AsiaCCS A

126 papers

YearTitle / Authors
2025A Cryptographic Analysis of Google's PSP and Falcon Channel Protocols.
Marc Fischlin, Sascha Hoffmann, Leonhard Ruppel, Gözde Saçiak, Tobias Schnitzler, Christian Schwarz, Maximilian Stillger
2025A Novel Asymmetric BSGS Polynomial Evaluation Algorithm under Homomorphic Encryption.
Qingfeng Wang, Li-Ping Wang
2025A Quantum-Secure Framework for IoD: Strengthening Authentication and Key-Establishment.
Salman Shamshad, Sana Belguith, Alma Oracevic
2025AVXProbe: Enhancing Website Fingerprinting with Side-Channel-Assisted Kernel-Level Traces.
Suryeon Kim, Seung Ho Na, Jaehan Kim, Seungwon Shin, Hyunwoo Choi
2025AWOSE: Probabilistic State Model for Consensus Algorithms' Fuzzing Frameworks.
Tannishtha Devgun, Gulshan Kumar, Rahul Saha, Alessandro Brighente, Mauro Conti
2025Adversarial Fog: Exploiting the Vulnerabilities of LiDAR Point Cloud Preprocessing Filters.
Yuna Tanaka, Kazuki Nomoto, Ryunosuke Kobayashi, Go Tsuruoka, Tatsuya Mori
2025An Automated Blackbox Noncompliance Checker for QUIC Server Implementations.
Kian Kai Ang, Guy Farrelly, Cheryl Pope, Damith C. Ranasinghe
2025An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization.
Animesh Singh, Ayantika Chatterjee, Anupam Chattopadhyay, Debdeep Mukhopadhyay
2025An Empirical Study of C Decompilers: Performance Metrics and Error Taxonomy.
Melih Sirlanci, Carter Yagemann, Zhiqiang Lin
2025An Empirical Study on Cross-chain Transactions: Costs, Inconsistencies, and Activities.
Kailun Yan, Bo Lu, Pranav Agrawal, Jiasun Li, Wenrui Diao, Xiaokuan Zhang
2025An Optimized Instantiation of Post-Quantum MQTT protocol on 8-bit AVR Sensor Nodes.
YoungBeom Kim, Seog Chung Seo
2025App-solutely Modded: Surveying Modded App Market Operators and Original App Developers.
Luis Adan Saavedra, Hridoy Sankar Dutta, Alastair R. Beresford, Alice Hutchings
2025AuthentiSafe: Lightweight and Future-Proof Device-to-Device Authentication for IoT.
Lukas Petzi, Torsten Krauß, Alexandra Dmitrienko, Gene Tsudik
2025BIP32-Compatible Threshold Wallets.
Poulami Das, Andreas Erwig, Sebastian Faust, Philipp-Florens Lehwalder, Julian Loss, Ziyan Qu, Siavash Riahi
2025BISON: Blind Identification with Stateless scOped pseudoNyms.
Jakob Heher, Stefan More, Lena Heimberger
2025BRC20 Snipping Attack.
Minfeng Qi, Qin Wang, Ningran Li, Shiping Chen, Tianqing Zhu
2025Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation.
Arwa Abdulkarim Al Alsadi, Mathew Vermeer, Takayuki Sasaki, Katsunari Yoshioka, Michel van Eeten, Carlos Gañán
2025BranchGauge: Modeling and Quantifying Side-Channel Leakage in Randomization-Based Secure Branch Predictors.
Quancheng Wang, Ming Tang, Ke Xu, Han Wang
2025Breaking Bad: How Compilers Break Constant-Time Implementations.
Moritz Schneider, Daniele Lain, Ivan Puddu, Nicolas Dutly, Srdjan Capkun
2025Can Small-scale Evaluation Reflect Real Ability? A Performance Study of Emerging Biometric Authentication.
Hangcheng Cao, Guowen Xu, Wenbin Huang, Hongwei Li
2025Can You Run My Code? A Close Look at Process Injection in Windows Malware.
Giorgia Di Pietro, Daniele Cono D'Elia, Leonardo Querzoni
2025ChainMarks: Securing DNN Watermark with Cryptographic Chain.
Brian Choi, Shu Wang, Isabelle Choi, Kun Sun
2025ClearMask: Noise-Free and Naturalness-Preserving Protection Against Voice Deepfake Attacks.
