default search action
12th AsiaCCS 2017: Abu Dhabi, United Arab Emirates
- Ramesh Karri, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, Xun Yi:
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017. ACM 2017, ISBN 978-1-4503-4944-4
Keynote & Invited Talks
- Christof Paar:
Hardware Trojans and Other Threats against Embedded Systems. 1 - Gregory Akers:
Advanced Security Research in the Era of the Internet of Things. 2 - David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. 3 - Mathias Payer:
Control-Flow Hijacking: Are We Making Progress? 4 - Gene Tsudik:
Security in Personal Genomics: Lest We Forget. 5 - Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache:
The Case for System Command Encryption. 6
SGX
- Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang:
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. 7-18 - Vishal Karande, Erick Bauman, Zhiqiang Lin, Latifur Khan:
SGX-Log: Securing System Logs With SGX. 19-30 - Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan:
The Circle Game: Scalable Private Membership Test Using Trusted Hardware. 31-44
Mobile Apps & Markets
- Vincent F. Taylor, Ivan Martinovic:
To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution. 45-57 - Hao Chen, Daojing He, Sencun Zhu, Jingshun Yang:
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets. 58-70 - Amiangshu Bosu, Fang Liu, Danfeng (Daphne) Yao, Gang Wang:
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications. 71-85
Embedded Systems Security 1
- Xavier Carpent, Karim El Defrawy, Norrathep Rattanavipanon, Gene Tsudik:
Lightweight Swarm Attestation: A Tale of Two LISA-s. 86-100 - Chuadhry Mujeeb Ahmed, Carlos Murguia, Justin Ruths:
Model-based Attack Detection Scheme for Smart Water Distribution Networks. 101-113 - Marco Rocchetto, Nils Ole Tippenhauer:
Towards Formal Security Analysis of Industrial Control Systems. 114-126 - Daniele Midi, Mathias Payer, Elisa Bertino:
Memory Safety for Embedded Devices with nesCheck. 127-139
Memory Corruption Att. & Def.
- Mohamed Elsabagh, Dan Fleck, Angelos Stavrou:
Strict Virtual Call Integrity Checking for C++ Binaries. 140-154 - He Huang, Amr M. Youssef, Mourad Debbabi:
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. 155-166 - Quan Chen, Ahmed M. Azab, Guruprasad Ganesh, Peng Ning:
PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks. 167-178 - Taehun Kim, Hyeonmin Ha, Seoyoon Choi, Jaeyeon Jung, Byung-Gon Chun:
Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps. 179-192 - Scott A. Carr, Mathias Payer:
DataShield: Configurable Data Confidentiality and Integrity. 193-204
Encryption
- Pierre-Alain Dupont, David Pointcheval:
Functional Encryption with Oblivious Helper. 205-214 - Keita Emura, Takuya Hayashi, Noboru Kunihiro, Jun Sakuma:
Mis-operation Resistant Searchable Homomorphic Encryption. 215-229 - Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh:
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. 230-240 - Jacob C. N. Schuldt, Kazumasa Shinagawa:
On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures. 241-252
Cloud Security
- Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
DoS Attacks on Your Memory in Cloud. 253-265 - Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency. 266-274 - Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan Karame:
Sharing Proofs of Retrievability across Tenants. 275-287 - Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Cache-Based Application Detection in the Cloud Using Machine Learning. 288-300
Password & Auth 1
- David Pointcheval, Guilin Wang:
VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange. 301-312 - Seunghun Cha, Sungsu Kwag, Hyoungshick Kim, Jun Ho Huh:
Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. 313-326 - Yan Li, Yao Cheng, Yingjiu Li, Robert H. Deng:
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses. 327-333
Vulnerability Analysis
- Yue Chen, Mustakimur Khandaker, Zhi Wang:
Pinpointing Vulnerabilities. 334-345 - Qian Feng, Minghua Wang, Mu Zhang, Rundong Zhou, Andrew Henderson, Heng Yin:
Extracting Conditional Formulas for Cross-Platform Bug Search. 346-359 - Mathy Vanhoef, Domien Schepers, Frank Piessens:
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing. 360-371
Password & Auth 2
- Ding Wang, Qianchen Gu, Xinyi Huang, Ping Wang:
Understanding Human-Chosen PINs: Characteristics, Distribution and Security. 372-385 - Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. 386-399 - Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha, Ketan Vyas:
Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme. 400-407
Storage Security
- Hung Dang, Erick Purwanto, Ee-Chien Chang:
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated. 408-422 - Xingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia:
EncKV: An Encrypted Key-value Store with Rich Queries. 423-435 - Christian Weinert, Denise Demirel, Martín A. Gagliotti Vigil, Matthias Geihs, Johannes Buchmann:
MoPS: A Modular Protection Scheme for Long-Term Storage. 436-448 - Yongjun Zhao, Sherman S. M. Chow:
Updatable Block-Level Message-Locked Encryption. 449-460 - Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda:
LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality. 461-468
Malware & Machine Learning 1
- Shahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali:
Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation. 469-482 - Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato:
On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters. 483-493 - Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. 494-505 - Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami:
Practical Black-Box Attacks against Machine Learning. 506-519
Privacy
- Alexandra Dmitrienko, David Noack, Moti Yung:
Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation. 520-531 - Kosuke Kusano, Ichiro Takeuchi, Jun Sakuma:
Privacy-preserving and Optimal Interval Release for Disease Susceptibility. 532-545 - Krzysztof Grining, Marek Klonowski:
Towards Extending Noiseless Privacy: Dependent Data and More Practical Approach. 546-560 - Sébastien Canard, Aïda Diop, Nizar Kheir, Marie Paindavoine, Mohamed Sabt:
BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic. 561-574
Malware & Machine Learning 2
- Samaneh Tajalizadehkhoob, Carlos Gañán, Arman Noroozian, Michel van Eeten:
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware. 575-586 - Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck:
Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks. 587-598 - Eugene Kolodenker, William Koch, Gianluca Stringhini, Manuel Egele:
PayBreak: Defense Against Cryptographic Ransomware. 599-611
Mobile Security 1
- Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng:
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. 612-624 - Behnaz Hassanshahi, Roland H. C. Yap:
Android Database Attacks Revisited. 625-639 - Omid Mirzaei, Guillermo Suarez-Tangil, Juan E. Tapiador, José María de Fuentes:
TriFlow: Triaging Android Applications using Speculative Information Flows. 640-651
Mobile Security 2
- Drew Davidson, Yaohui Chen, Franklin George, Long Lu, Somesh Jha:
Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems. 652-665 - Xingzi Yuan, Omid Setayeshfar, Hongfei Yan, Pranav Panage, Xuetao Wei, Kyu Hyung Lee:
DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging. 666-677 - Chaoting Xuan, Gong Chen, Erich Stuntebeck:
DroidPill: Pwn Your Daily-Use Apps. 678-689
Side Channel Attacks
- Thomas Unterluggauer, Mario Werner, Stefan Mangard:
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives. 690-702 - Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik:
Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP. 703-715 - Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar:
Hit by the Bus: QoS Degradation Attack on Android. 716-727
Embedded Systems Security 2
- Andre Rein:
DRIVE: Dynamic Runtime Integrity Verification and Evaluation. 728-742 - Tom Chothia, Mihai Ordean, Joeri de Ruiter, Richard James Thomas:
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols. 743-756 - Ivan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov:
Using Program Analysis to Synthesize Sensor Spoofing Attacks. 757-770 - Ruan de Clercq, Ronald De Keulenaer, Pieter Maene, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede:
SCM: Secure Code Memory Architecture. 771-776
Applied Crypto
- Keita Emura, Takuya Hayashi, Ai Ishida:
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction. 777-788 - Jiqiang Lu:
Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms. 789-799 - Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade, Cristina Onete, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. 800-814 - Gildas Avoine, Xavier Carpent:
Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses. 815-822 - Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au, Surya Nepal:
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. 823-834
Web & Network Security
- Dennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk:
SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor. 835-848 - Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha:
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. 849-861 - Taeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu:
The Case for In-Network Replay Suppression. 862-873 - Dima Rabadi, Rui Tan, David K. Y. Yau, Sreejaya Viswanathan:
Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage. 874-886 - AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
Accurate Manipulation of Delay-based Internet Geolocation. 887-898
Demonstrations
- Fabio Martinelli, Francesco Mercaldo, Andrea Saracino:
BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware. 899-901 - Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone:
How Discover a Malware using Model Checking. 902-904
Posters
- Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh:
Enabling End-Users to Protect their Privacy. 905-907 - Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur:
Detecting Inter-App Information Leakage Paths. 908-910 - Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti:
Detection of Information Leaks via Reflection in Android Apps. 911-913 - Kai Jansen, Matthias Schäfer, Vincent Lenders, Christina Pöpper, Jens B. Schmitt:
Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System. 914-916 - Katharina Siobhan Kohls, Christina Pöpper:
Traffic Analysis Attacks in Anonymity Networks. 917-919 - Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Quantitative Security Assessment Method based on Entropy for Moving Target Defense. 920-922 - Ahmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin:
A Behavioral Biometric Authentication Framework on Smartphones. 923-925 - Will Scott:
A Secure, Practical & Safe Packet Spoofing Service. 926-928
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.