skip to main content
10.1145/3460120.3484559acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications

Authors Info & Claims
Published:13 November 2021Publication History

ABSTRACT

Perceptual hashing is widely used to search or match similar images for digital forensics and cybercrime study. Unfortunately, the robustness of perceptual hashing algorithms is not well understood in these contexts. In this paper, we examine the robustness of perceptual hashing and its dependent security applications both experimentally and empirically. We first develop a series of attack algorithms to subvert perceptual hashing based image search. This is done by generating attack images that effectively enlarge the hash distance to the original image while introducing minimal visual changes. To make the attack practical, we design the attack algorithms under a black-box setting, augmented with novel designs (e.g., grayscale initialization) to improve the attack efficiency and transferability. We then evaluate our attack against the standard pHash as well as its robust variant using three different datasets. After confirming the attack effectiveness experimentally, we then empirically test against real-world reverse image search engines including TinEye, Google, Microsoft Bing, and Yandex. We find that our attack is highly successful on TinEye and Bing, and is moderately successful on Google and Yandex. Based on our findings, we discuss possible countermeasures and recommendations.

References

  1. Pushkal Agarwal, Kiran Garimella, Sagar Joglekar, Nishanth Sastry, and Gareth Tyson. 2020. Characterising User Content on a Multi-lingual Social Network. In Proc. of ICWSM.Google ScholarGoogle ScholarCross RefCross Ref
  2. Pieter Agten, Wouter Joosen, Frank Piessens, and Nick Nikiforakis. 2015. Seven months' worth of mistakes: A longitudinal study of typosquatting abuse. In Proc. of NDSS.Google ScholarGoogle ScholarCross RefCross Ref
  3. Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing Robust Adversarial Examples. In Proc. of ICML.Google ScholarGoogle Scholar
  4. Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, and Giovanni Vigna. 2017. Exploitation and mitigation of authentication schemes based on device-public information. In Proc. of AsiaCCS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Microsoft Bing. 2021. Microsoft Bing Images. https://www.bing.com/images/trending.Google ScholarGoogle Scholar
  6. Kevin Borgolte, Christopher Kruegel, and Giovanni Vigna. 2015. Meerkat: Detecting website defacements through image-based object recognition. In Proc. of USENIX Security.Google ScholarGoogle Scholar
  7. Thomas Brunner, Frederik Diehl, Michael Truong Le, and Alois Knoll. 2019. Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks. In Proc. of ICCV.Google ScholarGoogle ScholarCross RefCross Ref
  8. Johannes Buchner. 2021. ImageHash. https://github.com/JohannesBuchner/imagehash.Google ScholarGoogle Scholar
  9. Elie Bursztein, Einat Clarke, Michelle DeLaune, David M. Elifff, Nick Hsu, Lindsey Olson, John Shehan, Madhukar Thakur, Kurt Thomas, and Travis Bright. 2019. Rethinking the Detection of Child Sexual Abuse Imagery on the Internet. In Proc. of WWW.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Zhangjie Cao, Mingsheng Long, Jianmin Wang, and Philip Yu. 2017. HashNet: Deep Learning to Hash by Continuation. In Proc. of ICCV.Google ScholarGoogle ScholarCross RefCross Ref
  11. Nicholas Carlini and David Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In Proc. of IEEE SP.Google ScholarGoogle ScholarCross RefCross Ref
  12. Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, and Cho-Jui Hsieh. 2017. ZOO: Zeroth Order Optimization Based Black-Box Attacks to Deep Neural Networks without Training Substitute Models. In Proc. of AISec.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Yuxuan Chen, Xuejing Yuan, Jiangshan Zhang, Yue Zhao, Shengzhi Zhang, Kai Chen, and XiaoFeng Wang. 2020. Deviltextquoterights Whisper: A General Approach for Physical Adversarial Attacks against Commercial Black-box Speech Recognition Devices. In Proc. of USENIX Security.Google ScholarGoogle Scholar
  14. Jiri Fridrich and Miroslav Goljan. 2000. Robust Hash Functions for Digital Watermarking. IEEE Int Conf Information Technology: Coding Computing (2000).Google ScholarGoogle Scholar
  15. Robert Frischholz. 2021. Reverse Image Search -- Searching People by Photos. https://facedetection.com/online-reverse-image-search/.Google ScholarGoogle Scholar
  16. Oana Goga, Giridhari Venkatadri, and Krishna P Gummadi. 2015. The doppelg"anger bot attack: Exploring identity impersonation in online social networks. In Proc. of IMC.Google ScholarGoogle Scholar
