AsiaCCS A

113 papers

YearTitle / Authors
2022A Systematic Study of Bulletin Board and Its Application.
Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai
2022ALEXA VERSUS ALEXA: Controlling Smart Speakers by Self-Issuing Voice Commands.
Sergio Esposito, Daniele Sgandurra, Giampaolo Bella
2022APKC '22: 9th ACM ASIA Public-Key Cryptography Workshop.
Jason Paul Cruz, Naoto Yanai
2022ASAP: Algorithm Substitution Attacks on Cryptographic Protocols.
Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth
2022ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022
Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako
2022Adversarial Level Agreements for Two-Party Protocols.
Marilyn George, Seny Kamara
2022Aggregating and Thresholdizing Hash-based Signatures using STARKs.
Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai
2022Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning.
Shen Fu, Dong Qin, George T. Amariucai, Daji Qiao, Yong Guan, Ann Smiley
2022Autonomous Network Defence using Reinforcement Learning.
Myles Foley, Chris Hicks, Kate Highnam, Vasilios Mavroudis
2022AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains.
Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu
2022BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy.
Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer
2022BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure.
Keke Gai, Kim-Kwang Raymond Choo
2022Base64 Malleability in Practice.
Konstantinos Chalkias, Panagiotis Chatzigiannis
2022Black-box and Target-specific Attack Against Interpretable Deep Learning Systems.
Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad, Tamer AbuHmed
2022Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding.
Liang Feng Zhang, Huaxiong Wang, Li-Ping Wang
2022CPSS '22: 8th ACM Cyber-Physical System Security Workshop.
Alvaro A. Cárdenas, Daisuke Mashima
2022Cellular Security: Why is it difficult?
Yongdae Kim
2022Common Evaluation Pitfalls in Touch-Based Authentication Systems.
Martin Georgiev, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic
2022Confusing and Detecting ML Adversarial Attacks with Injected Attractors.
Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee
2022CySSS '22: 1st International Workshop on Cybersecurity and Social Sciences.
Eric Chan-Tin, Shelia Kennison
2022DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
Poulami Das, Julia Hesse, Anja Lehmann
2022Decentralized Federated Learning for Internet of Things Anomaly Detection.
Zhuotao Lian, Chunhua Su
2022Decentralized and Collaborative Tracing for Group Signatures.
Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai
2022Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models.
Firuz Juraev, Eldor Abdukhamidov, Mohammed Abuhamad, Tamer AbuHmed
2022Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning.
Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei V. Petrovski, Luca Piras
2022Differentially Private Data Synthesis: State of the Art and Challenges.
Ninghui Li
2022Driving Execution of Target Paths in Android Applications with (a) CAR.
Michelle Y. Wong, David Lie
2022Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates.
Niusen Chen, Bo Chen
2022EPID with Efficient Proof of Non-Revocation.
Olivier Sanders
2022EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants.
Mirabelle Dib, Sadegh Torabi, Elias Bou-Harb, Nizar Bouguila, Chadi Assi
2022Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security.
Adam Bowers, Jize Du, Dan Lin, Wei Jiang
2022Efficient Oblivious Permutation via the Waksman Network.
William L. Holland, Olga Ohrimenko, Anthony Wirth
2022Eliminating Sandwich Attacks with the Help of Game Theory.
Lioba Heimbach, Roger Wattenhofer
2022Email Summarization to Assist Users in Phishing Identification.
Amir Kashapov, Tingmin Wu, Sharif Abuadbba, Carsten Rudolph
2022Enabling Attribute-Based Access Control in Linux Kernel.
H. O. Sai Varshith, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
2022EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE.
Qifan Wang, Shujie Cui, Lei Zhou, Ocean Wu, Yonghua Zhu, Giovanni Russello
2022Evaluating Blockchain Protocols with Abusive Modeling.
Vishal Sharma, Pawel Szalachowski, Jianying Zhou
2022Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies.
Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang
2022FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations.
Ning Wang, Yang Xiao, Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou
2022Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet.
Shengtuo Hu, Qingzhao Zhang, André Weimerskirch, Z. Morley Mao
2022Generating Content-Preserving and Semantics-Flipping Adversarial Text.
