AsiaCCS A

72 papers

YearTitle / Authors
2019A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li
2019A Data Life Cycle Modeling Proposal by Means of Formal Methods.
Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
2019A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists.
Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna
2019A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing.
Xiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang, Seyit Camtepe, Jingling Xue
2019A Hybrid Approach to Secure Function Evaluation using SGX.
Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor
2019A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity.
Xun Yi, Kwok-Yan Lam
2019A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States.
Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo
2019Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants.
Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi
2019An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine Learning.
Sunnyeo Park, Dohyeok Kim, Sooel Son
2019AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families.
Omid Mirzaei, Guillermo Suarez-Tangil, José María de Fuentes, Juan Tapiador, Gianluca Stringhini
2019Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control.
Iskander Sánchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, Igor Santos
2019Characterizing Adversarial Subspaces by Mutual Information.
Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu
2019Control-Flow Carrying Code.
Yan Lin, Xiaoyang Cheng, Debin Gao
2019Cracking the Graph Routes in WirelessHART Networks.
Xia Cheng, Junyang Shi, Mo Sha
2019DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries.
Rukayat Ayomide Erinfolami, Aravind Prakash
2019Delegatable Order-Revealing Encryption.
Yuan Li, HongBing Wang, Yunlei Zhao
2019Design Procedure of Knowledge Base for Practical Attack Graph Generation.
Masaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai
2019E-Spion: A System-Level Intrusion Detection System for IoT Devices.
Anand Mudgerikar, Puneet Sharma, Elisa Bertino
2019EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs.
Thomas Schneider, Oleksandr Tkachenko
2019Establishing and Maintaining Root of Trust on Commodity Computer Systems.
Virgil D. Gligor
2019Examining DES-based Cipher Suite Support within the TLS Ecosystem.
Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler
2019Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates.
Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin
2019Exploiting Sound Masking for Audio Privacy in Smartphones.
Yu-Chih Tung, Kang G. Shin
2019Fidelity: A Property of Deep Neural Networks to Measure the Trustworthiness of Prediction Results.
Ziqi Yang
2019Flexibly and Securely Shape Your Data Disclosed to Others.
Qing-Qing Xie, Yantian Hou, Ke Cheng, Gaby G. Dagher, Liangmin Wang, Shucheng Yu
2019From Attacker Models to Reliable Security.
Heiko Mantel
2019GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu
2019HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici
2019High Efficiency, Low-noise Meltdown Attack by using a Return Stack Buffer.
Taehyun Kim, Youngjoo Shin
2019How to Securely Record Logs based on ARM TrustZone.
Seungho Lee, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee
2019Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing.
Jongkil Kim, Seyit Camtepe, Willy Susilo, Surya Nepal, Joonsang Baek
2019IoT Application-Centric Access Control (ACAC).
Mohammed Al-Shaboti, Ian Welch, Aaron Chen
2019K2SN-MSS: An Efficient Post-Quantum Signature.
Sabyasachi Karati, Reihaneh Safavi-Naini
2019MPC Joins The Dark Side.
John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui
2019MagAttack: Guessing Application Launching and Operation via Smartphone.
Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu
2019Misbinding Attacks on Secure Device Pairing and Bootstrapping.
Mohit Sethi, Aleksi Peltonen, Tuomas Aura
2019MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile Applications.
Shangcheng Shi, Xianbo Wang, Wing Cheong Lau
2019Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites.
Tom van Goethem, Victor Le Pochat, Wouter Joosen
2019Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation.
Lei Xu, Xingliang Yuan, Ron Steinfeld, Cong Wang, Chungen Xu
2019ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof.
Pengfei Wu, Qingni Shen, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu
2019On The Unforkability of Monero.
Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu
2019On the Difficulty of Hiding the Balance of Lightning Network Channels.
Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquín García-Alfaro
2019PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao
2019Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks.
Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim
2019Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain.
Yunlei Zhao
2019Practical Side-Channel Attacks against WPA-TKIP.
Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef
2019Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019
Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang
2019Process-Aware Cyberattacks for Thermal Desalination Plants.
Prashant Hari Narayan Rajput, Pankaj Rajput, Marios Sazos, Michail Maniatakos
2019Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2.
Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
2019Purchased Fame: Exploring the Ecosystem of Private Blog Networks.
Tom van Goethem, Najmeh Miramirkhani, Wouter Joosen, Nick Nikiforakis
2019R2Q: A Risk Quantification Framework to Authorize Requests in Web-based Collaborations.
Nirnay Ghosh, Rishabh Singhal, Sajal K. Das
2019RIP-RH: Preventing Rowhammer-based Inter-Process Attacks.
Carsten Bock, Ferdinand Brasser, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
2019Revisiting Assumptions for Website Fingerprinting Attacks.
Weiqi Cui, Tao Chen, Christian Fields, Julianna Chen, Anthony Sierra, Eric Chan-Tin
2019Robust Watermarking of Neural Network with Exponential Weighting.
Ryota Namba, Jun Sakuma
2019Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang
2019ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices.
Marius Musch, Marius Steffens, Sebastian Roth, Ben Stock, Martin Johns
2019Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks.
Surya Nepal
2019Smart Contract-based Miner Registration and Block Validation.
Shijie Zhang, Jong-Hyouk Lee
2019SoK: On DFA Vulnerabilities of Substitution-Permutation Networks.
Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin
2019SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed).
Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, Lorenzo Cavallaro
2019The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves.
Jan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose
2019Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry.
Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik
2019Towards Identifying Early Indicators of a Malware Infection.
Sareena Karapoola, Chester Rebeiro, Unnati Parekh, Kamakoti Veezhinathan
2019Towards Understanding Android System Vulnerabilities: Techniques and Insights.
Daoyuan Wu, Debin Gao, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, Robert H. Deng
2019TweetScore: Scoring Tweets via Social Attribute Relationships for Twitter Spammer Detection.
Yihe Zhang, Hao Zhang, Xu Yuan, Nian-Feng Tzeng
2019Undermining User Privacy on Mobile Devices Using AI.
Berk Gülmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, Berk Sunar
2019Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services.
Yuri Son, Geumhwan Cho, Hyoungshick Kim, Simon S. Woo
2019Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery.
Laura Genga, Luca Allodi, Nicola Zannone
2019Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management.
Jongwon Choi, HyungKwan Kim, Seungoh Choi, Jeong-Han Yun, Byung-gil Min, HyoungChun Kim
2019Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.
Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini
2019What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites.
Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang
2019eHIFS: An Efficient History Independent File System.
Biao Gao, Bo Chen, Shijie Jia, Luning Xia