


default search action
15th AsiaCCS 2020: Taipei, Taiwan
- Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese

:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020. ACM 2020, ISBN 978-1-4503-6750-9
Keynote Talks
- Dawn Song:

AI and Security: Lessons, Challenges and Future Directions. 1 - Gene Tsudik:

Proofs or Remote Execution and Mitigation of TOCTOU Attacks. 2-3 - Adrian Perrig:

Global Communication Guarantees in the Presence of Adversaries. 4-5
Session 1: IoT Security and Privacy
- Manuel Huber

, Stefan Hristozov, Simon Ott
, Vasil Sarafov, Marcus Peinado:
The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things. 6-19 - Sihan Yu, Xiaonan Zhang

, Pei Huang, Linke Guo, Long Cheng, Kuang-Ching Wang
:
AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments. 20-32 - Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao

, Rong Ge:
DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels. 33-46 - Shuaike Dong, Zhou Li

, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang:
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic. 47-59
Session 2: Authentication
- Joon Kuy Han, Xiaojun Bi, Hyoungshick Kim, Simon S. Woo:

PassTag: A Graphical-Textual Hybrid Fallback Authentication System. 60-72 - Benjamin Rothenberger, Dominik Roos, Markus Legner

, Adrian Perrig
:
PISKES: Pragmatic Internet-Scale Key-Establishment System. 73-86 - Ioana Boureanu

, Liqun Chen
, Sam Ivey:
Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments. 87-100 - Saul A. Johnson

, João F. Ferreira, Alexandra Mendes, Julien Cordry:
Skeptic: Automatic, Justified and Privacy-Preserving Password Composition Policy Selection. 101-115
Session 3: Network Security
- Joonsang Baek

, Jongkil Kim, Willy Susilo
:
Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception. 116-126 - Ankush Singla, Elisa Bertino, Dinesh C. Verma:

Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation. 127-140 - Markus Wurzenberger

, Georg Höld, Max Landauer
, Florian Skopik
, Wolfgang Kastner:
Creating Character-based Templates for Log Data to Enable Security Event Classification. 141-152 - Devkishen Sisodia, Jun Li, Lei Jiao

:
In-Network Filtering of Distributed Denial-of-Service Traffic with Near-Optimal Rule Selection. 153-164
Session 4: Cloud Security
- Katarzyna Kapusta, Matthieu Rambaud, Gérard Memmi

:
Revisiting Shared Data Protection Against Key Exposure. 165-177 - Guowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yinghui Zhang, Jianfei Sun, Robert H. Deng

:
Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems. 178-192 - Anselme Tueno, Florian Kerschbaum:

Efficient Secure Computation of Order-Preserving Encryption. 193-207 - Stefano Berlato

, Roberto Carbone, Adam J. Lee
, Silvio Ranise:
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization. 208-221
Session 5: Usable Security & Privacy
- Tobias Urban

, Dennis Tatang, Martin Degeling
, Thorsten Holz, Norbert Pohlmann:
Measuring the Impact of the GDPR on Data Sharing in Ad Networks. 222-235 - Shahryar Baki, Rakesh M. Verma

, Omprakash Gnawali:
Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders. 236-247 - Tingmin Wu

, Rongjunchen Zhang, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal
, Yang Xiang:
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts. 248-262 - Florian Quinkert, Martin Degeling

, Jim Blythe, Thorsten Holz:
Be the Phisher - Understanding Users' Perception of Malicious Domains. 263-276
Session 6: Privacy-enhancing Technology
- Sven Hammann, Ralf Sasse, David A. Basin:

Privacy-Preserving OpenID Connect. 277-289 - Nguyen Phong Hoang, Arian Akhavan Niaki

, Nikita Borisov
, Phillipa Gill, Michalis Polychronakis:
Assessing the Privacy Benefits of Domain Name Encryption. 290-304 - Sharif Abuadbba, Kyuyeon Kim, Minki Kim, Chandra Thapa

, Seyit Ahmet Çamtepe
, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training? 305-318 - Jan Bobolz, Fabian Eidens

, Stephan Krenn
, Daniel Slamanig
, Christoph Striecks
:
Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. 319-333
Session 7: AI Security
- Patrick P. K. Chan, Yaxuan Wang, Daniel S. Yeung:

Adversarial Attack against Deep Reinforcement Learning with Static Reward Impact Map. 334-343 - Congzheng Song, Reza Shokri

:
Membership Encoding for Deep Learning. 344-356 - Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah

:
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. 357-369 - Wanyu Lin

, Shengxiang Ji, Baochun Li:
Adversarial Attacks on Link Prediction Algorithms Based on Graph Neural Networks. 370-380 - Kumar Sharad, Giorgia Azzurra Marson, Hien Thi Thu Truong, Ghassan Karame:

On the Security of Randomized Defenses Against Adversarial Samples. 381-393
Session 8: Web Security
- Takashi Koide, Daiki Chiba

, Mitsuaki Akiyama:
To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web. 394-408 - Christian Dresen

, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian Schinzel:
CORSICA: Cross-Origin Web Service Identification. 409-419 - Sebastian Roth

, Michael Backes, Ben Stock
:
Assessing the Impact of Script Gadgets on CSP at Scale. 420-431 - Abhishek Bichhawat, Matt Fredrikson

, Jean Yang, Akash Trehan:
Contextual and Granular Policy Enforcement in Database-backed Applications. 432-444 - Rasoul Jahanshahi, Adam Doupé, Manuel Egele:

You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications. 445-457
Session 9: OS Security
- Qinsheng Hou, Yao Cheng, Lingyun Ying:

NativeX: Native Executioner Freezes Android. 458-470 - Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram

, David Robin, Keith Mayes, David Naccache:
Return-Oriented Programming on RISC-V. 471-480 - Claudio Canella, Michael Schwarz, Martin Haubenwallner, Martin Schwarzl, Daniel Gruss

:
KASLR: Break It, Fix It, Repeat. 481-493 - Prabhu Rajasekaran, Stephen Crane, David Gens, Yeoul Na, Stijn Volckaert

, Michael Franz:
CoDaRR: Continuous Data Space Randomization against Data-Only Attacks. 494-505
Session 10: Blockchain I
- Bowen Liu, Pawel Szalachowski, Siwei Sun:

Fail-safe Watchtowers and Short-lived Assertions for Payment Channels. 506-518 - Yazan Boshmaf, Charitha Elvitigala, Husam Al Jawaheri, Primal Wijesekera, Mashael Al Sabah:

Investigating MMM Ponzi Scheme on Bitcoin. 519-530 - Roman Matzutt

, Jan Pennekamp
, Erik Buchholz
, Klaus Wehrle
:
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services. 531-542 - Lisa Eckey, Sebastian Faust, Benjamin Schlosser:

OptiSwap: Fast Optimistic Fair Exchange. 543-557
Session 11: Blockchain II
- Erik-Oliver Blass, Florian Kerschbaum:

BOREALIS: Building Block for Sealed Bid Auctions on Blockchains. 558-571 - Feifan Yu, Na Ruan, Siyuan Cheng:

Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards. 572-583 - Christof Ferreira Torres

, Mathis Baden, Robert Norvill, Beltran Borja Fiz Pontiveros
, Hugo Jonker
, Sjouke Mauw:
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks. 584-597
Session 12: Software Security
- Shengbo Yan, Chenlu Wu, Hang Li, Wei Shao, Chunfu Jia:

PathAFL: Path-Coverage Assisted Fuzzing. 598-609 - Thanh Bui

, Siddharth Prakash Rao
, Markku Antikainen, Tuomas Aura
:
XSS Vulnerabilities in Cloud-Application Add-Ons. 610-621 - John Galea, Daniel Kroening:

The Taint Rabbit: Optimizing Generic Taint Analysis with Dynamic Fast Path Generation. 622-636 - Andrea Gussoni, Alessandro Di Federico, Pietro Fezzardi, Giovanni Agosta:

A Comb for Decompiled C Code. 637-651
Session 13: Malware
- Bushra A. AlAhmadi, Enrico Mariconti

, Riccardo Spolaor, Gianluca Stringhini, Ivan Martinovic:
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior. 652-664 - Hyejin Shin

, WooChul Shim, Jiin Moon, Jae Woo Seo, Sol Lee, Yong Ho Hwang:
Cybersecurity Event Detection with New and Re-emerging Words. 665-678 - Danny Hendler, Shay Kels, Amir Rubin:

AMSI-Based Detection of Malicious PowerShell Code Using Contextual Embeddings. 679-693 - Leonid Glanz, Patrick Müller, Lars Baumgärtner, Michael Reif, Sven Amann, Pauline Anthonysamy, Mira Mezini:

Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy. 694-707 - Greeshma Lingam, Rashmi Ranjan Rout, Durvasula V. L. N. Somayajulu, Sajal K. Das:

Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep Learning. 708-718
Session 14: CPS Security
- Zheng Yang

, Chenglu Jin
, Yangguang Tian
, Junyu Lai, Jianying Zhou
:
LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems. 719-731 - Nickolai Verchok, Alex Orailoglu:

Hunting Sybils in Participatory Mobile Consensus-Based Networks. 732-743 - Esha Sarkar, Hadjer Benkraouda, Michail Maniatakos

:
I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems. 744-758 - Marcello Pogliani, Federico Maggi, Marco Balduzzi, Davide Quarta, Stefano Zanero

:
Detecting Insecure Code Patterns in Industrial Robot Programs. 759-771 - Yilin Yang

, Yan Wang
, Yingying Chen, Chen Wang:
EchoLock: Towards Low-effort Mobile User Identification Leveraging Structure-borne Echos. 772-783
Session 15: Hardware-based Security & Applications
- Stephan Wesemeyer

, Christopher J. P. Newton
, Helen Treharne
, Liqun Chen
, Ralf Sasse, Jorden Whitefield:
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme. 784-798 - Jinwoo Ahn, Junghee Lee

, Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, Youngjae Kim:
DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX. 799-812 - Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais

, Clémentine Maurice
, Daniel Gruss
:
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors. 813-825 - Jianyu Jiang, Xusheng Chen, Tsz On Li, Cheng Wang, Tianxiang Shen, Shixiong Zhao, Heming Cui, Cho-Li Wang, Fengwei Zhang:

Uranus: Simple, Efficient SGX Programming and its Applications. 826-840
Session 16: Practical Post-Quantum Security
- Kevin Bürstinghaus-Steinbach, Christoph Krauß

, Ruben Niederhagen, Michael Schneider:
Post-Quantum TLS on Embedded Systems: Integrating and Evaluating Kyber and SPHINCS+ with mbed TLS. 841-852 - Chitchanok Chuengsatiansup, Thomas Prest

, Damien Stehlé, Alexandre Wallet
, Keita Xagawa
:
ModFalcon: Compact Signatures Based On Module-NTRU Lattices. 853-866 - Zhaomin Yang, Tianyuan Xie, Yanbin Pan:

Lattice Klepto Revisited. 867-873 - Tianyuan Xie, Yanbin Pan:

It all Started with Compression: Another Look at Reconciliation Mechanism. 874-885
Poster Session
- Ming-Hung Wang

, Yu-Chen Dai:
POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan. 886-888 - Pratibha Khandait, Neminath Hubballi, Katrin Franke:

POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of Characters. 889-891 - Shin-Ying Huang, Yiju Wu:

POSTER: Dynamic Software Vulnerabilities Threat Prediction through Social Media Contextual Analysis. 892-894 - Zhong-Yi Guo, Yu-Chi Chen

, Hsiu-Ping Lin:
POSTER: Oblivious Access System on Decentralized Database over Parallel Smart Contract Model. 895-897 - Sanoop Mallissery

, Min-Chieh Wu
, Chun-An Bau, Guan-Zhang Huang, Chen-Yu Yang, Wei-Chun Lin, Yu-Sung Wu:
POSTER: Data Leakage Detection for Health Information System based on Memory Introspection. 898-900 - Hans Albert Lianto, Yang Zhao, Jun Zhao:

POSTER: Attacks to Federated Learning: Responsive Web User Interface to Recover Training Data from User Gradients. 901-903 - Song-Yi Hsu, Xin Xie, Yu-Chi Chen

:
POSTER: SecretSVM - Secret Sharing-Based SVM for Preventing Collusion in IoT Data Analysis. 904-906 - Yebo Feng

, Devkishen Sisodia, Jun Li:
POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic. 907-909 - Shun Takagi, Yang Cao, Masatoshi Yoshikawa:

POSTER: Data Collection via Local Differential Privacy with Secret Parameters. 910-912 - Shun Takagi, Yang Cao, Yasuhito Asano, Masatoshi Yoshikawa:

POSTER: Protecting Location Privacy on Road Networks. 913-915 - Neminath Hubballi, Namrata Tiwari, Pratibha Khandait:

POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation. 916-918 - Taehun Kim, Youngjoo Shin

:
POSTER: Mitigating Memory Sharing-based Side-channel Attack by Embedding Random Values in Binary for Cloud Environment. 919-921 - Daniel Andrade, Yusuke Takahashi, Daichi Hasumi:

POSTER: Detecting Suspicious Processes from Log-Data via a Bayesian Block Model. 922-924 - Leong Mei Han, Yang Zhao, Jun Zhao:

POSTER: Blockchain-Based Differential Privacy Cost Management System. 925-927 - Seungoh Choi, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim:

POSTER: Expanding a Programmable CPS Testbed for Network Attack Analysis. 928-930 - Hao-Cheng Yang, Hsun Lee, Hsu-Chun Hsiao:

Poster: Challenges in Stopping Ticket Scalping Bots. 931-933 - Yi-Hsien Chen

, Yen-Da Lin, Chung-Kuan Chen, Chin-Laung Lei, Chun-Ying Huang
:
POSTER: Construct macOS Cyber Range for Red/Blue Teams. 934-936

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














