


default search action
11th AsiaCCS 2016: Xi'an, China
- Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang:

Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4233-9
Keynote Address
- Shigang Liu, Jun Zhang

, Yang Xiang:
Statistical Detection of Online Drifting Twitter Spam: Invited Paper. 1-10
Session 1: Software Security
- Qian Feng, Aravind Prakash, Minghua Wang

, Curtis Carmony, Heng Yin
:
ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis. 11-22 - Hyungjoon Koo

, Michalis Polychronakis:
Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement. 23-34 - Jan Werner, George Baltas, Rob Dallara, Nathan Otterness, Kevin Z. Snow, Fabian Monrose, Michalis Polychronakis:

No-Execute-After-Read: Preventing Code Disclosure in Commodity Software. 35-46 - Mariano Graziano, Davide Balzarotti, Alain Zidouemba:

ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks. 47-58
Session 2: Cloud Security I
- Heyi Tang

, Yong Cui, Chaowen Guan
, Jianping Wu, Jian Weng
, Kui Ren
:
Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control. 59-70 - Sagar Sharma, James Powers, Keke Chen:

Privacy-Preserving Spectral Analysis of Large Graphs in Public Clouds. 71-82 - Kaitai Liang

, Chunhua Su, Jiageng Chen
, Joseph K. Liu:
Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. 83-94
Session 3: Cloud Security II
- Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin:

FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System. 95-106 - Binanda Sengupta

, Sushmita Ruj:
Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding. 107-118 - Kaoutar Elkhiyaoui, Melek Önen

, Monir Azraoui, Refik Molva
:
Efficient Techniques for Publicly Verifiable Delegation of Computation. 119-128
Keynote Address
- Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling

, Christian Hammer
:
R-Droid: Leveraging Android App Analysis with Static Slice Optimization. 129-140
Session 4: Password Authentication and Security
- Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng

, Youcheng Zhang, Jianying Zhou
:
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. 141-151 - Lin Zhang, Zhenfeng Zhang, Xuexian Hu:

UC-secure Two-Server Password-Based Authentication Protocol and Its Applications. 153-164 - Jeremiah Blocki

, Anirudh Sridhar:
Client-CASH: Protecting Master Passwords against Offline Attacks. 165-176 - Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:

Device-Enhanced Password Protocols with Optimal Online-Offline Protection. 177-188 - Chen Wang, Xiaonan Guo, Yan Wang

, Yingying Chen
, Bo Liu
:
Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN. 189-200
Session 5: Identity-Based Encryption
- Willy Susilo

, Rongmao Chen, Fuchun Guo
, Guomin Yang
, Yi Mu, Yang-Wai Chow
:
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. 201-210 - Zhen Liu, Duncan S. Wong, Jack Poon:

Dealerless Corporate Key Generation for Identity-Based Encryption Schemes. 211-222 - Peng Xu

, Jingnan Li, Wei Wang, Hai Jin:
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security. 223-233 - Tao Zhang, Sherman S. M. Chow

, Jinyuan Sun:
Password-Controlled Encryption with Accountable Break-Glass Access. 235-246 - Kai He, Jian Weng

, Jia-Nan Liu
, Joseph K. Liu, Wei Liu, Robert H. Deng
:
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. 247-255
Session 6: Outsourcing
- Qian Wang

, Jingjun Wang, Shengshan Hu, Qin Zou
, Kui Ren
:
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud. 257-268 - Kai Zhang

, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao:
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. 269-279 - Sergio Salinas, Changqing Luo

, Weixian Liao, Pan Li
:
Efficient Secure Outsourcing of Large-scale Quadratic Programs. 281-292 - Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability. 293-303
Session 7: System Security
- Shijie Jia, Luning Xia, Bo Chen, Peng Liu:

NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer. 305-315 - Shweta Shinde

, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena:
Preventing Page Faults from Telling Your Secrets. 317-328 - Ahmed Taha, Patrick Metzler, Rubén Trapero, Jesus Luna, Neeraj Suri

:
Identifying and Utilizing Dependencies Across Cloud Security Services. 329-340 - Wai-Kit Sze, Abhinav Srivastava, R. Sekar:

Hardening OpenStack Cloud Platforms against Compute Node Compromises. 341-352 - Gorka Irazoqui, Thomas Eisenbarth

, Berk Sunar:
Cross Processor Cache Attacks. 353-364
Session 8: Mobile Security I
- Guozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu

, Jie Zhang, Tieming Chen
:
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools. 365-376 - Sen Chen, Minhui Xue

, Zhushou Tang, Lihua Xu, Haojin Zhu
:
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware. 377-388 - Gabriele Costa

, Paolo Gasti, Alessio Merlo, Shunt-Hsi Yu:
FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization. 389-400 - Eran Tromer, Roei Schuster:

DroidDisintegrator: Intra-Application Information Flow Control in Android Apps. 401-412 - Mathy Vanhoef

, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens:
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. 413-424
Session 9: IoT and CPS
- Ian D. Markwood, Yao Liu:

Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition. 425-436 - Andrei Costin, Apostolis Zarras

, Aurélien Francillon
:
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces. 437-448 - Sridhar Adepu, Aditya Mathur:

Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. 449-460 - Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, David A. Wagner:

Smart Locks: Lessons for Securing Commodity Internet of Things Devices. 461-472
Keynote Address
- Giovanni Vigna:

