dblp: AsiaCCS 2021 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


16th AsiaCCS 2021: Virtual Event, Hong Kong

jump to- Keynote I
- Session 1B: Cyber-physical Systems
- Session 2B: Hardware Security (I)
- Session 3B: ML and Security (II)
- Session 4A: ML and Security (III)
- Sessionn 5A: Network and Web Security (II)
- Session 6A: Software Security and Vulnerability Analysis (I)
- Keynote III
- Session 7B: Software Security and Vulnerability Analysis (II)
- Session 8B: Blockchain and Distributed Systems
- Session 9B: Malware and Cybercrime (II)

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8
Keynote I

Somesh Jha:
Trustworthy Machine Learning: Past, Present, and Future. 1
Session 1A: ML and Security (I)

Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong:
Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes. 2-13

Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong:
IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary. 14-25

Shameek Bhattacharjee, Venkata Praveen Kumar Madhavarapu
, Sajal K. Das:
A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification Attacks. 26-39

Fei Zuo, Qiang Zeng:
Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore. 40-51
Session 1B: Cyber-physical Systems

Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi:
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems. 52-66

S. Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen:
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech. 67-81

Yi Wu
, Xiangyu Xu, Payton R. Walker
, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks. 82-94

Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi
, Christopher Kruegel, Giovanni Vigna:
Conware: Automated Modeling of Hardware Peripherals. 95-109
Session 2A: Network and Web Security (I)

Gordon Meiser, Pierre Laperdrix, Ben Stock
:
Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication. 110-122

Assel Aliyeva, Manuel Egele:
Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session Cookies. 123-134

Jongkil Kim, Seyit Camtepe, Joonsang Baek
, Willy Susilo
, Josef Pieprzyk
, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. 135-146

Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty:
Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels. 147-161
Session 2B: Hardware Security (I)

Zhenkai Zhang
, Sisheng Liang, Fan Yao
, Xing Gao:
Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels. 162-175

Shuji Ohira
, Araya Kibrom Desta
, Ismail Arai
, Kazutoshi Fujikawa:
PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks. 176-186

Pascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard
:
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment. 187-199

Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard
:
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory. 200-212
Session 3A: Applied Cryptography (I)

Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim
, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. 213-226

Christian Plappert
, Lukas Jäger, Andreas Fuchs:
Secure Role and Rights Management for Automotive Access and Feature Activation. 227-241

Yun Wang
, Dimitrios Papadopoulos:
Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time. 252-264
Session 3B: ML and Security (II)
Keynote II

Elaine Shi:
Streamlet: An Absurdly Simple, Textbook Blockchain Protocol. 320
Session 4A: ML and Security (III)

Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song:
REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data. 321-335

Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. 336-348

Kaichen Yang
, Tzungyu Tsai, Honggang Yu
, Max Panoff, Tsung-Yi Ho
, Yier Jin
:
Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules. 349-362

Han Qiu, Yi Zeng, Shangwei Guo
, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham:
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation. 363-377
Session 4B: Measurement/Empirical Security

Mustafa Abdallah
, Daniel Woods
, Parinaz Naghizadeh
, Issa Khalil
, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems. 378-392

Wenhui Zhang, Peng Liu, Trent Jaeger:
Analyzing the Overhead of File Protection by Linux Security Modules. 393-406

Doowon Kim
, Haehyun Cho
, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn
, Tudor Dumitras:
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. 407-420

Wei Xie
, Chao Zhang, Pengfei Wang, Zhenhua Wang
, Qiang Yang:
ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition. 421-431
Sessionn 5A: Network and Web Security (II)

Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang:
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. 432-446

Mohammed Jubur
, Prakash Shrestha, Nitesh Saxena, Jay Prakash:
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications. 447-461

Timothy Barron, Johnny So, Nick Nikiforakis:
Click This, Not That: Extending Web Authentication with Deception. 462-474

Joonhee Lee, Hyunwoo Lee, Jongheon Jeong, Doowon Kim
, Ted Taekyoung Kwon:
Analyzing Spatial Differences in the TLS Security of Delegated Web Services. 475-487
Session 5B: Applied Cryptography (II)

Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz
, Elisa Bertino:
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. 501-515