Yuanda Wang, Bocheng Chen, Hanqing Guo, Guangjing Wang, Weikang Ding, Qiben Yan
2025Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World.
Hua Ma, Alsharif Abuadbba, Yansong Gao, Hyoungshick Kim, Surya Nepal
2025Concretely Efficient Private Set Union via Circuit-Based PSI.
Gowri R. Chandran, Thomas Schneider, Maximilian Stillger, Christian Weinert
2025CryptoGuard: Lightweight Hybrid Detection and Response to Host-based Cryptojackers in Linux Cloud Environments.
Gyeonghoon Park, Jaehan Kim, Jinu Choi, Jinwoo Kim
2025DTL: Data Tumbling Layer A Composable Unlinkability for Smart Contracts.
Mohsen Minaei, Pedro Moreno-Sanchez, Zhiyong Fang, Srinivasan Raghuraman, Navid Alamati, Panagiotis Chatzigiannis, Ranjit Kumaresan, Duc Viet Le
2025DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group.
Semin Han, Geonho Yoon, Hyunok Oh, Jihye Kim
2025Different Seas, Different Phishes - Large-Scale Analysis of Phishing Simulations Across Different Industries.
Oskar Braun, Jan Hörnemann, Norbert Pohlmann, Tobias Urban, Matteo Große-Kampmann
2025EXAM: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for Enhanced Cache Occupancy Attacks.
Tianhong Xu, Aidong Adam Ding, Yunsi Fei
2025Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension.
Mingli Wu, Tsz Hon Yuen, Siu-Ming Yiu
2025Efficient Updatable Private Information Retrieval From Simulatable Homomorphic Ciphertexts.
Yini Lin, Haibo Tian
2025Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY.
Amin Abdulrahman, Matthias J. Kannwischer, Thing-Han Lim
2025Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation.
Seonhong Min, Joon-Woo Lee, Yongsoo Song
2025Enhancing Binary Code Similarity Analysis for Software Updates: A Contextual Diffing Framework.
August See, Moritz Mönnich, Mathias Fischer
2025Enhancing Search Privacy on Tor: Advanced Deep Keyword Fingerprinting Attacks and BurstGuard Defense.
Chaiwon Hwang, Haeseung Jeon, Jiwoo Hong, Hosung Kang, Nate Mathews, Goun Kim, Se Eun Oh
2025Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHub.
Jafar Akhoundali, Hamidreza Hamidi, Kristian F. D. Rietveld, Olga Gadyatskaya
2025Evaluating Disassembly Errors With Only Binaries.
Lambang Akbar Wijayadi, Yuancheng Jiang, Roland H. C. Yap, Zhenkai Liang, Zhuohao Liu
2025Evaluating Robustness of Reference-based Phishing Detectors.
Eunjin Roh, Sungwoo Jeon, Sooel Son, Sanghyun Hong
2025FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack.
Kemal Derya, M. Caner Tol, Berk Sunar
2025FIRST: FrontrunnIng Resistant Smart ConTracts.
Emrah Sariboz, Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra
2025FP-Rowhammer: DRAM-Based Device Fingerprinting.
Hari Venugopalan, Kaustav Goswami, Zain ul Abi Din, Jason Lowe-Power, Samuel T. King, Zubair Shafiq
2025Fair Server-Aided Multiparty Private Set Intersection from OKVS and OPRF.
Fei Xiao, Chunyang Lv, Jianfeng Wang
2025Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility.
Jia Liu, Mark Manulis
2025Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and Accountability.
Ayoub Ben Hassen, Pascal Lafourcade, Dhekra Mahmoud, Maxime Puys
2025From Transients to Flips: Hardware-level Bit Manipulation of In-Vehicle Serial Communication.
Abdullah Zubair Mohammed, Ryan M. Gerdes
2025GAE4HT: Detecting Hardware Trojans with Graph Autoencoder-Trained on Golden Model Data Flow Graphs.
Daehyeon Lee, Junghee Lee
2025Generalized Adversarial Code-Suggestions: Exploiting Contexts of LLM-based Code-Completion.
Karl Rubel, Maximilian Noppel, Christian Wressnegger
2025Glitch in Time: Exploiting Temporal Misalignment of IMU For Eavesdropping.
Ahmed Najeeb, Abdul Rafay, Muhammad Hamad Alizai, Naveed Anwar Bhatti
2025Infiltrated Selfish Mining: Think Win-Win to Escape Dilemmas.
Xuelian Cao, Zheng Yang, Tao Xiang, Jianting Ning, Yuhan Liu, Zhiming Liu, Jianying Zhou
2025Key Extension: Multi-Key FHE Utilizing LWR.
Mansi Goyal, Aditi Kar Gangopadhyay
2025Learning to Identify Conflicts in RPKI.
Haya Schulmann, Shujie Zhao
2025LogaLookup: Efficient Multivariate Lookup Argument for Accelerated Proof Generation.
Dien H. A. Tran, Tam N. B. Nguyen, Nhien-An Le-Khac, Thuc D. Nguyen
2025Minerva: A File-Based Ransomware Detector.
Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Lorenzo De Carli, Luigi V. Mancini
2025Mining Attack with Zero Knowledge in the Blockchain.
Jiaping Yu, Shang Gao, Rui Song, Zhiping Cai, Bin Xiao
2025Monocle: Transient Execution Proof Memory Views for Runtime Compiled Code.
Matteo Oldani, William Blair, Shweta Shinde, Matthias Neugschwandtner
2025N-Tracer: A Trace Driven Attack on NoC-Based MPSoC Architecture.
Dipesh, Urbi Chatterjee
2025NailKey: Mutable Biometric Using Fingernails.
Yihong Hang, Zhice Yang
2025NoBU: An effective and viable cyber-physical solution to thwart BadUSB attacks.
Andrea Ciccotelli, Maurantonio Caprolu, Roberto Di Pietro
2025Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI.
Meghali Nandi, Arash Shaghaghi, Nazatul Haque Sultan, Gustavo Batista, Raymond K. Zhao, Sanjay K. Jha
2025OMAD5G: Online Malware Detection in 5G Networks using Compound Paths.
Zhixin Wen, Guanhua Yan
2025OblivCDN: A Practical Privacy-preserving CDN with Oblivious Content Access.
Viet Vo, Shangqi Lai, Xingliang Yuan, Surya Nepal, Qi Li
2025Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments.
Philipp Schmitz, Tobias Jauch, Alex Wezel, Mohammad Rahmani Fadiheh, Thore Tiemann, Jonah Heller, Thomas Eisenbarth, Dominik Stoffel, Wolfgang Kunz
2025On the Account Security Risks Posed by Password Strength Meters.
Ming Xu, Weili Han, Jitao Yu, Jing Liu, Xinyi Zhang, Yun Lin, Jin Song Dong
2025Open Access Alert: Studying the Privacy Risks in Android WebView's Web Permission Enforcement.
Trung Tin Nguyen, Ben Stock
2025PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response.
Govind Mittal, Arthur Jakobsson, Kelly O. Marshall, Chinmay Hegde, Nasir D. Memon
2025POSTER: An Empirical Study of Smart Contract Patching Practices in the Wild.
TaeYoung Kim, Gilhee Lee, Hyoungshick Kim
2025POSTER: Automating ICS Malware Analysis with MITRE ATT&CK.
Fatih Kurt, Neetesh Saxena, Vijay Kumar, George Theodorakopoulos
2025POSTER: Disappearing Ink: How Partial Model Extraction Erases Watermarks.
Venkata Sai Pranav Bachina, Ankit Gangwal
2025POSTER: Investigating Transferability of Adversarial Examples in Model Merging.
Ankit Gangwal, Aaryan Ajay Sharma
2025POSTER: Multimodal Graph Networks for Systematic Generalization in Code Clone Detection.
Cuong Dao, Van Tong, Hai Anh Tran, Duc Tran, Giang Nguyen
2025POSTER: Policy-driven security-aware scheduling in Kubernetes.
Matthew Rossi, Michele Beretta, Dario Facchinetti, Stefano Paraboschi
2025POSTER: Stealthy SWAP-Based Side-Channel Attack on Multi-Tenant Quantum Cloud Systems.
Wei Jie Bryan Lee, Siyi Wang, Suman Dutta, Walid El Maouaki, Anupam Chattopadhyay
2025POSTER: SuriCap - A Measurement Platform to Study and Evaluate Intrusion Detection Rule Engineering.
Koen T. W. Teuwen, Emmanuele Zambon, Luca Allodi
2025POSTER: Transparent Temporally-Specialized System Call Filters.
Matthew Rossi, Michele Beretta, Dario Facchinetti, Stefano Paraboschi
2025POSTER: When Models Speak Too Much: Privacy Leakage on Large Language Models.
Mingjun Zhang, Mahrokh Abdollahi, Thilina Ranbaduge, Ming Ding
2025PRISM: To Fortify Widget Based User-App Data Exchanges Using Android Virtualization Framework.
YingTat Ng, Zhe Chen, Haiqing Qiu, Xuhua Ding
2025PSP: A Privacy-Preserving Self-certify Pseudonym Protocol for V2X.
Xuyuan Cai, Rui Song, Bin Xie, Qingjun Xiao, Bin Xiao
2025Pace: Privacy-Preserving and Atomic Cross-chain Swaps for Cryptocurrency Exchanges.
Jianhuan Wang, Bin Xiao
2025Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point Division.
Soumyadyuti Ghosh, Harishma Boyapally, Ajith Suresh, Arpita Patra, Soumyajit Dey, Debdeep Mukhopadhyay
2025PentestAgent: Incorporating LLM Agents to Automated Penetration Testing.
Xiangmin Shen, Lingzhi Wang, Zhenyuan Li, Yan Chen, Wencheng Zhao, Dawei Sun, Jiashui Wang, Wei Ruan
2025Perses: Unlocking Privilege Escalation for Small LLMs via Extensible Heterogeneity.
Dominik M. Weber, Ioannis Tzachristas, Aifen Sui
2025Post-Compromise Security with Application-Level Key-Controls - with a comprehensive study of the 5G AKMA protocol.
Ioana Boureanu, Cristina Onete, Stephan Wesemeyer, Léo Robert, Rhys Miller, Pascal Lafourcade, Fortunat Rajaona
2025Poster: Typosquatting Attacks on the Rust Ecosystem.
Minh-Khanh Vu, Thanh-Cong Nguyen, Duc-Ly Vu
2025Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay.
Guilhem Niot
2025Preventing Radio Fingerprinting through Low-Power Jamming.
Muhammad Irfan, Savio Sciancalepore, Gabriele Oligeri
2025Prior-Based Label Differential Privacy via Secure Two-Party Computation.
Amit Agarwal, Stanislav Peceny, Mariana Raykova, Phillipp Schoppmann, Karn Seth
2025ProbeShooter: A New Practical Approach for Probe Aiming.
Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jung, Changmin Jeong, HeeSeok Kim, Seokhie Hong
2025Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2025, Hanoi, Vietnam, August 25-29, 2025
2025Protocols and Formal Models for Delegated Authorisation with Server-Side Secrecy.
Jean Snyman, Chris Culnane, Ioana Boureanu, David Gérault
2025ProwseBox: A Framework for the Analysis of the Web at Scale.
Dolière Francis Somé
2025Proxies as Sensors: Measuring Censorship of Refraction Networking in Iran.
Abdulrahman Alaraj, Eric Wustrow
2025QUIC-Exfil: Exploiting QUIC's Server Preferred Address Feature to Perform Data Exfiltration Attacks.
Thomas Grübl, Weijie Niu, Jan von der Assen, Burkhard Stiller
2025Quantum-safe Signatureless DNSSEC.
Aditya Singh Rawat, Mahabir Prasad Jhanwar
2025REFLECTA: Reflection-based Scalable and Semantic Scripting Language Fuzzing.
Chibin Zhang, Gwangmu Lee, Qiang Liu, Mathias Payer
2025Rejection Sampling for Covert Information Channel: Symmetric Power-Of-2-Choices.
Dominik Bojko, Jacek Cichon, Miroslaw Kutylowski, Oliwer Sobolewski
2025Ring-LWR based Commitments and ZK-PoKs with Application to Verifiable Quantum-Safe Searchable Symmetric Encryption.
Debadrita Talapatra, Nimish Mishra, Debdeep Mukhopadhyay
2025Robust Locally Differentially Private Graph Analysis.
Amrita Roy Chowdhury, Jacob Imola, Kamalika Chaudhuri
2025Ruling the Unruly: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations Centers.
Koen T. W. Teuwen, Tom Mulders, Emmanuele Zambon, Luca Allodi
2025Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems.
Xugui Zhou, Anqi Chen, Maxfield Kouzel, Haotian Ren, Morgan McCarty, Cristina Nita-Rotaru, Homa Alemzadeh
2025SAFE: A Novel Approach For Software Vulnerability Detection from Enhancing The Capability of Large Language Models.