Binary Analysis for Autonomous Hacking: Invited Abstract. 473
Session 10: Authentication
- Ding Wang

, Qianchen Gu, Haibo Cheng, Ping Wang:
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes. 475-486 - Shuai Han, Shengli Liu, Fangguo Zhang

, Kefei Chen:
Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes. 487-498 - Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank:

Forgery-Resistant Touch-based Authentication on Mobile Devices. 499-510 - Benoît Libert, Fabrice Mouhartem, Thomas Peters, Moti Yung:

Practical "Signatures with Efficient Protocols" from Simple Assumptions. 511-522 - Tao Xiang

, Xiaoguo Li, Fei Chen, Yi Mu:
Bilateral-secure Signature by Key Evolving. 523-533
Session 11: Security Protocols I
- Tianhao Wang

, Yunlei Zhao:
Secure Dynamic SSE via Access Indistinguishable Storage. 535-546 - Xingliang Yuan

, Xinyu Wang
, Cong Wang, Chen Qian, Jianxiong Lin:
Building an Encrypted, Distributed, and Searchable Key-value Store. 547-558 - Xingguang Zhou, Jianwei Liu

, Weiran Liu, Qianhong Wu:
Anonymous Role-Based Access Control on E-Health Records. 559-570 - Yan Li, Ting Zhu:

Gait-Based Wi-Fi Signatures for Privacy-Preserving. 571-582 - Xingye Lu, Man Ho Au

:
Anonymous Identification for Ad Hoc Group. 583-591
Session 12: Security Protocols II
- Zhe Zhou, Tao Zhang, Sherman S. M. Chow

, Yupeng Zhang, Kehuan Zhang:
Efficient Authenticated Multi-Pattern Matching. 593-604 - Ngoc Hieu Tran, HweeHwa Pang

, Robert H. Deng
:
Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data. 605-616 - Sungwook Kim

, Jinsu Kim, Dongyoung Koo
, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin
:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract. 617-628 - Chong Guan, Kun Sun, Zhan Wang, Wen Tao Zhu:

Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure. 629-640 - Pierre-Alain Fouque

, Chen Qian
:
Fault Attacks on Efficient Pairing Implementations. 641-650
Session 13: Web and Network Security
- Ronghai Yang, Guanchen Li, Wing Cheong Lau, Kehuan Zhang, Pili Hu:

Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations. 651-662 - Issa Khalil

, Ting Yu, Bei Guan:
Discovering Malicious Domains through Passive DNS Data Graph Analysis. 663-674 - Yogesh Mundada, Nick Feamster, Balachander Krishnamurthy:

Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern Web. 675-685 - Jethro G. Beekman, John L. Manferdelli, David A. Wagner:

Attestation Transparency: Building secure Internet services for legacy clients. 687-698 - Yu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, Vyas Sekar:

CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks. 699-710
Session 14: Mobile Security II
- Siqi Ma

, David Lo
, Teng Li, Robert H. Deng
:
CDRep: Automatic Repair of Cryptographic Misuses in Android Applications. 711-722 - Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao

, Mustaque Ahamad:
MobiPot: Understanding Mobile Telephony Threats with Honeycards. 723-734 - Yiming Jing, Gail-Joon Ahn

, Adam Doupé, Jeong Hyun Yi
:
Checking Intent-based Communication in Android with Intent Space Analysis. 735-746 - Zheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian

, Hao Chen
:
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. 747-758 - Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, Dengguo Feng:

Attacks and Defence on Android Free Floating Windows. 759-770
Session 15: Malware and Attacks
- Phani Vadrevu, Roberto Perdisci

:
MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing. 771-782 - Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci

:
Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining. 783-794 - Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo He

:
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms. 795-806 - Zeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, Yuan Zhao:

Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis. 807-818 - Changhai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, Victor E. DeBrunner:

Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher. 819-827
Session 16: Privacy
- Seyed Hossein Ahmadinejad, Philip W. L. Fong, Reihaneh Safavi-Naini:

Privacy and Utility of Inference Control Mechanisms for Social Computing Applications. 829-840 - Qinghan Xue, Mooi Choo Chuah, Yingying Chen

:
Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS). 841-852 - Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld:

Data Exfiltration in the Face of CSP. 853-864 - Mickaël Salaün, Marion Daubignard, Hervé Debar

:
StemJail: Dynamic Role Compartmentalization. 865-876 - Katharina Kohls, Thorsten Holz

, Dorothea Kolossa
, Christina Pöpper
:
SkypeLine: Robust Hidden Data Transmission for VoIP. 877-888
Session 17: Short Papers
- Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang

, Jin Li, Yabin Jin, Jiajun Huang:
Generic Construction of Publicly Verifiable Predicate Encryption. 889-894 - Jing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu:

Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. 895-900 - Shifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli

, Tsz Hon Yuen
:
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption. 901-906 - Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue

:
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus. 907-912 - Peng Xu

, Jun Xu, Wei Wang, Hai Jin, Willy Susilo
, Deqing Zou:
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds. 913-918 - Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes:

RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. 919-924 - Issa Khalil

, Zuochao Dou, Abdallah Khreishah
:
Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected. 925-930 - Jongho Won, Elisa Bertino:

Inside Attack Filtering for Robust Sensor Localization. 931-936

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














