


default search action
13th AsiaCCS 2018: Incheon, Republic of Korea
- Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:

Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018
Session 1: Embedded System Security
- Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:

DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. 1-13 - Ilias Giechaskiel

, Kasper Bonne Rasmussen, Ken Eguro:
Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires. 15-27 - Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu:

HlcAuth: Key-free and Secure Communications via Home-Limited Channel. 29-35
Session 2: Applied Crypto 1
- Francesco Berti

, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert
:
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. 37-50 - Joël Alwen, Peter Gazi, Chethan Kamath

, Karen Klein
, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár:
On the Memory-Hardness of Data-Independent Password-Hashing Functions. 51-65 - Wenjie Lu, Jun-Jie Zhou, Jun Sakuma:

Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption. 67-74
Session 3: Authentication
- Ian Oakley, Jun Ho Huh, Junsung Cho

, Geumhwan Cho
, Md. Rasel Islam, Hyoungshick Kim:
The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches. 75-87 - Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor:

2MA: Verifying Voice Commands via Two Microphone Authentication. 89-100 - Ben Hutchins, Anudeep Reddy, Wenqiang Jin, Michael Zhou, Ming Li, Lei Yang:

Beat-PIN: A User Authentication Mechanism for Wearable Devices Through Secret Beats. 101-115
Session 4: Mobile
- Luke Deshotels, Razvan Deaconescu

, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi:
iOracle: Automated Evaluation of Access Control Policies in iOS. 117-131 - Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov:

Source Attribution of Cryptographic API Misuse in Android Applications. 133-146 - Elkana Pariwono, Daiki Chiba

, Mitsuaki Akiyama, Tatsuya Mori
:
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps. 147-158
Session 5: Machine Learning 1
- Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian M. Molloy:

Protecting Intellectual Property of Deep Neural Networks with Watermarking. 159-172 - Shameek Bhattacharjee

, Aditya Thakur, Sajal K. Das
:
Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks. 173-185 - Danny Hendler, Shay Kels, Amir Rubin:

Detecting Malicious PowerShell Commands using Deep Neural Networks. 187-197 - Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami:

Detection under Privileged Information. 199-206
Session 6: Privacy 1
- Sébastien Gambs, Julien Lolive, Jean-Marc Robert:

Entwining Sanitization and Personalization on Databases. 207-219 - Oleksandr Tkachenko

, Christian Weinert
, Thomas Schneider
, Kay Hamacher:
Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies. 221-235 - Ke Cheng, Yantian Hou, Liangmin Wang

:
Secure Similar Sequence Query on Outsourced Genomic Data. 237-251 - Liang Zhao

, Liqun Chen
:
A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation. 253-260
Session 7: Cellular, Phone, and Email
- Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu:

FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. 261-272 - Jienan Liu, Babak Rahbarinia, Roberto Perdisci

, Haitao Du, Li Su:
Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets. 273-284 - Payas Gupta, Roberto Perdisci

, Mustaque Ahamad:
Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam. 285-296 - Daniel Gruss

, Michael Schwarz, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More
, Moritz Lipp:
Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. 297-311
Session 8: Trust
- Xavier Carpent

, Karim Eldefrawy, Norrathep Rattanavipanon
, Gene Tsudik:
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security. 313-327 - Florian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser:

SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks. 329-342 - Anders P. K. Dalskov

, Claudio Orlandi
:
Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security. 343-355 - Hanqing Liu, Na Ruan, Rongtian Du, Weijia Jia

:
On the Strategy and Behavior of Bitcoin Mining with N-attackers. 357-368
Session 9: Software Security
- Philipp Zieris

, Julian Horsch
:
A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity. 369-380 - Nathan Burow, Derrick Paul McKee

, Scott A. Carr, Mathias Payer:
CUP: Comprehensive User-Space Protection for C/C++. 381-392 - Vishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan

, Kevin W. Hamlen:
BCD: Decomposing Binary Code Into Components Using Graph-Based Clustering. 393-398
Session 10: Network Security 1
- Louis Waked, Mohammad Mannan, Amr M. Youssef:

To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. 399-412 - Shang Gao

, Zecheng Li, Yuan Yao, Bin Xiao
, Songtao Guo, Yuanyuan Yang
:
Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control. 413-424 - Panagiotis Papadopoulos

, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos:
Where's Wally?: How to Privately Discover your Friends on the Internet. 425-430
Session 11: Malware and Web
- Xiangwen Wang

, Peng Peng, Chun Wang, Gang Wang:
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces. 431-442 - Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini:

Investigating Web Defacement Campaigns at Large. 443-456 - Boyou Zhou

, Anmol Gupta, Rasoul Jahanshahi, Manuel Egele, Ajay Joshi:
Hardware Performance Counters Can Detect Malware: Myth or Fact? 457-468 - Hammad Afzali, Santiago Torres-Arias

, Reza Curtmola, Justin Cappos:
le-git-imate: Towards Verifiable Web-based Git Repositories. 469-482
Session 12: Physical Attacks and Defense
- Chuadhry Mujeeb Ahmed

, Martín Ochoa, Jianying Zhou
, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia
, Justin Ruths:
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. 483-497 - Jayaprakash Selvaraj, Gökçen Yilmaz Dayanikli, Neelam Prabhu Gaunkar, David Ware, Ryan M. Gerdes, Mani Mina:

Electromagnetic Induction Attacks Against Embedded Systems. 499-510 - Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara

, Kazuo Sakiyama:
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack. 511-524 - Qin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur:

TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems. 525-536
Session 13: Privacy 2
- Zihao Shan, Zhan Qin

, Leslie Ying
, Kui Ren:
SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction. 537-550 - David Derler

, Daniel Slamanig
:
Highly-Efficient Fully-Anonymous Dynamic Group Signatures. 551-565 - Vireshwar Kumar

, He Li, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati:
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System. 567-574
Session 14: CPU Security
- Samuel Weiser, Raphael Spreitzer

, Lukas Bodner:
Single Trace Attack Against RSA Key Generation in Intel SGX SSL. 575-586 - Michael Schwarz, Daniel Gruss

, Moritz Lipp, Clémentine Maurice
, Thomas Schuster, Anders Fogh, Stefan Mangard
:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. 587-600 - Sanchuan Chen

, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, XiaoFeng Wang:
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. 601-608
Session 15: Network Security 2
- Maciej Korczynski, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane C. M. Moura, Arman Noroozian, Drew Bagley, Cristian Hesselman:

Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs. 609-623 - Hwanjo Heo, Seungwon Shin:

Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning. 625-636 - Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig:

Towards Sustainable Evolution for the TLS Public-Key Infrastructure. 637-649 - Jeremy Erickson, Qi Alfred Chen, Xiaochen Yu, Erinjen Lin, Robert Levy, Zhuoqing Morley Mao:

No One In The Middle: Enabling Network Access Control Via Transparent Attribution. 651-658
Session 16: Applied Crypto 2
- Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:

Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. 659-672 - Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller

, Philippe Gaborit, Sailesh Simhadri:
Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability. 673-684 - Nuttapong Attrapadung, Goichiro Hanaoka, Shigeo Mitsunari

, Yusuke Sakai, Kana Shimizu, Tadanori Teruya:
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly. 685-697 - Michael T. Goodrich

:
Isogrammic-Fusion ORAM: Improved Statistically Secure Privacy-Preserving Cloud Data Access for Thin Clients. 699-706
Session 17: Machine Learning 2
- M. Sadegh Riazi, Christian Weinert

, Oleksandr Tkachenko
, Ebrahim M. Songhori, Thomas Schneider
, Farinaz Koushanfar
:
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. 707-721 - Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou

, Yang Xiang, Olivier Y. de Vel:
A Data-driven Attack against Support Vectors of SVM. 723-734 - Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, Junfeng Yang:

Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning. 735-747
Session 18: Android
- Raphael Spreitzer

, Felix Kirchengast, Daniel Gruss
, Stefan Mangard
:
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android. 749-763 - Ioannis Gasparis, Azeem Aqil, Zhiyun Qian

, Chengyu Song
, Srikanth V. Krishnamurthy
, Rajiv Gupta
, Edward Colbert:
Droid M+: Developer Support for Imbibing Android's New Permission Model. 765-776 - Ryan Johnson, Mohamed Elsabagh

, Angelos Stavrou
, Jeff Offutt:
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities. 777-791
Poster Session
- Afsah Anwar, Aminollah Khormali, Aziz Mohaisen:

POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. 793-795 - William Aiken, Hyoungshick Kim:

POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs. 797-799 - Kyeong Joo Jung, Bang Hun Lee, Yeon Nam Gung, Jun Seok Kim, Hyung Suk Kim, Ju Seong Han, Tomaspeter Kim, Bong Jun Choi

:
POSTER: Undetectable Task Bypassing OS Scheduler via Hardware Task Switching. 801-803 - Hyun Kwon

, Hyunsoo Yoon, Daeseon Choi:
POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense. 805-807 - Muhammad Saad, My T. Thai, Aziz Mohaisen:

POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. 809-811 - Taeyun Kim, Hyoungshick Kim:

POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption. 813-815 - Yuchen Zhao

, Isabel Wagner
:
POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. 817-819 - Anand Agrawal, Chuadhry Mujeeb Ahmed

, Ee-Chien Chang
:
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System. 821-823 - Fabio Martinelli, Francesco Mercaldo, Andrea Saracino

:
POSTER: A Framework for Phylogenetic Analysis in Mobile Environment. 825-827 - Seungoh Choi, Woomyo Lee, Hyeok-Ki Shin, Jeong-Han Yun, Sin-Kyu Kim:

POSTER: CPS Security Testbed Development Using Controller-in-the-Middle. 829-831 - Jusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo, Hyoungshick Kim:

POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System. 833-835 - HyukSang Kwon, Shahid Raza

, JeongGil Ko:
POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices. 837-839 - Sungmin Kim, Joongheon Kim

:
POSTER: Mining with Proof-of-Probability in Blockchain. 841-843 - Hosung Park, Daeyong Kwon, Seungsoo Nam, Daeseon Choi:

POSTER: Address Authentication Based on Location History. 845-847 - Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay:

POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. 849-851

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














