AsiaCCS A

88 papers

YearTitle / Authors
2020A Comb for Decompiled C Code.
Andrea Gussoni, Alessandro Di Federico, Pietro Fezzardi, Giovanni Agosta
2020AI and Security: Lessons, Challenges and Future Directions.
Dawn Song
2020AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings.
Danny Hendler, Shay Kels, Amir Rubin
2020ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020
Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese
2020Adversarial Attack against Deep Reinforcement Learning with Static Reward Impact Map.
Patrick P. K. Chan, Yaxuan Wang, Daniel S. Yeung
2020Adversarial Attacks on Link Prediction Algorithms Based on Graph Neural Networks.
Wanyu Lin, Shengxiang Ji, Baochun Li
2020Assessing the Impact of Script Gadgets on CSP at Scale.
Sebastian Roth, Michael Backes, Ben Stock
2020Assessing the Privacy Benefits of Domain Name Encryption.
Nguyen Phong Hoang, Arian Akhavan Niaki, Nikita Borisov, Phillipa Gill, Michalis Polychronakis
2020AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments.
Sihan Yu, Xiaonan Zhang, Pei Huang, Linke Guo, Long Cheng, Kuang-Ching Wang
2020BOREALIS: Building Block for Sealed Bid Auctions on Blockchains.
Erik-Oliver Blass, Florian Kerschbaum
2020BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior.
Bushra A. AlAhmadi, Enrico Mariconti, Riccardo Spolaor, Gianluca Stringhini, Ivan Martinovic
2020Be the Phisher - Understanding Users' Perception of Malicious Domains.
Florian Quinkert, Martin Degeling, Jim Blythe, Thorsten Holz
2020CORSICA: Cross-Origin Web Service Identification.
Christian Dresen, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel
2020Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal
2020Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Guowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yinghui Zhang, Jianfei Sun, Robert H. Deng
2020CoDaRR: Continuous Data Space Randomization against Data-Only Attacks.
Prabhu Rajasekaran, Stephen Crane, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz
2020Contextual and Granular Policy Enforcement in Database-backed Applications.
Abhishek Bichhawat, Matt Fredrikson, Jean Yang, Akash Trehan
2020Creating Character-based Templates for Log Data to Enable Security Event Classification.
Markus Wurzenberger, Georg Höld, Max Landauer, Florian Skopik, Wolfgang Kastner
2020Cybersecurity Event Detection with New and Re-emerging Words.
Hyejin Shin, Woochul Shim, Jiin Moon, Jae Woo Seo, Sol Lee, Yong Ho Hwang
2020DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX.
Jinwoo Ahn, Junghee Lee, Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, Youngjae Kim
2020DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels.
Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao, Rong Ge
2020Detecting Insecure Code Patterns in Industrial Robot Programs.
Marcello Pogliani, Federico Maggi, Marco Balduzzi, Davide Quarta, Stefano Zanero
2020EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos.
Yilin Yang, Yan Wang, Yingying Chen, Chen Wang
2020Efficient Secure Computation of Order-Preserving Encryption.
Anselme Tueno, Florian Kerschbaum
2020Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization.
Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise
2020Fail-safe Watchtowers and Short-lived Assertions for Payment Channels.
Bowen Liu, Pawel Szalachowski, Siwei Sun
2020Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Stephan Wesemeyer, Christopher J. P. Newton, Helen Treharne, Liqun Chen, Ralf Sasse, Jorden Whitefield
2020Global Communication Guarantees in the Presence of Adversaries.
Adrian Perrig
2020Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy.
Leonid Glanz, Patrick Müller, Lars Baumgärtner, Michael Reif, Sven Amann, Pauline Anthonysamy, Mira Mezini
2020Hunting Sybils in Participatory Mobile Consensus-Based Networks.
Nickolai Verchok, Alex Orailoglu
2020I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems.
Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos
2020In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection.
Devkishen Sisodia, Jun Li, Lei Jiao
2020Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception.
Joonsang Baek, Jongkil Kim, Willy Susilo
2020Investigating MMM Ponzi Scheme on Bitcoin.
Yazan Boshmaf, Charitha Elvitigala, Husam Al Jawaheri, Primal Wijesekera, Mashael Al Sabah
2020It all Started with Compression: Another Look at Reconciliation Mechanism.
Tianyuan Xie, Yanbin Pan
2020KASLR: Break It, Fix It, Repeat.
Claudio Canella, Michael Schwarz, Martin Haubenwallner, Martin Schwarzl, Daniel Gruss
2020Lattice Klepto Revisited.
Zhaomin Yang, Tianyuan Xie, Yanbin Pan
2020LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems.
Zheng Yang, Chenglu Jin, Yangguang Tian, Junyu Lai, Jianying Zhou
2020Measuring the Impact of the GDPR on Data Sharing in Ad Networks.
Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann
2020Membership Encoding for Deep Learning.
Congzheng Song, Reza Shokri
2020ModFalcon: Compact Signatures Based On Module-NTRU Lattices.
Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa
2020NativeX: Native Executioner Freezes Android.
Qinsheng Hou, Yao Cheng, Lingyun Ying
2020On the Security of Randomized Defenses Against Adversarial Samples.
Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame
2020OptiSwap: Fast Optimistic Fair Exchange.
Lisa Eckey, Sebastian Faust, Benjamin Schlosser
2020PISKES: Pragmatic Internet-Scale Key-Establishment System.
Benjamin Rothenberger, Dominik Roos, Markus Legner, Adrian Perrig
2020POSTER: Attacks to Federated Learning: Responsive Web User Interface to Recover Training Data from User Gradients.
Hans Albert Lianto, Yang Zhao, Jun Zhao
2020POSTER: Blockchain-Based Differential Privacy Cost Management System.
Leong Mei Han, Yang Zhao, Jun Zhao
2020POSTER: Construct macOS Cyber Range for Red/Blue Teams.
Yi-Hsien Chen, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, Chun-Ying Huang
2020POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic.
Yebo Feng, Devkishen Sisodia, Jun Li
2020POSTER: Data Collection via Local Differential Privacy with Secret Parameters.
Shun Takagi, Yang Cao, Masatoshi Yoshikawa
2020POSTER: Data Leakage Detection for Health Information System based on Memory Introspection.
Sanoop Mallissery, Min-Chieh Wu, Chun-An Bau, Guan-Zhang Huang, Chen-Yu Yang, Wei-Chun Lin, Yu-Sung Wu
2020POSTER: Detecting Suspicious Processes from Log-Data via a Bayesian Block Model.
Daniel Andrade, Yusuke Takahashi, Daichi Hasumi
2020POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation.
Neminath Hubballi, Namrata Tiwari, Pratibha Khandait
2020POSTER: Dynamic Software Vulnerabilities Threat Prediction through Social Media Contextual Analysis.
Shin-Ying Huang, Yiju Wu
2020POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis.
Seungoh Choi, Jeong-Han Yun, Byung-gil Min, HyoungChun Kim
2020POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan.
Ming-Hung Wang, Yu-Chen Dai
2020POSTER: Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud Environment.
Taehun Kim, Youngjoo Shin
2020POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model.
Zhong-Yi Guo, Yu-Chi Chen, Hsiu-Ping Lin
2020POSTER: Protecting Location Privacy on Road Networks.
Shun Takagi, Yang Cao, Yasuhito Asano, Masatoshi Yoshikawa
2020POSTER: SecretSVM - Secret Sharing-Based SVM for Preventing Collusion in IoT Data Analysis.
Song-Yi Hsu, Xin Xie, Yu-Chi Chen
2020POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of Characters.
Pratibha Khandait, Neminath Hubballi, Katrin Franke
2020PassTag: A Graphical-Textual Hybrid Fallback Authentication System.
Joon Kuy Han, Xiaojun Bi, Hyoungshick Kim, Simon S. Woo
2020PathAFL: Path-Coverage Assisted Fuzzing.
Shengbo Yan, Chenlu Wu, Hang Li, Wei Shao, Chunfu Jia
2020Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS.
Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider
2020Poster: Challenges in Stopping Ticket Scalping Bots.
Hao-Cheng Yang, Hsun Lee, Hsu-Chun Hsiao
2020Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation.
Ankush Singla, Elisa Bertino, Dinesh C. Verma
2020Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection.
Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks
2020Privacy-Preserving OpenID Connect.
Sven Hammann, Ralf Sasse, David A. Basin
2020Proofs or Remote Execution and Mitigation of TOCTOU Attacks.
Gene Tsudik
2020Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments.
Ioana Boureanu, Liqun Chen, Sam Ivey
2020Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards.
Feifan Yu, Na Ruan, Siyuan Cheng
2020Return-Oriented Programming on RISC-V.
Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache
2020Revisiting Shared Data Protection Against Key Exposure.
Katarzyna Kapusta, Matthieu Rambaud, Gérard Memmi
2020Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders.
Shahryar Baki, Rakesh M. Verma, Omprakash Gnawali
2020SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.
Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah
2020Skeptic: Automatic, Justified and Privacy-Preserving Password Composition Policy Selection.
Saul A. Johnson, João F. Ferreira, Alexandra Mendes, Julien Cordry
2020Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep Learning.
Greeshma Lingam, Rashmi Ranjan Rout, Durvasula V. L. N. Somayajulu, Sajal K. Das
2020Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors.
Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais, Clémentine Maurice, Daniel Gruss
2020The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things.
Manuel Huber, Stefan Hristozov, Simon Ott, Vasil Sarafov, Marcus Peinado
2020The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation.
John Galea, Daniel Kroening
2020To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web.
Takashi Koide, Daiki Chiba, Mitsuaki Akiyama
2020Uranus: Simple, Efficient SGX Programming and its Applications.
Jianyu Jiang, Xusheng Chen, Tsz On Li, Cheng Wang, Tianxiang Shen, Shixiong Zhao, Heming Cui, Cho-Li Wang, Fengwei Zhang
2020Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services.
Roman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle
2020What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts.
Tingmin Wu, Rongjunchen Zhang, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang
2020XSS Vulnerabilities in Cloud-Application Add-Ons.
Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura
2020You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications.
Rasoul Jahanshahi, Adam Doupé, Manuel Egele
2020Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang
2020ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks.
Christof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw