AsiaCCS A

88 papers

YearTitle / Authors
2017A Behavioral Biometric Authentication Framework on Smartphones.
Ahmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin
2017A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption.
Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh
2017A Secure, Practical & Safe Packet Spoofing Service.
Will Scott
2017A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol.
Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert
2017Accurate Manipulation of Delay-based Internet Geolocation.
AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot
2017Advanced Security Research in the Era of the Internet of Things.
Gregory Akers
2017Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms.
Jiqiang Lu
2017An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols.
Tom Chothia, Mihai Ordean, Joeri de Ruiter, Richard James Thomas
2017An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au, Surya Nepal
2017Android Database Attacks Revisited.
Behnaz Hassanshahi, Roland H. C. Yap
2017Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks.
Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck
2017BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware.
Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
2017BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection.
He Huang, Amr M. Youssef, Mourad Debbabi
2017BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic.
Sébastien Canard, Aïda Diop, Nizar Kheir, Marie Paindavoine, Mohamed Sabt
2017Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks.
Seunghun Cha, Sungsu Kwag, Hyoungshick Kim, Jun Ho Huh
2017Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps.
Taehun Kim, Hyeonmin Ha, Seoyoon Choi, Jaeyeon Jung, Byung-Gon Chun
2017Cache-Based Application Detection in the Cloud Using Machine Learning.
Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar
2017Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications.
Amiangshu Bosu, Fang Liu, Danfeng (Daphne) Yao, Gang Wang
2017Control-Flow Hijacking: Are We Making Progress?
Mathias Payer
2017CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks.
David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun
2017DRIVE: Dynamic Runtime Integrity Verification and Evaluation.
Andre Rein
2017DataShield: Configurable Data Confidentiality and Integrity.
Scott A. Carr, Mathias Payer
2017Detecting Inter-App Information Leakage Paths.
Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur
2017Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.
Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang
2017Detection of Information Leaks via Reflection in Android Apps.
Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti
2017Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing.
Mathy Vanhoef, Domien Schepers, Frank Piessens
2017DoS Attacks on Your Memory in Cloud.
Tianwei Zhang, Yinqian Zhang, Ruby B. Lee
2017Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP.
Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik
2017DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging.
Xingzi Yuan, Omid Setayeshfar, Hongfei Yan, Pranav Panage, Xuetao Wei, Kyu Hyung Lee
2017DroidPill: Pwn Your Daily-Use Apps.
Chaoting Xuan, Gong Chen, Erich Stuntebeck
2017Enabling End-Users to Protect their Privacy.
Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh
2017EncKV: An Encrypted Key-value Store with Rich Queries.
Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia
2017Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics.
Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic
2017Extracting Conditional Formulas for Cross-Platform Bug Search.
Qian Feng, Minghua Wang, Mu Zhang, Rundong Zhou, Andrew Henderson, Heng Yin
2017Functional Encryption with Oblivious Helper.
Pierre-Alain Dupont, David Pointcheval
2017Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna
2017Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction.
Keita Emura, Takuya Hayashi, Ai Ishida
2017Hardware Trojans and Other Threats against Embedded Systems.
Christof Paar
2017Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses.
Gildas Avoine, Xavier Carpent
2017Hit by the Bus: QoS Degradation Attack on Android.
Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2017How Discover a Malware using Model Checking.
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
2017LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda
2017Lightweight Swarm Attestation: A Tale of Two LISA-s.
Xavier Carpent, Karim El Defrawy, Norrathep Rattanavipanon, Gene Tsudik
2017Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System.
Kai Jansen, Matthias Schäfer, Vincent Lenders, Christina Pöpper, Jens B. Schmitt
2017Memory Safety for Embedded Devices with nesCheck.
Daniele Midi, Mathias Payer, Elisa Bertino
2017Mis-operation Resistant Searchable Homomorphic Encryption.
Keita Emura, Takuya Hayashi, Noboru Kunihiro, Jun Sakuma
2017MoPS: A Modular Protection Scheme for Long-Term Storage.
Christian Weinert, Denise Demirel, Martín A. Gagliotti Vigil, Matthias Geihs, Johannes Buchmann
2017Model-based Attack Detection Scheme for Smart Water Distribution Networks.
Chuadhry Mujeeb Ahmed, Carlos Murguia, Justin Ruths
2017On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters.
Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato
2017On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures.
Jacob C. N. Schuldt, Kazumasa Shinagawa
2017Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme.
Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha, Ketan Vyas
2017PayBreak: Defense Against Cryptographic Ransomware.
Eugene Kolodenker, William Koch, Gianluca Stringhini, Manuel Egele
2017Pinpointing Vulnerabilities.
Yue Chen, Mustakimur Khandaker, Zhi Wang
2017Practical Black-Box Attacks against Machine Learning.
Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami
2017PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks.
Quan Chen, Ahmed M. Azab, Guruprasad Ganesh, Peng Ning
2017Privacy-preserving and Optimal Interval Release for Disease Susceptibility.
Kosuke Kusano, Ichiro Takeuchi, Jun Sakuma
2017Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017
Ramesh Karri, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, Xun Yi
2017Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated.
Hung Dang, Erick Purwanto, Ee-Chien Chang
2017Quantitative Security Assessment Method based on Entropy for Moving Target Defense.
Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li
2017SCM: Secure Code Memory Architecture.
Ruan de Clercq, Ronald De Keulenaer, Pieter Maene, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede
2017SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor.
Dennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk
2017SGX-Log: Securing System Logs With SGX.
Vishal Karande, Erick Bauman, Zhiqiang Lin, Latifur Khan
2017SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng
2017Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation.
Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali
2017Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems.
Drew Davidson, Yaohui Chen, Franklin George, Long Lu, Somesh Jha
2017Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation.
Alexandra Dmitrienko, David Noack, Moti Yung
2017Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives.
Thomas Unterluggauer, Mario Werner, Stefan Mangard
2017Security in Personal Genomics: Lest We Forget.
Gene Tsudik
2017Sharing Proofs of Retrievability across Tenants.
Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan Karame
2017Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.
Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani
2017Strict Virtual Call Integrity Checking for C++ Binaries.
Mohamed Elsabagh, Dan Fleck, Angelos Stavrou
2017Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage.
Dima Rabadi, Rui Tan, David K. Y. Yau, Sreejaya Viswanathan
2017The Case for In-Network Replay Suppression.
Taeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu
2017The Case for System Command Encryption.
Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache
2017The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan
2017The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware.
Samaneh Tajalizadehkhoob, Carlos Gañán, Arman Noroozian, Michel van Eeten
2017To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution.
Vincent F. Taylor, Ivan Martinovic
2017Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets.
Hao Chen, Daojing He, Sencun Zhu, Jingshun Yang
2017Towards Extending Noiseless Privacy: Dependent Data and More Practical Approach.
Krzysztof Grining, Marek Klonowski
2017Towards Formal Security Analysis of Industrial Control Systems.
Marco Rocchetto, Nils Ole Tippenhauer
2017Traffic Analysis Attacks in Anonymity Networks.
Katharina Siobhan Kohls, Christina Pöpper
2017TriFlow: Triaging Android Applications using Speculative Information Flows.
Omid Mirzaei, Guillermo Suarez-Tangil, Juan E. Tapiador, José María de Fuentes
2017Understanding Human-Chosen PINs: Characteristics, Distribution and Security.
Ding Wang, Qianchen Gu, Xinyi Huang, Ping Wang
2017Updatable Block-Level Message-Locked Encryption.
Yongjun Zhao, Sherman S. M. Chow
2017Using Program Analysis to Synthesize Sensor Spoofing Attacks.
Ivan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov
2017VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange.
David Pointcheval, Guilin Wang
2017WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha
2017What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Yan Li, Yao Cheng, Yingjiu Li, Robert H. Deng