AsiaCCS A

85 papers

YearTitle / Authors
2016(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus.
Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue
2016Anonymous Identification for Ad Hoc Group.
Xingye Lu, Man Ho Au
2016Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Kai He, Jian Weng, Jia-Nan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng
2016Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security.
Peng Xu, Jingnan Li, Wei Wang, Hai Jin
2016Anonymous Role-Based Access Control on E-Health Records.
Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu
2016Attacks and Defence on Android Free Floating Windows.
Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, Dengguo Feng
2016Attestation Transparency: Building secure Internet services for legacy clients.
Jethro G. Beekman, John L. Manferdelli, David A. Wagner
2016Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces.
Andrei Costin, Apostolis Zarras, Aurélien Francillon
2016Bilateral-secure Signature by Key Evolving.
Tao Xiang, Xiaoguo Li, Fei Chen, Yi Mu
2016Binary Analysis for Autonomous Hacking: Invited Abstract.
Giovanni Vigna
2016Building an Encrypted, Distributed, and Searchable Key-value Store.
Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin
2016CDRep: Automatic Repair of Cryptographic Misuses in Android Applications.
Siqi Ma, David Lo, Teng Li, Robert H. Deng
2016CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks.
Yu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, Vyas Sekar
2016Checking Intent-based Communication in Android with Intent Space Analysis.
Yiming Jing, Gail-Joon Ahn, Adam Doupé, Jeong Hyun Yi
2016Client-CASH: Protecting Master Passwords against Offline Attacks.
Jeremiah Blocki, Anirudh Sridhar
2016Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou
2016Cross Processor Cache Attacks.
Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar
2016Data Exfiltration in the Face of CSP.
Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld
2016Dealerless Corporate Key Generation for Identity-Based Encryption Schemes.
Zhen Liu, Duncan S. Wong, Jack Poon
2016Device-Enhanced Password Protocols with Optimal Online-Offline Protection.
Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena
2016Discovering Malicious Domains through Passive DNS Data Graph Analysis.
Issa Khalil, Ting Yu, Bei Guan
2016Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant.
Sridhar Adepu, Aditya Mathur
2016DroidDisintegrator: Intra-Application Information Flow Control in Android Apps.
Eran Tromer, Roei Schuster
2016Efficient Authenticated Multi-Pattern Matching.
Zhe Zhou, Tao Zhang, Sherman S. M. Chow, Yupeng Zhang, Kehuan Zhang
2016Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Shifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen
2016Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data.
Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu
2016Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract.
Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin
2016Efficient Secure Outsourcing of Large-scale Quadratic Programs.
Sergio Salinas, Changqing Luo, Weixian Liao, Pan Li
2016Efficient Techniques for Publicly Verifiable Delegation of Computation.
Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva
2016Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data.
Ngoc Hieu Tran, HweeHwa Pang, Robert H. Deng
2016Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control.
Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng, Kui Ren
2016Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher.
Changhai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, Victor E. DeBrunner
2016FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization.
Gabriele Costa, Paolo Gasti, Alessio Merlo, Shunt-Hsi Yu
2016FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin
2016Fault Attacks on Efficient Pairing Implementations.
Pierre-Alain Fouque, Chen Qian
2016Forgery-Resistant Touch-based Authentication on Mobile Devices.
Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank
2016Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN.
Chen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, Bo Liu
2016Gait-Based Wi-Fi Signatures for Privacy-Preserving.
Yan Li, Ting Zhu
2016Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Peng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, Deqing Zou
2016Generic Construction of Publicly Verifiable Predicate Encryption.
Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Junbin Fang, Jin Li, Yabin Jin, Jiajun Huang
2016Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern Web.
Yogesh Mundada, Nick Feamster, Balachander Krishnamurthy
2016Hardening OpenStack Cloud Platforms against Compute Node Compromises.
Wai-Kit Sze, Abhinav Srivastava, R. Sekar
2016Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes.
Shuai Han, Shengli Liu, Fangguo Zhang, Kefei Chen
2016Identifying and Utilizing Dependencies Across Cloud Security Services.
Ahmed Taha, Patrick Metzler, Rubén Trapero, Jesus Luna, Neeraj Suri
2016Inside Attack Filtering for Robust Sensor Localization.
Jongho Won, Elisa Bertino
2016Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement.
Hyungjoon Koo, Michalis Polychronakis
2016Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis.
Zeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, Yuan Zhao
2016MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing.
Phani Vadrevu, Roberto Perdisci
2016MobiPot: Understanding Mobile Telephony Threats with Honeycards.
Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, Mustaque Ahamad
2016Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations.
Ronghai Yang, Guanchen Li, Wing Cheong Lau, Kehuan Zhang, Pili Hu
2016Mystique: Evolving Android Malware for Auditing Anti-Malware Tools.
Guozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu, Jie Zhang, Tieming Chen
2016NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer.
Shijie Jia, Luning Xia, Bo Chen, Peng Liu
2016No-Execute-After-Read: Preventing Code Disclosure in Commodity Software.
Jan Werner, George Baltas, Rob Dallara, Nathan Otterness, Kevin Z. Snow, Fabian Monrose, Michalis Polychronakis
2016Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Jing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu
2016ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis.
Qian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony, Heng Yin
2016Password-Controlled Encryption with Accountable Break-Glass Access.
Tao Zhang, Sherman S. M. Chow, Jinyuan Sun
2016Practical "Signatures with Efficient Protocols" from Simple Assumptions.
Benoît Libert, Fabrice Mouhartem, Thomas Peters, Moti Yung
2016Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao
2016Preventing Page Faults from Telling Your Secrets.
Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena
2016Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure.
Chong Guan, Kun Sun, Zhan Wang, Wen Tao Zhu
2016Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS).
Qinghan Xue, Mooi Choo Chuah, Yingying Chen
2016Privacy and Utility of Inference Control Mechanisms for Social Computing Applications.
Seyed Hossein Ahmadinejad, Philip W. L. Fong, Reihaneh Safavi-Naini
2016Privacy-Preserving Spectral Analysis of Large Graphs in Public Clouds.
Sagar Sharma, James Powers, Keke Chen
2016Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016
Xiaofeng Chen, Xiaofeng Wang, Xinyi Huang
2016Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding.
Binanda Sengupta, Sushmita Ruj
2016R-Droid: Leveraging Android App Analysis with Static Slice Optimization.
Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer
2016ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks.
Mariano Graziano, Davide Balzarotti, Alain Zidouemba
2016RamCrypt: Kernel-based Address Space Encryption for User-mode Processes.
Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes
2016Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining.
Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci
2016Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow
2016SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.
Qian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, Kui Ren
2016Secure Dynamic SSE via Access Indistinguishable Storage.
Tianhao Wang, Yunlei Zhao
2016SkypeLine: Robust Hidden Data Transmission for VoIP.
Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper
2016Smart Locks: Lessons for Securing Commodity Internet of Things Devices.
Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, David A. Wagner
2016Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms.
Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo He
2016Statistical Detection of Online Drifting Twitter Spam: Invited Paper.
Shigang Liu, Jun Zhang, Yang Xiang
2016StemJail: Dynamic Role Compartmentalization.
Mickaël Salaün, Marion Daubignard, Hervé Debar
2016StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware.
Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu
2016The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes.
Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang
2016UC-secure Two-Server Password-Based Authentication Protocol and Its Applications.
Lin Zhang, Zhenfeng Zhang, Xuexian Hu
2016Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition.
Ian D. Markwood, Yao Liu
2016Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu
2016Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.
Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens
2016Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected.
Issa Khalil, Zuochao Dou, Abdallah Khreishah
2016revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Zheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen