AsiaCCS A

61 papers

YearTitle / Authors
20111-out-of-2 signature.
Miroslaw Kutylowski, Jun Shao
2011A new and extended fault analysis on RSA.
Cai-Sen Chen, Tao Wang
2011A software-based root-of-trust primitive on multicore platforms.
Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng, Tieyan Li
2011A statistical approach to botnet virulence estimation.
Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani
2011An efficient mobile PACE implementation.
Alexander Wiesmaier, Moritz Horsch, Johannes Braun, Franziskus Kiefer, Detlef Hühnlein, Falko Strenzke, Johannes Buchmann
2011An integrated approach to cryptographic mitigation of denial-of-service attacks.
Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto
2011An ontology- and Bayesian-based approach for determining threat probabilities.
Stefan Fenz
2011Attack on the GridCode one-time password.
Ian M. Molloy, Ninghui Li
2011Attacks against process control systems: risk assessment, detection, and response.
Alvaro A. Cárdenas, Saurabh Amin, Zong-Syun Lin, Yu-Lun Huang, Chi-Yen Huang, Shankar Sastry
2011Automatic construction of jump-oriented programming shellcode (on the x86).
Ping Chen, Xiao Xing, Bing Mao, Li Xie, Xiaobin Shen, Xinchun Yin
2011Boosting the scalability of botnet detection using adaptive traffic sampling.
Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster
2011Bounded vector signatures and their applications.
Lei Wei, Scott E. Coull, Michael K. Reiter
2011Characterizing kernel malware behavior with kernel data access patterns.
Junghwan Rhee, Zhiqiang Lin, Dongyan Xu
2011Compact identity-based encryption without strong symmetric cipher.
Joonsang Baek, Jianying Zhou
2011Confidentiality-preserving proof theories for distributed proof systems.
Kazuhiro Minami, Nikita Borisov, Marianne Winslett, Adam J. Lee
2011Deriving common malware behavior through graph clustering.
Young Hee Park, Douglas S. Reeves
2011Detecting stealthy malware with inter-structure and imported signatures.
Bin Liang, Wei You, Wenchang Shi, Zhaohui Liang
2011Diesel: applying privilege separation to database access.
Adrienne Porter Felt, Matthew Finifter, Joel Weinberger, David A. Wagner
2011EASiER: encryption-based access control in social networks with efficient revocation.
Sonia Jahid, Prateek Mittal, Nikita Borisov
2011Efficient audit-based compliance for relational data retention.
Ragib Hasan, Marianne Winslett
2011Efficient computational oblivious transfer using interactive hashing.
Kirill Morozov, George Savvides
2011Efficient symbolic automated analysis of administrative attribute-based RBAC-policies.
Francesco Alberti, Alessandro Armando, Silvio Ranise
2011Enhancing the trust of internet routing with lightweight route attestation.
Qi Li, Mingwei Xu, Jianping Wu, Xinwen Zhang, Patrick P. C. Lee, Ke Xu
2011Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK.
Cas Cremers
2011Extended cubes: enhancing the cube attack by extracting low-degree non-linear equations.
Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
2011Formal modelling and automatic detection of resource exhaustion attacks.
Bogdan Groza, Marius Minea
2011How to design space efficient revocable IBE from non-monotonic ABE.
Huang Lin, Zhenfu Cao, Yuguang Fang, Muxin Zhou, Haojin Zhu
2011How to search linear approximation for large non-surjective S-box.
Yue Sun, Meiqin Wang, Qiumei Sun
2011Identity-based online/offline key encapsulation and encryption.
Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou
2011Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem.
Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi
2011Jump-oriented programming: a new class of code-reuse attack.
Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Zhenkai Liang
2011Leakage resilient eCK-secure key exchange protocol without random oracles.
Daisuke Moriyama, Tatsuaki Okamoto
2011Malware propagation in online social networks: nature, dynamics, and defense implications.
Guanhua Yan, Guanling Chen, Stephan J. Eidenbenz, Nan Li
2011Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call.
Mauro Conti, Irina Zachia-Zlatea, Bruno Crispo
2011Multi-authority ciphertext-policy attribute-based encryption with accountability.
Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie
2011Network scan detection with LQS: a lightweight, quick and stateful algorithm.
Mansour Alsaleh, Paul C. van Oorschot
2011Non-uniform distributions in quantitative information-flow.
Michael Backes, Matthias Berg, Boris Köpf
2011On mouse dynamics as a behavioral biometric for authentication.
Zach Jorgensen, Ting Yu
2011On the effectiveness of anonymizing networks for web search privacy.
Sai Teja Peddinti, Nitesh Saxena
2011On the invisibility of designated confirmer signatures.
Fubiao Xia, Guilin Wang, Rui Xue
2011On the security of the identity-based encryption based on DHIES from ASIACCS 2010.
Willy Susilo, Joonsang Baek
2011Optimal message transmission protocols with flexible parameters.
Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Hongsong Shi
2011PUF ROKs: a hardware approach to read-once keys.
Michael S. Kirkpatrick, Sam Kerr, Elisa Bertino
2011Practical affiliation-hiding authentication from improved polynomial interpolation.
Mark Manulis, Bertram Poettering
2011Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011
Bruce S. N. Cheung, Lucas Chi Kwong Hui, Ravi S. Sandhu, Duncan S. Wong
2011Quantified risk-adaptive access control for patient privacy protection in health information systems.
Qihua Wang, Hongxia Jin
2011ROPdefender: a detection tool to defend against return-oriented programming attacks.
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy
2011Receipt-mode trust negotiation: efficient authorization through outsourced interactions.
Andrew K. Adams, Adam J. Lee, Daniel Mossé
2011Rethinking about guessing attacks.
Zhiwei Li, Weichao Wang
2011Secure mobile subscription of sensor-encrypted data.
Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng
2011Self destructive tamper response for software protection.
Kazuomi Oishi, Tsutomu Matsumoto
2011Self-certified ring signatures.
Nan Li, Yi Mu, Willy Susilo, Fuchun Guo
2011Separation of duties as a service.
David A. Basin, Samuel J. Burri, Günter Karjoth
2011Server-aided signatures verification secure against collusion attack.
Sherman S. M. Chow, Man Ho Au, Willy Susilo
2011Stronger security model of group key agreement.
Jianjie Zhao, Dawu Gu, M. Choudary Gorantla
2011Strongly secure certificateless key exchange without pairing.
Guomin Yang, Chik How Tan
2011Threshold ring signature without random oracles.
Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
2011Towards a binary integrity system for windows.
Yongzheng Wu, Roland H. C. Yap
2011Towards mechanisms for detection and prevention of data exfiltration by insiders: keynote talk paper.
Elisa Bertino, Gabriel Ghinita
2011Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing.
Zhiyong Shan, Xin Wang, Tzi-cker Chiueh
2011WebPatrol: automated collection and replay of web-based malware scenarios.
Kevin Zhijie Chen, Guofei Gu, Jianwei Zhuge, Jose Nazario, Xinhui Han