Van Nguyen, Surya Nepal, Xingliang Yuan, Tingmin Wu, Carsten Rudolph
2025SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation.
Henri Dohmen, Robin Hundt, Nora Khayata, Thomas Schneider
2025Scalable Time-Lock Puzzle.
Aydin Abadi, Dan Ristea, Artem Grigor, Steven J. Murdoch
2025Secure Steganography Based on Chaos-Aided Quantization Index Modulation.
Shanxiang Lyu, Xinquan Xu, Ling Liu, Lip Yee Por
2025SigN: SIMBox Activity Detection Through Latency Anomalies at the Cellular Edge.
Anne Josiane Kouam, Aline Carneiro Viana, Philippe Martins, Cédric Adjih, Alain Tchana
2025Sigy: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals.
Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Shweta Shinde
2025Slice it up: Unmasking User Identities in Smartwatch Health Data.
Lucas Lange, Tobias Schreieder, Victor Christen, Erhard Rahm
2025SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS).
Masudul Hasan Masud Bhuiyan, Berk Çakar, Ethan H. Burmane, James C. Davis, Cristian-Alexandru Staicu
2025SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation.
Yashothara Shanmugarasa, Ming Ding, Mahawaga Arachchige Pathum Chamikara, Thierry Rakotoarivelo
2025Sounds Vishy: Automating Vishing Attacks with AI-Powered Systems.
João Figueiredo, Afonso Carvalho, Daniel Castro, Daniel Gonçalves, Nuno Santos
2025Systematic Analysis of Kernel Security Performance and Energy Costs.
Fabian Rauscher, Benedict Herzog, Timo Hönig, Daniel Gruss
2025Telescope: Top-Down Hierarchical Pre-silicon Side-channel Leakage Assessment in System-on-Chip Design.
Zhenyuan Liu, Andrew Malnicof, Arna Roy, Patrick Schaumont
2025The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations.
Marie Weinz, Nicola Zannone, Luca Allodi, Giovanni Apruzzese
2025Three Glitches to Rule One Car: Fault Injection Attacks on a Connected EV.
Niclas Kühnapfel, Christian Werling, Hans Niklas Jacob, Jean-Pierre Seifert
2025Toward Malicious Clients Detection in Federated Learning.
Zhihao Dou, Jiaqi Wang, Wei Sun, Zhuqing Liu, Minghong Fang
2025Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility.
M. A. P. Chamikara, Seung Ick Jang, Ian J. Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David
2025Transferable Adversarial Examples with Bayesian Approach.
Mingyuan Fan, Cen Chen, Wenmeng Zhou, Yinggui Wang
2025TrustyMon: Practical Detection of DOM-based Cross-Site Scripting Attacks Using Trusted Types.
Sunnyeo Park, Jihwan Kim, Seongho Keum, Hyunjoon Lee, Sooel Son
2025Unraveling Elevated Data Leakage in Split Learning for Fine-Tuning Stable Diffusion Models.
Fei Wang, Yan Zhu, Baochun Li
2025Unveiling Privacy Risks in Quantum Optimization Services.
Mateusz Lesniak, Michal Wronski, Ewa Syta, Miroslaw Kutylowski
2025VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and More.
Yue Zhou, Sid Chi-Kin Chau
2025Virtual End-to-End Encryption: Analysis of the Doctolib Protocol.
Dennis Dayanikli, Laura Holz, Anja Lehmann
2025Vulnerable Intel GPU Context: Prohibit Complete Context Restore by Modifying Kernel Driver.
Wonseok Choi, Youngjoo Shin
2025When Better Features Mean Greater Risks: The Performance-Privacy Trade-Off in Contrastive Learning.
Ruining Sun, Hongsheng Hu, Wei Luo, Zhaoxi Zhang, Yanjun Zhang, Haizhuan Yuan, Leo Yu Zhang
2025Your Control Host Intrusion Left Some Physical Breadcrumbs: Physical Evidence-Guided Post-Mortem Triage of SCADA Attacks.
Moses Ike, Keaton Sadoski, Romuald Valme, Burak Sahin, Saman A. Zonouz, Wenke Lee
2025poqeth: Efficient, post-quantum signature verification on Ethereum.
Ruslan Kysil, István András Seres, Péter Kutas, Nándor Kelecsényi