+21, HZL21, JP19, MGN+17, PSZ18,RPA16, SNCK18, TSH17, WL20, AMO21,BKO20, DMIP20, LMMV20, YTF+18].Beam [NKS+19]. Behavior[RPA16, SYRJ17]. Behavior-Based[RPA16]. Behavioral [OMA+19, ZAK+21].Beta [MV18]. Better [CHK+20]. Bias[HSHC20]. bile [RBS+17]. Binaries[ASWD18, PA21]. Biometric [SRRM18].Biometrics [ERLM16]. Blowup [HYG20].Blue [SHE+21]. Bluetooth [ATR20].Branch [BDG18]. Branchless [RBS+17].Brazilian [BAO+21]. Break[PHR+20, YTF+20]. Browser [MSSK16].Bugs [AHSM21]. Build [PHR+20].Building [OMA+19].

Captchas [YTF+20, MGN+17]. Case[AS20]. Centralized [KYREV19].Certificate [DKC16]. Certificates[DKC16]. Chain [IMT+20]. Chains[OMA+19]. Challenges [MRS+17].Channels [ZAK+21]. Characterizing[IOF+17, RVS+18]. Checksums [MCC+21].

Choices [CHK+20]. Ciphers [BM18].Class [CGG+16, Pow19].Class-Independent [CGG+16]. clicks[SHE+21]. Client [HYG20]. Clinical[LCSF18]. Close [UPGB18]. Cloud[BCK17, MJA+18]. Clustering [SCL+17].Code [ACB+20, AAMN21, AM21, PPK+18].Cognitive [ZAK+21]. Commercial[OEG+19]. Compiler [ZBA18]. component[WROR18]. Compromising [BM18].Computer [LCSF18]. Computing [ZD18].Consistency [BCK17]. Constant [HYG20].Constraints [CGG+16]. Consumer[NKS+19]. Contesting [PHR+20]. Context[BMSD21]. Contextual [MSSK16].Continuous [AAK+21]. Control[AS20, BDG18, KP18, RPA16].Controllable [CSA+21]. Cost [NVM+17].Counters [BM18]. Cracking [GAS+16].Crash [HSHC20]. Cried [SNKK20].Critical [OBC+17, SNKK20]. Cross[BMPS21]. Cross-app [BMPS21].CrowdPrivacy [WL20]. Crowdsourced[WL20]. Cyber[HZL21, LMMV20, SHE+21].Cyber-physical [LMMV20].Cybersecurity [MC21]. Cycle [SB18].

D [SZC20]. D-GEF [SZC20]. DADS[WPR19]. Daily [UPGB18]. Dark [SZC20].Data [AMO21, BMSD21, CAL+21, KP18,OGNS16, Pow19, WROR18, WL20, ZBA18].Data-oriented [CAL+21]. Database[YLV+19, RF20]. Dataset [UPGB18].Datasets [CVW+21]. Deadly [DMIP20].Debugging [BDG18]. Decentralization[JP19]. Decentralized [WPR19]. Decision[SHE+21]. Deep [AAMN21, DKC16].Defense [CAL+21, HZL21]. Defined[KYREV19]. Design [MC21]. Designing[WY21]. Desktops [BP20]. Detect[NKGY20]. Detecting[AMO21, GAS+16, IOF+17, OMA+19].Detection [BBEM21, CVW+21, DCB+21,

3

DKC16, SBP21, SYRJ17]. Detectors[SNKK20]. Developer [SGA19].Development [MC21, PHR+20]. Device[WPR19]. Devices [NVM+17]. Diachronic[SZC20]. Diagnostics [BMSD21].Differentially [RCBK19, SCL+17]. Digital[MC21]. Dilemma [KPFH20]. Dimension[PFB19]. Discriminative [BP20].Distributed [KP18]. DNS [NKGY20].Does [BAO+21]. Domain [Pow19].Domains [NKGY20, RPA16]. Don’t[AL16, BCK17]. Downgrade [ATR20].Downloads [MCC+21]. Driven [BMSD21].Drones [BBEM21, NKS+19, SNCK18].Dynamic [AM21, CECE19, CSA+21].

Eavesdropping [CCC+19]. Ecosystem[RVS+18]. Effective [SBP21]. Effects[KPFH20]. Efficient [ASWD18, KKK+18,KYCP19, MGSPL17, RPA16, RF20].Election [OBC+17]. Email [RAD+19].Embedded [BMSD21]. Embedding[SZC20]. Emerging [SZC20]. Encryption[CSA+21, KKK+18, PRSV17]. End[JJK+21]. End-to-end [JJK+21]. Energy[ATR20]. Engagement [KPFH20].Engineering [SGA19]. Enhancing[BDG18]. Environment [MRS+17, ZD18].Episodic [WAK+19]. ErsatzPasswords[GAS+16]. Eval [AM21]. Evaluating[APS+17, Wag17]. Evaluation[AKM+21, CPC+18, DCB+21, MC21]. Eve[ERLM16]. Evil [AM21]. Evolutionary[WY21]. Example [OBC+17]. Examples[SBBR19]. Exchange [JJK+21].EXEmples [DCB+21]. Existing [CAL+21].Experimental [DCB+21]. Exploitation[CAL+21]. Exploiting [PA21, ZAK+21].Exposing [ERLM16]. Exposure [WL20].Extended [OMA+19]. Extension [PSZ18].Extensive [JK21]. Eye[ERLM16, SRRM18].

Facebook [IOF+17]. Factor

[SCRV20, JK21, JJK+21]. Factorization[KKK+18]. Factors [LCSF18]. Farms[IOF+17]. Fast [PRSV17, SRRM18].Feature [AAMN21]. Features [BP20].Feedback [AS20]. Feedforward [AS20].File [CECE19]. FIMCE [ZD18]. Financial[BAO+21]. Finding [AHSM21, HSHC20].Fingerprinting [SNCK18, TSH17].Fingerprints [AMO21, MSSK16]. Fire[BMPS21]. Fit [BAO+21]. Fix [PHR+20].Flexible [HKL+21]. Flow[BDG18, WROR18, GM18]. Focused[AKM+21]. Follow [SGA19]. Following[NKGY20]. Forensics [PFB19]. Formal[JK21, LMMV20, SCRV20]. FOSS[ASWD18]. FOSSIL [ASWD18]. Four[RAD+19]. Framework [GM18, HYG20,SZC20, SBBR19, STT17, WROR18]. Fraud[CPC+18]. Frequency [Pow19]. Friendly[BMPS21]. Fully [KKK+18, ZD18].Functions [ASWD18].

Game [MC21, OEG+19, STT17, YLV+19].Game-Theoretic [OEG+19, STT17].Games [STT17]. Gateways [RVS+18].GEF [SZC20]. General[SBBR19, WROR18, ZBA18].General-Purpose [ZBA18]. Generating[CVW+21]. Generative [YTF+20].Generators [HSHC20]. Genomic[HAHT17, Wag17]. Global [MRS+17].Google [AL16]. Government [OEG+19].GPLADD [OEG+19]. GPS [NKS+19].Graph[MGSPL17, NKGY20, RF20, SZC20, ZPK18].Graph-database [RF20]. Group[BKO20, CECE19]. Group-based [BKO20].Group-key [CECE19]. Guarantees[APS+17]. Gyroscopes [SNCK18].GyrosFinger [SNCK18].

Habituation [KPFH20]. Hacker [SZC20].Handling [SMA18]. Hardware [AMO21].Hardware-based [AMO21]. Head

4

[SHE+21]. here [SHE+21]. Hierarchical[CGG+16, OGNS16]. hijacking [NKS+19].Homomorphic [KKK+18]. HTML5[DMIP20]. Human [LCSF18, OBC+17].Human-Intensive [OBC+17]. Hunting[Pow19]. Hybrid [RCBK19, SCL+17].