Weiping Pei, Chuan Yue
2022GraphTrack: A Graph-based Cross-Device Tracking Framework.
Binghui Wang, Tianchen Zhou, Song Li, Yinzhi Cao, Neil Zhenqiang Gong
2022Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations.
Payton Walker, Shalini Saini, S. Abhishek Anand, Tzipora Halevi, Nitesh Saxena
2022Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Priyanka Dutta, Mei Jiang, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto
2022Hopper: Per-Device Nano Segmentation for the Industrial IoT.
Piet De Vaere, Andrea Tulimiero, Adrian Perrig
2022Hunter: HE-Friendly Structured Pruning for Efficient Privacy-Preserving Deep Learning.
Yifei Cai, Qiao Zhang, Rui Ning, Chunsheng Xin, Hongyi Wu
2022InfoCensor: An Information-Theoretic Framework against Sensitive Attribute Inference and Demographic Disparity.
Tianhang Zheng, Baochun Li
2022IoT System Trustworthiness Assurance.
Razvan Beuran, Ooi Sian En, Abbie O. Barbir, Yasuo Tan
2022Iterative Oblivious Pseudo-Random Functions and Applications.
Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry
2022Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware.
Qirui Sun, Eldor Abdukhamidov, Tamer AbuHmed, Mohammed Abuhamad
2022Lures for Money: A First Look into YouTube Videos Promoting Money-Making Apps.
Noshaba Nasir, Faqia Iqbal, Mahnoor Zaheer, Mariam Shahjahan, Mobin Javed
2022MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware.
Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin
2022Machine Learning-based Online Social Network Privacy Preservation.
Tianchong Gao, Feng Li
2022Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten.
Quoc Phong Nguyen, Ryutaro Oikawa, Dinil Mon Divakaran, Mun Choon Chan, Bryan Kian Hsiang Low
2022Membership Feature Disentanglement Network.
Heonseok Ha, Jaehee Jang, Yonghyun Jeong, Sungroh Yoon
2022Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization.
Nuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Kazunari Tozawa
2022Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces.
Paul Staat, Harald Elders-Boll, Markus Heinrichs, Christian T. Zenger, Christof Paar
2022Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things.
Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze
2022Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3.
Sebastian Paul, Yulia Kuzovkova, Norman Lahr, Ruben Niederhagen
2022Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation.
Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan
2022Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits.
Shuai Feng, Shuaijianni Xu, Liang Feng Zhang
2022New Multiparty Computational Model: From Nakamoto to YOSO.
Tal Rabin
2022No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis.
Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos Hernandez Gañán
2022On Measuring Vulnerable JavaScript Functions in the Wild.
Maryna Kluban, Mohammad Mannan, Amr M. Youssef
2022On the Security of the FLARM Collision Warning System.
Boya Wang, Giorgio Tresoldi, Martin Strohmeier, Vincent Lenders
2022PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection.
Aner Ben-Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky
2022PacJam: Securing Dependencies Continuously via Package-Oriented Debloating.
Pardis Pashakhanloo, Aravind Machiry, Hyon-Young Choi, Anthony Canino, Kihong Heo, Insup Lee, Mayur Naik
2022PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals.
Qingchuan Zhao, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin
2022Port Contention Goes Portable: Port Contention Side Channels in Web Browsers.
Thomas Rokicki, Clémentine Maurice, Marina Botvinnik, Yossi Oren
2022Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao
2022Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption.
Jaehee Jang, Younho Lee, Andrey Kim, Byunggook Na, Donggeon Yhee, Byounghan Lee, Jung Hee Cheon, Sungroh Yoon
2022Proximity Searchable Encryption for the Iris Biometric.
Chloé Cachet, Sohaib Ahmad, Luke Demarest, Ariel Hamlin, Benjamin Fuller
2022Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation.
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
2022RBMon: Real Time System Behavior Monitoring Tool.
Nitesh Kumar, Anand Handa, Sandeep K. Shukla
2022ReFuzz - Structure Aware Fuzzing of the Resilient File System (ReFS).
Tobias Groß, Tobias Schleier, Tilo Müller
2022RecIPE: Revisiting the Evaluation of Memory Error Defenses.
Yuancheng Jiang, Roland H. C. Yap, Zhenkai Liang, Hubert Rosier
2022Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection.
Mathew Vermeer, Michel van Eeten, Carlos Gañán
2022SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication.
Christian Peeters, Christopher Patton, Imani N. S. Munyaka, Daniel Olszewski, Thomas Shrimpton, Patrick Traynor
2022SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech.
Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter
2022Scalable Private Decision Tree Evaluation with Sublinear Communication.
Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello
2022Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation.
Jack P. K. Ma, Sherman S. M. Chow
2022Server-Side Browsers: Exploring the Web's Hidden Attack Surface.
Marius Musch, Robin Kirchner, Max Boll, Martin Johns
2022ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs.
Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian
2022Signal Injection Attacks against CCD Image Sensors.
Sebastian Köhler, Richard Baker, Ivan Martinovic
2022SoK: A Survey Of Indirect Network-level Covert Channels.
Tobias Schmidbauer, Steffen Wendzel
2022SoK: Design Tools for Side-Channel-Aware Implementations.
Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont
2022SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model.
Tom van Goethem, Gertjan Franken, Iskander Sánchez-Rola, David Dworken, Wouter Joosen
2022SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons.
Feng Hao, Paul C. van Oorschot
2022SoK: The Evolution of Trusted UI on Mobile.
Davide Bove
2022Speedster: An Efficient Multi-party State Channel via Enclaves.
Jinghui Liao, Fengwei Zhang, Wenhai Sun, Weisong Shi
2022Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention.
Gabriel Figueira, Diogo Barradas, Nuno Santos
2022SteinerLog: Prize Collecting the Audit Logs for Threat Hunting on Enterprise Network.
Bibek Bhattarai, H. Howie Huang
2022Symbolic Synthesis of Indifferentiability Attacks.
Itsaka Rakotonirina, Miguel Ambrona, Alejandro Aguirre, Gilles Barthe
2022TRAP: The Bait of Rational Players to Solve Byzantine Consensus.
Alejandro Ranchal-Pedrosa, Vincent Gramoli
2022TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server.
Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal, Masaki Inamura
2022TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers.
Sadullah Canakci, Nikolay Matyunin, Kalman Graffi, Ajay Joshi, Manuel Egele
2022The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation.
Rhys Miller, Ioana Boureanu, Stephan Wesemeyer, Christopher J. P. Newton
2022The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study.
Alessandro Mantovani, Luca Compagna, Yan Shoshitaishvili, Davide Balzarotti
2022The Personalities of Social Media Posts and Photos.
Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison, Eric Chan-Tin
2022Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting.
Cailing Cai, Xianrui Qin, Tsz Hon Yuen, Siu-Ming Yiu
2022Towards Polyvalent Adversarial Attacks on URL Classification Engines.
Fabien Charmet, Harry Chandra Tanuwidjaja, Tomohiro Morikawa, Takeshi Takahashi
2022Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms.
Ping-Jui Chuang, Chih-Fan Hsu, Yung-Tien Chu, Szu-Chun Huang, Chun-Ying Huang
2022Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures.
Da Zhong, Haipei Sun, Jun Xu, Neil Zhenqiang Gong, Wendy Hui Wang
2022Understanding and Detecting Remote Infection on Linux-based IoT Devices.
Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao
2022VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities.
Luke Harrison, Samiran Bag, Hang Luo, Feng Hao
2022VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol.
Hyunwoo Lee, Imtiaz Karim, Ninghui Li, Elisa Bertino
2022Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions.
Matteo Campanelli, Mathias Hall-Andersen
2022Vulnerability Detection via Multimodal Learning: Datasets and Analysis.
Xin Zhou, Rakesh M. Verma
2022WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes.
Simon S. Woo, Shahroz Tariq, Hyoungshick Kim
2022WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID.
Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Yanchao Zhang
2022Wireless Manipulation of Serial Communication.
Gökçen Yilmaz Dayanikli, Abdullah Zubair Mohammed, Ryan M. Gerdes, Mani Mina
2022WoRMA '22: 1st Workshop on Robust Malware Analysis.
Fabio Pierazzi, Nedim Srndic
2022Wolf at the Door: Preventing Install-Time Attacks in npm with Latch.
Elizabeth Wyss, Alexander Wittman, Drew Davidson, Lorenzo De Carli