Esha Ghosh, Seny Kamara, Roberto Tamassia:
Efficient Graph Encryption Scheme for Shortest Path Queries. 516-525
Session 6A: Software Security and Vulnerability Analysis (I)

Sebastian Plotz, Frederik Armknecht
, Christian Bunse:
How to Take Over Drones. 526-536

Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury:
Localizing Vulnerabilities Statistically From One Exploit. 537-549

Markus Bauer
, Christian Rossow:
Cali: Compiler-Assisted Library Isolation. 550-564
Session 6B: Privacy (I)

Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes:
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps. 578-592

Maryam Sepehri, Florian Kerschbaum:
Low-Cost Hiding of the Query Pattern. 593-603

Linpeng Lu
, Ning Ding:
Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension. 604-615

Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida
:
Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks. 616-627
Keynote III

Kui Ren:
Encrypted Databases: Progresses and Challenges. 628
Session 7A: Privacy (II)

Erkam Uzun, Carter Yagemann
, Simon P. Chung, Vladimir Kolesnikov, Wenke Lee:
Cryptographic Key Derivation from Biometric Inferences for Remote Authentication. 629-643

Ahsan Zafar, Aafaq Sabir, Dilawer Ahmed, Anupam Das:
Understanding the Privacy Implications of Adblock Plus's Acceptable Ads. 644-657

Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider
:
Privacy-preserving Density-based Clustering. 658-671

Antoine Boutet, Carole Frindel
, Sébastien Gambs, Théo Jourdan, Rosin Claude Ngueveu:
DySan: Dynamically Sanitizing Motion Sensor Data Against Sensitive Inferences through Adversarial Networks. 672-686
Session 7B: Software Security and Vulnerability Analysis (II)

Andrew Fasano
, Tiemoko Ballo, Marius Muench
, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson
:
SoK: Enabling Security Analyses of Embedded Systems via Rehosting. 687-701

Yuede Ji, Lei Cui, H. Howie Huang
:
BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network. 702-715

Joshua Bundt
, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek:
Evaluating Synthetic Bugs. 716-730

Dongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella
, Christopher Kruegel, Giovanni Vigna:
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms. 731-743
Session 8A: Malware and Cybercrime (I)

Keane Lucas
, Mahmood Sharif
, Lujo Bauer
, Michael K. Reiter
, Saurabh Shintre:
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. 744-758

Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu
, Wenke Lee:
Identifying Behavior Dispatchers for Malware Analysis. 759-773

Michal Piskozub, Fabio De Gaspari
, Freddie Barr-Smith, Luigi V. Mancini, Ivan Martinovic:
MalPhase: Fine-Grained Malware Detection Using Network Flow Data. 774-786
Session 8B: Blockchain and Distributed Systems

Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. 787-801

Shivendra Kushwah, Ankush Desai, Pramod Subramanyan, Sanjit A. Seshia:
PSec: Programming Secure Distributed Systems using Enclaves. 802-816

Runchao Han, Zhimei Sui, Jiangshan Yu
, Joseph K. Liu, Shiping Chen
:
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains. 817-831

Yan Qiao, Kui Wu, Majid Khabbazian:
Non-Intrusive and High-Efficient Balance Tomography in the Lightning Network. 832-843

Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu:
Redactable Blockchain Supporting Supervision and Self-Management. 844-858

Yannan Li
, Willy Susilo
, Guomin Yang
, Yong Yu
, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. 859-871
Session 9A: Hardware Security (II)

Ajay Nayak, Pratheek B, Vinod Ganapathy, Arkaprava Basu:
(Mis)managed: A Novel TLB-based Covert Channel on GPUs. 872-885

Chuadhry Mujeeb Ahmed
, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. 886-900

Yazhou Tu, Vijay Srinivas Tida, Zhongqi Pan, Xiali Hei:
Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on Sensors. 901-915
Session 9B: Malware and Cybercrime (II)

Tsuyoshi Taniguchi, Harm Griffioen, Christian Doerr:
Analysis and Takeover of the Bitcoin-Coordinated Pony Malware. 916-930

Zeyu Zhang, Xiaoli Zhang, Qi Li
, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li:
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. 931-943

Ximing Liu, Yingjiu Li, Robert H. Deng
:
UltraPIN: Inferring PIN Entries via Ultrasound. 944-957

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






