default search action
13th AsiaCCS 2018: Incheon, Republic of Korea
- Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018
Session 1: Embedded System Security
- Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. 1-13 - Ilias Giechaskiel, Kasper Bonne Rasmussen, Ken Eguro:
Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires. 15-27 - Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu:
HlcAuth: Key-free and Secure Communications via Home-Limited Channel. 29-35
Session 2: Applied Crypto 1
- Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert:
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. 37-50 - Joël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár:
On the Memory-Hardness of Data-Independent Password-Hashing Functions. 51-65 - Wenjie Lu, Jun-Jie Zhou, Jun Sakuma:
Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption. 67-74
Session 3: Authentication
- Ian Oakley, Jun Ho Huh, Junsung Cho, Geumhwan Cho, Md. Rasel Islam, Hyoungshick Kim:
The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches. 75-87 - Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor:
2MA: Verifying Voice Commands via Two Microphone Authentication. 89-100 - Ben Hutchins, Anudeep Reddy, Wenqiang Jin, Michael Zhou, Ming Li, Lei Yang:
Beat-PIN: A User Authentication Mechanism for Wearable Devices Through Secret Beats. 101-115
Session 4: Mobile
- Luke Deshotels, Razvan Deaconescu, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi:
iOracle: Automated Evaluation of Access Control Policies in iOS. 117-131 - Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov:
Source Attribution of Cryptographic API Misuse in Android Applications. 133-146 - Elkana Pariwono, Daiki Chiba, Mitsuaki Akiyama, Tatsuya Mori:
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps. 147-158
Session 5: Machine Learning 1
- Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian M. Molloy:
Protecting Intellectual Property of Deep Neural Networks with Watermarking. 159-172 - Shameek Bhattacharjee, Aditya Thakur, Sajal K. Das:
Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks. 173-185 - Danny Hendler, Shay Kels, Amir Rubin:
Detecting Malicious PowerShell Commands using Deep Neural Networks. 187-197 - Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami:
Detection under Privileged Information. 199-206
Session 6: Privacy 1
- Sébastien Gambs, Julien Lolive, Jean-Marc Robert:
Entwining Sanitization and Personalization on Databases. 207-219 - Oleksandr Tkachenko, Christian Weinert, Thomas Schneider, Kay Hamacher:
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies. 221-235 - Ke Cheng, Yantian Hou, Liangmin Wang:
Secure Similar Sequence Query on Outsourced Genomic Data. 237-251 - Liang Zhao, Liqun Chen:
A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation. 253-260
Session 7: Cellular, Phone, and Email
- Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu:
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. 261-272 - Jienan Liu, Babak Rahbarinia, Roberto Perdisci, Haitao Du, Li Su:
Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets. 273-284 - Payas Gupta, Roberto Perdisci, Mustaque Ahamad:
Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam. 285-296 - Daniel Gruss, Michael Schwarz, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More, Moritz Lipp:
Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. 297-311
Session 8: Trust
- Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security. 313-327 - Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser:
SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks. 329-342 - Anders P. K. Dalskov, Claudio Orlandi:
Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. 343-355 - Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia:
On the Strategy and Behavior of Bitcoin Mining with N-attackers. 357-368
Session 9: Software Security
- Philipp Zieris, Julian Horsch:
A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity. 369-380 - Nathan Burow, Derrick Paul McKee, Scott A. Carr, Mathias Payer:
CUP: Comprehensive User-Space Protection for C/C++. 381-392 - Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, Kevin W. Hamlen:
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. 393-398
Session 10: Network Security 1
- Louis Waked, Mohammad Mannan, Amr M. Youssef:
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. 399-412 - Shang Gao, Zecheng Li, Yuan Yao, Bin Xiao, Songtao Guo, Yuanyuan Yang:
Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control. 413-424 - Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos:
Where's Wally?: How to Privately Discover your Friends on the Internet. 425-430
Session 11: Malware and Web
- Xiangwen Wang, Peng Peng, Chun Wang, Gang Wang:
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces. 431-442 - Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini:
Investigating Web Defacement Campaigns at Large. 443-456 - Boyou Zhou, Anmol Gupta, Rasoul Jahanshahi, Manuel Egele, Ajay Joshi:
Hardware Performance Counters Can Detect Malware: Myth or Fact? 457-468 - Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
le-git-imate: Towards Verifiable Web-based Git Repositories. 469-482
Session 12: Physical Attacks and Defense
- Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia, Justin Ruths:
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. 483-497 - Jayaprakash Selvaraj, Gökçen Yilmaz Dayanikli, Neelam Prabhu Gaunkar, David Ware, Ryan M. Gerdes, Mani Mina:
Electromagnetic Induction Attacks Against Embedded Systems. 499-510 - Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara, Kazuo Sakiyama:
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack. 511-524 - Qin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur:
TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems. 525-536
Session 13: Privacy 2
- Zihao Shan, Zhan Qin, Leslie Ying, Kui Ren:
SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction. 537-550 - David Derler, Daniel Slamanig:
Highly-Efficient Fully-Anonymous Dynamic Group Signatures. 551-565 - Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati:
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System. 567-574
Session 14: CPU Security
- Samuel Weiser, Raphael Spreitzer, Lukas Bodner:
Single Trace Attack Against RSA Key Generation in Intel SGX SSL. 575-586 - Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. 587-600 - Sanchuan Chen, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, XiaoFeng Wang:
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. 601-608
Session 15: Network Security 2
- Maciej Korczynski, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane C. M. Moura, Arman Noroozian, Drew Bagley, Cristian Hesselman:
Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs. 609-623 - Hwanjo Heo, Seungwon Shin:
Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning. 625-636 - Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig:
Towards Sustainable Evolution for the TLS Public-Key Infrastructure. 637-649 - Jeremy Erickson, Qi Alfred Chen, Xiaochen Yu, Erinjen Lin, Robert Levy, Zhuoqing Morley Mao:
No One In The Middle: Enabling Network Access Control Via Transparent Attribution. 651-658
Session 16: Applied Crypto 2
- Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. 659-672 - Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri:
Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability. 673-684 - Nuttapong Attrapadung, Goichiro Hanaoka, Shigeo Mitsunari, Yusuke Sakai, Kana Shimizu, Tadanori Teruya:
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly. 685-697 - Michael T. Goodrich:
Isogrammic-Fusion ORAM: Improved Statistically Secure Privacy-Preserving Cloud Data Access for Thin Clients. 699-706
Session 17: Machine Learning 2
- M. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider, Farinaz Koushanfar:
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. 707-721 - Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou, Yang Xiang, Olivier Y. de Vel:
A Data-driven Attack against Support Vectors of SVM. 723-734 - Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, Junfeng Yang:
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning. 735-747
Session 18: Android
- Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, Stefan Mangard:
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android. 749-763 - Ioannis Gasparis, Azeem Aqil, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta, Edward Colbert:
Droid M+: Developer Support for Imbibing Android's New Permission Model. 765-776 - Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou, Jeff Offutt:
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities. 777-791
Poster Session
- Afsah Anwar, Aminollah Khormali, Aziz Mohaisen:
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. 793-795 - William Aiken, Hyoungshick Kim:
POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs. 797-799 - Kyeong Joo Jung, Bang Hun Lee, Yeon Nam Gung, Jun Seok Kim, Hyung Suk Kim, Ju Seong Han, Tomaspeter Kim, Bong Jun Choi:
POSTER: Undetectable Task Bypassing OS Scheduler via Hardware Task Switching. 801-803 - Hyun Kwon, Hyunsoo Yoon, Daeseon Choi:
POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense. 805-807 - Muhammad Saad, My T. Thai, Aziz Mohaisen:
POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. 809-811 - Taeyun Kim, Hyoungshick Kim:
POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption. 813-815 - Yuchen Zhao, Isabel Wagner:
POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. 817-819 - Anand Agrawal, Chuadhry Mujeeb Ahmed, Ee-Chien Chang:
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System. 821-823 - Fabio Martinelli, Francesco Mercaldo, Andrea Saracino:
POSTER: A Framework for Phylogenetic Analysis in Mobile Environment. 825-827 - Seungoh Choi, Woomyo Lee, Hyeok-Ki Shin, Jeong-Han Yun, Sin-Kyu Kim:
POSTER: CPS Security Testbed Development Using Controller-in-the-Middle. 829-831 - Jusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo, Hyoungshick Kim:
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System. 833-835 - HyukSang Kwon, Shahid Raza, JeongGil Ko:
POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices. 837-839 - Sungmin Kim, Joongheon Kim:
POSTER: Mining with Proof-of-Probability in Blockchain. 841-843 - Hosung Park, Daeyong Kwon, Seungsoo Nam, Daeseon Choi:
POSTER: Address Authentication Based on Location History. 845-847 - Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay:
POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. 849-851
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.