Search dblp for Publications

export results for "toc:db/conf/ccs/asiaccs2018.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/0001GLMSFM18,
  author       = {Michael Schwarz and
                  Daniel Gruss and
                  Moritz Lipp and
                  Cl{\'{e}}mentine Maurice and
                  Thomas Schuster and
                  Anders Fogh and
                  Stefan Mangard},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Automated Detection, Exploitation, and Elimination of Double-Fetch
                  Bugs using Modern {CPU} Features},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {587--600},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196508},
  doi          = {10.1145/3196494.3196508},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001GLMSFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0002ESO18,
  author       = {Ryan Johnson and
                  Mohamed Elsabagh and
                  Angelos Stavrou and
                  Jeff Offutt},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Dazed Droids: {A} Longitudinal Study of Android Inter-App Vulnerabilities},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {777--791},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196549},
  doi          = {10.1145/3196494.3196549},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0002ESO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AfzaliTCC18,
  author       = {Hammad Afzali and
                  Santiago Torres{-}Arias and
                  Reza Curtmola and
                  Justin Cappos},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {le-git-imate: Towards Verifiable Web-based Git Repositories},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {469--482},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196523},
  doi          = {10.1145/3196494.3196523},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AfzaliTCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalAC18,
  author       = {Anand Agrawal and
                  Chuadhry Mujeeb Ahmed and
                  Ee{-}Chien Chang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Poster: Physics-Based Attack Detection for an Insider Threat Model
                  in a Cyber-Physical System},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {821--823},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201587},
  doi          = {10.1145/3196494.3201587},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhmedOZMQMR18,
  author       = {Chuadhry Mujeeb Ahmed and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou and
                  Aditya P. Mathur and
                  Rizwan Qadeer and
                  Carlos Murguia and
                  Justin Ruths},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {\emph{NoisePrint}: Attack Detection Using Sensor and Process Noise
                  Fingerprint in Cyber Physical Systems},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {483--497},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196532},
  doi          = {10.1145/3196494.3196532},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AhmedOZMQMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AikenK18,
  author       = {William Aiken and
                  Hyoungshick Kim},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} DeepCRACk: Using Deep Learning to Automatically CRack Audio
                  CAPTCHAs},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {797--799},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201581},
  doi          = {10.1145/3196494.3201581},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AikenK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlamelouBCCFGS18,
  author       = {Quentin Alam{\'{e}}lou and
                  Paul{-}Edmond Berthier and
                  Chlo{\'{e}} Cachet and
                  St{\'{e}}phane Cauchie and
                  Benjamin Fuller and
                  Philippe Gaborit and
                  Sailesh Simhadri},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Pseudoentropic Isometries: {A} New Framework for Fuzzy Extractor Reusability},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {673--684},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196530},
  doi          = {10.1145/3196494.3196530},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AlamelouBCCFGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlwenGKKOPRRR18,
  author       = {Jo{\"{e}}l Alwen and
                  Peter Gazi and
                  Chethan Kamath and
                  Karen Klein and
                  Georg Osang and
                  Krzysztof Pietrzak and
                  Leonid Reyzin and
                  Michal Rol{\'{\i}}nek and
                  Michal Ryb{\'{a}}r},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {On the Memory-Hardness of Data-Independent Password-Hashing Functions},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {51--65},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196534},
  doi          = {10.1145/3196494.3196534},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AlwenGKKOPRRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AnwarKM18,
  author       = {Afsah Anwar and
                  Aminollah Khormali and
                  Aziz Mohaisen},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} Understanding the Hidden Cost of Software Vulnerabilities:
                  Measurements and Predictions},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {793--795},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201580},
  doi          = {10.1145/3196494.3201580},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AnwarKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AttrapadungHM0S18,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Shigeo Mitsunari and
                  Yusuke Sakai and
                  Kana Shimizu and
                  Tadanori Teruya},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Efficient Two-level Homomorphic Encryption in Prime-order Bilinear
                  Groups and {A} Fast Implementation in WebAssembly},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {685--697},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196552},
  doi          = {10.1145/3196494.3196552},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AttrapadungHM0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BertiKPPS18,
  author       = {Francesco Berti and
                  Fran{\c{c}}ois Koeune and
                  Olivier Pereira and
                  Thomas Peters and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Ciphertext Integrity with Misuse and Leakage: Definition and Efficient
                  Constructions with Symmetric Primitives},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {37--50},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196525},
  doi          = {10.1145/3196494.3196525},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BertiKPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhattacharjeeTD18,
  author       = {Shameek Bhattacharjee and
                  Aditya Thakur and
                  Sajal K. Das},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Towards Fast and Semi-supervised Identification of Smart Meters Launching
                  Data Falsification Attacks},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {173--185},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196551},
  doi          = {10.1145/3196494.3196551},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BhattacharjeeTD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlueAVT18,
  author       = {Logan Blue and
                  Hadi Abdullah and
                  Luis Vargas and
                  Patrick Traynor},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {2MA: Verifying Voice Commands via Two Microphone Authentication},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {89--100},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196545},
  doi          = {10.1145/3196494.3196545},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlueAVT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyapallyPCM18,
  author       = {Harishma Boyapally and
                  Sikhar Patranabis and
                  Urbi Chatterjee and
                  Debdeep Mukhopadhyay},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} Authenticated Key-Exchange Protocol for Heterogeneous {CPS}},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {849--851},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201594},
  doi          = {10.1145/3196494.3201594},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyapallyPCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BurowMCP18,
  author       = {Nathan Burow and
                  Derrick Paul McKee and
                  Scott A. Carr and
                  Mathias Payer},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{CUP:} Comprehensive User-Space Protection for {C/C++}},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {381--392},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196540},
  doi          = {10.1145/3196494.3196540},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BurowMCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CaoYASMY18,
  author       = {Yinzhi Cao and
                  Alexander Fangxiao Yu and
                  Andrew Aday and
                  Eric Stahl and
                  Jon Merwine and
                  Junfeng Yang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {735--747},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196517},
  doi          = {10.1145/3196494.3196517},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CaoYASMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CarpentERT18,
  author       = {Xavier Carpent and
                  Karim Eldefrawy and
                  Norrathep Rattanavipanon and
                  Gene Tsudik},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Temporal Consistency of Integrity-Ensuring Computations and Applications
                  to Embedded Systems Security},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {313--327},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196526},
  doi          = {10.1145/3196494.3196526},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CarpentERT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CelikMIPSAS18,
  author       = {Z. Berkay Celik and
                  Patrick D. McDaniel and
                  Rauf Izmailov and
                  Nicolas Papernot and
                  Ryan Sheatsley and
                  Raquel Alvarez and
                  Ananthram Swami},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Detection under Privileged Information},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {199--206},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196502},
  doi          = {10.1145/3196494.3196502},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CelikMIPSAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenLMZLCW18,
  author       = {Sanchuan Chen and
                  Fangfei Liu and
                  Zeyu Mi and
                  Yinqian Zhang and
                  Ruby B. Lee and
                  Haibo Chen and
                  XiaoFeng Wang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {601--608},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196501},
  doi          = {10.1145/3196494.3196501},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenLMZLCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChengHW18,
  author       = {Ke Cheng and
                  Yantian Hou and
                  Liangmin Wang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Secure Similar Sequence Query on Outsourced Genomic Data},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {237--251},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196535},
  doi          = {10.1145/3196494.3196535},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChengHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChengJLX18,
  author       = {Yushi Cheng and
                  Xiaoyu Ji and
                  Tianyang Lu and
                  Wenyuan Xu},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {DeWiCam: Detecting Hidden Wireless Cameras via Smartphones},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196509},
  doi          = {10.1145/3196494.3196509},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChengJLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiLSYK18,
  author       = {Seungoh Choi and
                  Woomyo Lee and
                  Hyeok{-}Ki Shin and
                  Jeong{-}Han Yun and
                  Sin{-}Kyu Kim},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} {CPS} Security Testbed Development Using Controller-in-the-Middle},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {829--831},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201589},
  doi          = {10.1145/3196494.3201589},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiLSYK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiOAWK18,
  author       = {Jusop Choi and
                  Taekkyung Oh and
                  William Aiken and
                  Simon S. Woo and
                  Hyoungshick Kim},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} {I} Can't Hear This Because {I} Am Human: {A} Novel Design
                  of Audio {CAPTCHA} System},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {833--835},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201590},
  doi          = {10.1145/3196494.3201590},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiOAWK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DalskovO18,
  author       = {Anders P. K. Dalskov and
                  Claudio Orlandi},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's
                  Security},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {343--355},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196547},
  doi          = {10.1145/3196494.3196547},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DalskovO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DerlerS18,
  author       = {David Derler and
                  Daniel Slamanig},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Highly-Efficient Fully-Anonymous Dynamic Group Signatures},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {551--565},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196507},
  doi          = {10.1145/3196494.3196507},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DerlerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DeshotelsDCMECL18,
  author       = {Luke Deshotels and
                  Razvan Deaconescu and
                  Costin Carabas and
                  Iulia Manda and
                  William Enck and
                  Mihai Chiroiu and
                  Ninghui Li and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {iOracle: Automated Evaluation of Access Control Policies in iOS},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {117--131},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196527},
  doi          = {10.1145/3196494.3196527},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DeshotelsDCMECL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EricksonCYLLM18,
  author       = {Jeremy Erickson and
                  Qi Alfred Chen and
                  Xiaochen Yu and
                  Erinjen Lin and
                  Robert Levy and
                  Zhuoqing Morley Mao},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {No One In The Middle: Enabling Network Access Control Via Transparent
                  Attribution},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {651--658},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196498},
  doi          = {10.1145/3196494.3196498},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/EricksonCYLLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GambsL018,
  author       = {S{\'{e}}bastien Gambs and
                  Julien Lolive and
                  Jean{-}Marc Robert},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Entwining Sanitization and Personalization on Databases},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {207--219},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196536},
  doi          = {10.1145/3196494.3196536},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GambsL018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoLY0GY18,
  author       = {Shang Gao and
                  Zecheng Li and
                  Yuan Yao and
                  Bin Xiao and
                  Songtao Guo and
                  Yuanyuan Yang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Software-Defined Firewall: Enabling Malware Traffic Detection and
                  Programmable Security Control},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {413--424},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196519},
  doi          = {10.1145/3196494.3196519},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GaoLY0GY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GasparisAQSK0C18,
  author       = {Ioannis Gasparis and
                  Azeem Aqil and
                  Zhiyun Qian and
                  Chengyu Song and
                  Srikanth V. Krishnamurthy and
                  Rajiv Gupta and
                  Edward Colbert},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Droid {M+:} Developer Support for Imbibing Android's New Permission
                  Model},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {765--776},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196533},
  doi          = {10.1145/3196494.3196533},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GasparisAQSK0C18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GiechaskielRE18,
  author       = {Ilias Giechaskiel and
                  Kasper Bonne Rasmussen and
                  Ken Eguro},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Leaky Wires: Information Leakage and Covert Communication Between
                  {FPGA} Long Wires},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196518},
  doi          = {10.1145/3196494.3196518},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GiechaskielRE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Goodrich18,
  author       = {Michael T. Goodrich},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Isogrammic-Fusion {ORAM:} Improved Statistically Secure Privacy-Preserving
                  Cloud Data Access for Thin Clients},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {699--706},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196500},
  doi          = {10.1145/3196494.3196500},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Goodrich18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gruss0WGMML18,
  author       = {Daniel Gruss and
                  Michael Schwarz and
                  Matthias W{\"{u}}bbeling and
                  Simon Guggi and
                  Timo Malderle and
                  Stefan More and
                  Moritz Lipp},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying
                  it to Email Services},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {297--311},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196514},
  doi          = {10.1145/3196494.3196514},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Gruss0WGMML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GuptaPA18,
  author       = {Payas Gupta and
                  Roberto Perdisci and
                  Mustaque Ahamad},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Towards Measuring the Role of Phone Numbers in Twitter-Advertised
                  Spam},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {285--296},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196516},
  doi          = {10.1145/3196494.3196516},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GuptaPA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HendlerKR18,
  author       = {Danny Hendler and
                  Shay Kels and
                  Amir Rubin},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Detecting Malicious PowerShell Commands using Deep Neural Networks},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {187--197},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196511},
  doi          = {10.1145/3196494.3196511},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HendlerKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeoS18,
  author       = {Hwanjo Heo and
                  Seungwon Shin},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Who is knocking on the Telnet Port: {A} Large-Scale Empirical Study
                  of Network Scanning},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {625--636},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196537},
  doi          = {10.1145/3196494.3196537},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HeoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HutchinsRJZLY18,
  author       = {Ben Hutchins and
                  Anudeep Reddy and
                  Wenqiang Jin and
                  Michael Zhou and
                  Ming Li and
                  Lei Yang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {\emph{Beat-PIN}: {A} User Authentication Mechanism for Wearable Devices
                  Through Secret Beats},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {101--115},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196543},
  doi          = {10.1145/3196494.3196543},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HutchinsRJZLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JungLGKKHKC18,
  author       = {Kyeong Joo Jung and
                  Bang Hun Lee and
                  Yeon Nam Gung and
                  Jun Seok Kim and
                  Hyung Suk Kim and
                  Ju Seong Han and
                  Tomaspeter Kim and
                  Bong Jun Choi},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} Undetectable Task Bypassing {OS} Scheduler via Hardware
                  Task Switching},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {801--803},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201582},
  doi          = {10.1145/3196494.3201582},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JungLGKKHKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarandeCLCKH18,
  author       = {Vishal Karande and
                  Swarup Chandra and
                  Zhiqiang Lin and
                  Juan Caballero and
                  Latifur Khan and
                  Kevin W. Hamlen},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{BCD:} Decomposing Binary Code Into Components Using Graph-Based Clustering},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {393--398},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196504},
  doi          = {10.1145/3196494.3196504},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KarandeCLCKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimK18,
  author       = {Taeyun Kim and
                  Hyoungshick Kim},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} Can We Use Biometric Authentication on Cloud?: Fingerprint
                  Authentication Using Homomorphic Encryption},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {813--815},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201585},
  doi          = {10.1145/3196494.3201585},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KimK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimK18a,
  author       = {Sungmin Kim and
                  Joongheon Kim},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} Mining with Proof-of-Probability in Blockchain},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {841--843},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201592},
  doi          = {10.1145/3196494.3201592},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KimK18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KohnhauserB018,
  author       = {Florian Kohnh{\"{a}}user and
                  Niklas B{\"{u}}scher and
                  Stefan Katzenbeisser},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{SALAD:} Secure and Lightweight Attestation of Highly Dynamic and
                  Disruptive Networks},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {329--342},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196544},
  doi          = {10.1145/3196494.3196544},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KohnhauserB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KorczynskiWTMNB18,
  author       = {Maciej Korczynski and
                  Maarten Wullink and
                  Samaneh Tajalizadehkhoob and
                  Giovane C. M. Moura and
                  Arman Noroozian and
                  Drew Bagley and
                  Cristian Hesselman},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Cybercrime After the Sunrise: {A} Statistical Analysis of {DNS} Abuse
                  in New gTLDs},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {609--623},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196548},
  doi          = {10.1145/3196494.3196548},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KorczynskiWTMNB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KumarLLAPBWZ18,
  author       = {Vireshwar Kumar and
                  He Li and
                  Noah Luther and
                  Pranav Asokan and
                  Jung{-}Min "Jerry" Park and
                  Kaigui Bian and
                  Martin B. H. Weiss and
                  Taieb Znati},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Direct Anonymous Attestation with Efficient Verifier-Local Revocation
                  for Subscription System},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {567--574},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196497},
  doi          = {10.1145/3196494.3196497},
  timestamp    = {Sat, 26 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KumarLLAPBWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KwonRK18,
  author       = {HyukSang Kwon and
                  Shahid Raza and
                  JeongGil Ko},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} On Compressing {PKI} Certificates for Resource Limited Internet
                  of Things Devices},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {837--839},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201591},
  doi          = {10.1145/3196494.3201591},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KwonRK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KwonYC18,
  author       = {Hyun Kwon and
                  Hyunsoo Yoon and
                  Daeseon Choi},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} Zero-Day Evasion Attack Analysis on Race between Attack
                  and Defense},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {805--807},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201583},
  doi          = {10.1145/3196494.3201583},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KwonYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeePSP18,
  author       = {Taeho Lee and
                  Christos Pappas and
                  Pawel Szalachowski and
                  Adrian Perrig},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Towards Sustainable Evolution for the {TLS} Public-Key Infrastructure},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {637--649},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196520},
  doi          = {10.1145/3196494.3196520},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeePSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiJZZTZX18,
  author       = {Chaohao Li and
                  Xiaoyu Ji and
                  Xinyan Zhou and
                  Juchuan Zhang and
                  Jing Tian and
                  Yanmiao Zhang and
                  Wenyuan Xu},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {HlcAuth: Key-free and Secure Communications via Home-Limited Channel},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {29--35},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196499},
  doi          = {10.1145/3196494.3196499},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiJZZTZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LinAVM18,
  author       = {Qin Lin and
                  Sridhar Adepu and
                  Sicco Verwer and
                  Aditya Mathur},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{TABOR:} {A} Graphical Model-based Approach for Anomaly Detection
                  in Industrial Control Systems},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {525--536},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196546},
  doi          = {10.1145/3196494.3196546},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LinAVM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuRDJ18,
  author       = {Hanqing Liu and
                  Na Ruan and
                  Rongtian Du and
                  Weijia Jia},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {On the Strategy and Behavior of Bitcoin Mining with N-attackers},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {357--368},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196512},
  doi          = {10.1145/3196494.3196512},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuRDJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuRPDS18,
  author       = {Jienan Liu and
                  Babak Rahbarinia and
                  Roberto Perdisci and
                  Haitao Du and
                  Li Su},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Augmenting Telephone Spam Blacklists by Mining Large {CDR} Datasets},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {273--284},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196553},
  doi          = {10.1145/3196494.3196553},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuRPDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuZWZ0V18,
  author       = {Shigang Liu and
                  Jun Zhang and
                  Yu Wang and
                  Wanlei Zhou and
                  Yang Xiang and
                  Olivier Y. de Vel},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {A Data-driven Attack against Support Vectors of {SVM}},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {723--734},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196539},
  doi          = {10.1145/3196494.3196539},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuZWZ0V18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuZS18,
  author       = {Wenjie Lu and
                  Jun{-}Jie Zhou and
                  Jun Sakuma},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Non-interactive and Output Expressive Private Comparison from Homomorphic
                  Encryption},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {67--74},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196503},
  doi          = {10.1145/3196494.3196503},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaggiBFGC18,
  author       = {Federico Maggi and
                  Marco Balduzzi and
                  Ryan Flores and
                  Lion Gu and
                  Vincenzo Ciancaglini},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Investigating Web Defacement Campaigns at Large},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {443--456},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196542},
  doi          = {10.1145/3196494.3196542},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaggiBFGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MartinelliMS18,
  author       = {Fabio Martinelli and
                  Francesco Mercaldo and
                  Andrea Saracino},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} {A} Framework for Phylogenetic Analysis in Mobile Environment},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {825--827},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201588},
