AsiaCCS A

48 papers

YearTitle / Authors
20127th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012
Heung Youl Youm, Yoojae Won
2012A closer look at keyboard acoustic emanations: random passwords, typing styles and decoding techniques.
Tzipora Halevi, Nitesh Saxena
2012AdDroid: privilege separation for applications and advertisers in Android.
Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David A. Wagner
2012Adaptive semi-private email aliases.
Beng Heng Ng, Alexander Crowell, Atul Prakash
2012Adding query privacy to robust DHTs.
Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft
2012An efficient broadcast attack against NTRU.
Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu
2012An identity authentication protocol in online social networks.
Lingjun Li, Xinxin Zhao, Guoliang Xue
2012An independent validation of vulnerability discovery models.
Viet Hung Nguyen, Fabio Massacci
2012Boosting efficiency and security in proof of ownership for deduplication.
Roberto Di Pietro, Alessandro Sorniotti
2012CARMA: a hardware tamper-resistant isolated execution environment on commodity x86 platforms.
Amit Vasudevan, Jonathan M. McCune, James Newsome, Adrian Perrig, Leendert van Doorn
2012CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud.
Lei Xu, Xiaoxin Wu, Xinwen Zhang
2012Carving secure wi-fi zones with defensive jamming.
Yu Seung Kim, Patrick Tague, Heejo Lee, Hyogon Kim
2012Ciphertext policy attribute-based encryption from lattices.
Jiang Zhang, Zhenfeng Zhang, Aijun Ge
2012CloudER: a framework for automatic software vulnerability location and patching in the cloud.
Ping Chen, Dongyan Xu, Bing Mao
2012ClusterFA: a memory-efficient DFA structure for network intrusion detection.
Lei Jiang, Jianlong Tan, Yanbing Liu
2012Coercion resistance in authentication responsibility shifting.
Payas Gupta, Xuhua Ding, Debin Gao
2012Constraint-enhanced role engineering via answer set programming.
Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang
2012Discovering records of private VoIP calls without wiretapping.
Chang-Han Jong, Virgil D. Gligor
2012Expressive CP-ABE with partially hidden access structures.
Junzuo Lai, Robert H. Deng, Yingjiu Li
2012FlashOver: automated discovery of cross-site scripting vulnerabilities in rich internet applications.
Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Wouter Joosen, Frank Piessens
2012Forgery-resilience for digital signature schemes.
Atefeh Mashatan, Khaled Ouafi
2012Integrity walls: finding attack surfaces from mandatory access control policies.
Hayawardh Vijayakumar, Guruprasad Jakka, Sandra Julieta Rueda, Joshua Schiffman, Trent Jaeger
2012Keeping identity secret in online social networks.
Xinxin Zhao, Lingjun Li, Guoliang Xue
2012Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Yevgeniy Dodis, Weiliang Luo, Shouhuai Xu, Moti Yung
2012KoNKS: konsensus-style network koordinate system.
Eric Chan-Tin, Nicholas Hopper
2012Letting applications operate through attacks launched from compromised drivers.
Shengzhi Zhang, Peng Liu
2012Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions.
Cristiano Giuffrida, Stefano Ortolani, Bruno Crispo
2012Monetizing spambot activity and understanding its relation with spambot traffic features.
Syed Fida Gillani, Ehab Al-Shaer, Sardar Ali, Syed Ali Khayam
2012New time-memory-data trade-off attack on the estream finalists and modes of operation of block ciphers.
Khoongming Khoo, Chik How Tan
2012On sampling, anonymization, and differential privacy or,
Ninghui Li, Wahbeh H. Qardaji, Dong Su
2012On the mixing time of directed social graphs and security implications.
Abedelaziz Mohaisen, Huy Tran, Nicholas Hopper, Yongdae Kim
2012Outsourced private set intersection using homomorphic encryption.
Florian Kerschbaum
2012PassMap: a map based graphical-password authentication system.
Hung-Min Sun, Yao-Hsin Chen, Chiung-Cheng Fang, Shih-Ying Chang
2012Practical client puzzles in the standard model.
Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto
2012Privacy-preserving alibi systems.
Benjamin Davis, Hao Chen, Matthew K. Franklin
2012Private and oblivious set and multiset operations.
Marina Blanton, Everaldo Aguiar
2012Protection, usability and improvements in reflected XSS filters.
Riccardo Pelizzi, R. Sekar
2012Recursive partitioning and summarization: a practical framework for differentially private data publishing.
Wahbeh H. Qardaji, Ninghui Li
2012Secure cloud maintenance: protecting workloads against insider attacks.
Sören Bleikertz, Anil Kurmus, Zoltán A. Nagy, Matthias Schunter
2012Security implications in Kerberos by the introduction of smart cards.
Nikos Mavrogiannopoulos, Andreas Pashalidis, Bart Preneel
2012Software decoys for insider threat.
Young Hee Park, Salvatore J. Stolfo
2012The specification and compilation of obligation policies for program monitoring.
Cheng Xu, Philip W. L. Fong
2012Towards efficient proofs of retrievability.
Jia Xu, Ee-Chien Chang
2012Towards the attacker's view of protocol narrations (or, how to compile security protocols).
Zhiwei Li, Weichao Wang
2012User-level secure deletion on log-structured file systems.
Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin
2012Verifiable private equality test: enabling unbiased 2-party reconciliation on ordered sets in the malicious model.
Daniel A. Mayer, Susanne Wetzel
2012Verifier-local revocation group signatures with time-bound keys.
Cheng-Kang Chu, Joseph K. Liu, Xinyi Huang, Jianying Zhou
2012Virtual browser: a virtualized browser to sandbox third-party JavaScripts with enhanced security.
Yinzhi Cao, Zhichun Li, Vaibhav Rastogi, Yan Chen, Xitao Wen