


default search action
16th AsiaCCS 2021: Virtual Event, Hong Kong
- Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:

ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8
Keynote I
- Somesh Jha:

Trustworthy Machine Learning: Past, Present, and Future. 1
Session 1A: ML and Security (I)
- Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong:

Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes. 2-13 - Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong:

IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary. 14-25 - Shameek Bhattacharjee, Venkata Praveen Kumar Madhavarapu

, Sajal K. Das:
A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification Attacks. 26-39 - Fei Zuo, Qiang Zeng:

Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore. 40-51
Session 1B: Cyber-physical Systems
- Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi:

ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems. 52-66 - S. Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen:

EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech. 67-81 - Yi Wu

, Xiangyu Xu, Payton R. Walker
, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks. 82-94 - Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi

, Christopher Kruegel, Giovanni Vigna:
Conware: Automated Modeling of Hardware Peripherals. 95-109
Session 2A: Network and Web Security (I)
- Gordon Meiser, Pierre Laperdrix, Ben Stock

:
Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication. 110-122 - Assel Aliyeva, Manuel Egele:

Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session Cookies. 123-134 - Jongkil Kim, Seyit Camtepe, Joonsang Baek

, Willy Susilo
, Josef Pieprzyk
, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. 135-146 - Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty:

Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels. 147-161
Session 2B: Hardware Security (I)
- Zhenkai Zhang

, Sisheng Liang, Fan Yao
, Xing Gao:
Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels. 162-175 - Shuji Ohira

, Araya Kibrom Desta
, Ismail Arai
, Kazutoshi Fujikawa:
PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks. 176-186 - Pascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard

:
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment. 187-199 - Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard

:
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory. 200-212
Session 3A: Applied Cryptography (I)
- Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim

, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. 213-226 - Christian Plappert

, Lukas Jäger, Andreas Fuchs:
Secure Role and Rights Management for Automotive Access and Feature Activation. 227-241 - Jie Li, Yamin Liu, Shuang Wu:

Pipa: Privacy-preserving Password Checkup via Homomorphic Encryption. 242-251 - Yun Wang

, Dimitrios Papadopoulos:
Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time. 252-264
Session 3B: ML and Security (II)
- Antreas Dionysiou

, Vassilis Vassiliades
, Elias Athanasopoulos:
HoneyGen: Generating Honeywords Using Representation Learning. 265-279 - James Pavur, Ivan Martinovic:

On Detecting Deception in Space Situational Awareness. 280-291 - Stefano Calzavara, Lorenzo Cazzaro

, Claudio Lucchese:
AMEBA: An Adaptive Approach to the Black-Box Evasion of Machine Learning Models. 292-306 - Kangjie Chen, Shangwei Guo, Tianwei Zhang, Xiaofei Xie

, Yang Liu
:
Stealing Deep Reinforcement Learning Models for Fun and Profit. 307-319
Keynote II
- Elaine Shi:

Streamlet: An Absurdly Simple, Textbook Blockchain Protocol. 320
Session 4A: ML and Security (III)
- Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song:

REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data. 321-335 - Lun-Pin Yuan, Peng Liu, Sencun Zhu:

Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. 336-348 - Kaichen Yang

, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho
, Yier Jin
:
Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules. 349-362 - Han Qiu, Yi Zeng, Shangwei Guo

, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham:
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation. 363-377
Session 4B: Measurement/Empirical Security
- Mustafa Abdallah

, Daniel Woods
, Parinaz Naghizadeh
, Issa Khalil
, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems. 378-392 - Wenhui Zhang, Peng Liu, Trent Jaeger:

Analyzing the Overhead of File Protection by Linux Security Modules. 393-406 - Doowon Kim

, Haehyun Cho
, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn
, Tudor Dumitras:
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. 407-420 - Wei Xie

, Chao Zhang, Pengfei Wang, Zhenhua Wang, Qiang Yang:
ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition. 421-431
Sessionn 5A: Network and Web Security (II)
- Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang:

Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. 432-446 - Mohammed Jubur

, Prakash Shrestha, Nitesh Saxena, Jay Prakash:
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications. 447-461 - Timothy Barron, Johnny So, Nick Nikiforakis:

Click This, Not That: Extending Web Authentication with Deception. 462-474 - Joonhee Lee, Hyunwoo Lee, Jongheon Jeong, Doowon Kim

, Ted Taekyoung Kwon:
Analyzing Spatial Differences in the TLS Security of Delegated Web Services. 475-487
Session 5B: Applied Cryptography (II)
- Ruiyu Zhu, Yan Huang:

Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits. 488-500 - Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz

, Elisa Bertino:
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. 501-515 - Esha Ghosh, Seny Kamara, Roberto Tamassia:

Efficient Graph Encryption Scheme for Shortest Path Queries. 516-525
Session 6A: Software Security and Vulnerability Analysis (I)
- Sebastian Plotz, Frederik Armknecht

, Christian Bunse:
How to Take Over Drones. 526-536 - Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury:

Localizing Vulnerabilities Statistically From One Exploit. 537-549 - Markus Bauer

, Christian Rossow:
Cali: Compiler-Assisted Library Isolation. 550-564 - Zhuotao Liu

, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang:
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment. 565-577
Session 6B: Privacy (I)
- Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes:

Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps. 578-592 - Maryam Sepehri, Florian Kerschbaum:

Low-Cost Hiding of the Query Pattern. 593-603 - Linpeng Lu

, Ning Ding:
Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension. 604-615 - Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida

:
Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks. 616-627
Keynote III
- Kui Ren:

Encrypted Databases: Progresses and Challenges. 628
Session 7A: Privacy (II)
- Erkam Uzun, Carter Yagemann

, Simon P. Chung, Vladimir Kolesnikov, Wenke Lee:
Cryptographic Key Derivation from Biometric Inferences for Remote Authentication. 629-643 - Ahsan Zafar, Aafaq Sabir, Dilawer Ahmed, Anupam Das:

Understanding the Privacy Implications of Adblock Plus's Acceptable Ads. 644-657 - Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider

:
Privacy-preserving Density-based Clustering. 658-671 - Antoine Boutet, Carole Frindel

, Sébastien Gambs, Théo Jourdan, Rosin Claude Ngueveu:
DySan: Dynamically Sanitizing Motion Sensor Data Against Sensitive Inferences through Adversarial Networks. 672-686
Session 7B: Software Security and Vulnerability Analysis (II)
- Andrew Fasano

, Tiemoko Ballo, Marius Muench
, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson:
SoK: Enabling Security Analyses of Embedded Systems via Rehosting. 687-701 - Yuede Ji, Lei Cui, H. Howie Huang

:
BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network. 702-715 - Joshua Bundt

, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek:
Evaluating Synthetic Bugs. 716-730 - Dongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella

, Christopher Kruegel, Giovanni Vigna:
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms. 731-743
Session 8A: Malware and Cybercrime (I)
- Keane Lucas

, Mahmood Sharif
, Lujo Bauer
, Michael K. Reiter
, Saurabh Shintre:
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. 744-758 - Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu

, Wenke Lee:
Identifying Behavior Dispatchers for Malware Analysis. 759-773 - Michal Piskozub, Fabio De Gaspari

, Freddie Barr-Smith, Luigi V. Mancini, Ivan Martinovic:
MalPhase: Fine-Grained Malware Detection Using Network Flow Data. 774-786
Session 8B: Blockchain and Distributed Systems
- Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:

Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. 787-801 - Shivendra Kushwah, Ankush Desai, Pramod Subramanyan, Sanjit A. Seshia:

PSec: Programming Secure Distributed Systems using Enclaves. 802-816 - Runchao Han, Zhimei Sui, Jiangshan Yu

, Joseph K. Liu, Shiping Chen
:
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains. 817-831 - Yan Qiao, Kui Wu, Majid Khabbazian:

Non-Intrusive and High-Efficient Balance Tomography in the Lightning Network. 832-843 - Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu:

Redactable Blockchain Supporting Supervision and Self-Management. 844-858 - Yannan Li

, Willy Susilo
, Guomin Yang
, Yong Yu
, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. 859-871
Session 9A: Hardware Security (II)
- Ajay Nayak, Pratheek B, Vinod Ganapathy, Arkaprava Basu:

(Mis)managed: A Novel TLB-based Covert Channel on GPUs. 872-885 - Chuadhry Mujeeb Ahmed

, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. 886-900 - Yazhou Tu, Vijay Srinivas Tida, Zhongqi Pan, Xiali Hei:

Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on Sensors. 901-915
Session 9B: Malware and Cybercrime (II)
- Tsuyoshi Taniguchi, Harm Griffioen, Christian Doerr:

Analysis and Takeover of the Bitcoin-Coordinated Pony Malware. 916-930 - Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li:

See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. 931-943 - Ximing Liu, Yingjiu Li, Robert H. Deng

:
UltraPIN: Inferring PIN Entries via Ultrasound. 944-957

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