  17. Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. arXiv preprint arXiv:1412.6572 (2014).Google ScholarGoogle Scholar
  18. Google. 2021. Google Image Search. https://www.google.com/imghp.Google ScholarGoogle Scholar
  19. Azhar Hadmi, William Puech, Brahim Said, and Abdellah Ouahman. 2013. A robust and secure perceptual hashing system based on a quantization step analysis. Signal Processing: Image Communication, Vol. 28 (2013), 929--948.Google ScholarGoogle ScholarCross RefCross Ref
  20. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2009. Secure and robust SIFT. In Proc. of Multimedia.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Weiwei Hu and Ying Tan. 2017. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN. arXiv preprint arXiv:1702.05983 (2017).Google ScholarGoogle Scholar
  22. Andrew Ilyas, Logan Engstrom, Anish Athalye, and Jessy Lin. 2018. Black-box Adversarial Attacks with Limited Queries and Information. arXiv preprint arXiv:1804.08598 (2018).Google ScholarGoogle Scholar
  23. Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, and Aleksander Madry. 2019. Adversarial Examples Are Not Bugs, They Are Features. In Proc. of NeurIPS.Google ScholarGoogle Scholar
  24. Infringement-Report. 2021. ImageRaider. https://infringement.report/api/raider-reverse-image-search/.Google ScholarGoogle Scholar
  25. Diane Kelly and Leif Azzopardi. 2015. How Many Results per Page? A Study of SERP Size, Search Behavior and User Experience. In Proc. of SIGIR.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Amin Kharraz, William Robertson, and Engin Kirda. 2018. Surveylance: Automatically detecting online survey scams. In Proc. of IEEE SP.Google ScholarGoogle ScholarCross RefCross Ref
  27. Seon Joo Kim. 2021. Real and Fake Face Detection: Discriminate Real and Fake Face Images. https://www.kaggle.com/ciplab/real-and-fake-face-detection.Google ScholarGoogle Scholar
  28. Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero-Gómez, Nikolaos Pitropakis, Nick Nikiforakis, and Manos Antonakakis. 2017. Hiding in plain sight: A longitudinal study of combosquatting abuse. In Proc. of CCS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Evan Klinger and David Starkweather. 2021. pHash: The open source perceptual hash library. https://www.phash.org/docs/.Google ScholarGoogle Scholar
  30. Ching-Yung Lin and Shih-Fu Chang. 2001. A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11 (2001).Google ScholarGoogle Scholar
  31. Haomiao Liu, Ruiping Wang, Shiguang Shan, and Xilin Chen. 2016. Deep Supervised Hashing for Fast Image Retrieval. In Proc. of CVPR.Google ScholarGoogle ScholarCross RefCross Ref
  32. Wei Liu, Jun Wang, Rongrong Ji, Yu-Gang Jiang, and S. Chang. 2012. Supervised Hashing with Kernels. In Proc. of CVPR.Google ScholarGoogle Scholar
  33. Wei Liu, Jun Wang, Sanjiv Kumar, and Shih-Fu Chang. 2011. Hashing with Graphs. In Proc. of ICML.Google ScholarGoogle Scholar
  34. Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. 2017. Delving into Transferable Adversarial Examples and Black-box Attacks. In Proc. of ICLR.Google ScholarGoogle Scholar
  35. David G. Lowe. 2004. Distinctive Image Features from Scale-Invariant Keypoints. Int. J. Comput. Vision, Vol. 60, 2 (2004).Google ScholarGoogle Scholar
  36. Commons Machinery. 2021. Blockhash. http://blockhash.io/.Google ScholarGoogle Scholar
  37. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In Proc. of ICLR.Google ScholarGoogle Scholar
  38. Philipe Melo, Johnnatan Messias, Gustavo Resende, Kiran Garimella, Jussara Almeida, and Fabr'icio Benevenuto. 2019. Whatsapp monitor: A fact-checking system for whatsapp. In Proc. of ICWSM.Google ScholarGoogle ScholarCross RefCross Ref
  39. M. Kivancc Mihcc ak and Ramarathnam Venkatesan. 2002. New Iterative Geometric Methods for Robust Perceptual Image Hashing. In Proc. of ACM Workshop on Security and Privacy in Digital Rights Management.Google ScholarGoogle Scholar
  40. Najmeh Miramirkhani, Oleksii Starov, and Nick Nikiforakis. 2016. Dial one for scam: Analyzing and detecting technical support scams. In Proc. of NDSS.Google ScholarGoogle Scholar
  41. Alexandros Mittos, Savvas Zannettou, Jeremy Blackburn, and Emiliano De Cristofaro. 2020. ?And We Will Fight for Our Race!" A Measurement Study of Genetic Testing Conversations on Reddit and 4chan. In Proc. of ICWSM.Google ScholarGoogle ScholarCross RefCross Ref
  42. Vishal Monga and Brian L. Evans. 2004. Robust perceptual image hashing using feature points. In Proc. of ICIP.Google ScholarGoogle Scholar
  43. Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. 2016. DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks. In Proc. of CVPR.Google ScholarGoogle ScholarCross RefCross Ref
  44. Nick Nikiforakis, Federico Maggi, Gianluca Stringhini, M Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, and Stefano Zanero. 2014. Stranger danger: exploring the ecosystem of ad-based url shortening services. In Proc. of WWW.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Adam Novozámský, Babak Mahdian, and Stanislav Saic. 2020. IMD2020: A Large-Scale Annotated Dataset Tailored for Detecting Manipulated Images. In Proc. of IEEE Winter Applications of Computer Vision Workshops.Google ScholarGoogle Scholar
  46. Thomas Kobber Panum, Kaspar Hageman, René Rydhof Hansen, and Jens Myrup Pedersen. 2020. Towards Adversarial Phishing Detection. In Proc. of CSET.Google ScholarGoogle Scholar
  47. Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. 2016a. Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples. arXiv preprint arXiv:1605.07277 (2016).Google ScholarGoogle Scholar
  48. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, and Ananthram Swami. 2017. Practical Black-Box Attacks against Machine Learning. In Proc. of AsiaCCS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016b. The limitations of deep learning in adversarial settings. In Proc. of IEEE SP.Google ScholarGoogle ScholarCross RefCross Ref
  50. Sergio Pastrana, Alice Hutchings, Daniel Thomas, and Juan Tapiador. 2019. Measuring EWhoring. In Proc. of IMC.Google ScholarGoogle Scholar
  51. Kexin Pei, Yinzhi Cao, Junfeng Yang, and Suman Jana. 2017. DeepXplore: Automated Whitebox Testing of Deep Learning Systems. In Proc. of SOSP.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Pixsy. 2021. Pixsy. https://www.pixsy.com/.Google ScholarGoogle Scholar
  53. Erwin Quiring, David Klein, Daniel Arp, Martin Johns, and Konrad Rieck. 2020. Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks in Machine Learning. In Proc. of USENIX Security.Google ScholarGoogle Scholar
  54. M. Zubair Rafique, Tom Van Goethem, Wouter Joosen, Christophe Huygens, and Nick Nikiforakis. 2017. It's Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services. In Proc. of NDSS.Google ScholarGoogle Scholar
  55. Jathushan Rajasegaran, Naveen Karunanayake, Ashanie Gunathillake, Suranga Seneviratne, and Guillaume Jourjon. 2019. A multi-modal neural embeddings approach for detecting mobile counterfeit apps. In Proc. of WWW.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Julio C.S. Reis, Philipe Melo, Kiran Garimella, Jussara M Almeida, Dean Eckles, and Fabr'icio Benevenuto. 2020. A Dataset of Fact-Checked Images Shared on WhatsApp During the Brazilian and Indian Elections. In Proc. of ICWSM.Google ScholarGoogle ScholarCross RefCross Ref
  57. Gustavo Resende, Philipe Melo, Hugo Sousa, Johnnatan Messias, Marisa Vasconcelos, Jussara Almeida, and Fabr'icio Benevenuto. 2019. (Mis) Information Dissemination in WhatsApp: Gathering, Analyzing and Countermeasures. In Proc. of WWW.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, Alexander C. Berg, and Li Fei-Fei. 2015. ImageNet Large Scale Visual Recognition Challenge. In Proc. of IJCV.Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Marc Schneider and Shih-Fu Chang. 1996. A robust content based digital signature for image authentication. In Proc. of ICIP.Google ScholarGoogle ScholarCross RefCross Ref
  60. Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, and Ben Zhao. 2020. Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models. In Proc. of USENIX Security.Google ScholarGoogle Scholar
  61. Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. 2016. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proc. of CCS.Google ScholarGoogle Scholar
  62. Shangcheng Shi, Xianbo Wang, and Wing Cheong Lau. 2019. MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile Applications. In Proc. of AsiaCCS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, and Vern Paxson. 2017. Characterizing the nature and dynamics of Tor exit blocking. In Proc. of USENIX Security.Google ScholarGoogle Scholar
  64. Kate Starbird, Ahmer Arif, and Tom Wilson. 2019. Disinformation as Collaborative Work: Surfacing the Participatory Nature of Strategic Information Operations. CSCW, Vol. 3 (2019).Google ScholarGoogle Scholar
  65. Fnu Suya, Jianfeng Chi, David Evans, and Yuan Tian. 2020. Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries. In Proc. of USENIX Security.Google ScholarGoogle Scholar
  66. Ashiwin Swaminathan, Yinian Mao, and Min Wu. 2006. Robust and secure image hashing. IEEE Transactions on Information Forensics and Security, Vol. 1, 2 (2006), 215--230.Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013).Google ScholarGoogle Scholar
  68. Zhenjun Tang, Xianquan Zhang, and Shichao Zhang. 2014. Robust Perceptual Image Hashing Based on Ring Partition and NMF. ITKDE, Vol. 26, 3 (2014), 711--724.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. TinEye. 2021. TinEye. https://tineye.com/.Google ScholarGoogle Scholar
  70. Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, and Dan Boneh. 2019. AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning. In Proc. of CCS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Phani Vadrevu and Roberto Perdisci. 2019. What You See is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns. In Proc. of IMC.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Tom Van Goethem, Najmeh Miramirkhani, Wouter Joosen, and Nick Nikiforakis. 2019. Purchased Fame: Exploring the Ecosystem of Private Blog Networks. In Proc. of AsiaCCS.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Vinny Vella. 2020. Video of Delaware County poll workers filling out ballots was manipulated and lacked context, officials say. Inquirer. (6 November 2020).Google ScholarGoogle Scholar
  74. Ramarathnam Venkatesan, S.-M Koon, Mariusz Jakubowski, and Pierre Moulin. 2000. Robust image hashing. In Proc. of ICIP.Google ScholarGoogle ScholarCross RefCross Ref
  75. J. Wang, S. Kumar, and S. Chang. 2012. Semi-Supervised Hashing for Large-Scale Search. IEEE Transactions on Pattern Analysis and Machine Intelligence (2012).Google ScholarGoogle Scholar
  76. Xiaofeng Wang, Kemu Pang, Xiaorui Zhou, Yang Zhou, Lu Li, and Jianru Xue. 2015. A Visual Model-Based Perceptual Image Hash for Content Authentication. IEEE Transactions on Information Forensics and Security, Vol. 10, 7 (2015), 1336--1349.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Yuping Wang, Fatemeh Tahmasbi, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, David Magerman, Savvas Zannettou, and Gianluca Stringhini. 2021. Understanding the Use of Fauxtography on Social Media. In Proc. of ICWSM.Google ScholarGoogle ScholarCross RefCross Ref
  78. Yair Weiss, Antonio Torralba, and Rob Fergus. 2009. Spectral Hashing. In Proc. of NeurIPS.Google ScholarGoogle Scholar
  79. Li Weng and Bart Preneel. 2007. Attacking Some Perceptual Image Hash Algorithms. In Proc. of ICME.Google ScholarGoogle ScholarCross RefCross Ref
  80. Li Weng and Bart Preneel. 2011. A Secure Perceptual Hash Algorithm for Image Content Authentication. In Proc. of CMS.Google ScholarGoogle ScholarCross RefCross Ref
  81. Zhong Wu, Qifa Ke, Michael Isard, and Jian Sun. 2009. Bundling Features for Large Scale Partial-Duplicate Web Image Search. In Proc. of CVPR.Google ScholarGoogle Scholar
  82. Qixue Xiao, Yufei Chen, Chao Shen, Yu Chen, and Kang Li. 2019. Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms. In Proc. of USENIX Security.Google ScholarGoogle Scholar
  83. Yandex. 2021. Yandex Image Search. https://yandex.com/images/.Google ScholarGoogle Scholar
  84. Bian Yang, Fan Gu, and Xiamu Niu. 2006. Block Mean Value Based Image Perceptual Hashing. In Proc. of IIHMSP.Google ScholarGoogle ScholarCross RefCross Ref
  85. Kan Yuan, Di Tang, Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Yi Chen, Menghan Sun, Haoran Lu, and Kehuan Zhang. 2019. Stealthy porn: Understanding real-world adversarial images for illicit online promotion. In Proc. of IEEE SP.Google ScholarGoogle ScholarCross RefCross Ref
  86. Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, and Guillermo Suarez-Tangil. 2018. On the Origins of Memes by Means of Fringe Web Communities. In Proc. of IMC.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Savvas Zannettou, Tristan Caulfield, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, and Jeremy Blackburn. 2020. Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter. In Proc. of ICWSM.Google ScholarGoogle ScholarCross RefCross Ref
  88. Christoph Zauner. 2010. Implementation and Benchmarking of Perceptual Image Hash Functions. Master's thesis, Upper Austria University of Applied Sciences, Hagenberg Campus. (2010).Google ScholarGoogle Scholar
  89. Richard Zhang, Phillip Isola, Alexei A. Efros, Eli Shechtman, and Oliver Wang. 2018. The Unreasonable Effectiveness of Deep Features as a Perceptual Metric. In Proc. of CVPR.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
          November 2021
          3558 pages
          ISBN:9781450384544
          DOI:10.1145/3460120

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 November 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,261of6,999submissions,18%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader