default search action
17th AsiaCCS 2022: Nagasaki, Japan
- Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako:
ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022. ACM 2022, ISBN 978-1-4503-9140-5
Keynote Talk I
- Tal Rabin:
New Multiparty Computational Model: From Nakamoto to YOSO. 1
Session 1A: Cryptography #1
- Christian Peeters, Christopher Patton, Imani N. S. Munyaka, Daniel Olszewski, Thomas Shrimpton, Patrick Traynor:
SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication. 2-16 - Shuai Feng, Shuaijianni Xu, Liang Feng Zhang:
Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits. 17-27 - Erik-Oliver Blass, Florian Kerschbaum, Travis Mayberry:
Iterative Oblivious Pseudo-Random Functions and Applications. 28-41 - Cailing Cai, Xianrui Qin, Tsz Hon Yuen, Siu-Ming Yiu:
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting. 42-53
Session 1B: Systems and Network Security #1
- Niusen Chen, Bo Chen:
Duplicates also Matter! Towards Secure Deletion on Flash-based Storage Media by Removing Duplicates. 54-66 - Payton Walker, Shalini Saini, S. Abhishek Anand, Tzipora Halevi, Nitesh Saxena:
Hearing Check Failed: Using Laser Vibrometry to Analyze the Potential for Hard Disk Drives to Eavesdrop Speech Vibrations. 67-81 - Binghui Wang, Tianchen Zhou, Song Li, Yinzhi Cao, Neil Zhenqiang Gong:
GraphTrack: A Graph-based Cross-Device Tracking Framework. 82-96 - Bibek Bhattarai, H. Howie Huang:
SteinerLog: Prize Collecting the Audit Logs for Threat Hunting on Enterprise Network. 97-108
Session 2A: Blockchain #1
- Vishal Sharma, Pawel Szalachowski, Jianying Zhou:
Evaluating Blockchain Protocols with Abusive Modeling. 109-122 - Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang:
Exploring Unfairness on Proof of Authority: Order Manipulation Attacks and Remedies. 123-137 - Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. 138-152 - Lioba Heimbach, Roger Wattenhofer:
Eliminating Sandwich Attacks with the Help of Game Theory. 153-167 - Alejandro Ranchal-Pedrosa, Vincent Gramoli:
TRAP: The Bait of Rational Players to Solve Byzantine Consensus. 168-181
Session 2B: Wireless Communication #1
- Hyunwoo Lee, Imtiaz Karim, Ninghui Li, Elisa Bertino:
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. 182-195 - Daniele Antonioli, Nils Ole Tippenhauer, Kasper Rasmussen, Mathias Payer:
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy. 196-207 - Paul Staat, Harald Elders-Boll, Markus Heinrichs, Christian T. Zenger, Christof Paar:
Mirror, Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces. 208-221 - Gökçen Yilmaz Dayanikli, Abdullah Zubair Mohammed, Ryan M. Gerdes, Mani Mina:
Wireless Manipulation of Serial Communication. 222-236 - Rhys Miller, Ioana Boureanu, Stephan Wesemeyer, Christopher J. P. Newton:
The 5G Key-Establishment Stack: In-Depth Formal Verification and Experimentation. 237-251
Session 3A: Cyber-physical and IOT Security #1
- Markus Dahlmanns, Johannes Lohmöller, Jan Pennekamp, Jörn Bodenhausen, Klaus Wehrle, Martin Henze:
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things. 252-266 - Boya Wang, Giorgio Tresoldi, Martin Strohmeier, Vincent Lenders:
On the Security of the FLARM Collision Warning System. 267-278 - Piet De Vaere, Andrea Tulimiero, Adrian Perrig:
Hopper: Per-Device Nano Segmentation for the Industrial IoT. 279-293 - Sebastian Köhler, Richard Baker, Ivan Martinovic:
Signal Injection Attacks against CCD Image Sensors. 294-308 - Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos Hernandez Gañán:
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. 309-321
Session 3B: Machine Learning #1
- Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee:
Confusing and Detecting ML Adversarial Attacks with Injected Attractors. 322-336 - Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan:
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation. 337-350 - Quoc Phong Nguyen, Ryutaro Oikawa, Dinil Mon Divakaran, Mun Choon Chan, Bryan Kian Hsiang Low:
