AsiaCCS A

74 papers

YearTitle / Authors
2021(Mis)managed: A Novel TLB-based Covert Channel on GPUs.
Ajay Nayak, Pratheek B, Vinod Ganapathy, Arkaprava Basu
2021A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification Attacks.
Shameek Bhattacharjee, Venkata Praveen Kumar Madhavarapu, Sajal K. Das
2021AMEBA: An Adaptive Approach to the Black-Box Evasion of Machine Learning Models.
Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese
2021ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition.
Wei Xie, Chao Zhang, Pengfei Wang, Zhenhua Wang, Qiang Yang
2021ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021.
Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung
2021Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks.
Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida
2021Analysis and Takeover of the Bitcoin-Coordinated Pony Malware.
Tsuyoshi Taniguchi, Harm Griffioen, Christian Doerr
2021Analyzing Spatial Differences in the TLS Security of Delegated Web Services.
Joonhee Lee, Hyunwoo Lee, Jongheon Jeong, Doowon Kim, Ted Taekyoung Kwon
2021Analyzing the Overhead of File Protection by Linux Security Modules.
Wenhui Zhang, Peng Liu, Trent Jaeger
2021Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms.
Dongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella, Christopher Kruegel, Giovanni Vigna
2021BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network.
Yuede Ji, Lei Cui, H. Howie Huang
2021Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications.
Mohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash
2021Cali: Compiler-Assisted Library Isolation.
Markus Bauer, Christian Rossow
2021Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels.
Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty
2021Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication.
Gordon Meiser, Pierre Laperdrix, Ben Stock
2021Click This, Not That: Extending Web Authentication with Deception.
Timothy Barron, Johnny So, Nick Nikiforakis
2021ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems.
Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi
2021Conware: Automated Modeling of Hardware Peripherals.
Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi, Christopher Kruegel, Giovanni Vigna
2021CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory.
Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard
2021Cryptographic Key Derivation from Biometric Inferences for Remote Authentication.
Erkam Uzun, Carter Yagemann, Simon P. Chung, Vladimir Kolesnikov, Wenke Lee
2021DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Han Qiu, Yi Zeng, Shangwei Guo, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham
2021DySan: Dynamically Sanitizing Motion Sensor Data Against Sensitive Inferences through Adversarial Networks.
Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Rosin Claude Ngueveu
2021EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech.
S. Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen
2021Efficient Graph Encryption Scheme for Shortest Path Queries.
Esha Ghosh, Seny Kamara, Roberto Tamassia
2021Efficient Verifiable Image Redacting based on zk-SNARKs.
Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh
2021Encrypted Databases: Progresses and Challenges.
Kui Ren
2021Evaluating Synthetic Bugs.
Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek
2021Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore.
Fei Zuo, Qiang Zeng
2021Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains.
Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph K. Liu, Shiping Chen
2021Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning.
Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang
2021HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment.
Pascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard
2021HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks.
Yi Wu, Xiangyu Xu, Payton R. Walker, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu
2021Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits.
Ruiyu Zhu, Yan Huang
2021HoneyGen: Generating Honeywords Using Representation Learning.
Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos
2021Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension.
Linpeng Lu, Ning Ding
2021How to Take Over Drones.
Sebastian Plotz, Frederik Armknecht, Christian Bunse
2021IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary.
Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
2021Identifying Behavior Dispatchers for Malware Analysis.
Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu, Wenke Lee
2021Localizing Vulnerabilities Statistically From One Exploit.
Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury
2021Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz, Elisa Bertino
2021Low-Cost Hiding of the Query Pattern.
Maryam Sepehri, Florian Kerschbaum
2021MalPhase: Fine-Grained Malware Detection Using Network Flow Data.
Michal Piskozub, Fabio De Gaspari, Freddie Barr-Smith, Luigi V. Mancini, Ivan Martinovic
2021Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes.
Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre
2021Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps.
Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes
2021Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems.
Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi
2021Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time.
Yun Wang, Dimitrios Papadopoulos
2021Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual.
Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu
2021Non-Intrusive and High-Efficient Balance Tomography in the Lightning Network.
Yan Qiao, Kui Wu, Majid Khabbazian
2021On Detecting Deception in Space Situational Awareness.
James Pavur, Ivan Martinovic
2021Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session Cookies.
Assel Aliyeva, Manuel Egele
2021P2DPI: Practical and Privacy-Preserving Deep Packet Inspection.
Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal
2021PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks.
Shuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa
2021PSec: Programming Secure Distributed Systems using Enclaves.
Shivendra Kushwah, Ankush Desai, Pramod Subramanyan, Sanjit A. Seshia
2021Pipa: Privacy-preserving Password Checkup via Homomorphic Encryption.
Jie Li, Yamin Liu, Shuang Wu
2021Privacy-preserving Density-based Clustering.
Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
2021Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang
2021REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data.
Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song
2021Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs.
Lun-Pin Yuan, Peng Liu, Sencun Zhu
2021Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels.
Zhenkai Zhang, Sisheng Liang, Fan Yao, Xing Gao
2021Redactable Blockchain Supporting Supervision and Self-Management.
Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu
2021Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules.
Kaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, Yier Jin
2021Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes.
Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong
2021Scanning the Cycle: Timing-based Authentication on PLCs.
Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur
2021Secure Role and Rights Management for Automotive Access and Feature Activation.
Christian Plappert, Lukas Jäger, Andreas Fuchs
2021Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem.
Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn, Tudor Dumitras
2021See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li
2021SoK: Enabling Security Analyses of Embedded Systems via Rehosting.
Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson
2021Stealing Deep Reinforcement Learning Models for Fun and Profit.
Kangjie Chen, Shangwei Guo, Tianwei Zhang, Xiaofei Xie, Yang Liu
2021Streamlet: An Absurdly Simple, Textbook Blockchain Protocol.
Elaine Shi
2021Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts.
Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan
2021Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on Sensors.
Yazhou Tu, Vijay Srinivas Tida, Zhongqi Pan, Xiali Hei
2021Trustworthy Machine Learning: Past, Present, and Future.
Somesh Jha
2021UltraPIN: Inferring PIN Entries via Ultrasound.
Ximing Liu, Yingjiu Li, Robert H. Deng
2021Understanding the Privacy Implications of Adblock Plus's Acceptable Ads.
Ahsan Zafar, Aafaq Sabir, Dilawer Ahmed, Anupam Das