writing.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
A small, intentional community for poets, authors, and every kind of writer.

Administered by:

Server stats:

323
active users

#paperpreview

0 posts0 participants0 posts today
Annual Computer Security Applications Conference<p>Today's first <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> is Zhang et al.'s work in which they model the LLM watermark stealing attack as a constrained optimization problem to steal the details of the watermark and remove them: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=355" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=355</span></a></p>
Annual Computer Security Applications Conference<p>Today's third <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> is the work by Doan et al. who show “Digital” data poisoning is ineffective in the real-world based on a new DriveByFlyBy real-world test data set of <a href="https://infosec.exchange/tags/backdoor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backdoor</span></a> attacks in the wild: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=417" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=417</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Annual Computer Security Applications Conference<p>The second <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is Xia &amp; Chen's work showing a new threat to <a href="https://infosec.exchange/tags/AutonomousVehicles" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AutonomousVehicles</span></a>. MIA attacks inject invisible images into cameras, fooling <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> &amp; risking safety: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=373" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=373</span></a></p><p>An online demo is available: <a href="https://sites.google.com/view/morieinjection/home" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sites.google.com/view/morieinj</span><span class="invisible">ection/home</span></a></p>
Annual Computer Security Applications Conference<p>The second <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> for today is the work by Armknecht et al. who devise a novel and efficient light client protocol that optimizes for the fact most users are rarely offline for more than a week: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=309" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=309</span></a><br><a href="https://infosec.exchange/tags/Blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blockchain</span></a> <a href="https://infosec.exchange/tags/Committee" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Committee</span></a></p>
Annual Computer Security Applications Conference<p>The first <a href="https://infosec.exchange/tags/ACSAC2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ACSAC2024</span></a> <a href="https://infosec.exchange/tags/PaperPreview" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PaperPreview</span></a> today is Ayoub et al.'s Bluescream, where they investigate how an attacker can manipulate <a href="https://infosec.exchange/tags/Bluetooth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Bluetooth</span></a> Low Energy to enable the long-distance EM <a href="https://infosec.exchange/tags/sidechannel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sidechannel</span></a> <a href="https://infosec.exchange/tags/attack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>attack</span></a> called Screaming Channels: <a href="https://www.openconf.org/acsac2024/modules/request.php?module=oc_program&amp;action=summary.php&amp;id=103" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openconf.org/acsac2024/modules</span><span class="invisible">/request.php?module=oc_program&amp;action=summary.php&amp;id=103</span></a><br><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>