Markov Chain Monte Carlo-Based Machine Unlearning: Unlearning What Needs to be Forgotten. 351-363 - Heonseok Ha, Jaehee Jang, Yonghyun Jeong, Sungroh Yoon:
Membership Feature Disentanglement Network. 364-376 - Jaehee Jang, Younho Lee, Andrey Kim, Byunggook Na, Donggeon Yhee, Byounghan Lee, Jung Hee Cheon, Sungroh Yoon:
Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption. 377-391
Keynote Talk II
- Yongdae Kim:
Cellular Security: Why is it difficult? 392
Session 4A: Post-quantum Computing
- Irakliy Khaburzaniya, Konstantinos Chalkias, Kevin Lewi, Harjasleen Malvai:
Aggregating and Thresholdizing Hash-based Signatures using STARKs. 393-407 - Priyanka Dutta, Mei Jiang, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. 408-422 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. 423-436
Session 4B: Security Applications of Machine Learning
- Tianhang Zheng, Baochun Li:
InfoCensor: An Information-Theoretic Framework against Sensitive Attribute Inference and Demographic Disparity. 437-451 - Mirabelle Dib, Sadegh Torabi, Elias Bou-Harb, Nizar Bouguila, Chadi Assi:
EVOLIoT: A Self-Supervised Contrastive Learning Framework for Detecting and Characterizing Evolving IoT Malware Variants. 452-466 - Tianchong Gao, Feng Li:
Machine Learning-based Online Social Network Privacy Preservation. 467-478 - Ping-Jui Chuang, Chih-Fan Hsu, Yung-Tien Chu, Szu-Chun Huang, Chun-Ying Huang:
Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms. 479-493
Session 5A: Cyber-physical and IOT Security #2
- Shengtuo Hu, Qingzhao Zhang, André Weimerskirch, Z. Morley Mao:
Gatekeeper: A Gateway-based Broadcast Authentication Protocol for the In-Vehicle Ethernet. 494-507 - Ang Li, Jiawei Li, Dianqi Han, Yan Zhang, Tao Li, Yanchao Zhang:
WearRF-CLA: Continuous Location Authentication with Wrist Wearables and UHF RFID. 508-520 - Qingchuan Zhao, Chaoshun Zuo, Jorge Blasco, Zhiqiang Lin:
PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals. 521-533 - Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan John Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian:
ShadowAuth: Backward-Compatible Automatic CAN Authentication for Legacy ECUs. 534-545 - Tobias Schmidbauer, Steffen Wendzel:
SoK: A Survey Of Indirect Network-level Covert Channels. 546-560
Session 5B: Software Security #1
- Sadullah Canakci, Nikolay Matyunin, Kalman Graffi, Ajay Joshi, Manuel Egele:
TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers. 561-573 - Yuancheng Jiang, Roland H. C. Yap, Zhenkai Liang, Hubert Rosier:
RecIPE: Revisiting the Evaluation of Memory Error Defenses. 574-588 - Tobias Groß, Tobias Schleier, Tilo Müller:
ReFuzz - Structure Aware Fuzzing of the Resilient File System (ReFS). 589-601 - Alessandro Mantovani, Luca Compagna, Yan Shoshitaishvili, Davide Balzarotti:
The Convergence of Source Code and Binary Vulnerability Discovery - A Case Study. 602-615 - Davide Bove:
SoK: The Evolution of Trusted UI on Mobile. 616-629
Session 6A: Cryptography #2
- Jinghui Liao, Fengwei Zhang, Wenhai Sun, Weisong Shi:
Speedster: An Efficient Multi-party State Channel via Enclaves. 637-651 - Matteo Campanelli, Mathias Hall-Andersen:
Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions. 652-666 - Itsaka Rakotonirina, Miguel Ambrona, Alejandro Aguirre, Gilles Barthe:
Symbolic Synthesis of Indifferentiability Attacks. 667-681 - Poulami Das, Julia Hesse, Anja Lehmann:
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password. 682-696 - Feng Hao, Paul C. van Oorschot:
SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons. 697-711 - Sebastian Berndt, Jan Wichelmann, Claudius Pott, Tim-Henrik Traving, Thomas Eisenbarth:
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols. 712-726 - Sebastian Paul, Yulia Kuzovkova, Norman Lahr, Ruben Niederhagen:
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3. 727-740
Session 6B: System and Network Security #2
- Qifan Wang, Shujie Cui, Lei Zhou, Ocean Wu, Yonghua Zhu, Giovanni Russello:
EnclaveTree: Privacy-preserving Data Stream Training and Inference Using TEE. 741-755 - Ileana Buhan, Lejla Batina, Yuval Yarom, Patrick Schaumont:
SoK: Design Tools for Side-Channel-Aware Implementations. 756-770 - William L. Holland, Olga Ohrimenko, Anthony Wirth:
Efficient Oblivious Permutation via the Waksman Network. 771-783 - Tom van Goethem, Gertjan Franken, Iskander Sánchez-Rola, David Dworken, Wouter Joosen:
SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model. 784-798 - Mathew Vermeer, Michel van Eeten, Carlos Gañán:
Ruling the Rules: Quantifying the Evolution of Rulesets, Alerts and Incidents in Network Intrusion Detection. 799-814
Keynote Talk III
- Ninghui Li:
Differentially Private Data Synthesis: State of the Art and Challenges. 815
Session 7A: Cryptography #3
- Marilyn George, Seny Kamara:
Adversarial Level Agreements for Two-Party Protocols. 816-830 - Adam Bowers, Jize Du, Dan Lin, Wei Jiang:
Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security. 831-842 - Jianli Bai, Xiangfu Song, Shujie Cui, Ee-Chien Chang, Giovanni Russello:
Scalable Private Decision Tree Evaluation with Sublinear Communication. 843-857 - Nuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob C. N. Schuldt, Kazunari Tozawa:
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization. 858-872
Session 7B: Software Security #2
- Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao:
Understanding and Detecting Remote Infection on Linux-based IoT Devices. 873-887 - Michelle Y. Wong, David Lie:
Driving Execution of Target Paths in Android Applications with (a) CAR. 888-902 - Pardis Pashakhanloo, Aravind Machiry, Hyon-Young Choi, Anthony Canino, Kihong Heo, Insup Lee, Mayur Naik:
PacJam: Securing Dependencies Continuously via Package-Oriented Debloating. 903-916 - Maryna Kluban, Mohammad Mannan, Amr M. Youssef:
On Measuring Vulnerable JavaScript Functions in the Wild. 917-930
Session 8A: Machine Learning #2
- Yifei Cai, Qiao Zhang, Rui Ning, Chunsheng Xin, Hongyi Wu:
Hunter: HE-Friendly Structured Pruning for Efficient Privacy-Preserving Deep Learning. 931-945 - Ning Wang, Yang Xiao, Yimin Chen, Yang Hu, Wenjing Lou, Y. Thomas Hou:
FLARE: Defending Federated Learning against Model Poisoning Attacks via Latent Space Representations. 946-958 - Da Zhong, Haipei Sun, Jun Xu, Neil Zhenqiang Gong, Wendy Hui Wang:
Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures. 959-974 - Weiping Pei, Chuan Yue:
Generating Content-Preserving and Semantics-Flipping Adversarial Text. 975-989 - Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin:
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware. 990-1003
Session 8B: Biometrics and Security
- Chloé Cachet, Sohaib Ahmad, Luke Demarest, Ariel Hamlin, Benjamin Fuller:
Proximity Searchable Encryption for the Iris Biometric. 1004-1018 - Hanqing Guo, Qiben Yan, Nikolay Ivanov, Ying Zhu, Li Xiao, Eric J. Hunter:
SUPERVOICE: Text-Independent Speaker Verification Using Ultrasound Energy in Human Speech. 1019-1033 - Shen Fu, Dong Qin, George T. Amariucai, Daji Qiao, Yong Guan, Ann Smiley:
Artificial Intelligence Meets Kinesthetic Intelligence: Mouse-based User Authentication based on Hybrid Human-Machine Learning. 1034-1048 - Martin Georgiev, Simon Eberz, Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Common Evaluation Pitfalls in Touch-Based Authentication Systems. 1049-1063 - Sergio Esposito, Daniele Sgandurra, Giampaolo Bella:
ALEXA VERSUS ALEXA: Controlling Smart Speakers by Self-Issuing Voice Commands. 1064-1078
Session 9A: Privacy
- Liang Feng Zhang, Huaxiong Wang, Li-Ping Wang:
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding. 1079-1085 - Jack P. K. Ma, Sherman S. M. Chow:
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation. 1086-1097 - Aner Ben-Efraim, Olga Nissenbaum, Eran Omri, Anat Paskin-Cherniavsky:
PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection. 1098-1112 - Luke Harrison, Samiran Bag, Hang Luo, Feng Hao:
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities. 1113-1125 - Olivier Sanders:
EPID with Efficient Proof of Non-Revocation. 1126-1138
Session 9B: Web Security
- Elizabeth Wyss, Alexander Wittman, Drew Davidson, Lorenzo De Carli:
Wolf at the Door: Preventing Install-Time Attacks in npm with Latch. 1139-1153 - Gabriel Figueira, Diogo Barradas, Nuno Santos:
Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention. 1154-1167 - Marius Musch, Robin Kirchner, Max Boll, Martin Johns:
Server-Side Browsers: Exploring the Web's Hidden Attack Surface. 1168-1181 - Thomas Rokicki, Clémentine Maurice, Marina Botvinnik, Yossi Oren:
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers. 1182-1194 - Noshaba Nasir, Faqia Iqbal, Mahnoor Zaheer, Mariam Shahjahan, Mobin Javed:
Lures for Money: A First Look into YouTube Videos Promoting Money-Making Apps. 1195-1206
Poster Session
- Firuz Juraev, Eldor Abdukhamidov, Mohammed Abuhamad, Tamer Abuhmed:
Depth, Breadth, and Complexity: Ways to Attack and Defend Deep Learning Models. 1207-1209 - Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao:
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE. 1210-1212 - Misni Harjo Suwito, Bayu Adhi Tama, Bagus Santoso, Sabyasachi Dutta, Haowen Tan, Yoshifumi Ueshige, Kouichi Sakurai:
A Systematic Study of Bulletin Board and Its Application. 1213-1215 - Eldor Abdukhamidov, Firuz Juraev, Mohammed Abuhamad, Tamer Abuhmed:
Black-box and Target-specific Attack Against Interpretable Deep Learning Systems. 1216-1218 - Konstantinos Chalkias, Panagiotis Chatzigiannis:
Base64 Malleability in Practice. 1219-1221 - Razvan Beuran, Ooi Sian En, Abbie O. Barbir, Yasuo Tan:
IoT System Trustworthiness Assurance. 1222-1224 - Xin Zhou, Rakesh M. Verma:
Vulnerability Detection via Multimodal Learning: Datasets and Analysis. 1225-1227 - Nitesh Kumar, Anand Handa, Sandeep K. Shukla:
RBMon: Real Time System Behavior Monitoring Tool. 1228-1230 - Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison, Eric Chan-Tin:
The Personalities of Social Media Posts and Photos. 1231-1233 - Amir Kashapov, Tingmin Wu, Sharif Abuadbba, Carsten Rudolph:
Email Summarization to Assist Users in Phishing Identification. 1234-1236 - H. O. Sai Varshith, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Enabling Attribute-Based Access Control in Linux Kernel. 1237-1239 - Qirui Sun, Eldor Abdukhamidov, Tamer Abuhmed, Mohammed Abuhamad:
Leveraging Spectral Representations of Control Flow Graphs for Efficient Analysis of Windows Malware. 1240-1242 - Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal, Masaki Inamura:
TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server. 1243-1245 - Fabien Charmet, Harry Chandra Tanuwidjaja, Tomohiro Morikawa, Takeshi Takahashi:
Towards Polyvalent Adversarial Attacks on URL Classification Engines. 1246-1248 - Zhuotao Lian, Chunhua Su:
Decentralized Federated Learning for Internet of Things Anomaly Detection. 1249-1251 - Myles Foley, Chris Hicks, Kate Highnam, Vasilios Mavroudis:
Autonomous Network Defence using Reinforcement Learning. 1252-1254 - Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei V. Petrovski, Luca Piras:
Developing Secured Android Applications by Mitigating Code Vulnerabilities with Machine Learning. 1255-1257 - Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Decentralized and Collaborative Tracing for Group Signatures. 1258-1260
Workshop Summaries
- Jason Paul Cruz, Naoto Yanai:
APKC '22: 9th ACM ASIA Public-Key Cryptography Workshop. 1261-1262 - Keke Gai, Kim-Kwang Raymond Choo:
BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure. 1263-1264 - Alvaro A. Cárdenas, Daisuke Mashima:
CPSS '22: 8th ACM Cyber-Physical System Security Workshop. 1265-1266 - Eric Chan-Tin, Shelia Kennison:
CySSS '22: 1st International Workshop on Cybersecurity and Social Sciences. 1267-1268 - Simon S. Woo, Shahroz Tariq, Hyoungshick Kim:
WDC'22: 1st Workshop on the Security Implications of Deepfakes and Cheapfakes. 1269-1270 - Fabio Pierazzi, Nedim Srndic:
WoRMA '22: 1st Workshop on Robust Malware Analysis. 1271-1272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.