Search dblp for Publications

export results for "toc:db/conf/ccs/asiaccs2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/0003CG19,
  author       = {Yan Lin and
                  Xiaoyang Cheng and
                  Debin Gao},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Control-Flow Carrying Code},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {3--14},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329815},
  doi          = {10.1145/3321705.3329815},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0003CG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0003T19,
  author       = {Thomas Schneider and
                  Oleksandr Tkachenko},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {{EPISODE:} Efficient Privacy-PreservIng Similar Sequence Queries on
                  Outsourced Genomic DatabasEs},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {315--327},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329800},
  doi          = {10.1145/3321705.3329800},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0003T19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Al-ShabotiWC19,
  author       = {Mohammed Al{-}Shaboti and
                  Ian Welch and
                  Aaron Chen},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {IoT Application-Centric Access Control {(ACAC)}},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {685--687},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331008},
  doi          = {10.1145/3321705.3331008},
  timestamp    = {Thu, 29 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Al-ShabotiWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BockBGLS19,
  author       = {Carsten Bock and
                  Ferdinand Brasser and
                  David Gens and
                  Christopher Liebchen and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {{RIP-RH:} Preventing Rowhammer-based Inter-Process Attacks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {561--572},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329827},
  doi          = {10.1145/3321705.3329827},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BockBGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BreitenbacherHA19,
  author       = {Dominik Breitenbacher and
                  Ivan Homoliak and
                  Yan Lin Aung and
                  Nils Ole Tippenhauer and
                  Yuval Elovici},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {HADES-IoT: {A} Practical Host-Based Anomaly Detection System for IoT
                  Devices},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {479--484},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329847},
  doi          = {10.1145/3321705.3329847},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BreitenbacherHA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CartlidgeSA19,
  author       = {John Cartlidge and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {{MPC} Joins The Dark Side},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {148--159},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329809},
  doi          = {10.1145/3321705.3329809},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CartlidgeSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenMXSSXLM19,
  author       = {Yaohui Chen and
                  Dongliang Mu and
                  Jun Xu and
                  Zhichuang Sun and
                  Wenbo Shen and
                  Xinyu Xing and
                  Long Lu and
                  Bing Mao},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {PTrix: Efficient Hardware-Assisted Fuzzing for {COTS} Binary},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {633--645},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329828},
  doi          = {10.1145/3321705.3329828},
  timestamp    = {Thu, 26 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenMXSSXLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChengJXPZYCQ19,
  author       = {Yushi Cheng and
                  Xiaoyu Ji and
                  Wenyuan Xu and
                  Hao Pan and
                  Zhuangdi Zhu and
                  Chuang{-}Wen You and
                  Yi{-}Chao Chen and
                  Lili Qiu},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {MagAttack: Guessing Application Launching and Operation via Smartphone},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {283--294},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329817},
  doi          = {10.1145/3321705.3329817},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChengJXPZYCQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChengS019,
  author       = {Xia Cheng and
                  Junyang Shi and
                  Mo Sha},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Cracking the Graph Routes in WirelessHART Networks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {673--675},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331004},
  doi          = {10.1145/3321705.3331004},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChengS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiKCYMK19,
  author       = {Jongwon Choi and
                  HyungKwan Kim and
                  Seungoh Choi and
                  Jeong{-}Han Yun and
                  Byung{-}Gil Min and
                  HyoungChun Kim},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Vendor-Independent Monitoring on Programmable Logic Controller Status
                  for {ICS} Security Log Management},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {682--684},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331007},
  doi          = {10.1145/3321705.3331007},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiKCYMK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiTHPMSBT19,
  author       = {Joseph I. Choi and
                  Dave (Jing) Tian and
                  Grant Hernandez and
                  Christopher Patton and
                  Benjamin Mood and
                  Thomas Shrimpton and
                  Kevin R. B. Butler and
                  Patrick Traynor},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Hybrid Approach to Secure Function Evaluation using {SGX}},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {100--113},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329835},
  doi          = {10.1145/3321705.3329835},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiTHPMSBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CiobanuFMMS19,
  author       = {Madalina G. Ciobanu and
                  Fausto Fasano and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Data Life Cycle Modeling Proposal by Means of Formal Methods},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {670--672},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331003},
