


default search action
14th AsiaCCS 2019: Auckland, New Zealand
- Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:

Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3
Keynote 1
- Virgil D. Gligor:

Establishing and Maintaining Root of Trust on Commodity Computer Systems. 1-2
Session 1A: Binary Analysis and Hardening
- Yan Lin, Xiaoyang Cheng, Debin Gao

:
Control-Flow Carrying Code. 3-14 - Daniele Cono D'Elia

, Emilio Coppa
, Simone Nicchi, Federico Palmaro, Lorenzo Cavallaro
:
SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed). 15-27 - Rukayat Ayomide Erinfolami, Aravind Prakash:

DeClassifier: Class-Inheritance Inference Engine for Optimized C++ Binaries. 28-40
Session 1B: Cloud Security
- Shangqi Lai

, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Yuhong Liu, Dongxi Liu:
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search. 41-54 - Jongkil Kim

, Seyit Camtepe
, Willy Susilo
, Surya Nepal
, Joonsang Baek
:
Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing. 55-66 - Laura Genga

, Luca Allodi, Nicola Zannone
:
Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery. 67-72
Session 2A: SGX-based Security
- Jan Werner, Joshua Mason, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:

The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves. 73-85 - Pengfei Wu

, Qingni Shen
, Robert H. Deng
, Ximeng Liu, Yinghui Zhang, Zhonghai Wu:
ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof. 86-99 - Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler

, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation using SGX. 100-113 - Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang:

Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach. 114-121
Session 2B: Advanced Encryption Algorithms
- Lei Xu

, Xingliang Yuan, Ron Steinfeld, Cong Wang, Chungen Xu
:
Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation. 122-133 - Yuan Li, Hongbing Wang, Yunlei Zhao:

Delegatable Order-Revealing Encryption. 134-147 - John Cartlidge

, Nigel P. Smart, Younes Talibi Alaoui
:
MPC Joins The Dark Side. 148-159 - Qing-Qing Xie, Yantian Hou, Ke Cheng, Gaby G. Dagher

, Liangmin Wang
, Shucheng Yu
:
Flexibly and Securely Shape Your Data Disclosed to Others. 160-167
Session 3A: Web Attack Measurements
- Colin C. Ife, Yun Shen, Steven J. Murdoch

, Gianluca Stringhini:
Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web. 168-180 - Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang:

What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites. 181-192 - Benjamin Zi Hao Zhao, Muhammad Ikram

, Hassan Jameel Asghar
, Mohamed Ali Kâafar
, Abdelberi Chaabane, Kanchana Thilakarathna
:
A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists. 193-205 - Tom van Goethem, Victor Le Pochat

, Wouter Joosen:
Mobile Friendly or Attacker Friendly?: A Large-scale Security Evaluation of Mobile-first Websites. 206-213
Session 3B: Learning and Authentication
- Berk Gülmezoglu

, Andreas Zankl
, M. Caner Tol
, Saad Islam, Thomas Eisenbarth
, Berk Sunar:
Undermining User Privacy on Mobile Devices Using AI. 214-227 - Ryota Namba, Jun Sakuma:

Robust Watermarking of Neural Network with Exponential Weighting. 228-240 - Yan Li, Zilong Wang, Yingjiu Li, Robert H. Deng

, Binbin Chen
, Weizhi Meng
, Hui Li:
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication. 241-246 - Nirnay Ghosh, Rishabh Singhal

, Sajal K. Das:
R2Q: A Risk Quantification Framework to Authorize Requests in Web-based Collaborations. 247-254
Keynote 2
- Surya Nepal

:
Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks. 255-256
Session 4A: Mobile Security
- Yu-Chih Tung, Kang G. Shin:

Exploiting Sound Masking for Audio Privacy in Smartphones. 257-268 - Shangcheng Shi

, Xianbo Wang
, Wing Cheong Lau:
MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile Applications. 269-282 - Yushi Cheng, Xiaoyu Ji, Wenyuan Xu, Hao Pan, Zhuangdi Zhu, Chuang-Wen You, Yi-Chao Chen, Lili Qiu:

MagAttack: Guessing Application Launching and Operation via Smartphone. 283-294 - Daoyuan Wu

, Debin Gao
, Eric K. T. Cheng, Yichen Cao, Jintao Jiang, Robert H. Deng
:
Towards Understanding Android System Vulnerabilities: Techniques and Insights. 295-306 - Omid Mirzaei

, Guillermo Suarez-Tangil, José María de Fuentes
, Juan Tapiador
, Gianluca Stringhini:
AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families. 307-314
Session 4B: Privacy
- Thomas Schneider

, Oleksandr Tkachenko:
EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs. 315-327 - Weiqi Cui, Tao Chen, Christian Fields, Julianna Chen, Anthony Sierra, Eric Chan-Tin:

Revisiting Assumptions for Website Fingerprinting Attacks. 328-339 - Iskander Sánchez-Rola, Matteo Dell'Amico

, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, Igor Santos:
Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control. 340-351 - Yuri Son, Geumhwan Cho, Hyoungshick Kim, Simon S. Woo:

Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services. 352-365
Session 5A: Web Security
- Tom van Goethem, Najmeh Miramirkhani, Wouter Joosen, Nick Nikiforakis:

Purchased Fame: Exploring the Ecosystem of Private Blog Networks. 366-378 - Yihe Zhang

, Hao Zhang
, Xu Yuan, Nian-Feng Tzeng:
TweetScore: Scoring Tweets via Social Attribute Relationships for Twitter Spammer Detection. 379-390 - Marius Musch, Marius Steffens, Sebastian Roth

, Ben Stock
, Martin Johns
:
ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices. 391-402
Session 5B: Fault Attacks and Side Channel Analysis
- Mustafa Khairallah

, Xiaolu Hou
, Zakaria Najm, Jakub Breier
, Shivam Bhasin, Thomas Peyrin
:
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks. 403-414 - Domien Schepers, Aanjhan Ranganathan

, Mathy Vanhoef
:
Practical Side-Channel Attacks against WPA-TKIP. 415-426 - Prasanna Ravi, Mahabir Prasad Jhanwar

, James Howe, Anupam Chattopadhyay, Shivam Bhasin:
Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of NIST Candidates. 427-440
Session 6A: IoT Security
- Prashant Hari Narayan Rajput, Pankaj Rajput

, Marios Sazos, Michail Maniatakos
:
Process-Aware Cyberattacks for Thermal Desalination Plants. 441-452 - Mohit Sethi

, Aleksi Peltonen
, Tuomas Aura
:
Misbinding Attacks on Secure Device Pairing and Bootstrapping. 453-464 - Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi:

Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants. 465-478 - Dominik Breitenbacher, Ivan Homoliak

, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici:
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. 479-484 - Asuka Nakajima, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Maverick Woo:

A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States. 485-492 - Anand Mudgerikar, Puneet Sharma, Elisa Bertino:

E-Spion: A System-Level Intrusion Detection System for IoT Devices. 493-500
Session 6B: Applied Cryptography
- Sabyasachi Karati, Reihaneh Safavi-Naini:

K2SN-MSS: An Efficient Post-Quantum Signature. 501-514 - Ai Ishida, Yusuke Sakai, Keita Emura

, Goichiro Hanaoka, Keisuke Tanaka:
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2. 515-528 - Yunlei Zhao:

Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain. 529-538 - Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler

:
Examining DES-based Cipher Suite Support within the TLS Ecosystem. 539-546
Keynote 3
- Heiko Mantel:

From Attacker Models to Reliable Security. 547-548
Session 7: Hardware and Systems
- Sangwoo Ji, Youngjoo Ko, Saeyoung Oh, Jong Kim:

Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks. 549-560 - Carsten Bock, Ferdinand Brasser, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi:

RIP-RH: Preventing Rowhammer-based Inter-Process Attacks. 561-572 - Biao Gao

, Bo Chen, Shijie Jia, Luning Xia:
eHIFS: An Efficient History Independent File System. 573-585 - Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik:

Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry. 586-593 - Masaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai:

Design Procedure of Knowledge Base for Practical Attack Graph Generation. 594-601
Session 8: Blockchain Security
- Jordi Herrera-Joancomartí

, Guillermo Navarro-Arribas
, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà
, Joaquín García-Alfaro
:
On the Difficulty of Hiding the Balance of Lightning Network Channels. 602-612 - Xun Yi, Kwok-Yan Lam

:
A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity. 613-620 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu, Jiangshan Yu

:
On The Unforkability of Monero. 621-632
Session 9: Fuzzing
- Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:

PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. 633-645 - Sunnyeo Park, Dohyeok Kim, Sooel Son

:
An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine Learning. 646-657 - Xiaogang Zhu

, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang
, Seyit Camtepe
, Jingling Xue
:
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing. 658-663
Poster Presentations
- Seungho Lee

, Wonsuk Choi, Hyo Jin Jo, Dong Hoon Lee:
How to Securely Record Logs based on ARM TrustZone. 664-666 - Chia-Yi Hsu, Pin-Yu Chen, Chia-Mu Yu:

Characterizing Adversarial Subspaces by Mutual Information. 667-669 - Madalina G. Ciobanu

, Fausto Fasano
, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
A Data Life Cycle Modeling Proposal by Means of Formal Methods. 670-672 - Xia Cheng, Junyang Shi, Mo Sha

:
Cracking the Graph Routes in WirelessHART Networks. 673-675 - Ziqi Yang:

Fidelity: A Property of Deep Neural Networks to Measure the Trustworthiness of Prediction Results. 676-678 - Sareena Karapoola, Chester Rebeiro, Unnati Parekh, Kamakoti Veezhinathan:

Towards Identifying Early Indicators of a Malware Infection. 679-681 - Jongwon Choi, HyungKwan Kim, Seungoh Choi, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim:

Vendor-Independent Monitoring on Programmable Logic Controller Status for ICS Security Log Management. 682-684 - Mohammed Al-Shaboti, Ian Welch, Aaron Chen:

IoT Application-Centric Access Control (ACAC). 685-687 - Taehyun Kim, Youngjoo Shin

:
High Efficiency, Low-noise Meltdown Attack by using a Return Stack Buffer. 688-690 - Shijie Zhang, Jong-Hyouk Lee:

Smart Contract-based Miner Registration and Block Validation. 691-693

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














