AsiaCCS A

73 papers

YearTitle / Authors
2015A Near Real-Time Algorithm for Autonomous Identification and Characterization of Honeypot Attacks.
Philippe Owezarski
2015A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System.
Kenneth G. Paterson, Mario Strefler
2015A Secure Communication Protocol for Drones and Smart Objects.
Jongho Won, Seung-Hyun Seo, Elisa Bertino
2015A Single Query Forgery Attack on Raviyoyla v1.
Yuan Yao, Bin Zhang, Wenling Wu
2015Access Control in Publicly Verifiable Outsourced Computation.
James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2015Albatross: A Privacy-Preserving Location Sharing System.
Gökay Saldamli, Richard Chow, Hongxia Jin
2015An Empirical Analysis of ZeuS C&C Lifetime.
Carlos Gañán, Orçun Çetin, Michel van Eeten
2015Android Implicit Information Flow Demystified.
Wei You, Bin Liang, Jingzhe Li, Wenchang Shi, Xiangyu Zhang
2015Anonymizing Social Graphs via Uncertainty Semantics.
Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch
2015Anonymous Yoking-Group Proofs.
Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan
2015AppPolicyModules: Mandatory Access Control for Third-Party Apps.
Enrico Bacis, Simone Mutti, Stefano Paraboschi
2015Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi
2015Attribute-Based Access Control Models and Beyond.
Ravi S. Sandhu
2015Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism.
Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque
2015Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes.
Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise
2015Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps.
Chaoshun Zuo, Jianliang Wu, Shanqing Guo
2015Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification.
Guanhua Yan
2015Bittersweet ADB: Attacks and Defenses.
Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu
2015Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures.
Gang Xu, George T. Amariucai, Yong Guan
2015CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality.
Chung Hwan Kim, Sungjin Park, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu
2015Detecting Fingerprinted Data in TLS Traffic.
Konstantin Böttinger, Dieter Schuster, Claudia Eckert
2015Differentially Private Publishing of High-dimensional Data Using Sensitivity Control.
Wei-Yen Day, Ninghui Li
2015Disavowable Public Key Encryption with Non-interactive Opening.
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
2015Discover and Tame Long-running Idling Processes in Enterprise Systems.
Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Peng Liu, Guofei Jiang
2015Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability.
Hao Sun, Xiangyu Zhang, Chao Su, Qingkai Zeng
2015Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Huang, Johann Großschädl
2015Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Yueqiang Cheng, Xuhua Ding, Robert H. Deng
2015Emerging Security Threats and Countermeasures in IoT.
Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh
2015Enabling Encrypted Cloud Media Center with Secure Deduplication.
Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui
2015Enabling IP Protection for Outsourced Integrated Circuit Design.
Xingliang Yuan, Cong Wang, Kui Ren
2015Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.
Min Zheng, Hui Xue, Yulong Zhang, Tao Wei, John C. S. Lui
2015Fixing Races For Good: Portable and Reliable UNIX File-System Race Detection.
Xiang Cai, Rucha Lale, Xin Cheng Zhang, Rob Johnson
2015Formal Analysis of Enhanced Authorization in the TPM 2.0.
Jianxiong Shao, Yu Qin, Dengguo Feng, Weijin Wang
2015Group-oriented Proofs of Storage.
Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou
2015GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems.
Huseyin Ulusoy, Pietro Colombo, Elena Ferrari, Murat Kantarcioglu, Erman Pattuk
2015Hybrid User-level Sandboxing of Third-party Android Apps.
Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian Jiang
2015I Know Where You are: Proofs of Presence Resilient to Malicious Provers.
Markus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula
2015Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext.
Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo
2015JSDC: A Hybrid Approach for JavaScript Malware Detection and Classification.
Junjie Wang, Yinxing Xue, Yang Liu, Tian Huat Tan
2015LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran
2015Lucky 13 Strikes Back.
Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2015Measuring Botnets in the Wild: Some New Trends.
Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen
2015Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice.
Yantian Hou, Ming Li, Ruchir Chauhan, Ryan M. Gerdes, Kai Zeng
2015Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm.
Jiazhe Chen, Mingjie Liu, Hexin Li, Hongsong Shi
2015NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU.
David Nuñez, Isaac Agudo, Javier López
2015Now You See Me: Hide and Seek in Physical Address Space.
Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia
2015On Designing an Efficient Distributed Black-Box Fuzzing System for Mobile Devices.
Lee Wang Hao, Murali Srirangam Ramanujam, S. P. T. Krishnan
2015On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data.
Chris Y. T. Ma, David K. Y. Yau
2015Practical Private One-way Anonymous Message Routing.
Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Yung Shin Van Der Sype, Yutaka Miyake
2015Privacy-Preserving Association Rule Mining in Cloud Computing.
Xun Yi, Fang-Yu Rao, Elisa Bertino, Athman Bouguettaya
2015Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015
Feng Bao, Steven Miller, Jianying Zhou, Gail-Joon Ahn
2015Related Randomness Attacks for Public Key Cryptosystems.
Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu
2015Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible.
Haibo Tian, Fangguo Zhang, Kui Ren
2015Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices.
Paul-Edmond Berthier, Stéphane Cauchie, Zonghua Zhang
2015Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?
Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen
2015Social Networks Meet Distributed Systems: Towards a Robust Sybil Defense under Churn.
Nitin Chiluka, Nazareno Andrade, Johan A. Pouwelse, Henk J. Sips
2015Software Watermarking using Return-Oriented Programming.
Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Chunfu Jia, Debin Gao
2015Systematic Low Leakage Coding for Physical Unclonable Functions.
Matthias Hiller, Meng-Day (Mandel) Yu, Michael Pehl
2015TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS.
Olivier Levillain, Baptiste Gourdin, Hervé Debar
2015The Limits of Composable Crypto with Transferable Setup Devices.
Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay
2015The Performance Cost of Shadow Stacks and Stack Canaries.
Thurston H. Y. Dang, Petros Maniatis, David A. Wagner
2015The Power of Whispering: Near Field Assertions via Acoustic Communications.
Lingjun Li, Guoliang Xue, Xinxin Zhao
2015The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems.
Marina Krotofil, Jason Larsen, Dieter Gollmann
2015Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication.
Daniel Arp, Fabian Yamaguchi, Konrad Rieck
2015TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript.
Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao
2015Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu
2015Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove.
Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski
2015TrustLogin: Securing Password-Login on Commodity Operating Systems.
Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou
2015Vehicular Platooning in an Adversarial Environment.
Soodeh Dadras, Ryan M. Gerdes, Rajnikant Sharma
2015Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation.
Rong Cheng, Jingbo Yan, Chaowen Guan, Fangguo Zhang, Kui Ren
2015XiOS: Extended Application Sandboxing on iOS.
Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi
2015iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel.
Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha
2015k-Anonymization by Freeform Generalization.
Katerina Doka, Mingqiang Xue, Dimitrios Tsoumakos, Panagiotis Karras