Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/asiaccs2018.bht:"
@inproceedings{DBLP:conf/ccs/0001GLMSFM18, author = {Michael Schwarz and Daniel Gruss and Moritz Lipp and Cl{\'{e}}mentine Maurice and Thomas Schuster and Anders Fogh and Stefan Mangard}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern {CPU} Features}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {587--600}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196508}, doi = {10.1145/3196494.3196508}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001GLMSFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0002ESO18, author = {Ryan Johnson and Mohamed Elsabagh and Angelos Stavrou and Jeff Offutt}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Dazed Droids: {A} Longitudinal Study of Android Inter-App Vulnerabilities}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {777--791}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196549}, doi = {10.1145/3196494.3196549}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0002ESO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AfzaliTCC18, author = {Hammad Afzali and Santiago Torres{-}Arias and Reza Curtmola and Justin Cappos}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {le-git-imate: Towards Verifiable Web-based Git Repositories}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {469--482}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196523}, doi = {10.1145/3196494.3196523}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AfzaliTCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalAC18, author = {Anand Agrawal and Chuadhry Mujeeb Ahmed and Ee{-}Chien Chang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {821--823}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201587}, doi = {10.1145/3196494.3201587}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhmedOZMQMR18, author = {Chuadhry Mujeeb Ahmed and Mart{\'{\i}}n Ochoa and Jianying Zhou and Aditya P. Mathur and Rizwan Qadeer and Carlos Murguia and Justin Ruths}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {\emph{NoisePrint}: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {483--497}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196532}, doi = {10.1145/3196494.3196532}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AhmedOZMQMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AikenK18, author = {William Aiken and Hyoungshick Kim}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {797--799}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201581}, doi = {10.1145/3196494.3201581}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AikenK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlamelouBCCFGS18, author = {Quentin Alam{\'{e}}lou and Paul{-}Edmond Berthier and Chlo{\'{e}} Cachet and St{\'{e}}phane Cauchie and Benjamin Fuller and Philippe Gaborit and Sailesh Simhadri}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Pseudoentropic Isometries: {A} New Framework for Fuzzy Extractor Reusability}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {673--684}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196530}, doi = {10.1145/3196494.3196530}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AlamelouBCCFGS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlwenGKKOPRRR18, author = {Jo{\"{e}}l Alwen and Peter Gazi and Chethan Kamath and Karen Klein and Georg Osang and Krzysztof Pietrzak and Leonid Reyzin and Michal Rol{\'{\i}}nek and Michal Ryb{\'{a}}r}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {On the Memory-Hardness of Data-Independent Password-Hashing Functions}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {51--65}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196534}, doi = {10.1145/3196494.3196534}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AlwenGKKOPRRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AnwarKM18, author = {Afsah Anwar and Aminollah Khormali and Aziz Mohaisen}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {793--795}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201580}, doi = {10.1145/3196494.3201580}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AnwarKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AttrapadungHM0S18, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Shigeo Mitsunari and Yusuke Sakai and Kana Shimizu and Tadanori Teruya}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and {A} Fast Implementation in WebAssembly}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {685--697}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196552}, doi = {10.1145/3196494.3196552}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AttrapadungHM0S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BertiKPPS18, author = {Francesco Berti and Fran{\c{c}}ois Koeune and Olivier Pereira and Thomas Peters and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {37--50}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196525}, doi = {10.1145/3196494.3196525}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BertiKPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhattacharjeeTD18, author = {Shameek Bhattacharjee and Aditya Thakur and Sajal K. Das}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {173--185}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196551}, doi = {10.1145/3196494.3196551}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BhattacharjeeTD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlueAVT18, author = {Logan Blue and Hadi Abdullah and Luis Vargas and Patrick Traynor}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {2MA: Verifying Voice Commands via Two Microphone Authentication}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {89--100}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196545}, doi = {10.1145/3196494.3196545}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlueAVT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyapallyPCM18, author = {Harishma Boyapally and Sikhar Patranabis and Urbi Chatterjee and Debdeep Mukhopadhyay}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} Authenticated Key-Exchange Protocol for Heterogeneous {CPS}}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {849--851}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201594}, doi = {10.1145/3196494.3201594}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyapallyPCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BurowMCP18, author = {Nathan Burow and Derrick Paul McKee and Scott A. Carr and Mathias Payer}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{CUP:} Comprehensive User-Space Protection for {C/C++}}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {381--392}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196540}, doi = {10.1145/3196494.3196540}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BurowMCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoYASMY18, author = {Yinzhi Cao and Alexander Fangxiao Yu and Andrew Aday and Eric Stahl and Jon Merwine and Junfeng Yang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {735--747}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196517}, doi = {10.1145/3196494.3196517}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaoYASMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CarpentERT18, author = {Xavier Carpent and Karim Eldefrawy and Norrathep Rattanavipanon and Gene Tsudik}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {313--327}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196526}, doi = {10.1145/3196494.3196526}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CarpentERT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CelikMIPSAS18, author = {Z. Berkay Celik and Patrick D. McDaniel and Rauf Izmailov and Nicolas Papernot and Ryan Sheatsley and Raquel Alvarez and Ananthram Swami}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Detection under Privileged Information}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {199--206}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196502}, doi = {10.1145/3196494.3196502}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CelikMIPSAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenLMZLCW18, author = {Sanchuan Chen and Fangfei Liu and Zeyu Mi and Yinqian Zhang and Ruby B. Lee and Haibo Chen and XiaoFeng Wang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {601--608}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196501}, doi = {10.1145/3196494.3196501}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenLMZLCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChengHW18, author = {Ke Cheng and Yantian Hou and Liangmin Wang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Secure Similar Sequence Query on Outsourced Genomic Data}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {237--251}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196535}, doi = {10.1145/3196494.3196535}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChengHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChengJLX18, author = {Yushi Cheng and Xiaoyu Ji and Tianyang Lu and Wenyuan Xu}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {DeWiCam: Detecting Hidden Wireless Cameras via Smartphones}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {1--13}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196509}, doi = {10.1145/3196494.3196509}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChengJLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiLSYK18, author = {Seungoh Choi and Woomyo Lee and Hyeok{-}Ki Shin and Jeong{-}Han Yun and Sin{-}Kyu Kim}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} {CPS} Security Testbed Development Using Controller-in-the-Middle}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {829--831}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201589}, doi = {10.1145/3196494.3201589}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChoiLSYK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiOAWK18, author = {Jusop Choi and Taekkyung Oh and William Aiken and Simon S. Woo and Hyoungshick Kim}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} {I} Can't Hear This Because {I} Am Human: {A} Novel Design of Audio {CAPTCHA} System}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {833--835}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201590}, doi = {10.1145/3196494.3201590}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChoiOAWK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DalskovO18, author = {Anders P. K. Dalskov and Claudio Orlandi}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's Security}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {343--355}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196547}, doi = {10.1145/3196494.3196547}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DalskovO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DerlerS18, author = {David Derler and Daniel Slamanig}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Highly-Efficient Fully-Anonymous Dynamic Group Signatures}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {551--565}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196507}, doi = {10.1145/3196494.3196507}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DerlerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DeshotelsDCMECL18, author = {Luke Deshotels and Razvan Deaconescu and Costin Carabas and Iulia Manda and William Enck and Mihai Chiroiu and Ninghui Li and Ahmad{-}Reza Sadeghi}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {iOracle: Automated Evaluation of Access Control Policies in iOS}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {117--131}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196527}, doi = {10.1145/3196494.3196527}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DeshotelsDCMECL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EricksonCYLLM18, author = {Jeremy Erickson and Qi Alfred Chen and Xiaochen Yu and Erinjen Lin and Robert Levy and Zhuoqing Morley Mao}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {No One In The Middle: Enabling Network Access Control Via Transparent Attribution}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {651--658}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196498}, doi = {10.1145/3196494.3196498}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EricksonCYLLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GambsL018, author = {S{\'{e}}bastien Gambs and Julien Lolive and Jean{-}Marc Robert}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Entwining Sanitization and Personalization on Databases}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {207--219}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196536}, doi = {10.1145/3196494.3196536}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GambsL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoLY0GY18, author = {Shang Gao and Zecheng Li and Yuan Yao and Bin Xiao and Songtao Guo and Yuanyuan Yang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {413--424}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196519}, doi = {10.1145/3196494.3196519}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GaoLY0GY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GasparisAQSK0C18, author = {Ioannis Gasparis and Azeem Aqil and Zhiyun Qian and Chengyu Song and Srikanth V. Krishnamurthy and Rajiv Gupta and Edward Colbert}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Droid {M+:} Developer Support for Imbibing Android's New Permission Model}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {765--776}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196533}, doi = {10.1145/3196494.3196533}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GasparisAQSK0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GiechaskielRE18, author = {Ilias Giechaskiel and Kasper Bonne Rasmussen and Ken Eguro}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Leaky Wires: Information Leakage and Covert Communication Between {FPGA} Long Wires}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {15--27}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196518}, doi = {10.1145/3196494.3196518}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GiechaskielRE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Goodrich18, author = {Michael T. Goodrich}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Isogrammic-Fusion {ORAM:} Improved Statistically Secure Privacy-Preserving Cloud Data Access for Thin Clients}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {699--706}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196500}, doi = {10.1145/3196494.3196500}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Goodrich18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gruss0WGMML18, author = {Daniel Gruss and Michael Schwarz and Matthias W{\"{u}}bbeling and Simon Guggi and Timo Malderle and Stefan More and Moritz Lipp}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {297--311}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196514}, doi = {10.1145/3196494.3196514}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Gruss0WGMML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuptaPA18, author = {Payas Gupta and Roberto Perdisci and Mustaque Ahamad}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {285--296}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196516}, doi = {10.1145/3196494.3196516}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GuptaPA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HendlerKR18, author = {Danny Hendler and Shay Kels and Amir Rubin}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Detecting Malicious PowerShell Commands using Deep Neural Networks}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {187--197}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196511}, doi = {10.1145/3196494.3196511}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HendlerKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeoS18, author = {Hwanjo Heo and Seungwon Shin}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Who is knocking on the Telnet Port: {A} Large-Scale Empirical Study of Network Scanning}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {625--636}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196537}, doi = {10.1145/3196494.3196537}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HutchinsRJZLY18, author = {Ben Hutchins and Anudeep Reddy and Wenqiang Jin and Michael Zhou and Ming Li and Lei Yang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {\emph{Beat-PIN}: {A} User Authentication Mechanism for Wearable Devices Through Secret Beats}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {101--115}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196543}, doi = {10.1145/3196494.3196543}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HutchinsRJZLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JungLGKKHKC18, author = {Kyeong Joo Jung and Bang Hun Lee and Yeon Nam Gung and Jun Seok Kim and Hyung Suk Kim and Ju Seong Han and Tomaspeter Kim and Bong Jun Choi}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} Undetectable Task Bypassing {OS} Scheduler via Hardware Task Switching}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {801--803}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201582}, doi = {10.1145/3196494.3201582}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JungLGKKHKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarandeCLCKH18, author = {Vishal Karande and Swarup Chandra and Zhiqiang Lin and Juan Caballero and Latifur Khan and Kevin W. Hamlen}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{BCD:} Decomposing Binary Code Into Components Using Graph-Based Clustering}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {393--398}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196504}, doi = {10.1145/3196494.3196504}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KarandeCLCKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimK18, author = {Taeyun Kim and Hyoungshick Kim}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {813--815}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201585}, doi = {10.1145/3196494.3201585}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimK18a, author = {Sungmin Kim and Joongheon Kim}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} Mining with Proof-of-Probability in Blockchain}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {841--843}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201592}, doi = {10.1145/3196494.3201592}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimK18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KohnhauserB018, author = {Florian Kohnh{\"{a}}user and Niklas B{\"{u}}scher and Stefan Katzenbeisser}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{SALAD:} Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {329--342}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196544}, doi = {10.1145/3196494.3196544}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KohnhauserB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KorczynskiWTMNB18, author = {Maciej Korczynski and Maarten Wullink and Samaneh Tajalizadehkhoob and Giovane C. M. Moura and Arman Noroozian and Drew Bagley and Cristian Hesselman}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Cybercrime After the Sunrise: {A} Statistical Analysis of {DNS} Abuse in New gTLDs}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {609--623}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196548}, doi = {10.1145/3196494.3196548}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KorczynskiWTMNB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KumarLLAPBWZ18, author = {Vireshwar Kumar and He Li and Noah Luther and Pranav Asokan and Jung{-}Min "Jerry" Park and Kaigui Bian and Martin B. H. Weiss and Taieb Znati}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {567--574}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196497}, doi = {10.1145/3196494.3196497}, timestamp = {Sat, 26 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KumarLLAPBWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KwonRK18, author = {HyukSang Kwon and Shahid Raza and JeongGil Ko}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} On Compressing {PKI} Certificates for Resource Limited Internet of Things Devices}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {837--839}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201591}, doi = {10.1145/3196494.3201591}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KwonRK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KwonYC18, author = {Hyun Kwon and Hyunsoo Yoon and Daeseon Choi}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} Zero-Day Evasion Attack Analysis on Race between Attack and Defense}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {805--807}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201583}, doi = {10.1145/3196494.3201583}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KwonYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeePSP18, author = {Taeho Lee and Christos Pappas and Pawel Szalachowski and Adrian Perrig}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Towards Sustainable Evolution for the {TLS} Public-Key Infrastructure}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {637--649}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196520}, doi = {10.1145/3196494.3196520}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeePSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiJZZTZX18, author = {Chaohao Li and Xiaoyu Ji and Xinyan Zhou and Juchuan Zhang and Jing Tian and Yanmiao Zhang and Wenyuan Xu}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {HlcAuth: Key-free and Secure Communications via Home-Limited Channel}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {29--35}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196499}, doi = {10.1145/3196494.3196499}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiJZZTZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LinAVM18, author = {Qin Lin and Sridhar Adepu and Sicco Verwer and Aditya Mathur}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{TABOR:} {A} Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {525--536}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196546}, doi = {10.1145/3196494.3196546}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LinAVM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuRDJ18, author = {Hanqing Liu and Na Ruan and Rongtian Du and Weijia Jia}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {On the Strategy and Behavior of Bitcoin Mining with N-attackers}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {357--368}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196512}, doi = {10.1145/3196494.3196512}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuRDJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuRPDS18, author = {Jienan Liu and Babak Rahbarinia and Roberto Perdisci and Haitao Du and Li Su}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Augmenting Telephone Spam Blacklists by Mining Large {CDR} Datasets}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {273--284}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196553}, doi = {10.1145/3196494.3196553}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuRPDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuZWZ0V18, author = {Shigang Liu and Jun Zhang and Yu Wang and Wanlei Zhou and Yang Xiang and Olivier Y. de Vel}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {A Data-driven Attack against Support Vectors of {SVM}}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {723--734}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196539}, doi = {10.1145/3196494.3196539}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuZWZ0V18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuZS18, author = {Wenjie Lu and Jun{-}Jie Zhou and Jun Sakuma}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {67--74}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196503}, doi = {10.1145/3196494.3196503}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaggiBFGC18, author = {Federico Maggi and Marco Balduzzi and Ryan Flores and Lion Gu and Vincenzo Ciancaglini}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Investigating Web Defacement Campaigns at Large}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {443--456}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196542}, doi = {10.1145/3196494.3196542}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaggiBFGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MartinelliMS18, author = {Fabio Martinelli and Francesco Mercaldo and Andrea Saracino}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} {A} Framework for Phylogenetic Analysis in Mobile Environment}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {825--827}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201588}, doi = {10.1145/3196494.3201588}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MartinelliMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MuslukhovBB18, author = {Ildar Muslukhov and Yazan Boshmaf and Konstantin Beznosov}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Source Attribution of Cryptographic {API} Misuse in Android Applications}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {133--146}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196538}, doi = {10.1145/3196494.3196538}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MuslukhovBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NashimotoSSS18, author = {Shoei Nashimoto and Daisuke Suzuki and Takeshi Sugawara and Kazuo Sakiyama}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {511--524}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196506}, doi = {10.1145/3196494.3196506}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NashimotoSSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OakleyHCCIK18, author = {Ian Oakley and Jun Ho Huh and Junsung Cho and Geumhwan Cho and Md. Rasel Islam and Hyoungshick Kim}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {The Personal Identification Chord: {A} Four ButtonAuthentication System for Smartwatches}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {75--87}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196555}, doi = {10.1145/3196494.3196555}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/OakleyHCCIK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PapadopoulosCAM18, author = {Panagiotis Papadopoulos and Antonios A. Chariton and Elias Athanasopoulos and Evangelos P. Markatos}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Where's Wally?: How to Privately Discover your Friends on the Internet}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {425--430}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196496}, doi = {10.1145/3196494.3196496}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PapadopoulosCAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Pariwono0AM18, author = {Elkana Pariwono and Daiki Chiba and Mitsuaki Akiyama and Tatsuya Mori}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {147--158}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196554}, doi = {10.1145/3196494.3196554}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Pariwono0AM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ParkKNC18, author = {Hosung Park and Daeyong Kwon and Seungsoo Nam and Daeseon Choi}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} Address Authentication Based on Location History}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {845--847}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201593}, doi = {10.1145/3196494.3201593}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ParkKNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RiaziWTS0K18, author = {M. Sadegh Riazi and Christian Weinert and Oleksandr Tkachenko and Ebrahim M. Songhori and Thomas Schneider and Farinaz Koushanfar}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Chameleon: {A} Hybrid Secure Computation Framework for Machine Learning Applications}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {707--721}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196522}, doi = {10.1145/3196494.3196522}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RiaziWTS0K18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SaadTM18, author = {Muhammad Saad and My T. Thai and Aziz Mohaisen}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {809--811}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201584}, doi = {10.1145/3196494.3201584}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SaadTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SelvarajDGWGM18, author = {Jayaprakash Selvaraj and G{\"{o}}k{\c{c}}en Yilmaz Dayanikli and Neelam Prabhu Gaunkar and David Ware and Ryan M. Gerdes and Mani Mina}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Electromagnetic Induction Attacks Against Embedded Systems}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {499--510}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196556}, doi = {10.1145/3196494.3196556}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SelvarajDGWGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShanQY018, author = {Zihao Shan and Zhan Qin and Leslie Ying and Kui Ren}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {SecSAKE: Towards Secure and Efficient Outsourcing of Clinical {MRI} Reconstruction}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {537--550}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196513}, doi = {10.1145/3196494.3196513}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShanQY018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SpreitzerKGM18, author = {Raphael Spreitzer and Felix Kirchengast and Daniel Gruss and Stefan Mangard}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {749--763}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196510}, doi = {10.1145/3196494.3196510}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SpreitzerKGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TkachenkoW0H18, author = {Oleksandr Tkachenko and Christian Weinert and Thomas Schneider and Kay Hamacher}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {221--235}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196541}, doi = {10.1145/3196494.3196541}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TkachenkoW0H18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WakedMY18, author = {Louis Waked and Mohammad Mannan and Amr M. Youssef}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {To Intercept or Not to Intercept: Analyzing {TLS} Interception in Network Appliances}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {399--412}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196528}, doi = {10.1145/3196494.3196528}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WakedMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangPWW18, author = {Xiangwen Wang and Peng Peng and Chun Wang and Gang Wang}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {431--442}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196529}, doi = {10.1145/3196494.3196529}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangPWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WeiserSB18, author = {Samuel Weiser and Raphael Spreitzer and Lukas Bodner}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Single Trace Attack Against {RSA} Key Generation in Intel {SGX} {SSL}}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {575--586}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196524}, doi = {10.1145/3196494.3196524}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WeiserSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuAYLX18, author = {Zuoxia Yu and Man Ho Au and Rupeng Yang and Junzuo Lai and Qiuliang Xu}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Achieving Flexibility for {ABE} with Outsourcing via Proxy Re-Encryption}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {659--672}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196557}, doi = {10.1145/3196494.3196557}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuAYLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangGJWSHM18, author = {Jialong Zhang and Zhongshu Gu and Jiyong Jang and Hui Wu and Marc Ph. Stoecklin and Heqing Huang and Ian M. Molloy}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Protecting Intellectual Property of Deep Neural Networks with Watermarking}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {159--172}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196550}, doi = {10.1145/3196494.3196550}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangGJWSHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoC18, author = {Liang Zhao and Liqun Chen}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {253--260}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196505}, doi = {10.1145/3196494.3196505}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoW18, author = {Yuchen Zhao and Isabel Wagner}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {{POSTER:} Evaluating Privacy Metrics for Graph Anonymization and De-anonymization}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {817--819}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3201586}, doi = {10.1145/3196494.3201586}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouGJEJ18, author = {Boyou Zhou and Anmol Gupta and Rasoul Jahanshahi and Manuel Egele and Ajay Joshi}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Hardware Performance Counters Can Detect Malware: Myth or Fact?}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {457--468}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196515}, doi = {10.1145/3196494.3196515}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouGJEJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuangJZZXLL18, author = {Zhou Zhuang and Xiaoyu Ji and Taimin Zhang and Juchuan Zhang and Wenyuan Xu and Zhenhua Li and Yunhao Liu}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {261--272}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196521}, doi = {10.1145/3196494.3196521}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhuangJZZXLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZierisH18, author = {Philipp Zieris and Julian Horsch}, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity}, booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {369--380}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494.3196531}, doi = {10.1145/3196494.3196531}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZierisH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2018asia, editor = {Jong Kim and Gail{-}Joon Ahn and Seungjoo Kim and Yongdae Kim and Javier L{\'{o}}pez and Taesoo Kim}, title = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3196494}, doi = {10.1145/3196494}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2018asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.