


default search action
17th AsiaCCS 2022: Nagasaki, Japan
- Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako:

ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022. ACM 2022, ISBN 978-1-4503-9140-5
Keynote Talk I
- Tal Rabin:

New Multiparty Computational Model: From Nakamoto to YOSO. 1
Session 1A: Cryptography #1
- Christian Peeters, Christopher Patton, Imani N. S. Munyaka, Daniel Olszewski, Thomas Shrimpton, Patrick Traynor:

SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication. 2-16 - Shuai Feng

, Shuaijianni Xu, Liang Feng Zhang:
Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits. 17-27 - Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry:

Iterative Oblivious Pseudo-Random Functions and Applications. 28-41 - Cailing Cai, Xianrui Qin, Tsz Hon Yuen

, Siu-Ming Yiu:
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting. 42-53
Session 1B: Systems and Network Security #1
- Niusen Chen, Bo Chen

:
Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates. 54-66 - Payton Walker, Shalini Saini

, S. Abhishek Anand, Tzipora Halevi, Nitesh Saxena:
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations. 67-81 - Binghui Wang, Tianchen Zhou, Song Li

, Yinzhi Cao, Neil Zhenqiang Gong:
GraphTrack: A Graph-based Cross-Device Tracking Framework. 82-96 - Bibek Bhattarai, H. Howie Huang

:
SteinerLog: Prize Collecting the Audit Logs for Threat Hunting on Enterprise Network. 97-108
Session 2A: Blockchain #1
- Vishal Sharma

, Pawel Szalachowski, Jianying Zhou:
Evaluating Blockchain Protocols with Abusive Modeling. 109-122 - Qin Wang

, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang:
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies. 123-137 - Zhimei Sui, Joseph K. Liu, Jiangshan Yu

, Man Ho Au, Jia Liu
:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. 138-152 - Lioba Heimbach

, Roger Wattenhofer:
Eliminating Sandwich Attacks with the Help of Game Theory. 153-167 - Alejandro Ranchal-Pedrosa, Vincent Gramoli:

TRAP: The Bait of Rational Players to Solve Byzantine Consensus. 168-181
Session 2B: Wireless Communication #1
- Hyunwoo Lee, Imtiaz Karim

, Ninghui Li, Elisa Bertino:
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. 182-195 - Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer:

BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. 196-207 - Paul Staat, Harald Elders-Boll

, Markus Heinrichs, Christian T. Zenger
, Christof Paar:
Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces. 208-221 - Gökçen Yilmaz Dayanikli, Abdullah Zubair Mohammed, Ryan M. Gerdes, Mani Mina:

Wireless Manipulation of Serial Communication. 222-236 - Rhys Miller, Ioana Boureanu

, Stephan Wesemeyer
, Christopher J. P. Newton
:
The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation. 237-251
Session 3A: Cyber-physical and IOT Security #1
- Markus Dahlmanns, Johannes Lohmöller

, Jan Pennekamp
, Jörn Bodenhausen
, Klaus Wehrle, Martin Henze
:
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things. 252-266 - Boya Wang, Giorgio Tresoldi

, Martin Strohmeier
, Vincent Lenders
:
On the Security of the FLARM Collision Warning System. 267-278 - Piet De Vaere, Andrea Tulimiero, Adrian Perrig

:
Hopper: Per-Device Nano Segmentation for the Industrial IoT. 279-293 - Sebastian Köhler, Richard Baker, Ivan Martinovic:

Signal Injection Attacks against CCD Image Sensors. 294-308 - Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos Hernandez Gañán:

No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. 309-321
Session 3B: Machine Learning #1
- Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:

Confusing and Detecting ML Adversarial Attacks with Injected Attractors. 322-336 - Bang Wu

, Xiangwen Yang, Shirui Pan
, Xingliang Yuan:
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation. 337-350 - Quoc Phong Nguyen, Ryutaro Oikawa, Dinil Mon Divakaran, Mun Choon Chan, Bryan Kian Hsiang Low:

Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten. 351-363 - Heonseok Ha, Jaehee Jang, Yonghyun Jeong, Sungroh Yoon:

Membership Feature Disentanglement Network. 364-376 - Jaehee Jang, Younho Lee

, Andrey Kim, Byunggook Na, Donggeon Yhee, Byounghan Lee, Jung Hee Cheon, Sungroh Yoon:
Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption. 377-391
Keynote Talk II
- Yongdae Kim

:
Cellular Security: Why is it difficult? 392
Session 4A: Post-quantum Computing
- Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai:

Aggregating and Thresholdizing Hash-based Signatures using STARKs. 393-407 - Priyanka Dutta, Mei Jiang

, Dung Hoang Duong, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. 408-422 - Zi-Yuan Liu

, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen
:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. 423-436
Session 4B: Security Applications of Machine Learning
- Tianhang Zheng

, Baochun Li:
InfoCensor: An Information-Theoretic Framework against Sensitive Attribute Inference and Demographic Disparity. 437-451 - Mirabelle Dib, Sadegh Torabi

, Elias Bou-Harb, Nizar Bouguila, Chadi Assi:
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants. 452-466 - Tianchong Gao, Feng Li

:
Machine Learning-based Online Social Network Privacy Preservation. 467-478 - Ping-Jui Chuang, Chih-Fan Hsu

, Yung-Tien Chu, Szu-Chun Huang, Chun-Ying Huang
:
Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms. 479-493
Session 5A: Cyber-physical and IOT Security #2
- Shengtuo Hu, Qingzhao Zhang, André Weimerskirch, Z. Morley Mao:

Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet. 494-507 - Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Yanchao Zhang:

WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID. 508-520 - Qingchuan Zhao

, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin:
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals. 521-533 - Sungwoo Kim

, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian:
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. 534-545 - Tobias Schmidbauer, Steffen Wendzel

:
SoK: A Survey Of Indirect Network-level Covert Channels. 546-560
Session 5B: Software Security #1
- Sadullah Canakci, Nikolay Matyunin, Kalman Graffi

, Ajay Joshi, Manuel Egele:
TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers. 561-573 - Yuancheng Jiang

, Roland H. C. Yap, Zhenkai Liang, Hubert Rosier:
RecIPE: Revisiting the Evaluation of Memory Error Defenses. 574-588 - Tobias Groß, Tobias Schleier, Tilo Müller:

ReFuzz - Structure Aware Fuzzing of the Resilient File System (ReFS). 589-601 - Alessandro Mantovani, Luca Compagna, Yan Shoshitaishvili, Davide Balzarotti:

The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study. 602-615 - Davide Bove

:
SoK: The Evolution of Trusted UI on Mobile. 616-629
Session 6A: Cryptography #2
- Jinghui Liao, Fengwei Zhang, Wenhai Sun

, Weisong Shi:
Speedster: An Efficient Multi-party State Channel via Enclaves. 637-651 - Matteo Campanelli

, Mathias Hall-Andersen:
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions. 652-666 - Itsaka Rakotonirina, Miguel Ambrona

, Alejandro Aguirre
, Gilles Barthe:
Symbolic Synthesis of Indifferentiability Attacks. 667-681 - Poulami Das, Julia Hesse

, Anja Lehmann:
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password. 682-696 - Feng Hao, Paul C. van Oorschot:

SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons. 697-711 - Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth

:
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. 712-726 - Sebastian Paul, Yulia Kuzovkova, Norman Lahr

, Ruben Niederhagen:
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3. 727-740
Session 6B: System and Network Security #2
- Qifan Wang, Shujie Cui, Lei Zhou, Ocean Wu, Yonghua Zhu, Giovanni Russello:

EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE. 741-755 - Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont

:
SoK: Design Tools for Side-Channel-Aware Implementations. 756-770 - William L. Holland, Olga Ohrimenko

, Anthony Wirth:
Efficient Oblivious Permutation via the Waksman Network. 771-783 - Tom van Goethem, Gertjan Franken, Iskander Sánchez-Rola, David Dworken, Wouter Joosen:

SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model. 784-798 - Mathew Vermeer

, Michel van Eeten, Carlos Gañán:
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection. 799-814
Keynote Talk III
- Ninghui Li:

Differentially Private Data Synthesis: State of the Art and Challenges. 815
Session 7A: Cryptography #3
- Marilyn George, Seny Kamara:

Adversarial Level Agreements for Two-Party Protocols. 816-830 - Adam Bowers, Jize Du, Dan Lin, Wei Jiang:

Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security. 831-842 - Jianli Bai

, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. 843-857 - Nuttapong Attrapadung, Hiraku Morita

, Kazuma Ohara, Jacob C. N. Schuldt, Kazunari Tozawa:
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization. 858-872
Session 7B: Software Security #2
- Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao

:
Understanding and Detecting Remote Infection on Linux-based IoT Devices. 873-887 - Michelle Y. Wong, David Lie:

Driving Execution of Target Paths in Android Applications with (a) CAR. 888-902 - Pardis Pashakhanloo, Aravind Machiry, Hyon-Young Choi, Anthony Canino, Kihong Heo, Insup Lee, Mayur Naik:

PacJam: Securing Dependencies Continuously via Package-Oriented Debloating. 903-916 - Maryna Kluban

, Mohammad Mannan, Amr M. Youssef:
On Measuring Vulnerable JavaScript Functions in the Wild. 917-930
Session 8A: Machine Learning #2
- Yifei Cai, Qiao Zhang, Rui Ning, Chunsheng Xin, Hongyi Wu:

Hunter: HE-Friendly Structured Pruning for Efficient Privacy-Preserving Deep Learning. 931-945 - Ning Wang

, Yang Xiao, Yimin Chen, Yang Hu
, Wenjing Lou
, Y. Thomas Hou
:
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations. 946-958 - Da Zhong, Haipei Sun, Jun Xu, Neil Zhenqiang Gong, Wendy Hui Wang

:
Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures. 959-974 - Weiping Pei

, Chuan Yue:
Generating Content-Preserving and Semantics-Flipping Adversarial Text. 975-989 - Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin

:
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware. 990-1003
Session 8B: Biometrics and Security
- Chloé Cachet, Sohaib Ahmad, Luke Demarest

, Ariel Hamlin, Benjamin Fuller:
Proximity Searchable Encryption for the Iris Biometric. 1004-1018 - Hanqing Guo

, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter
:
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech. 1019-1033 - Shen Fu, Dong Qin, George T. Amariucai, Daji Qiao, Yong Guan, Ann Smiley:

Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning. 1034-1048 - Martin Georgiev

, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Common Evaluation Pitfalls in Touch-Based Authentication Systems. 1049-1063 - Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:

ALEXA VERSUS ALEXA: Controlling Smart Speakers by Self-Issuing Voice Commands. 1064-1078
Session 9A: Privacy
- Liang Feng Zhang, Huaxiong Wang, Li-Ping Wang:

Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding. 1079-1085 - Jack P. K. Ma

, Sherman S. M. Chow
:
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation. 1086-1097 - Aner Ben-Efraim, Olga Nissenbaum

, Eran Omri, Anat Paskin-Cherniavsky:
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection. 1098-1112 - Luke Harrison, Samiran Bag, Hang Luo

, Feng Hao:
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities. 1113-1125 - Olivier Sanders:

EPID with Efficient Proof of Non-Revocation. 1126-1138
Session 9B: Web Security
- Elizabeth Wyss

, Alexander Wittman, Drew Davidson, Lorenzo De Carli:
Wolf at the Door: Preventing Install-Time Attacks in npm with Latch. 1139-1153 - Gabriel Figueira, Diogo Barradas, Nuno Santos:

Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention. 1154-1167 - Marius Musch

, Robin Kirchner
, Max Boll, Martin Johns
:
Server-Side Browsers: Exploring the Web's Hidden Attack Surface. 1168-1181 - Thomas Rokicki, Clémentine Maurice

, Marina Botvinnik, Yossi Oren
:
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers. 1182-1194 - Noshaba Nasir, Faqia Iqbal, Mahnoor Zaheer, Mariam Shahjahan, Mobin Javed:

Lures for Money: A First Look into YouTube Videos Promoting Money-Making Apps. 1195-1206
Poster Session
- Firuz Juraev, Eldor Abdukhamidov, Mohammed Abuhamad

, Tamer Abuhmed:
Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models. 1207-1209 - Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao:

Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE. 1210-1212 - Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta

, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai:
A Systematic Study of Bulletin Board and Its Application. 1213-1215 - Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad

, Tamer Abuhmed:
Black-box and Target-specific Attack Against Interpretable Deep Learning Systems. 1216-1218 - Konstantinos Chalkias, Panagiotis Chatzigiannis:

Base64 Malleability in Practice. 1219-1221 - Razvan Beuran, Ooi Sian En, Abbie O. Barbir, Yasuo Tan:

IoT System Trustworthiness Assurance. 1222-1224 - Xin Zhou, Rakesh M. Verma

:
Vulnerability Detection via Multimodal Learning: Datasets and Analysis. 1225-1227 - Nitesh Kumar, Anand Handa, Sandeep K. Shukla:

RBMon: Real Time System Behavior Monitoring Tool. 1228-1230 - Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison, Eric Chan-Tin:

The Personalities of Social Media Posts and Photos. 1231-1233 - Amir Kashapov, Tingmin Wu

, Sharif Abuadbba
, Carsten Rudolph:
Email Summarization to Assist Users in Phishing Identification. 1234-1236 - H. O. Sai Varshith, Shamik Sural

, Jaideep Vaidya, Vijayalakshmi Atluri:
Enabling Attribute-Based Access Control in Linux Kernel. 1237-1239 - Qirui Sun, Eldor Abdukhamidov, Tamer Abuhmed, Mohammed Abuhamad

:
Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware. 1240-1242 - Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal

, Masaki Inamura:
TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server. 1243-1245 - Fabien Charmet, Harry Chandra Tanuwidjaja, Tomohiro Morikawa, Takeshi Takahashi:

Towards Polyvalent Adversarial Attacks on URL Classification Engines. 1246-1248 - Zhuotao Lian, Chunhua Su:

Decentralized Federated Learning for Internet of Things Anomaly Detection. 1249-1251 - Myles Foley

, Chris Hicks, Kate Highnam, Vasilios Mavroudis
:
Autonomous Network Defence using Reinforcement Learning. 1252-1254 - Janaka Senanayake

, Harsha K. Kalutarage
, M. Omar Al-Kadri
, Andrei V. Petrovski, Luca Piras:
Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning. 1255-1257 - Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:

Decentralized and Collaborative Tracing for Group Signatures. 1258-1260
Workshop Summaries
- Jason Paul Cruz, Naoto Yanai

:
APKC '22: 9th ACM ASIA Public-Key Cryptography Workshop. 1261-1262 - Keke Gai, Kim-Kwang Raymond Choo:

BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure. 1263-1264 - Alvaro A. Cárdenas

, Daisuke Mashima:
CPSS '22: 8th ACM Cyber-Physical System Security Workshop. 1265-1266 - Eric Chan-Tin, Shelia Kennison:

CySSS '22: 1st International Workshop on Cybersecurity and Social Sciences. 1267-1268 - Simon S. Woo, Shahroz Tariq

, Hyoungshick Kim:
WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes. 1269-1270 - Fabio Pierazzi

, Nedim Srndic:
WoRMA '22: 1st Workshop on Robust Malware Analysis. 1271-1272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