  doi          = {10.1145/3196494.3201588},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MartinelliMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MuslukhovBB18,
  author       = {Ildar Muslukhov and
                  Yazan Boshmaf and
                  Konstantin Beznosov},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Source Attribution of Cryptographic {API} Misuse in Android Applications},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {133--146},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196538},
  doi          = {10.1145/3196494.3196538},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MuslukhovBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NashimotoSSS18,
  author       = {Shoei Nashimoto and
                  Daisuke Suzuki and
                  Takeshi Sugawara and
                  Kazuo Sakiyama},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {511--524},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196506},
  doi          = {10.1145/3196494.3196506},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NashimotoSSS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OakleyHCCIK18,
  author       = {Ian Oakley and
                  Jun Ho Huh and
                  Junsung Cho and
                  Geumhwan Cho and
                  Md. Rasel Islam and
                  Hyoungshick Kim},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {The Personal Identification Chord: {A} Four ButtonAuthentication System
                  for Smartwatches},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {75--87},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196555},
  doi          = {10.1145/3196494.3196555},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/OakleyHCCIK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PapadopoulosCAM18,
  author       = {Panagiotis Papadopoulos and
                  Antonios A. Chariton and
                  Elias Athanasopoulos and
                  Evangelos P. Markatos},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Where's Wally?: How to Privately Discover your Friends on the Internet},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {425--430},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196496},
  doi          = {10.1145/3196494.3196496},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PapadopoulosCAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Pariwono0AM18,
  author       = {Elkana Pariwono and
                  Daiki Chiba and
                  Mitsuaki Akiyama and
                  Tatsuya Mori},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Don't throw me away: Threats Caused by the Abandoned Internet Resources
                  Used by Android Apps},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {147--158},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196554},
  doi          = {10.1145/3196494.3196554},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Pariwono0AM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ParkKNC18,
  author       = {Hosung Park and
                  Daeyong Kwon and
                  Seungsoo Nam and
                  Daeseon Choi},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} Address Authentication Based on Location History},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {845--847},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201593},
  doi          = {10.1145/3196494.3201593},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ParkKNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RiaziWTS0K18,
  author       = {M. Sadegh Riazi and
                  Christian Weinert and
                  Oleksandr Tkachenko and
                  Ebrahim M. Songhori and
                  Thomas Schneider and
                  Farinaz Koushanfar},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Chameleon: {A} Hybrid Secure Computation Framework for Machine Learning
                  Applications},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {707--721},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196522},
  doi          = {10.1145/3196494.3196522},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RiaziWTS0K18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SaadTM18,
  author       = {Muhammad Saad and
                  My T. Thai and
                  Aziz Mohaisen},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} Deterring DDoS Attacks on Blockchain-based Cryptocurrencies
                  through Mempool Optimization},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {809--811},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201584},
  doi          = {10.1145/3196494.3201584},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SaadTM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SelvarajDGWGM18,
  author       = {Jayaprakash Selvaraj and
                  G{\"{o}}k{\c{c}}en Yilmaz Dayanikli and
                  Neelam Prabhu Gaunkar and
                  David Ware and
                  Ryan M. Gerdes and
                  Mani Mina},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Electromagnetic Induction Attacks Against Embedded Systems},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {499--510},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196556},
  doi          = {10.1145/3196494.3196556},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SelvarajDGWGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShanQY018,
  author       = {Zihao Shan and
                  Zhan Qin and
                  Leslie Ying and
                  Kui Ren},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {SecSAKE: Towards Secure and Efficient Outsourcing of Clinical {MRI}
                  Reconstruction},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {537--550},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196513},
  doi          = {10.1145/3196494.3196513},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShanQY018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SpreitzerKGM18,
  author       = {Raphael Spreitzer and
                  Felix Kirchengast and
                  Daniel Gruss and
                  Stefan Mangard},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks
                  on Android},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {749--763},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196510},
  doi          = {10.1145/3196494.3196510},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SpreitzerKGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TkachenkoW0H18,
  author       = {Oleksandr Tkachenko and
                  Christian Weinert and
                  Thomas Schneider and
                  Kay Hamacher},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Large-Scale Privacy-Preserving Statistical Computations for Distributed
                  Genome-Wide Association Studies},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {221--235},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196541},
  doi          = {10.1145/3196494.3196541},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TkachenkoW0H18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WakedMY18,
  author       = {Louis Waked and
                  Mohammad Mannan and
                  Amr M. Youssef},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {To Intercept or Not to Intercept: Analyzing {TLS} Interception in
                  Network Appliances},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {399--412},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196528},
  doi          = {10.1145/3196494.3196528},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WakedMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangPWW18,
  author       = {Xiangwen Wang and
                  Peng Peng and
                  Chun Wang and
                  Gang Wang},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {You Are Your Photographs: Detecting Multiple Identities of Vendors
                  in the Darknet Marketplaces},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {431--442},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196529},
  doi          = {10.1145/3196494.3196529},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangPWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WeiserSB18,
  author       = {Samuel Weiser and
                  Raphael Spreitzer and
                  Lukas Bodner},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Single Trace Attack Against {RSA} Key Generation in Intel {SGX} {SSL}},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {575--586},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196524},
  doi          = {10.1145/3196494.3196524},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WeiserSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YuAYLX18,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Rupeng Yang and
                  Junzuo Lai and
                  Qiuliang Xu},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Achieving Flexibility for {ABE} with Outsourcing via Proxy Re-Encryption},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {659--672},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196557},
  doi          = {10.1145/3196494.3196557},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YuAYLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangGJWSHM18,
  author       = {Jialong Zhang and
                  Zhongshu Gu and
                  Jiyong Jang and
                  Hui Wu and
                  Marc Ph. Stoecklin and
                  Heqing Huang and
                  Ian M. Molloy},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Protecting Intellectual Property of Deep Neural Networks with Watermarking},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {159--172},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196550},
  doi          = {10.1145/3196494.3196550},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangGJWSHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoC18,
  author       = {Liang Zhao and
                  Liqun Chen},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {A Linear Distinguisher and its Application for Analyzing Privacy-Preserving
                  Transformation Used in Verifiable (Outsourced) Computation},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {253--260},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196505},
  doi          = {10.1145/3196494.3196505},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhaoC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoW18,
  author       = {Yuchen Zhao and
                  Isabel Wagner},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {{POSTER:} Evaluating Privacy Metrics for Graph Anonymization and De-anonymization},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {817--819},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3201586},
  doi          = {10.1145/3196494.3201586},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhaoW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouGJEJ18,
  author       = {Boyou Zhou and
                  Anmol Gupta and
                  Rasoul Jahanshahi and
                  Manuel Egele and
                  Ajay Joshi},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Hardware Performance Counters Can Detect Malware: Myth or Fact?},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {457--468},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196515},
  doi          = {10.1145/3196494.3196515},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouGJEJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuangJZZXLL18,
  author       = {Zhou Zhuang and
                  Xiaoyu Ji and
                  Taimin Zhang and
                  Juchuan Zhang and
                  Wenyuan Xu and
                  Zhenhua Li and
                  Yunhao Liu},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {261--272},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196521},
  doi          = {10.1145/3196494.3196521},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuangJZZXLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZierisH18,
  author       = {Philipp Zieris and
                  Julian Horsch},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow
                  Integrity},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {369--380},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196531},
  doi          = {10.1145/3196494.3196531},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZierisH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2018asia,
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494},
  doi          = {10.1145/3196494},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2018asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics