AsiaCCS A

89 papers

YearTitle / Authors
2023#DM-Me: Susceptibility to Direct Messaging-Based Scams.
Raj Vardhan, Alok Chandrawal, Phakpoom Chinprutthiwong, Yangyong Zhang, Guofei Gu
2023A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessage.
Yeomin Jeong, Woonghee Lee, Junbeom Hur
2023A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao
2023A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems.
Yumeng Zhang, Max Ward, Mingyu Guo, Hung Nguyen
2023A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator.
Leizhang Wang, Yuntao Wang, Baocang Wang
2023A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing.
HyunJin Kim, JinYeong Bak, Kyunghyun Cho, Hyungjoon Koo
2023AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation.
Alexander Küchler, Leon Wenning, Florian Wendland
2023An End-to-End Analysis of Covid-Themed Scams in the Wild.
Behzad Ousat, Mohammad Ali Tofighi, Amin Kharraz
2023An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks.
Matthew Rogers, Kasper Rasmussen
2023Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis.
Sirus Shahini, Mu Zhang, Mathias Payer, Robert Ricci
2023BFU: Bayesian Federated Unlearning with Parameter Self-Sharing.
Weiqi Wang, Zhiyi Tian, Chenhan Zhang, An Liu, Shui Yu
2023Benchmarking the Benchmarks.
Marc Miltenberger, Steven Arzt, Philipp Holzinger, Julius Näumann
2023BinWrap: Hybrid Protection against Native Node.js Add-ons.
George Christou, Grigoris Ntousakis, Eric Lahtinen, Sotiris Ioannidis, Vasileios P. Kemerlis, Nikos Vasilakis
2023Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures.
Abdullah Qasem, Mourad Debbabi, Bernard Lebel, Marthe Kassouf
2023Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup.
Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo
2023CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses.
Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu
2023CacheFX: A Framework for Evaluating Cache Security.
Daniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval Yarom
2023Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses.
Marco Abbadini, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi
2023Communication-Efficient Inner Product Private Join and Compute with Cardinality.
Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida
2023CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications.
Florian Draschbacher, Johannes Feichtner
2023DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation.
Zhicong Yan, Shenghong Li, Ruijie Zhao, Yuan Tian, Yuanyuan Zhao
2023Data Privacy Examination against Semi-Supervised Learning.
Jiadong Lou, Xu Yuan, Miao Pan, Hao Wang, Nian-Feng Tzeng
2023Deepfake CAPTCHA: A Method for Preventing Fake Calls.
Lior Yasur, Guy Frankovits, Fred Matanel Grabovski, Yisroel Mirsky
2023Democratizing election verification: new methods for addressing an ancient attacker model.
Vanessa Teague
2023Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators.
Yangyong Zhang, Raj Vardhan, Phakpoom Chinprutthiwong, Guofei Gu
2023EMShepherd: Detecting Adversarial Samples via Side-channel Leakage.
Ruyi Ding, Cheng Gongye, Siyue Wang, A. Adam Ding, Yunsi Fei
2023Electromagnetic Signal Injection Attacks on Differential Signaling.
Youqian Zhang, Kasper Rasmussen
2023Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs.
Mohamad Mansouri, Jun Xu, Georgios Portokalidis
2023Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO.
Guy Farrelly, Michael Chesser, Damith C. Ranasinghe
2023Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck.
Chenhan Zhang, Weiqi Wang, James J. Q. Yu, Shui Yu
2023FLAIR: Defense against Model Poisoning Attack in Federated Learning.
Atul Sharma, Wei Chen, Joshua C. Zhao, Qiang Qiu, Saurabh Bagchi, Somali Chaterji
2023FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation.
Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko
2023Faster TFHE Bootstrapping with Block Binary Keys.
Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song
2023Flag: A Framework for Lightweight Robust Secure Aggregation.
Laasya Bangalore, Mohammad Hossein Faghihi Sereshgi, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
2023FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A.
Jingquan Ge, Fengwei Zhang
2023Formal Methods for Payment Protocols.
David A. Basin
2023Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices.
Chris Culnane, Ioana Boureanu, Jean Snyman, Stephan Wesemeyer, Helen Treharne
2023Going Haywire: False Friends in Federated Learning and How to Find Them.
William Aiken, Paula Branco, Guy-Vincent Jourdan
2023How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability.
Kun Peng
2023IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity.
Lili Yan, Jingyi Cui, Jian Liu, Guangquan Xu, Lidong Han, Alireza Jolfaei, Xi Zheng
2023IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems.
Thore Tiemann, Zane Weissman, Thomas Eisenbarth, Berk Sunar
2023Implementing and Optimizing Matrix Triples with Homomorphic Encryption.
Johannes Mono, Tim Güneysu
2023Invasion of location privacy using online map services and smartphone sensors.
Hyunsoo Kim, Youngbae Jeon, Ji Won Yoon
2023Investigating Traffic Analysis Attacks on Apple iCloud Private Relay.
Ali Zohaib, Jade Sheffey, Amir Houmansadr
2023Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant Applications.
Baiqi Chen, Tingmin Wu, Yanjun Zhang, Mohan Baruwal Chhetri, Guangdong Bai
2023Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks.
Zitao Chen, Pritam Dash, Karthik Pattabiraman
2023LDL: A Defense for Label-Based Membership Inference Attacks.
Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran
2023LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks.
Mengyao Ma, Yanjun Zhang, Mahawaga Arachchige Pathum Chamikara, Leo Yu Zhang, Mohan Baruwal Chhetri, Guangdong Bai
2023MASCARA : Systematically Generating Memorable And Secure Passphrases.
Avirup Mukherjee, Kousshik Murali, Shivam Kumar Jha, Niloy Ganguly, Rahul Chatterjee, Mainack Mondal
2023Masked Language Model Based Textual Adversarial Example Detection.
Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang
2023Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers.
Jiyi Zhang, Han Fang, Wesley Joon-Wie Tann, Ke Xu, Chengfang Fang, Ee-Chien Chang
2023Model Stealing Attacks and Defenses: Where Are We Now?
N. Asokan
2023Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging.
Martin Unterguggenberger, David Schrammel, Pascal Nasahl, Robert Schilling, Lukas Lamster, Stefan Mangard
2023On the Cryptographic Fragility of the Telegram Ecosystem.
Theo von Arx, Kenneth G. Paterson
2023Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice.
Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters
2023POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design.
Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran
2023POSTER: A Cyberspace Study of the Russia-Ukraine War.
Gursimran Singh, Hrishikesh B. Acharya
2023POSTER: A Semi-asynchronous Federated Intrusion Detection Framework for Power Systems.
Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh
2023POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity.
Abdullahi Chowdhury, Hung Nguyen, Debi Ashenden, Ganna Pogrebna
2023POSTER: Leveraging eBPF to enhance sandboxing of WebAssembly runtimes.
Marco Abbadini, Michele Beretta, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi
2023POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models.
Zhibo Jin, Zhiyu Zhu, Hongsheng Hu, Minhui Xue, Huaming Chen
2023POSTER: On searching information leakage of Python model execution to detect adversarial examples.
Cheng-Yao Guo, Fang Yu
2023POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting.
Yiyan Wang, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne
2023POSTER: Security Logs Graph Analytics for Industry Network System.
Qiaoran Meng, Nay Oo, Hoon Wei Lim, Biplab Sikdar
2023POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking.
Tina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim
2023PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption.
Yongha Son, Jinhyuck Jeong
2023Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims.
Aydin Abadi, Steven J. Murdoch
2023Privacy-Preserving Record Linkage for Cardinality Counting.
Nan Wu, Dinusha Vatsalan, Mohamed Ali Kâafar, Sanath Kumar Ramesh
2023Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023
Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik
2023QUDA: Query-Limited Data-Free Model Extraction.
Zijun Lin, Ke Xu, Chengfang Fang, Huadi Zheng, Aneez Ahmed Jaheezuddin, Jie Shi
2023RaceBench: A Triggerable and Observable Concurrency Bug Benchmark.
Jiashuo Liang, Ming Yuan, Zhanzhao Ding, Siqi Ma, Xinhui Han, Chao Zhang
2023RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy Defense.
Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu
2023Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities.
Wenyuan Xu
2023SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks.
Oleg Schell, Marcel Kneib
2023SPEAR-V: Secure and Practical Enclave Architecture for RISC-V.
David Schrammel, Moritz Waser, Lukas Lamster, Martin Unterguggenberger, Stefan Mangard
2023Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact.
Markus Dahlmanns, Constantin Sander, Robin Decker, Klaus Wehrle
2023Secure Context Switching of Masked Software Implementations.
Barbara Gigerl, Robert Primas, Stefan Mangard
2023Secure and Efficient Mobile DNN Using Trusted Execution Environments.
Bin Hu, Yan Wang, Jerry Cheng, Tianming Zhao, Yucheng Xie, Xiaonan Guo, Yingying Chen
2023Securing Container-based Clouds with Syscall-aware Scheduling.
Michael V. Le, Salman Ahmed, Dan Williams, Hani Jamjoom
2023Security Properties of Virtual Remotes and SPOOKing their violations.
Joshua David Oetting Majors, Edgardo Barsallo Yi, Amiya Maji, Darren Wu, Saurabh Bagchi, Aravind Machiry
2023Sfitag: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions.
Jiwon Seo, Junseung You, Yungi Cho, Yeongpil Cho, Donghyun Kwon, Yunheung Paek
2023ShowTime: Amplifying Arbitrary CPU Timing Side Channels.
Antoon Purnal, Marton Bognar, Frank Piessens, Ingrid Verbauwhede
2023SoK: Systematizing Attack Studies in Federated Learning - From Sparseness to Completeness.
Geetanjli Sharma, M. A. P. Chamikara, Mohan Baruwal Chhetri, Yi-Ping Phoebe Chen
2023Stairway To Rainbow.
Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel
2023Symbolic modelling of remote attestation protocols for device and app integrity on Android.
Abdulla Aldoseri, Tom Chothia, José Moreira, David F. Oswald
2023T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing.
Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks
2023ThreadLock: Native Principal Isolation Through Memory Protection Keys.
William Blair, William K. Robertson, Manuel Egele
2023Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide.
Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco
2023ZEKRA: Zero-Knowledge Control-Flow Attestation.
Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi