default search action
8th AsiaCCS 2013: Hangzhou, China
- Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, Wen-Guey Tzeng:
8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013. ACM 2013, ISBN 978-1-4503-1767-2
Mobile devices security
- Wu Zhou, Xinwen Zhang, Xuxian Jiang:
AppInk: watermarking android apps for repackaging deterrence. 1-12 - Tim Werthmann, Ralf Hund, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz:
PSiOS: bring your own privacy & security to iOS devices. 13-24 - Hao Hao, Vicky Singh, Wenliang Du:
On the effectiveness of API-level access control using bytecode rewriting in Android. 25-36 - Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng:
Designing leakage-resilient password entry on touchscreen mobile devices. 37-48 - Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao:
Your love is public now: questioning the use of personal information in authentication. 49-60
Applied cryptography I
- Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He:
Multi-key leakage-resilient threshold cryptography. 61-70 - Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Y. Thomas Hou, Hui Li:
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. 71-82 - Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama:
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism. 83-94 - Christian Hanser, Daniel Slamanig:
Blank digital signatures. 95-106 - Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering:
Pseudorandom signatures. 107-118
Software security
- Davide Maiorca, Igino Corona, Giorgio Giacinto:
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection. 119-130 - Ben Niu, Gang Tan:
Efficient user-space information flow control. 131-142
Short papers I: social network
- Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao:
SocialWatch: detection of online service abuse via large-scale social graphs. 143-148 - Amirreza Masoumzadeh, James Joshi:
Privacy settings in social networking systems: what you cannot control. 149-154 - Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, Yongdae Kim:
Trustworthy distributed computing on social networks. 155-160 - Seyed Hossein Ahmadinejad, Philip W. L. Fong:
On the feasibility of inference attacks by third-party extensions to social network systems. 161-166 - Abedelaziz Mohaisen, Yongdae Kim:
Dynamix: anonymity on dynamic social structures. 167-172 - Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim:
Protecting access privacy of cached contents in information centric networks. 173-178
Keynote address
- Wenbo Mao:
The role and effectiveness of cryptography in network virtualization: a position paper. 179-182
Data outsourcing
- Yihua Zhang, Marina Blanton:
Efficient dynamic provable possession of remote data via balanced update trees. 183-194 - Jia Xu, Ee-Chien Chang, Jianying Zhou:
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. 195-206 - Marina Blanton, Aaron Steele, Mehrdad Aliasgari:
Data-oblivious graph algorithms for secure computation and outsourcing. 207-218 - Shams Zawoad, Amit Kumar Dutta, Ragib Hasan:
SecLaaS: secure logging-as-a-service for cloud forensics. 219-230 - Jun Ho Huh, Mirko Montanari, Derek Dagit, Rakesh Bobba, Dongwook Kim, Yoonjoo Choi, Roy H. Campbell:
An empirical study on the software integrity of virtual appliances: are you really getting what you paid for? 231-242
Applied cryptography II
- Junzuo Lai, Xuhua Zhou, Robert Huijie Deng, Yingjiu Li, Kefei Chen:
Expressive search on encrypted data. 243-252 - Qiang Tang, Xiaofeng Chen:
Towards asymmetric searchable encryption with message recovery and flexible search authorization. 253-264 - Tarik Moataz, Abdullatif Shikfa:
Boolean symmetric searchable encryption. 265-276 - Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh:
Multi-channel broadcast encryption. 277-286 - Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami:
Comparative study of multicast authentication schemes with application to wide-area measurement system. 287-298
Software security
- Lucas Vincenzo Davi, Alexandra Dmitrienko, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. 299-310 - Aravind Prakash, Heng Yin, Zhenkai Liang:
Enforcing system-wide control flow integrity for exploit detection and diagnosis. 311-322
Short papers II: cloud and mobile security
- Xinxin Zhao, Lingjun Li, Guoliang Xue:
Secure cloud-assisted location based reminder. 323-328 - Vaibhav Rastogi, Yan Chen, Xuxian Jiang:
DroidChameleon: evaluating Android anti-malware against transformation attacks. 329-334 - Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng:
Bind your phone number with caution: automated user profiling through address book matching on smartphone. 335-340 - Huiping Yao, Dongwan Shin:
Towards preventing QR code based attacks on android phone using security warnings. 341-346 - Zhan Wang, Jiwu Jing, Liang Li:
Time evolving graphical password for securing mobile devices. 347-352 - Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie:
DroidAlarm: an all-sided static analysis tool for Android privilege-escalation malware. 353-358
Privacy and anonymity
- Sebastian Clauß, Stefan Schiffner, Florian Kerschbaum:
k-anonymous reputation. 359-368 - Cheng-Kang Chu, Joseph K. Liu, Jun Wen Wong, Yunlei Zhao, Jianying Zhou:
Privacy-preserving smart metering with regional statistics and personal enquiry services. 369-380 - Sébastien Canard, Roch Lescuyer:
Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. 381-392 - Florian Kerschbaum:
An information-flow type-system for mixed protocol secure computation. 393-404
Network security
- Jun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou:
Robust network traffic identification with unknown applications. 405-414 - Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
STRIDE: sanctuary trail - refuge from internet DDoS entrapment. 415-426 - Mathy Vanhoef, Frank Piessens:
Practical verification of WPA-TKIP vulnerabilities. 427-436 - Wilko Henecka, Thomas Schneider:
Faster secure two-party computation with less memory. 437-446
Web and mobile security
- Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen:
TabShots: client-side detection of tabnabbing attacks. 447-456 - Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang:
Fuzzing the ActionScript virtual machine. 457-468 - Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, Dustin Rinehart:
Sensing-enabled channels for hard-to-detect command and control of mobile devices. 469-480
Short paper III: software and web security
- Xiaowei Li, Yuan Xue:
LogicScope: automatic discovery of logic vulnerabilities within web applications. 481-486 - Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Stephen McCamant, Laszlo Szekeres:
Protecting function pointers in binary. 487-492 - Viet Hung Nguyen, Fabio Massacci:
The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities. 493-498 - David Gugelmann, Dominik Schatzmann, Vincent Lenders:
Horizon extender: long-term preservation of data leakage evidence in web traffic. 499-504
Short paper IV: applied cryptography and protocols
- Kevin Atighehchi, Traian Muntean:
Towards fully incremental cryptographic schemes. 505-510 - Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li:
Anonymous attribute-based encryption supporting efficient decryption test. 511-516 - Kazuma Ohara, Yusuke Sakai, Keita Emura, Goichiro Hanaoka:
A group signature scheme with unbounded message-dependent opening. 517-522 - Kan Yang, Xiaohua Jia, Kui Ren:
Attribute-based fine-grained access control with efficient revocation in cloud storage systems. 523-528 - Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg, Markus Huber, Manuel Leithner, Martin Mulazzani, Edgar R. Weippl:
Covert computation: hiding code in code for obfuscation purposes. 529-534 - Rong Hu, Kirill Morozov, Tsuyoshi Takagi:
Proof of plaintext knowledge for code-based public-key encryption revisited. 535-540 - Bharath K. Samanthula, Hu Chun, Wei Jiang:
An efficient and probabilistic secure bit-decomposition. 541-546 - Jannik Dreier, Hugo Jonker, Pascal Lafourcade:
Defining verifiability in e-auction protocols. 547-552 - Xuhua Ding, HweeHwa Pang, Junzuo Lai:
Verifiable and private top-k monitoring. 553-558
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.