![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/asiaccs2019.bht:"
@inproceedings{DBLP:conf/ccs/0003CG19, author = {Yan Lin and Xiaoyang Cheng and Debin Gao}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Control-Flow Carrying Code}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {3--14}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329815}, doi = {10.1145/3321705.3329815}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0003CG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0003T19, author = {Thomas Schneider and Oleksandr Tkachenko}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {{EPISODE:} Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {315--327}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329800}, doi = {10.1145/3321705.3329800}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0003T19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Al-ShabotiWC19, author = {Mohammed Al{-}Shaboti and Ian Welch and Aaron Chen}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {IoT Application-Centric Access Control {(ACAC)}}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {685--687}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331008}, doi = {10.1145/3321705.3331008}, timestamp = {Thu, 29 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Al-ShabotiWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BockBGLS19, author = {Carsten Bock and Ferdinand Brasser and David Gens and Christopher Liebchen and Ahmad{-}Reza Sadeghi}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {{RIP-RH:} Preventing Rowhammer-based Inter-Process Attacks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {561--572}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329827}, doi = {10.1145/3321705.3329827}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BockBGLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BreitenbacherHA19, author = {Dominik Breitenbacher and Ivan Homoliak and Yan Lin Aung and Nils Ole Tippenhauer and Yuval Elovici}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {HADES-IoT: {A} Practical Host-Based Anomaly Detection System for IoT Devices}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {479--484}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329847}, doi = {10.1145/3321705.3329847}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BreitenbacherHA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CartlidgeSA19, author = {John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {{MPC} Joins The Dark Side}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {148--159}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329809}, doi = {10.1145/3321705.3329809}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CartlidgeSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenMXSSXLM19, author = {Yaohui Chen and Dongliang Mu and Jun Xu and Zhichuang Sun and Wenbo Shen and Xinyu Xing and Long Lu and Bing Mao}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {PTrix: Efficient Hardware-Assisted Fuzzing for {COTS} Binary}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {633--645}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329828}, doi = {10.1145/3321705.3329828}, timestamp = {Thu, 26 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenMXSSXLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChengJXPZYCQ19, author = {Yushi Cheng and Xiaoyu Ji and Wenyuan Xu and Hao Pan and Zhuangdi Zhu and Chuang{-}Wen You and Yi{-}Chao Chen and Lili Qiu}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {MagAttack: Guessing Application Launching and Operation via Smartphone}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {283--294}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329817}, doi = {10.1145/3321705.3329817}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChengJXPZYCQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChengS019, author = {Xia Cheng and Junyang Shi and Mo Sha}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Cracking the Graph Routes in WirelessHART Networks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {673--675}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331004}, doi = {10.1145/3321705.3331004}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChengS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiKCYMK19, author = {Jongwon Choi and HyungKwan Kim and Seungoh Choi and Jeong{-}Han Yun and Byung{-}Gil Min and HyoungChun Kim}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Vendor-Independent Monitoring on Programmable Logic Controller Status for {ICS} Security Log Management}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {682--684}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331007}, doi = {10.1145/3321705.3331007}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChoiKCYMK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiTHPMSBT19, author = {Joseph I. Choi and Dave (Jing) Tian and Grant Hernandez and Christopher Patton and Benjamin Mood and Thomas Shrimpton and Kevin R. B. Butler and Patrick Traynor}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Hybrid Approach to Secure Function Evaluation using {SGX}}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {100--113}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329835}, doi = {10.1145/3321705.3329835}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChoiTHPMSBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CiobanuFMMS19, author = {Madalina G. Ciobanu and Fausto Fasano and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Data Life Cycle Modeling Proposal by Means of Formal Methods}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {670--672}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331003}, doi = {10.1145/3321705.3331003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CiobanuFMMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CuiCFCSC19, author = {Weiqi Cui and Tao Chen and Christian Fields and Julianna Chen and Anthony Sierra and Eric Chan{-}Tin}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Revisiting Assumptions for Website Fingerprinting Attacks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {328--339}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329802}, doi = {10.1145/3321705.3329802}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CuiCFCSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DEliaCNPC19, author = {Daniele Cono D'Elia and Emilio Coppa and Simone Nicchi and Federico Palmaro and Lorenzo Cavallaro}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed)}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {15--27}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329819}, doi = {10.1145/3321705.3329819}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DEliaCNPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ErinfolamiP19, author = {Rukayat Ayomide Erinfolami and Aravind Prakash}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {DeClassifier: Class-Inheritance Inference Engine for Optimized {C++} Binaries}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {28--40}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329833}, doi = {10.1145/3321705.3329833}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ErinfolamiP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrostTRPTB19, author = {Vanessa Frost and Dave (Jing) Tian and Christie Ruales and Vijay Prakash and Patrick Traynor and Kevin R. B. Butler}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Examining DES-based Cipher Suite Support within the {TLS} Ecosystem}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {539--546}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329858}, doi = {10.1145/3321705.3329858}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FrostTRPTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaoCJX19, author = {Biao Gao and Bo Chen and Shijie Jia and Luning Xia}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {eHIFS: An Efficient History Independent File System}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {573--585}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329839}, doi = {10.1145/3321705.3329839}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GaoCJX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GengaAZ19, author = {Laura Genga and Luca Allodi and Nicola Zannone}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Unveiling Systematic Biases in Decisional Processes: An Application to Discrimination Discovery}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {67--72}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329856}, doi = {10.1145/3321705.3329856}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GengaAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GhoshSD19, author = {Nirnay Ghosh and Rishabh Singhal and Sajal K. Das}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {{R2Q:} {A} Risk Quantification Framework to Authorize Requests in Web-based Collaborations}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {247--254}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329852}, doi = {10.1145/3321705.3329852}, timestamp = {Tue, 10 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GhoshSD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gligor19, author = {Virgil D. Gligor}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Establishing and Maintaining Root of Trust on Commodity Computer Systems}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {1--2}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329913}, doi = {10.1145/3321705.3329913}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Gligor19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoethemMJN19, author = {Tom van Goethem and Najmeh Miramirkhani and Wouter Joosen and Nick Nikiforakis}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Purchased Fame: Exploring the Ecosystem of Private Blog Networks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {366--378}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329830}, doi = {10.1145/3321705.3329830}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GoethemMJN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoethemPJ19, author = {Tom van Goethem and Victor Le Pochat and Wouter Joosen}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Mobile Friendly or Attacker Friendly?: {A} Large-scale Security Evaluation of Mobile-first Websites}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {206--213}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329855}, doi = {10.1145/3321705.3329855}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoethemPJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GulmezogluZTI0S19, author = {Berk G{\"{u}}lmezoglu and Andreas Zankl and M. Caner Tol and Saad Islam and Thomas Eisenbarth and Berk Sunar}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Undermining User Privacy on Mobile Devices Using {AI}}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {214--227}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329804}, doi = {10.1145/3321705.3329804}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GulmezogluZTI0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Herrera-Joancomarti19, author = {Jordi Herrera{-}Joancomart{\'{\i}} and Guillermo Navarro{-}Arribas and Alejandro Ranchal{-}Pedrosa and Cristina P{\'{e}}rez{-}Sol{\`{a}} and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {On the Difficulty of Hiding the Balance of Lightning Network Channels}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {602--612}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329812}, doi = {10.1145/3321705.3329812}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Herrera-Joancomarti19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HsuCY19, author = {Chia{-}Yi Hsu and Pin{-}Yu Chen and Chia{-}Mu Yu}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Characterizing Adversarial Subspaces by Mutual Information}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {667--669}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331002}, doi = {10.1145/3321705.3331002}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HsuCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IfeSMS19, author = {Colin C. Ife and Yun Shen and Steven J. Murdoch and Gianluca Stringhini}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Waves of Malice: {A} Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {168--180}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329807}, doi = {10.1145/3321705.3329807}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/IfeSMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/InokuchiOKYSBES19, author = {Masaki Inokuchi and Yoshinobu Ohta and Shunichi Kinoshita and Tomohiko Yagyu and Orly Stan and Ron Bitton and Yuval Elovici and Asaf Shabtai}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Design Procedure of Knowledge Base for Practical Attack Graph Generation}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {594--601}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329853}, doi = {10.1145/3321705.3329853}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/InokuchiOKYSBES19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Ishida0EHT19, author = {Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Proper Usage of the Group Signature Scheme in {ISO/IEC} 20008-2}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {515--528}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329824}, doi = {10.1145/3321705.3329824}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Ishida0EHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiKO019, author = {Sangwoo Ji and Youngjoo Ko and Saeyoung Oh and Jong Kim}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {549--560}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329811}, doi = {10.1145/3321705.3329811}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiKO019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KaczmarekOT19, author = {Tyler Kaczmarek and Ercan Ozturk and Gene Tsudik}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {586--593}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329846}, doi = {10.1145/3321705.3329846}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KaczmarekOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarapoolaRPV19, author = {Sareena Karapoola and Chester Rebeiro and Unnati Parekh and Kamakoti Veezhinathan}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Towards Identifying Early Indicators of a Malware Infection}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {679--681}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331006}, doi = {10.1145/3321705.3331006}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KarapoolaRPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KaratiS19, author = {Sabyasachi Karati and Reihaneh Safavi{-}Naini}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {{K2SN-MSS:} An Efficient Post-Quantum Signature}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {501--514}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329837}, doi = {10.1145/3321705.3329837}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KaratiS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KhairallahHNBBP19, author = {Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {SoK: On {DFA} Vulnerabilities of Substitution-Permutation Networks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {403--414}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329810}, doi = {10.1145/3321705.3329810}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KhairallahHNBBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimCSNB19, author = {Jongkil Kim and Seyit Camtepe and Willy Susilo and Surya Nepal and Joonsang Baek}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Identity-Based Broadcast Encryption with Outsourced Partial Decryption for Hybrid Security Models in Edge Computing}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {55--66}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329825}, doi = {10.1145/3321705.3329825}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KimCSNB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimS19, author = {Taehyun Kim and Youngjoo Shin}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {High Efficiency, Low-noise Meltdown Attack by using a Return Stack Buffer}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {688--690}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331009}, doi = {10.1145/3321705.3331009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KimS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaiYSLLL19, author = {Shangqi Lai and Xingliang Yuan and Shifeng Sun and Joseph K. Liu and Yuhong Liu and Dongxi Liu}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {GraphSE{\({^2}\)}: An Encrypted Graph Database for Privacy-Preserving Social Search}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {41--54}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329803}, doi = {10.1145/3321705.3329803}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaiYSLLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeCJ019, author = {Seungho Lee and Wonsuk Choi and Hyo Jin Jo and Dong Hoon Lee}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {How to Securely Record Logs based on {ARM} TrustZone}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {664--666}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331001}, doi = {10.1145/3321705.3331001}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LeeCJ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiWLDCML19, author = {Yan Li and Zilong Wang and Yingjiu Li and Robert H. Deng and Binbin Chen and Weizhi Meng and Hui Li}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Closer Look Tells More: {A} Facial Distortion Based Liveness Detection for Face Authentication}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {241--246}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329850}, doi = {10.1145/3321705.3329850}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiWLDCML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiWZ19, author = {Yuan Li and Hongbing Wang and Yunlei Zhao}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Delegatable Order-Revealing Encryption}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {134--147}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329829}, doi = {10.1145/3321705.3329829}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Mantel19, author = {Heiko Mantel}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {From Attacker Models to Reliable Security}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {547--548}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329915}, doi = {10.1145/3321705.3329915}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Mantel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MirzaeiSFTS19, author = {Omid Mirzaei and Guillermo Suarez{-}Tangil and Jos{\'{e}} Mar{\'{\i}}a de Fuentes and Juan Tapiador and Gianluca Stringhini}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {AndrEnsemble: Leveraging {API} Ensembles to Characterize Android Malware Families}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {307--314}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329854}, doi = {10.1145/3321705.3329854}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MirzaeiSFTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MitevMS19, author = {Richard Mitev and Markus Miettinen and Ahmad{-}Reza Sadeghi}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {465--478}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329842}, doi = {10.1145/3321705.3329842}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MitevMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MudgerikarSB19, author = {Anand Mudgerikar and Puneet Sharma and Elisa Bertino}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {E-Spion: {A} System-Level Intrusion Detection System for IoT Devices}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {493--500}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329857}, doi = {10.1145/3321705.3329857}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MudgerikarSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MuschSRSJ19, author = {Marius Musch and Marius Steffens and Sebastian Roth and Ben Stock and Martin Johns}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {391--402}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329841}, doi = {10.1145/3321705.3329841}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MuschSRSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Nakajima0SAW19, author = {Asuka Nakajima and Takuya Watanabe and Eitaro Shioji and Mitsuaki Akiyama and Maverick Woo}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Pilot Study on Consumer IoT Device Vulnerability Disclosure and Patch Release in Japan and the United States}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {485--492}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329849}, doi = {10.1145/3321705.3329849}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Nakajima0SAW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NambaS19, author = {Ryota Namba and Jun Sakuma}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Robust Watermarking of Neural Network with Exponential Weighting}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {228--240}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329808}, doi = {10.1145/3321705.3329808}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NambaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Nepal19, author = {Surya Nepal}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Security is the Weakest Link: Prevalent Culture of Victim Blaming in Cyberattacks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {255--256}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329914}, doi = {10.1145/3321705.3329914}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Nepal19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ParkKS19, author = {Sunnyeo Park and Dohyeok Kim and Sooel Son}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine Learning}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {646--657}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329840}, doi = {10.1145/3321705.3329840}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ParkKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PengXQ0VW19, author = {Peng Peng and Chao Xu and Luke Quinn and Hang Hu and Bimal Viswanath and Gang Wang}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {181--192}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329818}, doi = {10.1145/3321705.3329818}, timestamp = {Tue, 23 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PengXQ0VW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RajputRSM19, author = {Prashant Hari Narayan Rajput and Pankaj Rajput and Marios Sazos and Michail Maniatakos}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Process-Aware Cyberattacks for Thermal Desalination Plants}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {441--452}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329805}, doi = {10.1145/3321705.3329805}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RajputRSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RaviJHCB19, author = {Prasanna Ravi and Mahabir Prasad Jhanwar and James Howe and Anupam Chattopadhyay and Shivam Bhasin}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Exploiting Determinism in Lattice-based Signatures: Practical Fault Attacks on pqm4 Implementations of {NIST} Candidates}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {427--440}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329821}, doi = {10.1145/3321705.3329821}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RaviJHCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Sanchez-RolaDKB19, author = {Iskander S{\'{a}}nchez{-}Rola and Matteo Dell'Amico and Platon Kotzias and Davide Balzarotti and Leyla Bilge and Pierre{-}Antoine Vervier and Igor Santos}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Can {I} Opt Out Yet?: {GDPR} and the Global Illusion of Cookie Control}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {340--351}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329806}, doi = {10.1145/3321705.3329806}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Sanchez-RolaDKB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchepersRV19, author = {Domien Schepers and Aanjhan Ranganathan and Mathy Vanhoef}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Practical Side-Channel Attacks against {WPA-TKIP}}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {415--426}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329832}, doi = {10.1145/3321705.3329832}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchepersRV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SethiPA19, author = {Mohit Sethi and Aleksi Peltonen and Tuomas Aura}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Misbinding Attacks on Secure Device Pairing and Bootstrapping}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {453--464}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329813}, doi = {10.1145/3321705.3329813}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SethiPA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShiWL19, author = {Shangcheng Shi and Xianbo Wang and Wing Cheong Lau}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities in Mobile Applications}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {269--282}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329801}, doi = {10.1145/3321705.3329801}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShiWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SonCKW19, author = {Yuri Son and Geumhwan Cho and Hyoungshick Kim and Simon S. Woo}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {352--365}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329838}, doi = {10.1145/3321705.3329838}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SonCKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TungS19, author = {Yu{-}Chih Tung and Kang G. Shin}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Exploiting Sound Masking for Audio Privacy in Smartphones}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {257--268}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329799}, doi = {10.1145/3321705.3329799}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TungS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangBKLCZ19, author = {Huibo Wang and Erick Bauman and Vishal Karande and Zhiqiang Lin and Yueqiang Cheng and Yinqian Zhang}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Running Language Interpreters Inside {SGX:} {A} Lightweight, Legacy-Compatible Script Code Hardening Approach}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {114--121}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329848}, doi = {10.1145/3321705.3329848}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangBKLCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WernerMAPM19, author = {Jan Werner and Joshua Mason and Manos Antonakakis and Michalis Polychronakis and Fabian Monrose}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {The SEVerESt Of Them All: Inference Attacks Against Secure Virtual Enclaves}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {73--85}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329820}, doi = {10.1145/3321705.3329820}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WernerMAPM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WijayaLSLY19, author = {Dimaz Ankaa Wijaya and Joseph K. Liu and Ron Steinfeld and Dongxi Liu and Jiangshan Yu}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {On The Unforkability of Monero}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {621--632}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329823}, doi = {10.1145/3321705.3329823}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WijayaLSLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuGCCJD19, author = {Daoyuan Wu and Debin Gao and Eric K. T. Cheng and Yichen Cao and Jintao Jiang and Robert H. Deng}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Towards Understanding Android System Vulnerabilities: Techniques and Insights}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {295--306}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329831}, doi = {10.1145/3321705.3329831}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuGCCJD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuSDLZW19, author = {Pengfei Wu and Qingni Shen and Robert H. Deng and Ximeng Liu and Yinghui Zhang and Zhonghai Wu}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {86--99}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329822}, doi = {10.1145/3321705.3329822}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WuSDLZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XieHCDWY19, author = {Qing{-}Qing Xie and Yantian Hou and Ke Cheng and Gaby G. Dagher and Liangmin Wang and Shucheng Yu}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Flexibly and Securely Shape Your Data Disclosed to Others}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {160--167}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329851}, doi = {10.1145/3321705.3329851}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XieHCDWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuYSWX19, author = {Lei Xu and Xingliang Yuan and Ron Steinfeld and Cong Wang and Chungen Xu}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {122--133}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329814}, doi = {10.1145/3321705.3329814}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuYSWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Yang19, author = {Ziqi Yang}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Fidelity: {A} Property of Deep Neural Networks to Measure the Trustworthiness of Prediction Results}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {676--678}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331005}, doi = {10.1145/3321705.3331005}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Yang19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YiL19, author = {Xun Yi and Kwok{-}Yan Lam}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A New Blind {ECDSA} Scheme for Bitcoin Transaction Anonymity}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {613--620}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329816}, doi = {10.1145/3321705.3329816}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangL19, author = {Shijie Zhang and Jong{-}Hyouk Lee}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Smart Contract-based Miner Registration and Block Validation}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {691--693}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3331010}, doi = {10.1145/3321705.3331010}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangZYT19, author = {Yihe Zhang and Hao Zhang and Xu Yuan and Nian{-}Feng Tzeng}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {TweetScore: Scoring Tweets via Social Attribute Relationships for Twitter Spammer Detection}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {379--390}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329836}, doi = {10.1145/3321705.3329836}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangZYT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Zhao19, author = {Yunlei Zhao}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Practical Aggregate Signature from General Elliptic Curves, and Applications to Blockchain}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {529--538}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329826}, doi = {10.1145/3321705.3329826}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Zhao19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoIAKCT19, author = {Benjamin Zi Hao Zhao and Muhammad Ikram and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar and Abdelberi Chaabane and Kanchana Thilakarathna}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Decade of Mal-Activity Reporting: {A} Retrospective Analysis of Internet Malicious Activity Blacklists}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {193--205}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329834}, doi = {10.1145/3321705.3329834}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoIAKCT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuFJW0CX19, author = {Xiaogang Zhu and Xiaotao Feng and Tengyun Jiao and Sheng Wen and Yang Xiang and Seyit Camtepe and Jingling Xue}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {658--663}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329845}, doi = {10.1145/3321705.3329845}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhuFJW0CX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019asia, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705}, doi = {10.1145/3321705}, isbn = {978-1-4503-6752-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2019asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.