AsiaCCS A

76 papers

YearTitle / Authors
20182MA: Verifying Voice Commands via Two Microphone Authentication.
Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor
2018A Data-driven Attack against Support Vectors of SVM.
Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou, Yang Xiang, Olivier Y. de Vel
2018A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity.
Philipp Zieris, Julian Horsch
2018A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation.
Liang Zhao, Liqun Chen
2018Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.
Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu
2018Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets.
Jienan Liu, Babak Rahbarinia, Roberto Perdisci, Haitao Du, Li Su
2018Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard
2018BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering.
Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, Kevin W. Hamlen
2018CUP: Comprehensive User-Space Protection for C/C++.
Nathan Burow, Derrick Paul McKee, Scott A. Carr, Mathias Payer
2018Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security.
Anders P. K. Dalskov, Claudio Orlandi
2018Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications.
M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar
2018Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives.
Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert
2018Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs.
Maciej Korczynski, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane C. M. Moura, Arman Noroozian, Drew Bagley, Cristian Hesselman
2018Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities.
Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Jeff Offutt
2018DeWiCam: Detecting Hidden Wireless Cameras via Smartphones.
Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu
2018Detecting Malicious PowerShell Commands using Deep Neural Networks.
Danny Hendler, Shay Kels, Amir Rubin
2018Detection under Privileged Information.
Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami
2018Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System.
Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati
2018Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps.
Elkana Pariwono, Daiki Chiba, Mitsuaki Akiyama, Tatsuya Mori
2018Droid M+: Developer Support for Imbibing Android's New Permission Model.
Ioannis Gasparis, Azeem Aqil, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta, Edward Colbert
2018Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning.
Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, Junfeng Yang
2018Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Nuttapong Attrapadung, Goichiro Hanaoka, Shigeo Mitsunari, Yusuke Sakai, Kana Shimizu, Tadanori Teruya
2018Electromagnetic Induction Attacks Against Embedded Systems.
Jayaprakash Selvaraj, Gökçen Yilmaz Dayanikli, Neelam Prabhu Gaunkar, David Ware, Ryan M. Gerdes, Mani Mina
2018Entwining Sanitization and Personalization on Databases.
Sébastien Gambs, Julien Lolive, Jean-Marc Robert
2018FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting.
Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu
2018Hardware Performance Counters Can Detect Malware: Myth or Fact?
Boyou Zhou, Anmol Gupta, Rasoul Jahanshahi, Manuel Egele, Ajay Joshi
2018Highly-Efficient Fully-Anonymous Dynamic Group Signatures.
David Derler, Daniel Slamanig
2018HlcAuth: Key-free and Secure Communications via Home-Limited Channel.
Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu
2018Investigating Web Defacement Campaigns at Large.
Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini
2018Isogrammic-Fusion ORAM: Improved Statistically Secure Privacy-Preserving Cloud Data Access for Thin Clients.
Michael T. Goodrich
2018Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies.
Oleksandr Tkachenko, Christian Weinert, Thomas Schneider, Kay Hamacher
2018Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires.
Ilias Giechaskiel, Kasper Bonne Rasmussen, Ken Eguro
2018Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses.
Sanchuan Chen, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, Xiaofeng Wang
2018No One In The Middle: Enabling Network Access Control Via Transparent Attribution.
Jeremy Erickson, Qi Alfred Chen, Xiaochen Yu, Erinjen Lin, Robert Levy, Zhuoqing Morley Mao
2018Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption.
Wenjie Lu, Jun-Jie Zhou, Jun Sakuma
2018On the Memory-Hardness of Data-Independent Password-Hashing Functions.
Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár
2018On the Strategy and Behavior of Bitcoin Mining with N-attackers.
Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia
2018POSTER: A Framework for Phylogenetic Analysis in Mobile Environment.
Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
2018POSTER: Address Authentication Based on Location History.
Hosung Park, Daeyong Kwon, Seungsoo Nam, Daeseon Choi
2018POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS.
Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay
2018POSTER: CPS Security Testbed Development Using Controller-in-the-Middle.
Seungoh Choi, Woomyo Lee, Hyeok-Ki Shin, Jeong-Han Yun, Sin-Kyu Kim
2018POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption.
Taeyun Kim, Hyoungshick Kim
2018POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs.
William Aiken, Hyoungshick Kim
2018POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization.
Muhammad Saad, My T. Thai, Aziz Mohaisen
2018POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization.
Yuchen Zhao, Isabel Wagner
2018POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Jusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo, Hyoungshick Kim
2018POSTER: Mining with Proof-of-Probability in Blockchain.
Sungmin Kim, Joongheon Kim
2018POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices.
HyukSang Kwon, Shahid Raza, JeongGil Ko
2018POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions.
Afsah Anwar, Aminollah Khormali, Aziz Mohaisen
2018POSTER: Undetectable Task Bypassing OS Scheduler via Hardware Task Switching.
Kyeong Joo Jung, Bang Hun Lee, Yeon Nam Gung, Jun Seok Kim, Hyung Suk Kim, Ju Seong Han, Tomaspeter Kim, Bong Jun Choi
2018POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense.
Hyun Kwon, Hyunsoo Yoon, Daeseon Choi
2018Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System.
Anand Agrawal, Chuadhry Mujeeb Ahmed, Ee-Chien Chang
2018ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android.
Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, Stefan Mangard
2018Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018
Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim
2018Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian M. Molloy
2018Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability.
Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri
2018SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks.
Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser
2018SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction.
Zihao Shan, Zhan Qin, Leslie Ying, Kui Ren
2018Secure Similar Sequence Query on Outsourced Genomic Data.
Ke Cheng, Yantian Hou, Liangmin Wang
2018Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack.
Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara, Kazuo Sakiyama
2018Single Trace Attack Against RSA Key Generation in Intel SGX SSL.
Samuel Weiser, Raphael Spreitzer, Lukas Bodner
2018Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control.
Shang Gao, Zecheng Li, Yuan Yao, Bin Xiao, Songtao Guo, Yuanyuan Yang
2018Source Attribution of Cryptographic API Misuse in Android Applications.
Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov
2018TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems.
Qin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur
2018Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security.
Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik
2018The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches.
Ian Oakley, Jun Ho Huh, Junsung Cho, Geumhwan Cho, Md. Rasel Islam, Hyoungshick Kim
2018To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances.
Louis Waked, Mohammad Mannan, Amr M. Youssef
2018Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks.
Shameek Bhattacharjee, Aditya Thakur, Sajal K. Das
2018Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam.
Payas Gupta, Roberto Perdisci, Mustaque Ahamad
2018Towards Sustainable Evolution for the TLS Public-Key Infrastructure.
Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig
2018Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.
Daniel Gruss, Michael Schwarz, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More, Moritz Lipp
2018Where's Wally?: How to Privately Discover your Friends on the Internet.
Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos
2018Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning.
Hwanjo Heo, Seungwon Shin
2018You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces.
Xiangwen Wang, Peng Peng, Chun Wang, Gang Wang
2018iOracle: Automated Evaluation of Access Control Policies in iOS.
Luke Deshotels, Razvan Deaconescu, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi
2018le-git-imate: Towards Verifiable Web-based Git Repositories.
Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos