AsiaCCS A

52 papers

YearTitle / Authors
20149th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014
Shiho Moriai, Trent Jaeger, Kouichi Sakurai
2014A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen
2014APKLancet: tumor payload diagnosis and purification for android applications.
Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu
2014Abstract model counting: a novel approach for quantification of information leaks.
Quoc-Sang Phan, Pasquale Malacaria
2014After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud.
Su Zhang, Xinwen Zhang, Xinming Ou
2014ConXsense: automated context classification for context-aware access control.
Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan
2014Covert ephemeral communication in named data networking.
Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik
2014Cyber defenses for physical attacks and insider threats in cloud computing.
Jakub Szefer, Pramod A. Jamkhedkar, Diego Perez-Botero, Ruby B. Lee
2014Design and evaluation of persea, a sybil-resistant DHT.
Mahdi Nasrullah Al-Ameen, Matthew K. Wright
2014Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery.
Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan
2014Differential privacy with δ-neighbourhood for spatial and dynamic datasets.
Chengfang Fang, Ee-Chien Chang
2014DroidRay: a security evaluation system for customized android firmwares.
Min Zheng, Mingshen Sun, John C. S. Lui
2014Efficient, context-aware privacy leakage confinement for android applications without firmware modding.
Mu Zhang, Heng Yin
2014Evading android runtime analysis via sandbox detection.
Timothy Vidas, Nicolas Christin
2014Fighting malicious code: an eternal struggle.
Christopher Kruegel
2014Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng
2014How many down?: toward understanding systematic risk in networks.
Benjamin Johnson, Aron Laszka, Jens Grossklags
2014Improved anonymous proxy re-encryption with CCA security.
Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang
2014IntentFuzzer: detecting capability leaks of android applications.
Kun Yang, Jianwei Zhuge, Yongke Wang, Lujue Zhou, Hai-Xin Duan
2014Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature.
Fabian Lanze, Andriy Panchenko, Benjamin Braatz, Thomas Engel
2014Malware detection with quantitative data flow graphs.
Tobias Wüchner, Martín Ochoa, Alexander Pretschner
2014Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li
2014Modelling after-the-fact leakage for key exchange.
Janaka Alawatugoda, Douglas Stebila, Colin Boyd
2014Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets.
Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen
2014Multi-recipient encryption, revisited.
Alexandre Pinto, Bertram Poettering, Jacob C. N. Schuldt
2014OTIT: towards secure provenance modeling for location proofs.
Rasib Khan, Shams Zawoad, Munirul M. Haque, Ragib Hasan
2014On the effectiveness of risk prediction based on users browsing behavior.
Davide Canali, Leyla Bilge, Davide Balzarotti
2014On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment.
Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann
2014Outsourceable two-party privacy-preserving biometric authentication.
Hu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, Wei Jiang
2014PIDGIN: privacy-preserving interest and content sharing in opportunistic networks.
Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello
2014Practical secret key agreement for full-duplex near field communications.
Rong Jin, Xianru Du, Zi Deng, Kai Zeng, Jing Xu
2014Practical user authentication leveraging channel state information (CSI).
Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen
2014Privacy of outsourced k-means clustering.
Dongxi Liu, Elisa Bertino, Xun Yi
2014Privacy-preserving distance computation and proximity testing on earth, done right.
Jaroslav Sedenka, Paolo Gasti
2014Prospect: peripheral proxying supported embedded code testing.
Markus Kammerstetter, Christian Platzer, Wolfgang Kastner
2014Protecting users against XSS-based password manager abuse.
Ben Stock, Martin Johns
2014Prover anonymous and deniable distance-bounding authentication.
Sébastien Gambs, Cristina Onete, Jean-Marc Robert
2014Re
Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar
2014Remotely wiping sensitive data on stolen smartphones.
Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, Jiwu Jing
2014S-ORAM: a segmentation-based oblivious RAM.
Jinsheng Zhang, Wensheng Zhang, Daji Qiao
2014Scanner hunter: understanding HTTP scanning traffic.
Guowu Xie, Huy Hang, Michalis Faloutsos
2014Scanning of real-world web applications for parameter tampering vulnerabilities.
Adonis P. H. Fung, Tielei Wang, K. W. Cheung, Tsz-Yeung Wong
2014Shades of gray: a closer look at emails in the gray area.
Jelena Isacenkova, Davide Balzarotti
2014Sufficient conditions for vertical composition of security protocols.
Sebastian Mödersheim, Luca Viganò
2014The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape.
Gianluca Stringhini, Oliver Hohlfeld, Christopher Kruegel, Giovanni Vigna
2014Towards automated protocol reverse engineering using semantic information.
Georges Bossert, Frédéric Guihéry, Guillaume Hiet
2014Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi
2014Understanding OSN-based facial disclosure against face authentication systems.
Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng
2014VirtualSwindle: an automated attack against in-app billing on android.
Collin Mulliner, William K. Robertson, Engin Kirda
2014Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations.
Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith
2014YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.
Tiffany Hyun-Jin Kim, H. Colleen Stuart, Hsu-Chun Hsiao, Yue-Hsun Lin, Leon Zhang, Laura Dabbish, Sara B. Kiesler
2014pTwitterRec: a privacy-preserving personalized tweet recommendation framework.
Bisheng Liu, Urs Hengartner