  doi          = {10.1145/3321705.3331003},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CiobanuFMMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CuiCFCSC19,
  author       = {Weiqi Cui and
                  Tao Chen and
                  Christian Fields and
                  Julianna Chen and
                  Anthony Sierra and
                  Eric Chan{-}Tin},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Revisiting Assumptions for Website Fingerprinting Attacks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {328--339},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329802},
  doi          = {10.1145/3321705.3329802},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CuiCFCSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DEliaCNPC19,
  author       = {Daniele Cono D'Elia and
                  Emilio Coppa and
                  Simone Nicchi and
                  Federico Palmaro and
                  Lorenzo Cavallaro},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {SoK: Using Dynamic Binary Instrumentation for Security (And How You
                  May Get Caught Red Handed)},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {15--27},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329819},
  doi          = {10.1145/3321705.3329819},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DEliaCNPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ErinfolamiP19,
  author       = {Rukayat Ayomide Erinfolami and
                  Aravind Prakash},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {DeClassifier: Class-Inheritance Inference Engine for Optimized {C++}
                  Binaries},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {28--40},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329833},
  doi          = {10.1145/3321705.3329833},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ErinfolamiP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FrostTRPTB19,
  author       = {Vanessa Frost and
                  Dave (Jing) Tian and
                  Christie Ruales and
                  Vijay Prakash and
                  Patrick Traynor and
                  Kevin R. B. Butler},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Examining DES-based Cipher Suite Support within the {TLS} Ecosystem},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {539--546},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329858},
  doi          = {10.1145/3321705.3329858},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/FrostTRPTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaoCJX19,
  author       = {Biao Gao and
                  Bo Chen and
                  Shijie Jia and
                  Luning Xia},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {eHIFS: An Efficient History Independent File System},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {573--585},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329839},
  doi          = {10.1145/3321705.3329839},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GaoCJX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GengaAZ19,
  author       = {Laura Genga and
                  Luca Allodi and
                  Nicola Zannone},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Unveiling Systematic Biases in Decisional Processes: An Application
                  to Discrimination Discovery},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {67--72},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329856},
  doi          = {10.1145/3321705.3329856},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GengaAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GhoshSD19,
  author       = {Nirnay Ghosh and
                  Rishabh Singhal and
                  Sajal K. Das},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {{R2Q:} {A} Risk Quantification Framework to Authorize Requests in
                  Web-based Collaborations},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {247--254},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329852},
  doi          = {10.1145/3321705.3329852},
  timestamp    = {Tue, 10 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GhoshSD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gligor19,
  author       = {Virgil D. Gligor},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Establishing and Maintaining Root of Trust on Commodity Computer Systems},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329913},
  doi          = {10.1145/3321705.3329913},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Gligor19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoethemMJN19,
  author       = {Tom van Goethem and
                  Najmeh Miramirkhani and
                  Wouter Joosen and
                  Nick Nikiforakis},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Purchased Fame: Exploring the Ecosystem of Private Blog Networks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {366--378},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329830},
  doi          = {10.1145/3321705.3329830},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GoethemMJN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoethemPJ19,
  author       = {Tom van Goethem and
                  Victor Le Pochat and
                  Wouter Joosen},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Mobile Friendly or Attacker Friendly?: {A} Large-scale Security Evaluation
                  of Mobile-first Websites},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {206--213},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329855},
  doi          = {10.1145/3321705.3329855},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GoethemPJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GulmezogluZTI0S19,
  author       = {Berk G{\"{u}}lmezoglu and
                  Andreas Zankl and
                  M. Caner Tol and
                  Saad Islam and
                  Thomas Eisenbarth and
                  Berk Sunar},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Undermining User Privacy on Mobile Devices Using {AI}},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {214--227},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329804},
  doi          = {10.1145/3321705.3329804},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GulmezogluZTI0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Herrera-Joancomarti19,
  author       = {Jordi Herrera{-}Joancomart{\'{\i}} and
                  Guillermo Navarro{-}Arribas and
                  Alejandro Ranchal{-}Pedrosa and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}} and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {On the Difficulty of Hiding the Balance of Lightning Network Channels},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {602--612},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329812},
  doi          = {10.1145/3321705.3329812},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Herrera-Joancomarti19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HsuCY19,
  author       = {Chia{-}Yi Hsu and
                  Pin{-}Yu Chen and
                  Chia{-}Mu Yu},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Characterizing Adversarial Subspaces by Mutual Information},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {667--669},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331002},
  doi          = {10.1145/3321705.3331002},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HsuCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IfeSMS19,
  author       = {Colin C. Ife and
                  Yun Shen and
                  Steven J. Murdoch and
                  Gianluca Stringhini},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Waves of Malice: {A} Longitudinal Measurement of the Malicious File
                  Delivery Ecosystem on the Web},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {168--180},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329807},
  doi          = {10.1145/3321705.3329807},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/IfeSMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/InokuchiOKYSBES19,
  author       = {Masaki Inokuchi and
                  Yoshinobu Ohta and
                  Shunichi Kinoshita and
                  Tomohiko Yagyu and
                  Orly Stan and
                  Ron Bitton and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Design Procedure of Knowledge Base for Practical Attack Graph Generation},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {594--601},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329853},
  doi          = {10.1145/3321705.3329853},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/InokuchiOKYSBES19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Ishida0EHT19,
  author       = {Ai Ishida and
                  Yusuke Sakai and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Proper Usage of the Group Signature Scheme in {ISO/IEC} 20008-2},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {515--528},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329824},
  doi          = {10.1145/3321705.3329824},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Ishida0EHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiKO019,
  author       = {Sangwoo Ji and
                  Youngjoo Ko and
                  Saeyoung Oh and
                  Jong Kim},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Pinpoint Rowhammer: Suppressing Unwanted Bit Flips on Rowhammer Attacks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {549--560},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329811},
  doi          = {10.1145/3321705.3329811},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JiKO019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KaczmarekOT19,
  author       = {Tyler Kaczmarek and
                  Ercan Ozturk and
                  Gene Tsudik},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard
                  Data Entry},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {586--593},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329846},
  doi          = {10.1145/3321705.3329846},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KaczmarekOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KarapoolaRPV19,
  author       = {Sareena Karapoola and
                  Chester Rebeiro and
                  Unnati Parekh and
                  Kamakoti Veezhinathan},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Towards Identifying Early Indicators of a Malware Infection},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {679--681},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331006},
  doi          = {10.1145/3321705.3331006},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KarapoolaRPV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KaratiS19,
  author       = {Sabyasachi Karati and
                  Reihaneh Safavi{-}Naini},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {{K2SN-MSS:} An Efficient Post-Quantum Signature},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {501--514},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329837},
  doi          = {10.1145/3321705.3329837},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KaratiS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KhairallahHNBBP19,
  author       = {Mustafa Khairallah and
                  Xiaolu Hou and
                  Zakaria Najm and
                  Jakub Breier and
                  Shivam Bhasin and
                  Thomas Peyrin},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {SoK: On {DFA} Vulnerabilities of Substitution-Permutation Networks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {403--414},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329810},
  doi          = {10.1145/3321705.3329810},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KhairallahHNBBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimCSNB19,
  author       = {Jongkil Kim and
                  Seyit Camtepe and
                  Willy Susilo and
                  Surya Nepal and
                  Joonsang Baek},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Identity-Based Broadcast Encryption with Outsourced Partial Decryption
                  for Hybrid Security Models in Edge Computing},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {55--66},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329825},
  doi          = {10.1145/3321705.3329825},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KimCSNB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimS19,
  author       = {Taehyun Kim and
                  Youngjoo Shin},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {High Efficiency, Low-noise Meltdown Attack by using a Return Stack
                  Buffer},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {688--690},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331009},
  doi          = {10.1145/3321705.3331009},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KimS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaiYSLLL19,
  author       = {Shangqi Lai and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Yuhong Liu and
                  Dongxi Liu},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {GraphSE{\({^2}\)}: An Encrypted Graph Database for Privacy-Preserving
                  Social Search},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {41--54},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329803},
  doi          = {10.1145/3321705.3329803},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LaiYSLLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeeCJ019,
  author       = {Seungho Lee and
                  Wonsuk Choi and
                  Hyo Jin Jo and
                  Dong Hoon Lee},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {How to Securely Record Logs based on {ARM} TrustZone},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {664--666},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331001},
  doi          = {10.1145/3321705.3331001},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LeeCJ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiWLDCML19,
  author       = {Yan Li and
                  Zilong Wang and
                  Yingjiu Li and
                  Robert H. Deng and
                  Binbin Chen and
                  Weizhi Meng and
                  Hui Li},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Closer Look Tells More: {A} Facial Distortion Based Liveness Detection
                  for Face Authentication},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {241--246},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329850},
  doi          = {10.1145/3321705.3329850},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiWLDCML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiWZ19,
  author       = {Yuan Li and
                  Hongbing Wang and
                  Yunlei Zhao},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Delegatable Order-Revealing Encryption},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {134--147},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329829},
  doi          = {10.1145/3321705.3329829},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Mantel19,
  author       = {Heiko Mantel},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {From Attacker Models to Reliable Security},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {547--548},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329915},
  doi          = {10.1145/3321705.3329915},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Mantel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MirzaeiSFTS19,
  author       = {Omid Mirzaei and
                  Guillermo Suarez{-}Tangil and
                  Jos{\'{e}} Mar{\'{\i}}a de Fuentes and
                  Juan Tapiador and
                  Gianluca Stringhini},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {AndrEnsemble: Leveraging {API} Ensembles to Characterize Android Malware
                  Families},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {307--314},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329854},
  doi          = {10.1145/3321705.3329854},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MirzaeiSFTS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MitevMS19,
  author       = {Richard Mitev and
                  Markus Miettinen and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual
                  Assistants},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {465--478},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329842},
  doi          = {10.1145/3321705.3329842},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MitevMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MudgerikarSB19,
  author       = {Anand Mudgerikar and
                  Puneet Sharma and
                  Elisa Bertino},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {E-Spion: {A} System-Level Intrusion Detection System for IoT Devices},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {493--500},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329857},
  doi          = {10.1145/3321705.3329857},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MudgerikarSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MuschSRSJ19,
  author       = {Marius Musch and
                  Marius Steffens and
                  Sebastian Roth and
                  Ben Stock and
                  Martin Johns},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {ScriptProtect: Mitigating Unsafe Third-Party JavaScript Practices},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {391--402},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329841},
  doi          = {10.1145/3321705.3329841},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MuschSRSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Nakajima0SAW19,
  author       = {Asuka Nakajima and
                  Takuya Watanabe and
                  Eitaro Shioji and
                  Mitsuaki Akiyama and
                  Maverick Woo},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Pilot Study on Consumer IoT Device Vulnerability Disclosure and
                  Patch Release in Japan and the United States},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {485--492},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329849},
  doi          = {10.1145/3321705.3329849},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Nakajima0SAW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NambaS19,
  author       = {Ryota Namba and
                  Jun Sakuma},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Robust Watermarking of Neural Network with Exponential Weighting},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {228--240},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329808},
  doi          = {10.1145/3321705.3329808},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NambaS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Nepal19,
  author       = {Surya Nepal},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Security is the Weakest Link: Prevalent Culture of Victim Blaming
                  in Cyberattacks},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {255--256},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329914},
  doi          = {10.1145/3321705.3329914},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Nepal19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ParkKS19,
  author       = {Sunnyeo Park and
                  Dohyeok Kim and
                  Sooel Son},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {An Empirical Study of Prioritizing JavaScript Engine Crashes via Machine
                  Learning},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {646--657},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329840},
  doi          = {10.1145/3321705.3329840},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ParkKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PengXQ0VW19,
  author       = {Peng Peng and
                  Chao Xu and
                  Luke Quinn and
                  Hang Hu and
                  Bimal Viswanath and
                  Gang Wang},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {What Happens After You Leak Your Password: Understanding Credential
                  Sharing on Phishing Sites},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {181--192},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329818},
  doi          = {10.1145/3321705.3329818},
  timestamp    = {Tue, 23 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PengXQ0VW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RajputRSM19,
  author       = {Prashant Hari Narayan Rajput and
                  Pankaj Rajput and
                  Marios Sazos and
                  Michail Maniatakos},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Process-Aware Cyberattacks for Thermal Desalination Plants},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {441--452},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329805},
  doi          = {10.1145/3321705.3329805},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RajputRSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RaviJHCB19,
  author       = {Prasanna Ravi and
                  Mahabir Prasad Jhanwar and
                  James Howe and
                  Anupam Chattopadhyay and
                  Shivam Bhasin},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Exploiting Determinism in Lattice-based Signatures: Practical Fault
                  Attacks on pqm4 Implementations of {NIST} Candidates},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {427--440},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329821},
  doi          = {10.1145/3321705.3329821},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RaviJHCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Sanchez-RolaDKB19,
  author       = {Iskander S{\'{a}}nchez{-}Rola and
                  Matteo Dell'Amico and
                  Platon Kotzias and
                  Davide Balzarotti and
                  Leyla Bilge and
                  Pierre{-}Antoine Vervier and
                  Igor Santos},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Can {I} Opt Out Yet?: {GDPR} and the Global Illusion of Cookie Control},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {340--351},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329806},
  doi          = {10.1145/3321705.3329806},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Sanchez-RolaDKB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchepersRV19,
  author       = {Domien Schepers and
                  Aanjhan Ranganathan and
                  Mathy Vanhoef},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Practical Side-Channel Attacks against {WPA-TKIP}},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {415--426},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329832},
  doi          = {10.1145/3321705.3329832},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchepersRV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SethiPA19,
  author       = {Mohit Sethi and
                  Aleksi Peltonen and
                  Tuomas Aura},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Misbinding Attacks on Secure Device Pairing and Bootstrapping},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {453--464},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329813},
  doi          = {10.1145/3321705.3329813},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SethiPA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShiWL19,
  author       = {Shangcheng Shi and
                  Xianbo Wang and
                  Wing Cheong Lau},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {MoSSOT: An Automated Blackbox Tester for Single Sign-On Vulnerabilities
                  in Mobile Applications},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {269--282},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329801},
  doi          = {10.1145/3321705.3329801},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShiWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SonCKW19,
  author       = {Yuri Son and
                  Geumhwan Cho and
                  Hyoungshick Kim and
                  Simon S. Woo},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Understanding Users' Risk Perceptions about Personal Health Records
                  Shared on Social Networking Services},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {352--365},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329838},
  doi          = {10.1145/3321705.3329838},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SonCKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TungS19,
  author       = {Yu{-}Chih Tung and
                  Kang G. Shin},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Exploiting Sound Masking for Audio Privacy in Smartphones},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {257--268},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329799},
  doi          = {10.1145/3321705.3329799},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TungS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangBKLCZ19,
  author       = {Huibo Wang and
                  Erick Bauman and
                  Vishal Karande and
                  Zhiqiang Lin and
                  Yueqiang Cheng and
                  Yinqian Zhang},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Running Language Interpreters Inside {SGX:} {A} Lightweight, Legacy-Compatible
                  Script Code Hardening Approach},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {114--121},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329848},
  doi          = {10.1145/3321705.3329848},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangBKLCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WernerMAPM19,
  author       = {Jan Werner and
                  Joshua Mason and
                  Manos Antonakakis and
                  Michalis Polychronakis and
                  Fabian Monrose},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {The SEVerESt Of Them All: Inference Attacks Against Secure Virtual
                  Enclaves},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {73--85},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329820},
  doi          = {10.1145/3321705.3329820},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WernerMAPM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WijayaLSLY19,
  author       = {Dimaz Ankaa Wijaya and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Dongxi Liu and
                  Jiangshan Yu},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {On The Unforkability of Monero},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {621--632},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329823},
  doi          = {10.1145/3321705.3329823},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WijayaLSLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuGCCJD19,
  author       = {Daoyuan Wu and
                  Debin Gao and
                  Eric K. T. Cheng and
                  Yichen Cao and
                  Jintao Jiang and
                  Robert H. Deng},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Towards Understanding Android System Vulnerabilities: Techniques and
                  Insights},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {295--306},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329831},
  doi          = {10.1145/3321705.3329831},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WuGCCJD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuSDLZW19,
  author       = {Pengfei Wu and
                  Qingni Shen and
                  Robert H. Deng and
                  Ximeng Liu and
                  Yinghui Zhang and
                  Zhonghai Wu},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {ObliDC: An SGX-based Oblivious Distributed Computing Framework with
                  Formal Proof},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {86--99},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329822},
  doi          = {10.1145/3321705.3329822},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WuSDLZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XieHCDWY19,
  author       = {Qing{-}Qing Xie and
                  Yantian Hou and
                  Ke Cheng and
                  Gaby G. Dagher and
                  Liangmin Wang and
                  Shucheng Yu},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Flexibly and Securely Shape Your Data Disclosed to Others},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {160--167},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329851},
  doi          = {10.1145/3321705.3329851},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XieHCDWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuYSWX19,
  author       = {Lei Xu and
                  Xingliang Yuan and
                  Ron Steinfeld and
                  Cong Wang and
                  Chungen Xu},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {122--133},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329814},
  doi          = {10.1145/3321705.3329814},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuYSWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Yang19,
  author       = {Ziqi Yang},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Fidelity: {A} Property of Deep Neural Networks to Measure the Trustworthiness
                  of Prediction Results},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {676--678},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331005},
  doi          = {10.1145/3321705.3331005},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Yang19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YiL19,
  author       = {Xun Yi and
                  Kwok{-}Yan Lam},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A New Blind {ECDSA} Scheme for Bitcoin Transaction Anonymity},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {613--620},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329816},
  doi          = {10.1145/3321705.3329816},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YiL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangL19,
  author       = {Shijie Zhang and
                  Jong{-}Hyouk Lee},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Smart Contract-based Miner Registration and Block Validation},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {691--693},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3331010},
  doi          = {10.1145/3321705.3331010},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZYT19,
  author       = {Yihe Zhang and
                  Hao Zhang and
                  Xu Yuan and
                  Nian{-}Feng Tzeng},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {TweetScore: Scoring Tweets via Social Attribute Relationships for
                  Twitter Spammer Detection},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {379--390},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329836},
  doi          = {10.1145/3321705.3329836},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangZYT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Zhao19,
  author       = {Yunlei Zhao},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Practical Aggregate Signature from General Elliptic Curves, and Applications
                  to Blockchain},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {529--538},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329826},
  doi          = {10.1145/3321705.3329826},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Zhao19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoIAKCT19,
  author       = {Benjamin Zi Hao Zhao and
                  Muhammad Ikram and
                  Hassan Jameel Asghar and
                  Mohamed Ali K{\^{a}}afar and
                  Abdelberi Chaabane and
                  Kanchana Thilakarathna},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Decade of Mal-Activity Reporting: {A} Retrospective Analysis of
                  Internet Malicious Activity Blacklists},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {193--205},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329834},
  doi          = {10.1145/3321705.3329834},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhaoIAKCT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuFJW0CX19,
  author       = {Xiaogang Zhu and
                  Xiaotao Feng and
                  Tengyun Jiao and
                  Sheng Wen and
                  Yang Xiang and
                  Seyit Camtepe and
                  Jingling Xue},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Feature-Oriented Corpus for Understanding, Evaluating and Improving
                  Fuzz Testing},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {658--663},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329845},
  doi          = {10.1145/3321705.3329845},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuFJW0CX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019asia,
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705},
  doi          = {10.1145/3321705},
  isbn         = {978-1-4503-6752-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2019asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics