default search action
14th AsiaCCS 2019: Auckland, New Zealand
- Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3
Keynote 1
- Virgil D. Gligor:
Establishing and Maintaining Root of Trust on Commodity Computer Systems. 1-2
Session 1A: Binary Analysis and Hardening
- Yan Lin, Xiaoyang Cheng, Debin Gao:
Control-Flow Carrying Code. 3-14 - Daniele Cono D'Elia, Emilio Coppa, Simone Nicchi, Federico Palmaro, Lorenzo Cavallaro:
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). 15-27 - Rukayat Ayomide Erinfolami, Aravind Prakash:
DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries. 28-40
Session 1B: Cloud Security
- Shangqi Lai, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search. 41-54 - Jongkil Kim, Seyit Camtepe, Willy Susilo, Surya Nepal, Joonsang Baek:
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing. 55-66 - Laura Genga, Luca Allodi, Nicola Zannone:
Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery. 67-72
Session 2A: SGX-based Security
- Jan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves. 73-85 - Pengfei Wu, Qingni Shen, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu:
ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof. 86-99 - Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation using SGX. 100-113 - Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang:
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach. 114-121
Session 2B: Advanced Encryption Algorithms
- Lei Xu, Xingliang Yuan, Ron Steinfeld, Cong Wang, Chungen Xu:
Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation. 122-133 - Yuan Li, Hongbing Wang, Yunlei Zhao:
Delegatable Order-Revealing Encryption. 134-147 - John Cartlidge, Nigel P. Smart, Younes Talibi Alaoui:
MPC Joins The Dark Side. 148-159 - Qing-Qing Xie, Yantian Hou, Ke Cheng, Gaby G. Dagher, Liangmin Wang, Shucheng Yu:
Flexibly and Securely Shape Your Data Disclosed to Others. 160-167
Session 3A: Web Attack Measurements
- Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini:
Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web. 168-180 - Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang:
What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites. 181-192 - Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kâafar, Abdelberi Chaabane, Kanchana Thilakarathna:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. 193-205 - Tom van Goethem, Victor Le Pochat, Wouter Joosen:
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites. 206-213
Session 3B: Learning and Authentication
- Berk Gülmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, Berk Sunar:
Undermining User Privacy on Mobile Devices Using AI. 214-227 - Ryota Namba, Jun Sakuma:
Robust Watermarking of Neural Network with Exponential Weighting. 228-240 - Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng, Binbin Chen, Weizhi Meng, Hui Li:
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. 241-246 - Nirnay Ghosh, Rishabh Singhal, Sajal K. Das:
R2Q: A Risk Quantification Framework to Authorize Requests in Web-based Collaborations. 247-254
Keynote 2
- Surya Nepal:
Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks. 255-256
Session 4A: Mobile Security
- Yu-Chih Tung, Kang G. Shin:
Exploiting Sound Masking for Audio Privacy in Smartphones. 257-268 - Shangcheng Shi, Xianbo Wang, Wing Cheong Lau:
MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile Applications. 269-282 - Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:
MagAttack: Guessing Application Launching and Operation via Smartphone. 283-294 - Daoyuan Wu, Debin Gao, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, Robert H. Deng:
Towards Understanding Android System Vulnerabilities: Techniques and Insights. 295-306 - Omid Mirzaei, Guillermo Suarez-Tangil, José María de Fuentes, Juan Tapiador, Gianluca Stringhini:
AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families. 307-314
Session 4B: Privacy
- Thomas Schneider, Oleksandr Tkachenko:
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs. 315-327 - Weiqi Cui, Tao Chen, Christian Fields, Julianna Chen, Anthony Sierra, Eric Chan-Tin:
Revisiting Assumptions for Website Fingerprinting Attacks. 328-339 - Iskander Sánchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, Igor Santos:
Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control. 340-351 - Yuri Son, Geumhwan Cho, Hyoungshick Kim, Simon S. Woo:
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services. 352-365
Session 5A: Web Security
- Tom van Goethem, Najmeh Miramirkhani, Wouter Joosen, Nick Nikiforakis:
Purchased Fame: Exploring the Ecosystem of Private Blog Networks. 366-378 - Yihe Zhang, Hao Zhang, Xu Yuan, Nian-Feng Tzeng:
TweetScore: Scoring Tweets via Social Attribute Relationships for Twitter Spammer Detection. 379-390 - Marius Musch, Marius Steffens, Sebastian Roth, Ben Stock, Martin Johns:
ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices. 391-402
Session 5B: Fault Attacks and Side Channel Analysis
- Mustafa Khairallah, Xiaolu Hou, Zakaria Najm, Jakub Breier, Shivam Bhasin, Thomas Peyrin:
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks. 403-414 - Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
Practical Side-Channel Attacks against WPA-TKIP. 415-426 - Prasanna Ravi, Mahabir Prasad Jhanwar, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates. 427-440
Session 6A: IoT Security
- Prashant Hari Narayan Rajput, Pankaj Rajput, Marios Sazos, Michail Maniatakos:
Process-Aware Cyberattacks for Thermal Desalination Plants. 441-452 - Mohit Sethi, Aleksi Peltonen, Tuomas Aura:
Misbinding Attacks on Secure Device Pairing and Bootstrapping. 453-464 - Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi:
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants. 465-478 - Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici:
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. 479-484 - Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo:
A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States. 485-492 - Anand Mudgerikar, Puneet Sharma, Elisa Bertino:
E-Spion: A System-Level Intrusion Detection System for IoT Devices. 493-500
Session 6B: Applied Cryptography
- Sabyasachi Karati, Reihaneh Safavi-Naini:
K2SN-MSS: An Efficient Post-Quantum Signature. 501-514 - Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2. 515-528 - Yunlei Zhao:
Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain. 529-538 - Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler:
Examining DES-based Cipher Suite Support within the TLS Ecosystem. 539-546
Keynote 3
- Heiko Mantel:
From Attacker Models to Reliable Security. 547-548
Session 7: Hardware and Systems
- Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim:
Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks. 549-560 - Carsten Bock, Ferdinand Brasser, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:
RIP-RH: Preventing Rowhammer-based Inter-Process Attacks. 561-572 - Biao Gao, Bo Chen, Shijie Jia, Luning Xia:
eHIFS: An Efficient History Independent File System. 573-585 - Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik:
Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry. 586-593 - Masaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai:
Design Procedure of Knowledge Base for Practical Attack Graph Generation. 594-601
Session 8: Blockchain Security
- Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquín García-Alfaro:
On the Difficulty of Hiding the Balance of Lightning Network Channels. 602-612 - Xun Yi, Kwok-Yan Lam:
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity. 613-620 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu:
On The Unforkability of Monero. 621-632
Session 9: Fuzzing
- Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. 633-645 - Sunnyeo Park, Dohyeok Kim, Sooel Son:
An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine Learning. 646-657 - Xiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang, Seyit Camtepe, Jingling Xue:
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing. 658-663
Poster Presentations
- Seungho Lee, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee:
How to Securely Record Logs based on ARM TrustZone. 664-666 - Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:
Characterizing Adversarial Subspaces by Mutual Information. 667-669 - Madalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
A Data Life Cycle Modeling Proposal by Means of Formal Methods. 670-672 - Xia Cheng, Junyang Shi, Mo Sha:
Cracking the Graph Routes in WirelessHART Networks. 673-675 - Ziqi Yang:
Fidelity: A Property of Deep Neural Networks to Measure the Trustworthiness of Prediction Results. 676-678 - Sareena Karapoola, Chester Rebeiro, Unnati Parekh, Kamakoti Veezhinathan:
Towards Identifying Early Indicators of a Malware Infection. 679-681 - Jongwon Choi, HyungKwan Kim, Seungoh Choi, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim:
Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management. 682-684 - Mohammed Al-Shaboti, Ian Welch, Aaron Chen:
IoT Application-Centric Access Control (ACAC). 685-687 - Taehyun Kim, Youngjoo Shin:
High Efficiency, Low-noise Meltdown Attack by using a Return Stack Buffer. 688-690 - Shijie Zhang, Jong-Hyouk Lee:
Smart Contract-based Miner Registration and Block Validation. 691-693
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.