


default search action
9th AsiaCCS 2014: Kyoto, Japan
- Shiho Moriai, Trent Jaeger, Kouichi Sakurai:

9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014. ACM 2014, ISBN 978-1-4503-2800-5
Keynote
- Christopher Kruegel:

Fighting malicious code: an eternal struggle. 1
Network
- Fabian Lanze, Andriy Panchenko, Benjamin Braatz

, Thomas Engel:
Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature. 3-14 - Moreno Ambrosin

, Mauro Conti
, Paolo Gasti, Gene Tsudik:
Covert ephemeral communication in named data networking. 15-26 - Guowu Xie, Huy Hang, Michalis Faloutsos

:
Scanner hunter: understanding HTTP scanning traffic. 27-38 - Hao Zhang

, Danfeng (Daphne) Yao
, Naren Ramakrishnan
:
Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. 39-50 - Georges Bossert, Frédéric Guihéry, Guillaume Hiet:

Towards automated protocol reverse engineering using semantic information. 51-62
Reputation and location
- Anupam Das, Nikita Borisov

, Prateek Mittal, Matthew Caesar
:
Re3: relay reliability reputation for anonymity systems. 63-74 - Mahdi Nasrullah Al-Ameen, Matthew K. Wright

:
Design and evaluation of persea, a sybil-resistant DHT. 75-86 - Rasib Khan, Shams Zawoad, Munirul M. Haque, Ragib Hasan

:
OTIT: towards secure provenance modeling for location proofs. 87-98 - Jaroslav Sedenka, Paolo Gasti:

Privacy-preserving distance computation and proximity testing on earth, done right. 99-110
Processing encrypted data
- Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li:

Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. 111-122 - Dongxi Liu, Elisa Bertino, Xun Yi:

Privacy of outsourced k-means clustering. 123-134 - Muhammad Rizwan Asghar

, Ashish Gehani, Bruno Crispo, Giovanni Russello:
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. 135-146 - Jinsheng Zhang, Wensheng Zhang, Daji Qiao:

S-ORAM: a segmentation-based oblivious RAM. 147-158 - Chengfang Fang, Ee-Chien Chang

:
Differential privacy with δ-neighbourhood for spatial and dynamic datasets. 159-170
Applications 1
- Davide Canali, Leyla Bilge, Davide Balzarotti:

On the effectiveness of risk prediction based on users browsing behavior. 171-182 - Ben Stock

, Martin Johns
:
Protecting users against XSS-based password manager abuse. 183-194 - Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot

, Wei-bang Chen:
A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability. 195-206
Crypto
- Janaka Alawatugoda

, Douglas Stebila
, Colin Boyd:
Modelling after-the-fact leakage for key exchange. 207-216 - Rong Jin, Xianru Du, Zi Deng, Kai Zeng, Jing Xu:

Practical secret key agreement for full-duplex near field communications. 217-228 - Alexandre Pinto, Bertram Poettering, Jacob C. N. Schuldt:

Multi-recipient encryption, revisited. 229-238 - Junzuo Lai, Robert H. Deng

, Yingjiu Li, Jian Weng
:
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. 239-248 - Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang:

Improved anonymous proxy re-encryption with CCA security. 249-258
Access control and flow analysis
- Mu Zhang

, Heng Yin
:
Efficient, context-aware privacy leakage confinement for android applications without firmware modding. 259-270 - Tobias Wüchner, Martín Ochoa

, Alexander Pretschner:
Malware detection with quantitative data flow graphs. 271-282 - Quoc-Sang Phan

, Pasquale Malacaria:
Abstract model counting: a novel approach for quantification of information leaks. 283-292 - Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan

:
ConXsense: automated context classification for context-aware access control. 293-304
Software and systems security
- Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon

, Christoph Neumann:
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. 305-316 - Su Zhang, Xinwen Zhang, Xinming Ou:

After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. 317-328 - Markus Kammerstetter, Christian Platzer, Wolfgang Kastner

:
Prospect: peripheral proxying supported embedded code testing. 329-340 - Adonis P. H. Fung, Tielei Wang, K. W. Cheung, Tsz-Yeung Wong:

Scanning of real-world web applications for parameter tampering vulnerabilities. 341-352
Applications 2
- Gianluca Stringhini, Oliver Hohlfeld, Christopher Kruegel, Giovanni Vigna:

The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape. 353-364 - Bisheng Liu, Urs Hengartner:

pTwitterRec: a privacy-preserving personalized tweet recommendation framework. 365-376 - Jelena Isacenkova, Davide Balzarotti:

Shades of gray: a closer look at emails in the gray area. 377-388
Authentication
- Hongbo Liu

, Yan Wang, Jian Liu, Jie Yang, Yingying Chen
:
Practical user authentication leveraging channel state information (CSI). 389-400 - Hu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, Wei Jiang:

Outsourceable two-party privacy-preserving biometric authentication. 401-412 - Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng

:
Understanding OSN-based facial disclosure against face authentication systems. 413-424 - Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow

, Josep Domingo-Ferrer
, Wenchang Shi:
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. 425-434 - Sebastian Mödersheim

, Luca Viganò
:
Sufficient conditions for vertical composition of security protocols. 435-446
Android
- Timothy Vidas, Nicolas Christin

:
Evading android runtime analysis via sandbox detection. 447-458 - Collin Mulliner, William K. Robertson, Engin Kirda:

VirtualSwindle: an automated attack against in-app billing on android. 459-470 - Min Zheng, Mingshen Sun, John C. S. Lui:

DroidRay: a security evaluation system for customized android firmwares. 471-482 - Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu:

APKLancet: tumor payload diagnosis and purification for android applications. 483-494
Short 1 -- network
- Benjamin Johnson, Aron Laszka

, Jens Grossklags:
How many down?: toward understanding systematic risk in networks. 495-500 - Sébastien Gambs, Cristina Onete

, Jean-Marc Robert:
Prover anonymous and deniable distance-bounding authentication. 501-506 - Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith

:
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. 507-512 - Tiffany Hyun-Jin Kim, H. Colleen Stuart, Hsu-Chun Hsiao, Yue-Hsun Lin, Leon Zhang, Laura Dabbish

, Sara B. Kiesler:
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords. 513-518
Short 1 -- software
- Jakub Szefer, Pramod A. Jamkhedkar, Diego Perez-Botero, Ruby B. Lee:

Cyber defenses for physical attacks and insider threats in cloud computing. 519-524 - Steven Van Acker, Nick Nikiforakis, Lieven Desmet

, Frank Piessens, Wouter Joosen:
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. 525-530 - Kun Yang, Jianwei Zhuge, Yongke Wang, Lujue Zhou, Hai-Xin Duan:

IntentFuzzer: detecting capability leaks of android applications. 531-536 - Xingjie Yu, Zhan Wang, Kun Sun

, Wen Tao Zhu, Neng Gao, Jiwu Jing:
Remotely wiping sensitive data on stolen smartphones. 537-542

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














