


default search action
8th AsiaCCS 2013: Hangzhou, China
- Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng:

8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013. ACM 2013, ISBN 978-1-4503-1767-2
Mobile devices security
- Wu Zhou, Xinwen Zhang, Xuxian Jiang:

AppInk: watermarking android apps for repackaging deterrence. 1-12 - Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz

:
PSiOS: bring your own privacy & security to iOS devices. 13-24 - Hao Hao, Vicky Singh, Wenliang Du:

On the effectiveness of API-level access control using bytecode rewriting in Android. 25-36 - Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou

, Robert H. Deng
:
Designing leakage-resilient password entry on touchscreen mobile devices. 37-48 - Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao

:
Your love is public now: questioning the use of personal information in authentication. 49-60
Applied cryptography I
- Cong Zhang, Tsz Hon Yuen

, Hao Xiong, Sherman S. M. Chow
, Siu-Ming Yiu, Yi Jun He:
Multi-key leakage-resilient threshold cryptography. 61-70 - Wenhai Sun

, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou
, Hui Li:
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. 71-82 - Atsushi Fujioka

, Koutarou Suzuki, Keita Xagawa
, Kazuki Yoneyama:
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism. 83-94 - Christian Hanser, Daniel Slamanig

:
Blank digital signatures. 95-106 - Nils Fleischhacker

, Felix Günther, Franziskus Kiefer
, Mark Manulis
, Bertram Poettering:
Pseudorandom signatures. 107-118
Software security
- Davide Maiorca

, Igino Corona
, Giorgio Giacinto
:
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. 119-130 - Ben Niu, Gang Tan

:
Efficient user-space information flow control. 131-142
Short papers I: social network
- Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao:

SocialWatch: detection of online service abuse via large-scale social graphs. 143-148 - Amirreza Masoumzadeh, James Joshi:

Privacy settings in social networking systems: what you cannot control. 149-154 - Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim

:
Trustworthy distributed computing on social networks. 155-160 - Seyed Hossein Ahmadinejad, Philip W. L. Fong:

On the feasibility of inference attacks by third-party extensions to social network systems. 161-166 - Abedelaziz Mohaisen

, Yongdae Kim
:
Dynamix: anonymity on dynamic social structures. 167-172 - Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim

:
Protecting access privacy of cached contents in information centric networks. 173-178
Keynote address
- Wenbo Mao:

The role and effectiveness of cryptography in network virtualization: a position paper. 179-182
Data outsourcing
- Yihua Zhang, Marina Blanton

:
Efficient dynamic provable possession of remote data via balanced update trees. 183-194 - Jia Xu

, Ee-Chien Chang
, Jianying Zhou
:
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. 195-206 - Marina Blanton

, Aaron Steele, Mehrdad Aliasgari:
Data-oblivious graph algorithms for secure computation and outsourcing. 207-218 - Shams Zawoad, Amit Kumar Dutta, Ragib Hasan

:
SecLaaS: secure logging-as-a-service for cloud forensics. 219-230 - Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba

, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell:
An empirical study on the software integrity of virtual appliances: are you really getting what you paid for? 231-242
Applied cryptography II
- Junzuo Lai, Xuhua Zhou, Robert Huijie Deng

, Yingjiu Li, Kefei Chen:
Expressive search on encrypted data. 243-252 - Qiang Tang

, Xiaofeng Chen:
Towards asymmetric searchable encryption with message recovery and flexible search authorization. 253-264 - Tarik Moataz, Abdullatif Shikfa

:
Boolean symmetric searchable encryption. 265-276 - Duong Hieu Phan

, David Pointcheval
, Viet Cuong Trinh
:
Multi-channel broadcast encryption. 277-286 - Yee Wei Law

, Zheng Gong, Tie Luo
, Slaven Marusic, Marimuthu Palaniswami:
Comparative study of multicast authentication schemes with application to wide-area measurement system. 287-298
Software security
- Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi:

Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. 299-310 - Aravind Prakash, Heng Yin

