default search action
15th AsiaCCS 2020: Taipei, Taiwan
- Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020. ACM 2020, ISBN 978-1-4503-6750-9
Keynote Talks
- Dawn Song:
AI and Security: Lessons, Challenges and Future Directions. 1 - Gene Tsudik:
Proofs or Remote Execution and Mitigation of TOCTOU Attacks. 2-3 - Adrian Perrig:
Global Communication Guarantees in the Presence of Adversaries. 4-5
Session 1: IoT Security and Privacy
- Manuel Huber, Stefan Hristozov, Simon Ott, Vasil Sarafov, Marcus Peinado:
The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things. 6-19 - Sihan Yu, Xiaonan Zhang, Pei Huang, Linke Guo, Long Cheng, Kuang-Ching Wang:
AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments. 20-32 - Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao, Rong Ge:
DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels. 33-46 - Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang:
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic. 47-59
Session 2: Authentication
- Joon Kuy Han, Xiaojun Bi, Hyoungshick Kim, Simon S. Woo:
PassTag: A Graphical-Textual Hybrid Fallback Authentication System. 60-72 - Benjamin Rothenberger, Dominik Roos, Markus Legner, Adrian Perrig:
PISKES: Pragmatic Internet-Scale Key-Establishment System. 73-86 - Ioana Boureanu, Liqun Chen, Sam Ivey:
Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments. 87-100 - Saul A. Johnson, João F. Ferreira, Alexandra Mendes, Julien Cordry:
Skeptic: Automatic, Justified and Privacy-Preserving Password Composition Policy Selection. 101-115
Session 3: Network Security
- Joonsang Baek, Jongkil Kim, Willy Susilo:
Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception. 116-126 - Ankush Singla, Elisa Bertino, Dinesh C. Verma:
Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation. 127-140 - Markus Wurzenberger, Georg Höld, Max Landauer, Florian Skopik, Wolfgang Kastner:
Creating Character-based Templates for Log Data to Enable Security Event Classification. 141-152 - Devkishen Sisodia, Jun Li, Lei Jiao:
In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection. 153-164
Session 4: Cloud Security
- Katarzyna Kapusta, Matthieu Rambaud, Gérard Memmi:
Revisiting Shared Data Protection Against Key Exposure. 165-177 - Guowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yinghui Zhang, Jianfei Sun, Robert H. Deng:
Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems. 178-192 - Anselme Tueno, Florian Kerschbaum:
Efficient Secure Computation of Order-Preserving Encryption. 193-207 - Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise:
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization. 208-221
Session 5: Usable Security & Privacy
- Tobias Urban, Dennis Tatang, Martin Degeling, Thorsten Holz, Norbert Pohlmann:
Measuring the Impact of the GDPR on Data Sharing in Ad Networks. 222-235 - Shahryar Baki, Rakesh M. Verma, Omprakash Gnawali:
Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders. 236-247 - Tingmin Wu, Rongjunchen Zhang, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts. 248-262 - Florian Quinkert, Martin Degeling, Jim Blythe, Thorsten Holz:
Be the Phisher - Understanding Users' Perception of Malicious Domains. 263-276
Session 6: Privacy-enhancing Technology
- Sven Hammann, Ralf Sasse, David A. Basin:
Privacy-Preserving OpenID Connect. 277-289 - Nguyen Phong Hoang, Arian Akhavan Niaki, Nikita Borisov, Phillipa Gill, Michalis Polychronakis:
Assessing the Privacy Benefits of Domain Name Encryption. 290-304 - Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit Ahmet Çamtepe, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? 305-318 - Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, Christoph Striecks:
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. 319-333
Session 7: AI Security
- Patrick P. K. Chan, Yaxuan Wang, Daniel S. Yeung:
Adversarial Attack against Deep Reinforcement Learning with Static Reward Impact Map. 334-343 - Congzheng Song, Reza Shokri:
Membership Encoding for Deep Learning. 344-356 - Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah:
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. 357-369 - Wanyu Lin, Shengxiang Ji, Baochun Li:
Adversarial Attacks on Link Prediction Algorithms Based on Graph Neural Networks. 370-380 - Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame:
On the Security of Randomized Defenses Against Adversarial Samples. 381-393
Session 8: Web Security
- Takashi Koide, Daiki Chiba, Mitsuaki Akiyama:
To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web. 394-408 - Christian Dresen, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel:
CORSICA: Cross-Origin Web Service Identification. 409-419 - Sebastian Roth, Michael Backes, Ben Stock:
Assessing the Impact of Script Gadgets on CSP at Scale. 420-431 - Abhishek Bichhawat, Matt Fredrikson, Jean Yang, Akash Trehan:
Contextual and Granular Policy Enforcement in Database-backed Applications. 432-444 - Rasoul Jahanshahi, Adam Doupé, Manuel Egele:
You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. 445-457
Session 9: OS Security
- Qinsheng Hou, Yao Cheng, Lingyun Ying:
NativeX: Native Executioner Freezes Android. 458-470 - Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache:
Return-Oriented Programming on RISC-V. 471-480 - Claudio Canella, Michael Schwarz, Martin Haubenwallner, Martin Schwarzl, Daniel Gruss:
KASLR: Break It, Fix It, Repeat. 481-493 - Prabhu Rajasekaran, Stephen Crane, David Gens, Yeoul Na, Stijn Volckaert, Michael Franz:
CoDaRR: Continuous Data Space Randomization against Data-Only Attacks. 494-505
Session 10: Blockchain I
- Bowen Liu, Pawel Szalachowski, Siwei Sun:
Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. 506-518 - Yazan Boshmaf, Charitha Elvitigala, Husam Al Jawaheri, Primal Wijesekera, Mashael Al Sabah:
Investigating MMM Ponzi Scheme on Bitcoin. 519-530 - Roman Matzutt, Jan Pennekamp, Erik Buchholz, Klaus Wehrle:
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services. 531-542 - Lisa Eckey, Sebastian Faust, Benjamin Schlosser:
OptiSwap: Fast Optimistic Fair Exchange. 543-557
Session 11: Blockchain II
- Erik-Oliver Blass, Florian Kerschbaum:
BOREALIS: Building Block for Sealed Bid Auctions on Blockchains. 558-571 - Feifan Yu, Na Ruan, Siyuan Cheng:
Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards. 572-583 - Christof Ferreira Torres, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros, Hugo Jonker, Sjouke Mauw:
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. 584-597
Session 12: Software Security
- Shengbo Yan, Chenlu Wu, Hang Li, Wei Shao, Chunfu Jia:
PathAFL: Path-Coverage Assisted Fuzzing. 598-609 - Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura:
XSS Vulnerabilities in Cloud-Application Add-Ons. 610-621 - John Galea, Daniel Kroening:
The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation. 622-636 - Andrea Gussoni, Alessandro Di Federico, Pietro Fezzardi, Giovanni Agosta:
A Comb for Decompiled C Code. 637-651
Session 13: Malware
- Bushra A. AlAhmadi, Enrico Mariconti, Riccardo Spolaor, Gianluca Stringhini, Ivan Martinovic:
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior. 652-664 - Hyejin Shin, WooChul Shim, Jiin Moon, Jae Woo Seo, Sol Lee, Yong Ho Hwang:
Cybersecurity Event Detection with New and Re-emerging Words. 665-678 - Danny Hendler, Shay Kels, Amir Rubin:
AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings. 679-693 - Leonid Glanz, Patrick Müller, Lars Baumgärtner, Michael Reif, Sven Amann, Pauline Anthonysamy, Mira Mezini:
Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy. 694-707 - Greeshma Lingam, Rashmi Ranjan Rout, Durvasula V. L. N. Somayajulu, Sajal K. Das:
Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep Learning. 708-718
Session 14: CPS Security
- Zheng Yang, Chenglu Jin, Yangguang Tian, Junyu Lai, Jianying Zhou:
LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems. 719-731 - Nickolai Verchok, Alex Orailoglu:
Hunting Sybils in Participatory Mobile Consensus-Based Networks. 732-743 - Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos:
I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems. 744-758 - Marcello Pogliani, Federico Maggi, Marco Balduzzi, Davide Quarta, Stefano Zanero:
Detecting Insecure Code Patterns in Industrial Robot Programs. 759-771 - Yilin Yang, Yan Wang, Yingying Chen, Chen Wang:
EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos. 772-783
Session 15: Hardware-based Security & Applications
- Stephan Wesemeyer, Christopher J. P. Newton, Helen Treharne, Liqun Chen, Ralf Sasse, Jorden Whitefield:
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme. 784-798 - Jinwoo Ahn, Junghee Lee, Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, Youngjae Kim:
DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX. 799-812 - Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais, Clémentine Maurice, Daniel Gruss:
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors. 813-825 - Jianyu Jiang, Xusheng Chen, Tsz On Li, Cheng Wang, Tianxiang Shen, Shixiong Zhao, Heming Cui, Cho-Li Wang, Fengwei Zhang:
Uranus: Simple, Efficient SGX Programming and its Applications. 826-840
Session 16: Practical Post-Quantum Security
- Kevin Bürstinghaus-Steinbach, Christoph Krauß, Ruben Niederhagen, Michael Schneider:
Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS. 841-852 - Chitchanok Chuengsatiansup, Thomas Prest, Damien Stehlé, Alexandre Wallet, Keita Xagawa:
ModFalcon: Compact Signatures Based On Module-NTRU Lattices. 853-866 - Zhaomin Yang, Tianyuan Xie, Yanbin Pan:
Lattice Klepto Revisited. 867-873 - Tianyuan Xie, Yanbin Pan:
It all Started with Compression: Another Look at Reconciliation Mechanism. 874-885
Poster Session
- Ming-Hung Wang, Yu-Chen Dai:
POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan. 886-888 - Pratibha Khandait, Neminath Hubballi, Katrin Franke:
POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of Characters. 889-891 - Shin-Ying Huang, Yiju Wu:
POSTER: Dynamic Software Vulnerabilities Threat Prediction through Social Media Contextual Analysis. 892-894 - Zhong-Yi Guo, Yu-Chi Chen, Hsiu-Ping Lin:
POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model. 895-897 - Sanoop Mallissery, Min-Chieh Wu, Chun-An Bau, Guan-Zhang Huang, Chen-Yu Yang, Wei-Chun Lin, Yu-Sung Wu:
POSTER: Data Leakage Detection for Health Information System based on Memory Introspection. 898-900 - Hans Albert Lianto, Yang Zhao, Jun Zhao:
POSTER: Attacks to Federated Learning: Responsive Web User Interface to Recover Training Data from User Gradients. 901-903 - Song-Yi Hsu, Xin Xie, Yu-Chi Chen:
POSTER: SecretSVM - Secret Sharing-Based SVM for Preventing Collusion in IoT Data Analysis. 904-906 - Yebo Feng, Devkishen Sisodia, Jun Li:
POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic. 907-909 - Shun Takagi, Yang Cao, Masatoshi Yoshikawa:
POSTER: Data Collection via Local Differential Privacy with Secret Parameters. 910-912 - Shun Takagi, Yang Cao, Yasuhito Asano, Masatoshi Yoshikawa:
POSTER: Protecting Location Privacy on Road Networks. 913-915 - Neminath Hubballi, Namrata Tiwari, Pratibha Khandait:
POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation. 916-918 - Taehun Kim, Youngjoo Shin:
POSTER: Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud Environment. 919-921 - Daniel Andrade, Yusuke Takahashi, Daichi Hasumi:
POSTER: Detecting Suspicious Processes from Log-Data via a Bayesian Block Model. 922-924 - Leong Mei Han, Yang Zhao, Jun Zhao:
POSTER: Blockchain-Based Differential Privacy Cost Management System. 925-927 - Seungoh Choi, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim:
POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis. 928-930 - Hao-Cheng Yang, Hsun Lee, Hsu-Chun Hsiao:
Poster: Challenges in Stopping Ticket Scalping Bots. 931-933 - Yi-Hsien Chen, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, Chun-Ying Huang:
POSTER: Construct macOS Cyber Range for Red/Blue Teams. 934-936
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.