Iceberg [AHSM21]. Identification[AAMN21, BP20]. Identifying[ASWD18, SZC20]. if [SHE+21]. I’m [AL16].Implementation [KYCP19].Implementing [ZBA18]. Implications[CHK+20]. Implicit [IMT+20]. Improve[OBC+17]. Improved [MGN+17].Independent [BKO20, CGG+16].Inference [GL18, MGSPL17, NKGY20].Information [GM18]. Information-flow[GM18]. Informed [JTG+18].Infrastructure [BMSD21, SNKK20].Inhibiting [GAS+16]. Insider [ERLM16].Integrity[AMO21, BDG18, BCK17, MCC+21].Intensive [OBC+17]. Intention [SGA19].Inter [WROR18]. Inter-component[WROR18]. Interaction [KPFH20].Interactions [BMPS21]. Interdependent[HAHT17]. Interference [GM18]. Internet[RMSB17]. Interpreter [AM21].Intersection [PSZ18]. Intra [KYCP19].Intra-level [KYCP19]. Introducing[PFB19]. Intrusion [CVW+21]. Invasion[BBEM21]. Investigating [SGA19]. IoT[BMPS21, NVM+17]. IP [CCC+19].Isolated [ZD18]. Isolation [MJA+18].ISOTOP [MJA+18]. ISP [RPA16].Iterative [OBC+17].

Just [PPK+18]. Just-In-Time [PPK+18].

Kernel [JTG+18, PPK+18].Kernel-Informed [JTG+18]. Key[ATR20, BM18, JJK+21, OBC+17, CECE19].Keyboard [CCC+19]. Keystroke [KHV20].KIST [JTG+18]. Know [AL16].

Labeling [SBP21]. Language [MGN+17].Large [AAMN21, DMIP20, RPA16, VCT21].Large-Scale [VCT21, AAMN21, DMIP20].Layers [MJA+18]. Lazy [NRS20]. Leakage[CSA+21]. Leap [HSHC20]. Learning[AAMN21, DCB+21, HZL21, Pow19].Learning-Based [HZL21]. Less [WL20].Let [AL16]. level [KYCP19]. Life [SB18].Lightweight [AAK+21]. Like[ERLM16, IOF+17]. Linguistic [VCT21].link [SHE+21]. Linkage [RCBK19].Literacy [MC21]. Loading [IMT+20].Location [AV18, APS+17, JP19, STT17,SNCK18, WL20]. Location-Based[JP19, WL20]. Lock [YTF+18]. Logically[KYREV19]. Login [SCRV20]. Lonely[AL16]. Long [SYRJ17]. Long-Span[SYRJ17]. Longitudinal [BAO+21]. Look[UPGB18]. Looks [ERLM16]. Low[ATR20, NVM+17]. Low-Cost [NVM+17].

Maat [SBP21]. MAC [GKM16]. Machine[DCB+21, SMA18]. Making [SHE+21].Malicious [NKGY20, Pow19, SMA18].Malware [ASWD18, BDG18, BAO+21,DCB+21, LCSF18, OMA+19, RPA16,SBP21, UPGB18]. Malware-Control[RPA16]. MaMaDroid [OMA+19].Management [FSC+18]. Markov[OMA+19]. Matching [RCBK19]. Matrix[KKK+18]. Means [SCL+17].Measurements [AMO21]. Measuring[IOF+17, IMT+20]. Mechanisms[HKL+21]. Memory[GKM16, PFB19, WAK+19]. MEMS[SNCK18]. Merits [AHSM21]. Metering[BMSD21]. Methodologies [SGA19].Metrics [Wag17, WY21]. Micro [ZD18].Micro-Computing [ZD18]. Mimicry[KHV20]. Mitigate [AS20]. Mitigation[FSC+18]. Mixed [PA21]. Mo [RBS+17].Mobile [DMIP20, SCRV20]. Model[MVBK21, RF20, VCT21]. Modeling[SYRJ17]. Models [CECE19, OMA+19].

5

Modes [KPFH20]. Money [RBS+17].Monitoring [BDG18]. Movement[ERLM16]. Movements [SRRM18]. Mr[SHE+21]. Multi [HYG20, HZL21, JK21,MOW+21, SCRV20, ZBA18]. Multi-Factor[SCRV20, JK21]. Multi-Party [ZBA18].Multi-server [HYG20]. Multi-Stage[HZL21]. Multi-view [MOW+21].Multicore [ZD18]. Multiple[BKO20, CHK+20]. Mutation [AKM+21].Mutation-Based [AKM+21].

Native [ACB+20]. Negotiation [ATR20].Network [BKO20, CVW+21, MOW+21].Networks [DKC16, GL18, KYREV19,MJA+18, RPA16, YTF+20]. Neural[DKC16]. NoiSense [AMO21]. Non[GM18]. Non-Interference [GM18].Notices [KPFH20]. Number [HSHC20].

Object [BCK17]. Objectives [SBBR19].Observation [ZAK+21]. Offline [GAS+16].One [BAO+21, Pow19]. One-class [Pow19].Online [GL18]. OpenStack [MJA+18].Optimal [RMSB17]. Optimization[SCL+17, WY21]. Optimizing [STT17].ORAM [HYG20]. Organizations[CGG+16]. oriented [CAL+21]. OT[PSZ18]. Out-of-Band [NRS20]. Outputs[SNCK18]. Overtones [Pow19].

PACA [AAK+21]. Paired [RAD+19].Paper [TSH17]. Pareto [RMSB17].Participants [RAD+19]. Party[ZBA18, IMT+20]. Passive [NKGY20].Password[GAS+16, JJK+21, SB18, VCT21].Password-authenticated [JJK+21].Passwords [VCT21]. Pattern [YTF+18].Patterns [TSH17, VCT21]. Perception[MGN+17]. Performance [BM18]. Phones[BP20]. physical [LMMV20]. Physics[LMMV20]. Physics-based [LMMV20].Pinning [AV18]. PINs [MBG+21].

Platform [MVBK21]. Platforms[BMPS21]. Pointers [ZBA18]. POMDP[HZL21]. Potential [CAL+21]. Power[BP20]. Practical [DCB+21, TSH17].Precise [WROR18]. Precomputation[GKM16]. Preserve [MOW+21].Preserving[KKK+18, OGNS16, BKO20, CSA+21].Preventing [MSSK16]. Print [AMO21].Prioritization [FSC+18, YLV+19]. Privacy[APS+17, BBEM21, BKO20, CSA+21,HAHT17, JP19, KPFH20, KKK+18, MC21,MV18, MOW+21, OGNS16, SGA19, STT17,Wag17, WY21, WL20, AAK+21].Privacy-Aware [AAK+21].Privacy-Preserving[KKK+18, OGNS16, BKO20, CSA+21].Privado [BKO20]. Private[PSZ18, RCBK19, SCL+17, ZBA18].Privilege [KYCP19]. Proactively [SZC20].Problem [CGG+16]. Problems [RBS+17].Processes [OBC+17]. Processing [ZPK18].Program [SYRJ17]. Properties [OBC+17].Protect [YTF+20]. Protection[ACB+20, JP19, PPK+18]. Protocol[AAK+21]. Protocols [CECE19, JK21].Providers [BKO20]. Providing [CHK+20].Proximity [APS+17]. Proxy [PRSV17].Public [BM18, RVS+18]. Publish[PRSV17, WL20]. Publish/Subscribe[PRSV17]. Publishing [OGNS16]. Purpose[ZBA18]. Purposes [BDG18].

Quantifying [HAHT17, OEG+19].Quantum [HSHC20]. Queries [RF20].

Random [HSHC20]. Re [PRSV17].Re-Encryption [PRSV17]. Real[BBEM21]. Real-world [BBEM21].ReBAC [RF20]. Recommendation[KKK+18]. Record [RCBK19]. Records[RCBK19]. Reflexive [SRRM18]. Remote[HKL+21]. Renewability [ACB+20].Replay [SRRM18]. Replay-Resistant

6

[SRRM18]. Rescue [TSH17]. Resilient[ASWD18, JP19, ZAK+21]. Resistant[SRRM18]. Resource [RMSB17].Resources [IMT+20]. Reuse [PPK+18].Risk [SHE+21]. Risks [DMIP20, HAHT17].Robust [AAMN21]. Rogue [DKC16].

Safe [KYCP19, NKS+19]. Safe-hijacking[NKS+19]. Samples [UPGB18]. Sancus[NVM+17]. Satisfiability [CGG+16].Scalability [CECE19]. Scalable [PSZ18].Scale [VCT21, AAMN21, DMIP20].Schemes [ZAK+21]. Script [MSSK16].Searchable [CSA+21]. Searching[HSHC20]. Secure [CECE19, GKM16,PHR+20, RAD+19, ZBA18]. Security[AHSM21, AKM+21, BDG18, CPC+18,CHK+20, JJK+21, KYREV19, KYCP19,LCSF18, MBG+21, MVBK21, NRS20,NVM+17, OBC+17, RVS+18, RMSB17,SNKK20, SHE+21, WROR18].Security-Focused [AKM+21]. Semantic[VCT21]. Sensor[AMO21, DMIP20, SNKK20]. Sensor-based[DMIP20]. Separating [RCBK19].Separation [KYCP19]. Server[AV18, HYG20]. Services[APS+17, JP19, WL20]. Set [PSZ18]. Seven[DMIP20]. Sharing [CECE19]. Side[ZAK+21]. Sign [SCRV20]. Sign-On[SCRV20]. Single [SCRV20]. Sins[DMIP20]. Size [BAO+21]. Skype[CCC+19]. SLV [AV18]. Smart [BMSD21].Smartphone [KHV20, MBG+21].Smartphones [CHK+20]. Smoke[SNKK20]. SMS [RVS+18]. Social[BKO20, GL18]. Socket [JTG+18].Software[ACB+20, KYREV19, SGA19, SMA18].Software-Defined [KYREV19]. Sound[AM21]. Soundness [AKM+21]. Span[SYRJ17]. Spoofing [NKS+19]. Stage[HZL21]. Static [AKM+21]. Stealthy[NKGY20]. Stores [BCK17]. Strength

[Wag17]. Strong [WY21]. Study[DMIP20, IMT+20, MCC+21, RAD+19].Subscribe [PRSV17]. Suites [WY21].Support [ZBA18]. supporting [RF20].Survey [DCB+21]. Swarms [WPR19].Symmetric [CSA+21]. Synopses[RCBK19]. Synthetic [CVW+21]. System[ASWD18, CPC+18, FSC+18, KYCP19,SNKK20]. Systematic [AKM+21].Systems [CECE19, KP18, LMMV20,OEG+19, PRSV17, ZD18].

Tablets [BP20]. Techniques[AKM+21, CAL+21, SMA18].Technological [LCSF18]. Temporal[PFB19]. Text [YTF+20]. Texture[TSH17]. Theft [Pow19]. Theoretic[OEG+19, STT17]. Theory [YLV+19].Things [RMSB17]. Thinking [SHE+21].Third [IMT+20]. Third-party [IMT+20].Threats [ERLM16, SZC20]. Time[AS20, PPK+18]. Tip [AHSM21]. TLS[AV18]. Tools [RAD+19]. Tor [JTG+18].Trace [MOW+21]. Traces[NKGY20, STT17]. Tracking[RPA16, SNCK18]. Tractor [NKS+19].Traffic [CVW+21]. Train [MSSK16].Transfer [AS20]. Transport [JTG+18].Trial [LCSF18]. Trim [AS20]. Trust[BMSD21, BCK17, IMT+20, OEG+19].Trusted [DKC16]. Tweens [MC21]. Two[JJK+21]. Two-factor [JJK+21]. Type[CCC+19]. Typing [BP20].

Understanding [MGN+17]. Unifying[GM18]. Unlock [MBG+21]. Usability[CHK+20, RAD+19]. Usage [KP18]. Use[MCC+21, SGA19]. Useful [WL20]. User[BP20, KPFH20, WAK+19]. Users [NRS20].Using [AMO21, BKO20, DKC16, ERLM16,GAS+16, HZL21, MSSK16, RAD+19, WY21,WAK+19, YTF+20, KYCP19]. Utility[MOW+21]. Utilizing [BM18].

REFERENCES 7

Verifiable [ZPK18]. Verification[AV18, MCC+21]. Verify [BCK17]. Version[OMA+19]. Vetting [WROR18]. Via[NKGY20, KKK+18, YLV+19]. Video[YTF+18]. Video-based [YTF+18]. view[MOW+21]. Virtual [MJA+18, SMA18].VirusTotal [SBP21]. Voice [CCC+19].Voice-over-IP [CCC+19]. VULCON[FSC+18]. Vulnerability [FSC+18].

Weakening [GM18]. Web[MCC+21, SZC20]. WebAPI [DMIP20].Wide [SNKK20]. Wide-area [SNKK20].Will [SGA19]. Windows [DCB+21]. Wolf[SNKK20]. Workflow [CGG+16].Workload [YLV+19]. world [BBEM21].

XSS [MSSK16].

ReferencesAcar:2021:LPA

[AAK+21] Abbas Acar, Shoukat Ali, KorayKarabina, Cengiz Kaygusuz, Hi-dayet Aksu, Kemal Akkaya, andSelcuk Uluagac. A lightweightPrivacy-Aware Continuous Au-thentication Protocol — PACA.ACM Transactions on Privacyand Security (TOPS), 24(4):24:1–24:28, November 2021. CO-DEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3464690.

Abuhamad:2021:LSR

[AAMN21] Mohammed Abuhamad, TamerAbuhmed, David Mohaisen, andDaehun Nyang. Large-scale androbust code authorship identifi-cation with deep feature learn-ing. ACM Transactions on Pri-

vacy and Security (TOPS), 24(4):23:1–23:35, November 2021.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3461666.

Abrath:2020:CRN

[ACB+20] Bert Abrath, Bart Coppens,Jens Van Den Broeck, BrechtWyseur, Alessandro Cabutto,Paolo Falcarin, and Bjorn DeSutter. Code renewability for na-tive software protection. ACMTransactions on Privacy andSecurity (TOPS), 23(4):20:1–20:31, August 2020. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3404891.

Alexopoulos:2021:TIM

[AHSM21] Nikolaos Alexopoulos, Sheikh Mah-bub Habib, Steffen Schulz, andMax Muhlhauser. The tip of theiceberg: On the merits of find-ing security bugs. ACM Trans-actions on Privacy and Security(TOPS), 24(1):3:1–3:33, January2021. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3406112.

Ami:2021:SMB

[AKM+21] Amit Seal Ami, Kaushal Kafle,Kevin Moran, Adwait Nadkarni,and Denys Poshyvanyk. Sys-tematic mutation-based evalua-tion of the soundness of security-focused Android static analy-sis techniques. ACM Transac-

REFERENCES 8

tions on Privacy and Security(TOPS), 24(3):15:1–15:37, April2021. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3439802.

Aonghusa:2016:DLG

[AL16] Pol Mac Aonghusa and Dou-glas J. Leith. Don’t let Googleknow I’m lonely. ACM Trans-actions on Privacy and Security(TOPS), 19(1):3:1–3:??, August2016. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic).

Arceri:2021:ADC

[AM21] Vincenzo Arceri and IsabellaMastroeni. Analyzing dynamiccode: a sound abstract inter-preter for evil eval. ACMTransactions on Privacy andSecurity (TOPS), 24(2):10:1–10:38, February 2021. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3426470.

Ahmed:2021:NPD

[AMO21] Chuadhry Mujeeb Ahmed, Aditya P.Mathur, and Martın Ochoa.NoiSense print: Detecting dataintegrity attacks on sensor mea-surements using hardware-basedfingerprints. ACM Transac-tions on Privacy and Security(TOPS), 24(1):2:1–2:35, January2021. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3410447.

Argyros:2017:EPG

[APS+17] George Argyros, Theofilos Pet-sios, Suphannee Sivakorn, An-gelos D. Keromytis, and JasonPolakis. Evaluating the privacyguarantees of location proximityservices. ACM Transactions onPrivacy and Security (TOPS),19(4):12:1–12:??, February 2017.CODEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Anwar:2020:CFC

[AS20] Fatima M. Anwar and Mani Sri-vastava. A case for feedforwardcontrol with feedback trim tomitigate time transfer attacks.ACM Transactions on Privacyand Security (TOPS), 23(2):11:1–11:25, May 2020. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/abs/10.1145/3382503.

Alrabaee:2018:FRE

[ASWD18] Saed Alrabaee, Paria Shirani,Lingyu Wang, and Mourad Deb-babi. FOSSIL: A resilient andefficient system for identifyingFOSS functions in malware bi-naries. ACM Transactions onPrivacy and Security (TOPS),21(2):8:1–8:??, February 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3175492.

Antonioli:2020:KND

[ATR20] Daniele Antonioli, Nils Ole Tip-penhauer, and Kasper Ras-mussen. Key negotiation down-

REFERENCES 9

grade attacks on Bluetooth andBluetooth low energy. ACMTransactions on Privacy andSecurity (TOPS), 23(3):14:1–14:28, July 2020. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/doi/abs/10.1145/3394497.

Abdou:2018:SLV

[AV18] Abdelrahman Abdou and P. C.Van Oorschot. Server lo-cation verification (SLV) andserver location pinning: Aug-menting TLS authentication.ACM Transactions on Privacyand Security (TOPS), 21(1):1:1–1:??, January 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3139294.

Botacin:2021:OSD

[BAO+21] Marcus Botacin, Hojjat Aghakhani,Stefano Ortolani, ChristopherKruegel, Giovanni Vigna, DanielaOliveira, Paulo Lıcio De Geus,and Andre Gregio. One size doesnot fit all: a longitudinal anal-ysis of Brazilian financial mal-ware. ACM Transactions on Pri-vacy and Security (TOPS), 24(2):11:1–11:31, February 2021.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3429741.

Birnbach:2021:PRW

[BBEM21] Simon Birnbach, Richard Baker,Simon Eberz, and Ivan Mar-tinovic. #PrettyFlyForAWiFi:

Real-world detection of privacyinvasion attacks by drones. ACMTransactions on Privacy andSecurity (TOPS), 24(4):31:1–31:34, November 2021. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3473672.

Brandenburger:2017:DTC

[BCK17] Marcus Brandenburger, Chris-tian Cachin, and Nikola Knezevic.Don’t trust the cloud, verify: In-tegrity and consistency for cloudobject stores. ACM Transac-tions on Privacy and Security(TOPS), 20(3):8:1–8:??, August2017. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic).

Botacin:2018:EBM

[BDG18] Marcus Botacin, Paulo LıcioDe Geus, and Andre Gregio.Enhancing branch monitoringfor security purposes: Fromcontrol flow integrity to mal-ware analysis and debugging.ACM Transactions on Privacyand Security (TOPS), 21(1):4:1–4:??, January 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3152162.

Boshrooyeh:2020:PPP

[BKO20] Sanaz Taheri Boshrooyeh, AlptekinKupcu, and Oznur Ozkasap. Pri-vado: Privacy-preserving group-based advertising using mul-tiple independent social net-

REFERENCES 10

work providers. ACM Transac-tions on Privacy and Security(TOPS), 23(3):12:1–12:36, July2020. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/doi/abs/10.1145/3386154.

Bhattacharya:2018:UPC

[BM18] Sarani Bhattacharya and Deb-deep Mukhopadhyay. Utiliz-ing performance counters forcompromising public key ci-phers. ACM Transactions onPrivacy and Security (TOPS),21(1):5:1–5:??, January 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3156015.

Balliu:2021:FFC

[BMPS21] Musard Balliu, Massimo Merro,Michele Pasqua, and MikhailShcherbakov. Friendly fire:Cross-app interactions in IoTplatforms. ACM Transactions onPrivacy and Security (TOPS), 24(3):16:1–16:40, April 2021. CO-DEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3444963.

Bhattacharjee:2021:ACE

[BMSD21] Shameek Bhattacharjee, VenkataPraveen Kumar Madhavarapu,Simone Silvestri, and Sajal K.Das. Attack context embed-ded data driven trust diagnos-tics in smart metering infras-tructure. ACM Transactions onPrivacy and Security (TOPS),

24(2):9:1–9:36, February 2021.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3426739.

Belman:2020:DPT

[BP20] Amith K. Belman and Vir V.Phoha. Discriminative powerof typing features on desktops,tablets, and phones for useridentification. ACM Transac-tions on Privacy and Security(TOPS), 23(1):4:1–4:36, Febru-ary 2020. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/doi/abs/10.1145/3377404.

Cheng:2021:ETD

[CAL+21] Long Cheng, Salman Ahmed,Hans Liljestrand, Thomas Ny-man, Haipeng Cai, TrentJaeger, N. Asokan, and Dan-feng (Daphne) Yao. Exploitationtechniques for data-oriented at-tacks with existing and poten-tial defense approaches. ACMTransactions on Privacy andSecurity (TOPS), 24(4):26:1–26:36, November 2021. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3462699.

Cecconello:2019:STK

[CCC+19] Stefano Cecconello, AlbertoCompagno, Mauro Conti, DanieleLain, and Gene Tsudik. Skype& Type: Keyboard eavesdrop-ping in Voice-over-IP. ACM

REFERENCES 11

Transactions on Privacy andSecurity (TOPS), 22(4):24:1–24:??, December 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3365366.

Cantali:2019:AMS

[CECE19] Gokcan Cantali, Orhan Ermis,Mehmet Ufuk Caglayan, andCem Ersoy. Analytical mod-els for the scalability of dy-namic group-key agreement pro-tocols and secure file sharing sys-tems. ACM Transactions on Pri-vacy and Security (TOPS), 22(4):20:1–20:??, December 2019.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3342998.

Crampton:2016:WSP

[CGG+16] Jason Crampton, Andrei Gagarin,Gregory Gutin, Mark Jones,and Magnus Wahlstrom. Onthe workflow satisfiability prob-lem with class-independent con-straints for hierarchical organi-zations. ACM Transactions onPrivacy and Security (TOPS),19(3):8:1–8:??, December 2016.CODEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Cho:2020:SUI

[CHK+20] Geumhwan Cho, Jun Ho Huh,Soolin Kim, Junsung Cho,Heesung Park, Yenah Lee, Kon-stantin Beznosov, and Hyoung-shick Kim. On the securityand usability implications of

providing multiple authentica-tion choices on smartphones:The more, the better? ACMTransactions on Privacy andSecurity (TOPS), 23(4):22:1–22:32, August 2020. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3410155.

Carminati:2018:SEB

[CPC+18] Michele Carminati, Mario Polino,Andrea Continella, AndreaLanzi, Federico Maggi, and Ste-fano Zanero. Security evaluationof a banking fraud analysis sys-tem. ACM Transactions on Pri-vacy and Security (TOPS), 21(3):11:1–11:??, June 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3178370.

Cui:2021:PPD

[CSA+21] Shujie Cui, Xiangfu Song,Muhammad Rizwan Asghar,Steven D. Galbraith, and Gio-vanni Russello. Privacy-preserving dynamic symmetricsearchable encryption with con-trollable leakage. ACM Trans-actions on Privacy and Security(TOPS), 24(3):18:1–18:35, April2021. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3446920.

Cordero:2021:GNT

[CVW+21] Carlos Garcia Cordero, Em-manouil Vasilomanolakis, Aid-mar Wainakh, Max Muhlhauser,

REFERENCES 12

and Simin Nadjm-Tehrani. Ongenerating network traffic datasetswith synthetic attacks for in-trusion detection. ACM Trans-actions on Privacy and Se-curity (TOPS), 24(2):8:1–8:39,February 2021. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3424155.

Demetrio:2021:AES

[DCB+21] Luca Demetrio, Scott E. Coull,Battista Biggio, Giovanni Lago-rio, Alessandro Armando, andFabio Roli. Adversarial EX-Emples: a survey and exper-imental evaluation of practi-cal attacks on machine learn-ing for Windows malware detec-tion. ACM Transactions on Pri-vacy and Security (TOPS), 24(4):27:1–27:31, November 2021.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3473039.

Dong:2016:DRC

[DKC16] Zheng Dong, Kevin Kane, andL. Jean Camp. Detection ofrogue certificates from trustedcertificate authorities using deepneural networks. ACM Trans-actions on Privacy and Se-curity (TOPS), 19(2):5:1–5:??,September 2016. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic).

Diamantaris:2020:SDS

[DMIP20] Michalis Diamantaris, Francesco

Marcantoni, Sotiris Ioannidis,and Jason Polakis. The sevendeadly sins of the HTML5 We-bAPI: a large-scale study on therisks of mobile sensor-based at-tacks. ACM Transactions onPrivacy and Security (TOPS),23(4):19:1–19:31, August 2020.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3403947.

Eberz:2016:LLE

[ERLM16] Simon Eberz, Kasper B. Ras-mussen, Vincent Lenders, andIvan Martinovic. Looks likeEve: Exposing insider threatsusing eye movement biometrics.ACM Transactions on Privacyand Security (TOPS), 19(1):1:1–1:??, August 2016. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic).

Farris:2018:VSV

[FSC+18] Katheryn A. Farris, Ankit Shah,George Cybenko, Rajesh Gane-san, and Sushil Jajodia. VUL-CON: A system for vulner-ability prioritization, mitiga-tion, and management. ACMTransactions on Privacy andSecurity (TOPS), 21(4):16:1–16:??, October 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3196884.

Gutierrez:2016:IDO

[GAS+16] Christopher N. Gutierrez, Mo-hammed H. Almeshekah, Eu-gene H. Spafford, Mikhail J.

REFERENCES 13

Atallah, and Jeff Avery. Inhibit-ing and detecting offline pass-word cracking using ErsatzPass-words. ACM Transactions onPrivacy and Security (TOPS),19(3):9:1–9:??, December 2016.CODEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Garay:2016:MPA

[GKM16] Juan A. Garay, Vladimir Kolesnikov,and Rae Mclellan. MAC pre-computation with applications tosecure memory. ACM Transac-tions on Privacy and Security(TOPS), 19(2):6:1–6:??, Septem-ber 2016. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic).

Gong:2018:AIA

[GL18] Neil Zhenqiang Gong and BinLiu. Attribute inference at-tacks in online social networks.ACM Transactions on Privacyand Security (TOPS), 21(1):3:1–3:??, January 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3154793.

Giacobazzi:2018:ANI

[GM18] Roberto Giacobazzi and Is-abella Mastroeni. Abstract non-interference: A unifying frame-work for weakening information-flow. ACM Transactions onPrivacy and Security (TOPS),21(2):9:1–9:??, February 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3175660.

Humbert:2017:QIR

[HAHT17] Mathias Humbert, Erman Ay-day, Jean-Pierre Hubaux, andAmalio Telenti. Quantifying in-terdependent risks in genomicprivacy. ACM Transactions onPrivacy and Security (TOPS), 20(1):3:1–3:??, February 2017. CO-DEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Helble:2021:FMR

[HKL+21] Sarah C. Helble, Ian D. Kretz,Peter A. Loscocco, John D.Ramsdell, Paul D. Rowe, andPerry Alexander. Flexible mech-anisms for remote attestation.ACM Transactions on Privacyand Security (TOPS), 24(4):29:1–29:23, November 2021. CO-DEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3470535.

Hurley-Smith:2020:QLC

[HSHC20] Darren Hurley-Smith and JulioHernandez-Castro. Quantumleap and crash: Searching andfinding bias in quantum ran-dom number generators. ACMTransactions on Privacy andSecurity (TOPS), 23(3):16:1–16:25, July 2020. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/doi/abs/10.1145/3398726.

Hoang:2020:MSO

[HYG20] Thang Hoang, Attila A. Yavuz,and Jorge Guajardo. Amulti-server ORAM framework

REFERENCES 14

with constant client band-width blowup. ACM Transac-tions on Privacy and Security(TOPS), 23(1):1:1–1:35, Febru-ary 2020. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/doi/abs/10.1145/3369108.

Hu:2021:ACD

[HZL21] Zhisheng Hu, Minghui Zhu, andPeng Liu. Adaptive cyber de-fense against multi-stage attacksusing learning-based POMDP.ACM Transactions on Privacyand Security (TOPS), 24(1):6:1–6:25, January 2021. CO-DEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3418897.

Ikram:2020:MAC

[IMT+20] Muhammad Ikram, Rahat Ma-sood, Gareth Tyson, Mo-hamed Ali Kaafar, Noha Loizon,and Roya Ensafi. Measuringand analysing the chain of im-plicit trust: a study of third-party resources loading. ACMTransactions on Privacy and Se-curity (TOPS), 23(2):8:1–8:27,May 2020. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/doi/abs/10.1145/3380466.

Ikram:2017:MCD

[IOF+17] Muhammad Ikram, Lucky On-wuzurike, Shehroze Farooqi,Emiliano De Cristofaro, ArikFriedman, Guillaume Jourjon,

Mohammed Ali Kaafar, andM. Zubair Shafiq. Measur-ing, characterizing, and detect-ing Facebook like farms. ACMTransactions on Privacy and Se-curity (TOPS), 20(4):13:1–13:??,October 2017. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic).

Jarecki:2021:TFP

[JJK+21] Stanislaw Jarecki, MohammedJubur, Hugo Krawczyk, NiteshSaxena, and Maliheh Shirva-nian. Two-factor password-authenticated key exchange withend-to-end security. ACM Trans-actions on Privacy and Security(TOPS), 24(3):17:1–17:37, April2021. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3446807.

Jacomme:2021:EFA

[JK21] Charlie Jacomme and Steve Kre-mer. An extensive formal analy-sis of multi-factor authenticationprotocols. ACM Transactions onPrivacy and Security (TOPS),24(2):13:1–13:34, February 2021.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3440712.

Jin:2019:RPP

[JP19] Hongyu Jin and Panos Papadim-itratos. Resilient privacy protec-tion for location-based servicesthrough decentralization. ACMTransactions on Privacy andSecurity (TOPS), 22(4):21:1–

REFERENCES 15

21:??, December 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3319401.

Jansen:2018:KKI

[JTG+18] Rob Jansen, Matthew Traudt,John Geddes, Chris Wacek,Micah Sherr, and Paul Syver-son. KIST: Kernel-informedsocket transport for Tor. ACMTransactions on Privacy andSecurity (TOPS), 22(1):3:1–3:??, January 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3278121.

Khan:2020:MAS

[KHV20] Hassan Khan, Urs Hengartner,and Daniel Vogel. Mimicry at-tacks on smartphone keystrokeauthentication. ACM Transac-tions on Privacy and Security(TOPS), 23(1):2:1–2:34, Febru-ary 2020. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/doi/abs/10.1145/3372420.

Kim:2018:EPP

[KKK+18] Jinsu Kim, Dongyoung Koo,Yuna Kim, Hyunsoo Yoon, Jun-bum Shin, and Sungwook Kim.Efficient privacy-preserving ma-trix factorization for recommen-dation via fully homomorphic en-cryption. ACM Transactions onPrivacy and Security (TOPS),21(4):17:1–17:??, October 2018.ISSN 2471-2566 (print), 2471-

2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3212509.

Kelbert:2018:DUC

[KP18] Florian Kelbert and Alexan-der Pretschner. Data usagecontrol for distributed systems.ACM Transactions on Privacyand Security (TOPS), 21(3):12:1–12:??, June 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3183342.

Karegar:2020:DUE

[KPFH20] Farzaneh Karegar, John SorenPettersson, and Simone Fischer-Hubner. The dilemma of userengagement in privacy notices:Effects of interaction modes andhabituation on user attention.ACM Transactions on Privacyand Security (TOPS), 23(1):5:1–5:38, February 2020. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/abs/10.1145/3372296.

Kwon:2019:SEI

[KYCP19] Donghyun Kwon, Hayoon Yi,Yeongpil Cho, and Yunhe-ung Paek. Safe and effi-cient implementation of a se-curity system on ARM usingintra-level privilege separation.ACM Transactions on Privacyand Security (TOPS), 22(2):10:1–10:??, April 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://

REFERENCES 16

dl.acm.org/citation.cfm?id=3309698.

Kreutz:2019:ALC

[KYREV19] Diego Kreutz, Jiangshan Yu,Fernando M. V. Ramos, andPaulo Esteves-Verissimo. AN-CHOR: Logically centralized se-curity for software-defined net-works. ACM Transactions onPrivacy and Security (TOPS), 22(2):8:1–8:??, April 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3301305.

Levesque:2018:THF

[LCSF18] Fanny Lalonde Levesque, So-nia Chiasson, Anil Somayaji,and Jose M. Fernandez. Tech-nological and human factorsof malware attacks: A com-puter security clinical trial ap-proach. ACM Transactions onPrivacy and Security (TOPS),21(4):18:1–18:??, October 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3210311.

Lanotte:2020:FAP

[LMMV20] Ruggero Lanotte, MassimoMerro, Andrei Munteanu, andLuca Vigano. A formal ap-proach to physics-based attacksin cyber-physical systems. ACMTransactions on Privacy and Se-curity (TOPS), 23(1):3:1–3:41,February 2020. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://

dl.acm.org/doi/abs/10.1145/3373270.

Markert:2021:SSU

[MBG+21] Philipp Markert, Daniel V. Bai-ley, Maximilian Golla, MarkusDurmuth, and Adam J. Aviv. Onthe security of smartphone un-lock PINs. ACM Transactions onPrivacy and Security (TOPS), 24(4):30:1–30:36, November 2021.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3473040.

Maqsood:2021:DDE

[MC21] Sana Maqsood and Sonia Chi-asson. Design, development,and evaluation of a cybersecu-rity, privacy, and digital liter-acy game for tweens. ACMTransactions on Privacy andSecurity (TOPS), 24(4):28:1–28:37, November 2021. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3469821.

Meylan:2021:SUC

[MCC+21] Alexandre Meylan, Mauro Cheru-bini, Bertil Chapuis, MathiasHumbert, Igor Bilogrevic, andKevin Huguenin. A study onthe use of checksums for integrityverification of Web downloads.ACM Transactions on Privacyand Security (TOPS), 24(1):4:1–4:36, January 2021. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3410154.

REFERENCES 17

Meutzner:2017:TIA

[MGN+17] Hendrik Meutzner, SantoshGupta, Viet-Hung Nguyen,Thorsten Holz, and DorotheaKolossa. Toward improved audioCAPTCHAs based on auditoryperception and language under-standing. ACM Transactions onPrivacy and Security (TOPS),19(4):10:1–10:??, February 2017.CODEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Munoz-Gonzalez:2017:EAG

[MGSPL17] Luis Munoz-Gonzalez, DanieleSgandurra, Andrea Paudice, andEmil C. Lupu. Efficient attackgraph analysis through approx-imate inference. ACM Trans-actions on Privacy and Secu-rity (TOPS), 20(3):10:1–10:??,August 2017. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic).

Madi:2018:IAV

[MJA+18] Taous Madi, Yosr Jarraya, AmirAlimohammadifar, SuryadiptaMajumdar, Yushun Wang, MakanPourzandi, Lingyu Wang, andMourad Debbabi. ISOTOP: Au-diting virtual networks isolationacross cloud layers in Open-Stack. ACM Transactions onPrivacy and Security (TOPS),22(1):1:1–1:??, January 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3267339.

Mohammady:2021:MVA

[MOW+21] Meisam Mohammady, MomenOqaily, Lingyu Wang, YuanHong, Habib Louafi, MakanPourzandi, and Mourad Deb-babi. A multi-view approachto preserve privacy and util-ity in network trace anonymiza-tion. ACM Transactions on Pri-vacy and Security (TOPS), 24(3):14:1–14:36, April 2021. CO-DEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3439732.

Matsumoto:2017:ACG

[MRS+17] Stephanos Matsumoto, Raphael M.Reischuk, Pawel Szalachowski,Tiffany Hyun-Jin Kim, andAdrian Perrig. Authenticationchallenges in a global environ-ment. ACM Transactions onPrivacy and Security (TOPS),20(1):1:1–1:??, February 2017.CODEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Mitropoulos:2016:HTY

[MSSK16] Dimitris Mitropoulos, Kon-stantinos Stroggylos, DiomidisSpinellis, and Angelos D.Keromytis. How to train yourbrowser: Preventing XSS attacksusing contextual script finger-prints. ACM Transactions onPrivacy and Security (TOPS), 19(1):2:1–2:??, August 2016. CO-DEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

REFERENCES 18

Modersheim:2018:ABP

[MV18] Sebastian Modersheim and LucaVigano. Alpha–beta privacy.ACM Transactions on Privacyand Security (TOPS), 22(1):7:1–7:??, January 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3289255.

Mayrhofer:2021:APS

[MVBK21] Rene Mayrhofer, Jeffrey VanderStoep, Chad Brubaker, and NickKralevich. The Android platformsecurity model. ACM Transac-tions on Privacy and Security(TOPS), 24(3):19:1–19:35, April2021. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3448609.

Nabeel:2020:FPD

[NKGY20] Mohamed Nabeel, Issa M.Khalil, Bei Guan, and TingYu. Following passive DNStraces to detect stealthy mali-cious domains via graph infer-ence. ACM Transactions onPrivacy and Security (TOPS),23(4):17:1–17:36, August 2020.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3401897.

Noh:2019:TBS

[NKS+19] Juhwan Noh, Yujin Kwon, Yun-mok Son, Hocheol Shin, DohyunKim, Jaeyeong Choi, and Yong-dae Kim. Tractor Beam: Safe-hijacking of consumer drones

with adaptive GPS spoofing.ACM Transactions on Privacyand Security (TOPS), 22(2):12:1–12:??, April 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3309735.

Naor:2020:SLU

[NRS20] Moni Naor, Lior Rotem, and GilSegev. The security of lazy usersin out-of-band authentication.ACM Transactions on Privacyand Security (TOPS), 23(2):9:1–9:32, May 2020. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/doi/abs/10.1145/3377849.

Noorman:2017:SLC

[NVM+17] Job Noorman, Jo Van Bulck,Jan Tobias Muhlberg, FrankPiessens, Pieter Maene, BartPreneel, Ingrid Verbauwhede,Johannes Gotzfried, Tilo Muller,and Felix Freiling. Sancus 2.0:a low-cost security architecturefor IoT devices. ACM Trans-actions on Privacy and Security(TOPS), 20(3):7:1–7:??, August2017. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic).

Osterweil:2017:IAI

[OBC+17] Leon J. Osterweil, Matt Bishop,Heather M. Conboy, HuongPhan, Borislava I. Simidchieva,George S. Avrunin, Lori A.Clarke, and Sean Peisert. It-erative analysis to improve key

REFERENCES 19

properties of critical human-intensive processes: an electionsecurity example. ACM Trans-actions on Privacy and Security(TOPS), 20(2):5:1–5:??, March2017. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic).

Outkin:2019:GQT

[OEG+19] Alexander V. Outkin, Bran-don K. Eames, Meghan A.Galiardi, Sarah Walsh, Eric D.Vugrin, Byron Heersink, JacobHobbs, and Gregory D. Wyss.GPLADD: Quantifying trust ingovernment and commercial sys-tems: a game-theoretic ap-proach. ACM Transactions onPrivacy and Security (TOPS), 22(3):18:1–18:??, July 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3326283.

Ozalp:2016:PPP

[OGNS16] Ismet Ozalp, Mehmet Emre Gur-soy, Mehmet Ercan Nergiz, andYucel Saygin. Privacy-preservingpublishing of hierarchical data.ACM Transactions on Privacyand Security (TOPS), 19(3):7:1–7:??, December 2016. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic).

Onwuzurike:2019:MDA

[OMA+19] Lucky Onwuzurike, Enrico Mari-conti, Panagiotis Andriotis,Emiliano De Cristofaro, Gor-don Ross, and Gianluca Stringh-ini. MaMaDroid: Detect-

ing Android malware by build-ing Markov chains of behav-ioral models (extended version).ACM Transactions on Privacyand Security (TOPS), 22(2):14:1–14:??, April 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3313391.

Papaevripides:2021:EMB

[PA21] Michalis Papaevripides and EliasAthanasopoulos. Exploitingmixed binaries. ACM Trans-actions on Privacy and Se-curity (TOPS), 24(2):7:1–7:29,February 2021. CODEN???? ISSN 2471-2566 (print),2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3418898.

Pagani:2019:ITD

[PFB19] Fabio Pagani, Oleksii Fedorov,and Davide Balzarotti. In-troducing the temporal di-mension to memory forensics.ACM Transactions on Privacyand Security (TOPS), 22(2):9:1–9:??, April 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3310355.

Parker:2020:BIB

[PHR+20] James Parker, Michael Hicks,Andrew Ruef, Michelle L.Mazurek, Dave Levin, DanielVotipka, Piotr Mardziel, andKelsey R. Fulton. Build it,break it, fix it: Contesting se-cure development. ACM Trans-

REFERENCES 20

actions on Privacy and Security(TOPS), 23(2):10:1–10:36, May2020. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/doi/abs/10.1145/3383773.

Powell:2019:MOH

[Pow19] Brian A. Powell. Malicious over-tones: Hunting data theft in thefrequency domain with one-classlearning. ACM Transactions onPrivacy and Security (TOPS), 22(4):22:1–22:??, December 2019.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3360469.

Pomonis:2018:KPA

[PPK+18] Marios Pomonis, Theofilos Pet-sios, Angelos D. Keromytis,Michalis Polychronakis, andVasileios P. Kemerlis. Ker-nel protection against just-in-time code reuse. ACMTransactions on Privacy andSecurity (TOPS), 22(1):5:1–5:??, January 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3277592.

Polyakov:2017:FPR

[PRSV17] Yuriy Polyakov, Kurt Rohloff,Gyana Sahu, and Vinod Vaikun-tanathan. Fast proxy re-encryption for publish/subscribesystems. ACM Transactions onPrivacy and Security (TOPS),20(4):14:1–14:??, October 2017.

CODEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Pinkas:2018:SPS

[PSZ18] Benny Pinkas, Thomas Schnei-der, and Michael Zohner. Scal-able private set intersectionbased on OT extension. ACMTransactions on Privacy andSecurity (TOPS), 21(2):7:1–7:??, February 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3154794.

Ruoti:2019:USF

[RAD+19] Scott Ruoti, Jeff Andersen, LukeDickinson, Scott Heidbrink,Tyler Monson, Mark O’Neill,Ken Reese, Brad Spendlove,Elham Vaziripour, Justin Wu,Daniel Zappala, and Kent Sea-mons. A usability study offour secure email tools us-ing paired participants. ACMTransactions on Privacy andSecurity (TOPS), 22(2):13:1–13:??, April 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3313761.

Reaves:2017:MBM

[RBS+17] Bradley Reaves, Jasmine Bow-ers, Nolen Scaife, Adam Bates,Arnav Bhartiya, Patrick Traynor,and Kevin R. B. Butler. Mo(bile)money, mo(bile) problems: Anal-ysis of branchless banking appli-cations. ACM Transactions onPrivacy and Security (TOPS),20(3):11:1–11:??, August 2017.

REFERENCES 21

CODEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Rao:2019:HPR

[RCBK19] Fang-Yu Rao, Jianneng Cao,Elisa Bertino, and MuratKantarcioglu. Hybrid pri-vate record linkage: Separat-ing differentially private syn-opses from matching records.ACM Transactions on Privacyand Security (TOPS), 22(3):15:1–15:??, July 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3318462.

Rizvi:2020:EAG

[RF20] Syed Zain Raza Rizvi and PhilipW. L. Fong. Efficient authoriza-tion of graph-database queries inan attribute-supporting ReBACmodel. ACM Transactions onPrivacy and Security (TOPS),23(4):18:1–18:33, August 2020.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3401027.

Rullo:2017:POS

[RMSB17] Antonino Rullo, Daniele Midi,Edoardo Serra, and ElisaBertino. Pareto optimal securityresource allocation for Internet ofThings. ACM Transactions onPrivacy and Security (TOPS),20(4):15:1–15:??, October 2017.CODEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Rahbarinia:2016:EAB

[RPA16] Babak Rahbarinia, RobertoPerdisci, and Manos Anton-akakis. Efficient and accu-rate behavior-based tracking ofmalware-control domains in largeISP networks. ACM Transac-tions on Privacy and Security(TOPS), 19(2):4:1–4:??, Septem-ber 2016. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic).

Reaves:2018:CSS

[RVS+18] Bradley Reaves, Luis Vargas,Nolen Scaife, Dave Tian, Lo-gan Blue, Patrick Traynor, andKevin R. B. Butler. Char-acterizing the security of theSMS ecosystem with public gate-ways. ACM Transactions onPrivacy and Security (TOPS),22(1):2:1–2:??, January 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3268932.

Stobert:2018:PLC

[SB18] Elizabeth Stobert and RobertBiddle. The password life cy-cle. ACM Transactions on Pri-vacy and Security (TOPS), 21(3):13:1–13:??, June 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3183341.

Sharif:2019:GFA

[SBBR19] Mahmood Sharif, Sruti Bha-gavatula, Lujo Bauer, and

REFERENCES 22

Michael K. Reiter. A gen-eral framework for adversar-ial examples with objectives.ACM Transactions on Privacyand Security (TOPS), 22(3):16:1–16:??, July 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3317611.

Salem:2021:MAA

[SBP21] Aleieldin Salem, Sebastian Banescu,and Alexander Pretschner. Maat:Automatically analyzing Virus-Total for accurate labelingand effective malware detec-tion. ACM Transactions on Pri-vacy and Security (TOPS), 24(4):25:1–25:35, November 2021.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3465361.

Su:2017:DPM

[SCL+17] Dong Su, Jianneng Cao, NinghuiLi, Elisa Bertino, Min Lyu, andHongxia Jin. Differentially pri-vate K-means clustering and ahybrid approach to private opti-mization. ACM Transactions onPrivacy and Security (TOPS),20(4):16:1–16:??, October 2017.CODEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Sciarretta:2020:FAM

[SCRV20] Giada Sciarretta, Roberto Car-bone, Silvio Ranise, and LucaVigano. Formal analysis of mo-bile multi-factor authenticationwith single sign-on login. ACM

Transactions on Privacy andSecurity (TOPS), 23(3):13:1–13:37, July 2020. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/doi/abs/10.1145/3386685.

Senarath:2019:WTU

[SGA19] Awanthika Senarath, MarthieGrobler, and Nalin Asanka Gam-agedara Arachchilage. Will theyuse it or not? Investigating soft-ware developers’ intention to fol-low privacy engineering method-ologies. ACM Transactions onPrivacy and Security (TOPS), 22(4):23:1–23:??, December 2019.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3364224.

Shreeve:2021:IMB

[SHE+21] Benjamin Shreeve, Joseph Hal-lett, Matthew Edwards, PaulineAnthonysamy, Sylvain Frey, andAwais Rashid. “So if Mr BlueHead here clicks the link. . . ” riskthinking in cyber security de-cision making. ACM Transac-tions on Privacy and Security(TOPS), 24(1):5:1–5:29, January2021. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3419101.

Shi:2018:HAV

[SMA18] Hao Shi, Jelena Mirkovic, andAbdulla Alwabel. Handlinganti-virtual machine techniquesin malicious software. ACMTransactions on Privacy and

REFERENCES 23

Security (TOPS), 21(1):2:1–2:??, January 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3139292.

Son:2018:GFD

[SNCK18] Yunmok Son, Juhwan Noh,Jaeyeong Choi, and YongdaeKim. GyrosFinger: Finger-printing drones for locationtracking based on the outputsof MEMS gyroscopes. ACMTransactions on Privacy andSecurity (TOPS), 21(2):10:1–10:??, February 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3177751.

Shin:2020:SCW

[SNKK20] Hocheol Shin, Juhwan Noh, Do-hyun Kim, and Yongdae Kim.The system that cried wolf: Sen-sor security analysis of wide-area smoke detectors for criti-cal infrastructure. ACM Trans-actions on Privacy and Security(TOPS), 23(3):15:1–15:32, July2020. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/doi/abs/10.1145/3393926.

Sluganovic:2018:ARE

[SRRM18] Ivo Sluganovic, Marc Roeschlin,Kasper B. Rasmussen, and IvanMartinovic. Analysis of reflexiveeye movements for fast replay-resistant biometric authentica-tion. ACM Transactions on

Privacy and Security (TOPS),22(1):4:1–4:??, January 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3281745.

Shokri:2017:PGA

[STT17] Reza Shokri, George Theodor-akopoulos, and Carmela Tron-coso. Privacy games along lo-cation traces: a game-theoreticframework for optimizing loca-tion privacy. ACM Trans-actions on Privacy and Secu-rity (TOPS), 19(4):11:1–11:??,February 2017. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic).

Shu:2017:LSP

[SYRJ17] Xiaokui Shu, Danfeng (Daphne)Yao, Naren Ramakrishnan, andTrent Jaeger. Long-span pro-gram behavior modeling and at-tack detection. ACM Trans-actions on Privacy and Secu-rity (TOPS), 20(4):12:1–12:??,October 2017. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic).

Samtani:2020:PIE

[SZC20] Sagar Samtani, Hongyi Zhu, andHsinchun Chen. Proactivelyidentifying emerging hackerthreats from the Dark Web:a diachronic graph embeddingframework (D-GEF). ACMTransactions on Privacy andSecurity (TOPS), 23(4):21:1–21:33, August 2020. CODEN???? ISSN 2471-2566 (print),

REFERENCES 24

2471-2574 (electronic). URLhttps://dl.acm.org/doi/10.1145/3409289.

Toreini:2017:TRP

[TSH17] Ehsan Toreini, Siamak F. Sha-handashti, and Feng Hao. Tex-ture to the rescue: Practical pa-per fingerprinting based on tex-ture patterns. ACM Transac-tions on Privacy and Security(TOPS), 20(3):9:1–9:??, August2017. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic).

Ugarte-Pedrero:2018:CLD

[UPGB18] Xabier Ugarte-Pedrero, Mar-iano Graziano, and DavideBalzarotti. A close look at adaily dataset of malware sam-ples. ACM Transactions onPrivacy and Security (TOPS),22(1):6:1–6:??, January 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3291061.

Veras:2021:LSA

[VCT21] Rafael Veras, Christopher Collins,and Julie Thorpe. A large-scaleanalysis of the semantic pass-word model and linguistic pat-terns in passwords. ACM Trans-actions on Privacy and Security(TOPS), 24(3):20:1–20:21, April2021. CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3448608.

Wagner:2017:ESG

[Wag17] Isabel Wagner. Evaluating thestrength of genomic privacy met-rics. ACM Transactions on Pri-vacy and Security (TOPS), 20(1):2:1–2:??, February 2017. CO-DEN ???? ISSN 2471-2566(print), 2471-2574 (electronic).

Woo:2019:UEM

[WAK+19] Simon S. Woo, Ron Artstein,Elsi Kaiser, Xiao Le, and Je-lena Mirkovic. Using episodicmemory for user authentica-tion. ACM Transactions onPrivacy and Security (TOPS),22(2):11:1–11:??, April 2019.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3308992.

Wu:2020:CPM

[WL20] Fang-Jing Wu and Tie Luo.CrowdPrivacy: Publish moreuseful data with less privacy ex-posure in crowdsourced location-based services. ACM Transac-tions on Privacy and Security(TOPS), 23(1):6:1–6:25, Febru-ary 2020. CODEN ???? ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/doi/abs/10.1145/3375752.

Wedaj:2019:DDA

[WPR19] Samuel Wedaj, Kolin Paul, andVinay J. Ribeiro. DADS: De-centralized attestation for deviceswarms. ACM Transactions onPrivacy and Security (TOPS), 22(3):19:1–19:??, July 2019. ISSN

REFERENCES 25

2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3325822.

Wei:2018:APG

[WROR18] Fengguo Wei, Sankardas Roy,Xinming Ou, and Robby. Aman-droid: A precise and gen-eral inter-component data flowanalysis framework for secu-rity vetting of Android apps.ACM Transactions on Privacyand Security (TOPS), 21(3):14:1–14:??, June 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3183575.

Wagner:2021:DSP

[WY21] Isabel Wagner and Iryna Yevseyeva.Designing strong privacy metricssuites using evolutionary opti-mization. ACM Transactions onPrivacy and Security (TOPS),24(2):12:1–12:35, February 2021.CODEN ???? ISSN 2471-2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3439405.

Yan:2019:DAW

[YLV+19] Chao Yan, Bo Li, YevgeniyVorobeychik, Aron Laszka,Daniel Fabbri, and Bradley Ma-lin. Database audit workloadprioritization via game theory.ACM Transactions on Privacyand Security (TOPS), 22(3):17:1–17:??, July 2019. ISSN2471-2566 (print), 2471-2574(electronic). URL https://

dl.acm.org/citation.cfm?id=3323924.

Ye:2018:VBA

[YTF+18] Guixin Ye, Zhanyong Tang,Dingyi Fang, Xiaojiang Chen,Willy Wolff, Adam J. Aviv,and Zheng Wang. A video-based attack for Android pat-tern lock. ACM Transactions onPrivacy and Security (TOPS),21(4):19:1–19:??, October 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3230740.

Ye:2020:UGA

[YTF+20] Guixin Ye, Zhanyong Tang,Dingyi Fang, Zhanxing Zhu,Yansong Feng, Pengfei Xu, Xi-aojiang Chen, Jungong Han,and Zheng Wang. Using gen-erative adversarial networks tobreak and protect text captchas.ACM Transactions on Privacyand Security (TOPS), 23(2):7:1–7:29, May 2020. CODEN ????ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/doi/abs/10.1145/3378446.

Zhao:2021:EBS

[ZAK+21] Benjamin Zi Hao Zhao, Has-san Jameel Asghar, Mohamed AliKaafar, Francesca Trevisan, andHaiyue Yuan. Exploiting behav-ioral side channels in observa-tion resilient cognitive authen-tication schemes. ACM Trans-actions on Privacy and Security(TOPS), 24(1):1:1–1:33, January2021. CODEN ???? ISSN 2471-

REFERENCES 26

2566 (print), 2471-2574 (elec-tronic). URL https://dl.acm.org/doi/10.1145/3414844.

Zhang:2018:ISP

[ZBA18] Yihua Zhang, Marina Blanton,and Ghada Almashaqbeh. Im-plementing support for point-ers to private data in a general-purpose secure multi-party com-piler. ACM Transactions onPrivacy and Security (TOPS),21(2):6:1–6:??, February 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3154600.

Zhao:2018:FFI

[ZD18] Siqi Zhao and Xuhua Ding.FIMCE: A fully isolated micro-computing environment for mul-ticore systems. ACM Trans-actions on Privacy and Se-curity (TOPS), 21(3):15:1–15:??, June 2018. ISSN2471-2566 (print), 2471-2574(electronic). URL https://dl.acm.org/citation.cfm?id=3195181.

Zhang:2018:VGP

[ZPK18] Yupeng Zhang, CharalamposPapamanthou, and JonathanKatz. Verifiable graph pro-cessing. ACM Transactions onPrivacy and Security (TOPS),21(4):20:1–20:??, October 2018.ISSN 2471-2566 (print), 2471-2574 (electronic). URL https://dl.acm.org/citation.cfm?id=3233181.