, Zhenkai Liang
:
Enforcing system-wide control flow integrity for exploit detection and diagnosis. 311-322
Short papers II: cloud and mobile security
- Xinxin Zhao, Lingjun Li, Guoliang Xue:

Secure cloud-assisted location based reminder. 323-328 - Vaibhav Rastogi, Yan Chen, Xuxian Jiang:

DroidChameleon: evaluating Android anti-malware against transformation attacks. 329-334 - Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng:

Bind your phone number with caution: automated user profiling through address book matching on smartphone. 335-340 - Huiping Yao, Dongwan Shin

:
Towards preventing QR code based attacks on android phone using security warnings. 341-346 - Zhan Wang, Jiwu Jing, Liang Li

:
Time evolving graphical password for securing mobile devices. 347-352 - Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:

DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware. 353-358
Privacy and anonymity
- Sebastian Clauß, Stefan Schiffner, Florian Kerschbaum:

k-anonymous reputation. 359-368 - Cheng-Kang Chu, Joseph K. Liu

, Jun Wen Wong, Yunlei Zhao, Jianying Zhou
:
Privacy-preserving smart metering with regional statistics and personal enquiry services. 369-380 - Sébastien Canard, Roch Lescuyer:

Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. 381-392 - Florian Kerschbaum:

An information-flow type-system for mixed protocol secure computation. 393-404
Network security
- Jun Zhang

, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Robust network traffic identification with unknown applications. 405-414 - Hsu-Chun Hsiao

, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
STRIDE: sanctuary trail - refuge from internet DDoS entrapment. 415-426 - Mathy Vanhoef

, Frank Piessens:
Practical verification of WPA-TKIP vulnerabilities. 427-436 - Wilko Henecka

, Thomas Schneider
:
Faster secure two-party computation with less memory. 437-446
Web and mobile security
- Philippe De Ryck, Nick Nikiforakis, Lieven Desmet

, Wouter Joosen:
TabShots: client-side detection of tabnabbing attacks. 447-456 - Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang:

Fuzzing the ActionScript virtual machine. 457-468 - Ragib Hasan

, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart:
Sensing-enabled channels for hard-to-detect command and control of mobile devices. 469-480
Short paper III: software and web security
- Xiaowei Li, Yuan Xue:

LogicScope: automatic discovery of logic vulnerabilities within web applications. 481-486 - Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres:

Protecting function pointers in binary. 487-492 - Viet Hung Nguyen, Fabio Massacci

:
The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities. 493-498 - David Gugelmann, Dominik Schatzmann, Vincent Lenders

:
Horizon extender: long-term preservation of data leakage evidence in web traffic. 499-504
Short paper IV: applied cryptography and protocols
- Kevin Atighehchi, Traian Muntean:

Towards fully incremental cryptographic schemes. 505-510 - Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li:

Anonymous attribute-based encryption supporting efficient decryption test. 511-516 - Kazuma Ohara

, Yusuke Sakai, Keita Emura
, Goichiro Hanaoka:
A group signature scheme with unbounded message-dependent opening. 517-522 - Kan Yang

, Xiaohua Jia
, Kui Ren
:
Attribute-based fine-grained access control with efficient revocation in cloud storage systems. 523-528 - Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg

, Markus Huber
, Manuel Leithner
, Martin Mulazzani, Edgar R. Weippl:
Covert computation: hiding code in code for obfuscation purposes. 529-534 - Rong Hu, Kirill Morozov, Tsuyoshi Takagi:

Proof of plaintext knowledge for code-based public-key encryption revisited. 535-540 - Bharath K. Samanthula, Hu Chun, Wei Jiang:

An efficient and probabilistic secure bit-decomposition. 541-546 - Jannik Dreier, Hugo Jonker, Pascal Lafourcade

:
Defining verifiability in e-auction protocols. 547-552 - Xuhua Ding

, HweeHwa Pang
, Junzuo Lai:
Verifiable and private top-k monitoring. 553-558

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














