dblp: AsiaCCS 2018 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


13th AsiaCCS 2018: Incheon, Republic of Korea

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018
Session 1: Embedded System Security

Yushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu:
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones. 1-13

Ilias Giechaskiel
, Kasper Bonne Rasmussen, Ken Eguro:
Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires. 15-27

Chaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu:
HlcAuth: Key-free and Secure Communications via Home-Limited Channel. 29-35
Session 2: Applied Crypto 1

Francesco Berti
, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert
:
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives. 37-50

Joël Alwen, Peter Gazi, Chethan Kamath
, Karen Klein
, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, Michal Rybár:
On the Memory-Hardness of Data-Independent Password-Hashing Functions. 51-65

Wenjie Lu, Jun-Jie Zhou, Jun Sakuma:
Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption. 67-74
Session 3: Authentication

Ian Oakley, Jun Ho Huh, Junsung Cho
, Geumhwan Cho
, Md. Rasel Islam, Hyoungshick Kim:
The Personal Identification Chord: A Four ButtonAuthentication System for Smartwatches. 75-87

Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor:
2MA: Verifying Voice Commands via Two Microphone Authentication. 89-100

Ben Hutchins, Anudeep Reddy, Wenqiang Jin, Michael Zhou, Ming Li, Lei Yang:
Beat-PIN: A User Authentication Mechanism for Wearable Devices Through Secret Beats. 101-115
Session 4: Mobile

Luke Deshotels, Razvan Deaconescu
, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi:
iOracle: Automated Evaluation of Access Control Policies in iOS. 117-131

Ildar Muslukhov, Yazan Boshmaf, Konstantin Beznosov:
Source Attribution of Cryptographic API Misuse in Android Applications. 133-146

Elkana Pariwono, Daiki Chiba
, Mitsuaki Akiyama, Tatsuya Mori
:
Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android Apps. 147-158
Session 5: Machine Learning 1

Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian M. Molloy:
Protecting Intellectual Property of Deep Neural Networks with Watermarking. 159-172

Shameek Bhattacharjee
, Aditya Thakur, Sajal K. Das
:
Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks. 173-185

Danny Hendler, Shay Kels, Amir Rubin:
Detecting Malicious PowerShell Commands using Deep Neural Networks. 187-197

Z. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami:
Detection under Privileged Information. 199-206
Session 6: Privacy 1
Session 7: Cellular, Phone, and Email

Zhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu:
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting. 261-272

Jienan Liu, Babak Rahbarinia, Roberto Perdisci
, Haitao Du, Li Su:
Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets. 273-284

Payas Gupta, Roberto Perdisci
, Mustaque Ahamad:
Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam. 285-296

Daniel Gruss
, Michael Schwarz, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More
, Moritz Lipp:
Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. 297-311
Session 8: Trust
Session 9: Software Security
Session 10: Network Security 1

Louis Waked, Mohammad Mannan, Amr M. Youssef:
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. 399-412

Shang Gao
, Zecheng Li, Yuan Yao, Bin Xiao
, Songtao Guo, Yuanyuan Yang
:
Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control. 413-424

Panagiotis Papadopoulos
, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos:
Where's Wally?: How to Privately Discover your Friends on the Internet. 425-430
Session 11: Malware and Web

Xiangwen Wang
, Peng Peng, Chun Wang, Gang Wang:
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces. 431-442

Federico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini:
Investigating Web Defacement Campaigns at Large. 443-456

Boyou Zhou
, Anmol Gupta, Rasoul Jahanshahi, Manuel Egele, Ajay Joshi:
Hardware Performance Counters Can Detect Malware: Myth or Fact? 457-468

Hammad Afzali, Santiago Torres-Arias
, Reza Curtmola, Justin Cappos:
le-git-imate: Towards Verifiable Web-based Git Repositories. 469-482
Session 12: Physical Attacks and Defense

Chuadhry Mujeeb Ahmed
, Martín Ochoa, Jianying Zhou
, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia
, Justin Ruths:
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems. 483-497

Jayaprakash Selvaraj, Gökçen Yilmaz Dayanikli, Neelam Prabhu Gaunkar, David Ware, Ryan M. Gerdes, Mani Mina:
Electromagnetic Induction Attacks Against Embedded Systems. 499-510

Shoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara
, Kazuo Sakiyama:
Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack. 511-524

Qin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur:
TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control Systems. 525-536
Session 13: Privacy 2

Zihao Shan, Zhan Qin
, Leslie Ying
, Kui Ren:
SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction. 537-550

David Derler
, Daniel Slamanig
:
Highly-Efficient Fully-Anonymous Dynamic Group Signatures. 551-565

Vireshwar Kumar
, He Li, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati:
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System. 567-574
Session 14: CPU Security

Samuel Weiser, Raphael Spreitzer
, Lukas Bodner:
Single Trace Attack Against RSA Key Generation in Intel SGX SSL. 575-586

Michael Schwarz, Daniel Gruss
, Moritz Lipp, Clémentine Maurice
, Thomas Schuster, Anders Fogh, Stefan Mangard
:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. 587-600

Sanchuan Chen
, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, XiaoFeng Wang:
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. 601-608
Session 15: Network Security 2

Maciej Korczynski, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane C. M. Moura, Arman Noroozian, Drew Bagley, Cristian Hesselman:
Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs. 609-623

Hwanjo Heo, Seungwon Shin:
Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network Scanning. 625-636

Taeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig:
Towards Sustainable Evolution for the TLS Public-Key Infrastructure. 637-649

Jeremy Erickson, Qi Alfred Chen, Xiaochen Yu, Erinjen Lin, Robert Levy, Zhuoqing Morley Mao:
No One In The Middle: Enabling Network Access Control Via Transparent Attribution. 651-658
Session 16: Applied Crypto 2

Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. 659-672

Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller
, Philippe Gaborit, Sailesh Simhadri:
Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability. 673-684

Nuttapong Attrapadung, Goichiro Hanaoka, Shigeo Mitsunari
, Yusuke Sakai, Kana Shimizu, Tadanori Teruya:
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly. 685-697

Michael T. Goodrich
:
Isogrammic-Fusion ORAM: Improved Statistically Secure Privacy-Preserving Cloud Data Access for Thin Clients. 699-706
Session 17: Machine Learning 2

M. Sadegh Riazi, Christian Weinert
, Oleksandr Tkachenko
, Ebrahim M. Songhori, Thomas Schneider
, Farinaz Koushanfar
:
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications. 707-721

Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou
, Yang Xiang, Olivier Y. de Vel:
A Data-driven Attack against Support Vectors of SVM. 723-734

Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, Junfeng Yang:
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning. 735-747
Session 18: Android

Raphael Spreitzer
, Felix Kirchengast, Daniel Gruss
, Stefan Mangard
:
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android. 749-763

Ioannis Gasparis, Azeem Aqil, Zhiyun Qian
, Chengyu Song
, Srikanth V. Krishnamurthy
, Rajiv Gupta
, Edward Colbert:
Droid M+: Developer Support for Imbibing Android's New Permission Model. 765-776

Ryan Johnson, Mohamed Elsabagh
, Angelos Stavrou
, Jeff Offutt:
Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities. 777-791
Poster Session

Afsah Anwar, Aminollah Khormali, Aziz Mohaisen:
POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and Predictions. 793-795

William Aiken, Hyoungshick Kim:
POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAs. 797-799

Kyeong Joo Jung, Bang Hun Lee, Yeon Nam Gung, Jun Seok Kim, Hyung Suk Kim, Ju Seong Han, Tomaspeter Kim, Bong Jun Choi
:
POSTER: Undetectable Task Bypassing OS Scheduler via Hardware Task Switching. 801-803

Hyun Kwon
, Hyunsoo Yoon, Daeseon Choi:
POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense. 805-807

Muhammad Saad, My T. Thai, Aziz Mohaisen:
POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization. 809-811

Taeyun Kim, Hyoungshick Kim:
POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic Encryption. 813-815

Yuchen Zhao
, Isabel Wagner
:
POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. 817-819

Anand Agrawal, Chuadhry Mujeeb Ahmed
, Ee-Chien Chang
:
Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical System. 821-823

Fabio Martinelli, Francesco Mercaldo, Andrea Saracino
:
POSTER: A Framework for Phylogenetic Analysis in Mobile Environment. 825-827

Seungoh Choi, Woomyo Lee, Hyeok-Ki Shin, Jeong-Han Yun, Sin-Kyu Kim:
POSTER: CPS Security Testbed Development Using Controller-in-the-Middle. 829-831

Jusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo, Hyoungshick Kim:
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System. 833-835

HyukSang Kwon, Shahid Raza
, JeongGil Ko:
POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices. 837-839

Sungmin Kim, Joongheon Kim
:
POSTER: Mining with Proof-of-Probability in Blockchain. 841-843

Hosung Park, Daeyong Kwon, Seungsoo Nam, Daeseon Choi:
POSTER: Address Authentication Based on Location History. 845-847

Harishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay:
POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS. 849-851

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






