


default search action
18th AsiaCCS 2023: Melbourne, VIC, Australia
- Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik:

Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023
Keynote 1
- Wenyuan Xu

:
Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities. 1
Session 1: Applied Cryptography (I)
- Changmin Lee

, Seonhong Min
, Jinyeong Seo
, Yongsoo Song
:
Faster TFHE Bootstrapping with Block Binary Keys. 2-13 - Laasya Bangalore

, Mohammad Hossein Faghihi Sereshgi
, Carmit Hazay
, Muthuramakrishnan Venkitasubramaniam
:
Flag: A Framework for Lightweight Robust Secure Aggregation. 14-28 - Johannes Mono

, Tim Güneysu
:
Implementing and Optimizing Matrix Triples with Homomorphic Encryption. 29-40
Session 2: Privacy Application
- Hyunsoo Kim

, Youngbae Jeon
, Ji Won Yoon
:
Invasion of location privacy using online map services and smartphone sensors. 41-52 - Nan Wu

, Dinusha Vatsalan
, Mohamed Ali Kâafar
, Sanath Kumar Ramesh
:
Privacy-Preserving Record Linkage for Cardinality Counting. 53-64 - Baiqi Chen

, Tingmin Wu
, Yanjun Zhang
, Mohan Baruwal Chhetri
, Guangdong Bai
:
Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant Applications. 65-79
Session 3: Privacy and Machine Learning
- Yue Cui

, Syed Irfan Ali Meerza
, Zhuohang Li
, Luyang Liu
, Jiaxin Zhang
, Jian Liu
:
RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy Defense. 80-94 - Arezoo Rajabi

, Dinuka Sahabandu
, Luyao Niu
, Bhaskar Ramasubramanian
, Radha Poovendran
:
LDL: A Defense for Label-Based Membership Inference Attacks. 95-108 - Chenhan Zhang

, Weiqi Wang
, James J. Q. Yu
, Shui Yu
:
Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck. 109-121 - Mengyao Ma

, Yanjun Zhang
, Mahawaga Arachchige Pathum Chamikara
, Leo Yu Zhang
, Mohan Baruwal Chhetri
, Guangdong Bai
:
LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks. 122-135 - Jiadong Lou

, Xu Yuan
, Miao Pan
, Hao Wang
, Nian-Feng Tzeng
:
Data Privacy Examination against Semi-Supervised Learning. 136-148
Session 4: Architecture Security (I)
- Marco Abbadini

, Dario Facchinetti
, Gianluca Oldani
, Matthew Rossi
, Stefano Paraboschi
:
Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses. 149-162 - Daniel Genkin

, William Kosasih
, Fangfei Liu
, Anna Trikalinou
, Thomas Unterluggauer
, Yuval Yarom
:
CacheFX: A Framework for Evaluating Cache Security. 163-176 - Martin Unterguggenberger

, David Schrammel
, Pascal Nasahl
, Robert Schilling
, Lukas Lamster
, Stefan Mangard
:
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging. 177-189 - Jingquan Ge

, Fengwei Zhang
:
FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A. 190-204 - Antoon Purnal

, Marton Bognar
, Frank Piessens
, Ingrid Verbauwhede
:
ShowTime: Amplifying Arbitrary CPU Timing Side Channels. 205-217
Session 5: Software Security (I)
- Abdulla Aldoseri

, Tom Chothia
, José Moreira
, David F. Oswald
:
Symbolic modelling of remote attestation protocols for device and app integrity on Android. 218-231 - Sirus Shahini

, Mu Zhang
, Mathias Payer
, Robert Ricci
:
Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis. 232-246 - Alexander Küchler

, Leon Wenning
, Florian Wendland
:
AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation. 247-258 - Mohamad Mansouri

, Jun Xu
, Georgios Portokalidis
:
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs. 259-273
Session 6: Hardware Security
- Bin Hu

, Yan Wang
, Jerry Cheng
, Tianming Zhao
, Yucheng Xie
, Xiaonan Guo
, Yingying Chen
:
Secure and Efficient Mobile DNN Using Trusted Execution Environments. 274-285 - Gildas Avoine

, Xavier Carpent
, Diane Leblanc-Albarel
:
Stairway To Rainbow. 286-299 - Ruyi Ding

, Cheng Gongye
, Siyue Wang
, A. Adam Ding
, Yunsi Fei
:
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage. 300-313 - Youqian Zhang

, Kasper Rasmussen
:
Electromagnetic Signal Injection Attacks on Differential Signaling. 314-325
Keynote 2
- David A. Basin

:
Formal Methods for Payment Protocols. 326
Keynote 3
- N. Asokan

:
Model Stealing Attacks and Defenses: Where Are We Now? 327
Session 7: Applied Cryptography (II)
- Theo von Arx

, Kenneth G. Paterson
:
On the Cryptographic Fragility of the Telegram Ecosystem. 328-341 - Yongha Son

, Jinhyuck Jeong
:
PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption. 342-356 - Heini Bergsson Debes

, Edlira Dushku
, Thanassis Giannetsos
, Ali Marandi
:
ZEKRA: Zero-Knowledge Control-Flow Attestation. 357-371 - Pascal Reisert

, Marc Rivinius
, Toomas Krips
, Ralf Küsters
:
Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice. 372-386
Session 8: Software Security (II)
- Marc Miltenberger

, Steven Arzt
, Philipp Holzinger
, Julius Näumann
:
Benchmarking the Benchmarks. 387-400 - Guy Farrelly

, Michael Chesser
, Damith C. Ranasinghe
:
Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO. 401-414 - Jiashuo Liang

, Ming Yuan
, Zhanzhao Ding
, Siqi Ma
, Xinhui Han
, Chao Zhang
:
RaceBench: A Triggerable and Observable Concurrency Bug Benchmark. 415-428 - George Christou

, Grigoris Ntousakis
, Eric Lahtinen
, Sotiris Ioannidis
, Vasileios P. Kemerlis
, Nikos Vasilakis
:
BinWrap: Hybrid Protection against Native Node.js Add-ons. 429-442
Session 9: Architecture Security (II)
- Abdullah Qasem

, Mourad Debbabi
, Bernard Lebel
, Marthe Kassouf
:
Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures. 443-456 - David Schrammel

, Moritz Waser
, Lukas Lamster
, Martin Unterguggenberger
, Stefan Mangard
:
SPEAR-V: Secure and Practical Enclave Architecture for RISC-V. 457-468 - Jiwon Seo

, Junseung You
, Yungi Cho
, Yeongpil Cho
, Donghyun Kwon
, Yunheung Paek
:
Sfitag: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions. 469-480 - Matthew Rogers

, Kasper Rasmussen
:
An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks. 481-493
Session 10: User-Centric Security (I)
- Raj Vardhan

, Alok Chandrawal
, Phakpoom Chinprutthiwong
, Yangyong Zhang
, Guofei Gu
:
#DM-Me: Susceptibility to Direct Messaging-Based Scams. 494-508 - Behzad Ousat

, Mohammad Ali Tofighi
, Amin Kharraz
:
An End-to-End Analysis of Covid-Themed Scams in the Wild. 509-523 - Avirup Mukherjee

, Kousshik Murali
, Shivam Kumar Jha
, Niloy Ganguly
, Rahul Chatterjee
, Mainack Mondal
:
MASCARA : Systematically Generating Memorable And Secure Passphrases. 524-538 - Kun Peng

:
How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability. 539-551
Keynote 4
- Vanessa Teague

:
Democratizing election verification: new methods for addressing an ancient attacker model. 552
Session 11: Machine Learning and Security
- Atul Sharma

, Wei Chen
, Joshua C. Zhao
, Qiang Qiu
, Saurabh Bagchi
, Somali Chaterji
:
FLAIR: Defense against Model Poisoning Attack in Federated Learning. 553-566 - Weiqi Wang

, Zhiyi Tian
, Chenhan Zhang
, An Liu
, Shui Yu
:
BFU: Bayesian Federated Unlearning with Parameter Self-Sharing. 567-578 - Geetanjli Sharma

, M. A. P. Chamikara
, Mohan Baruwal Chhetri
, Yi-Ping Phoebe Chen
:
SoK: Systematizing Attack Studies in Federated Learning - From Sparseness to Completeness. 579-592 - William Aiken

, Paula Branco
, Guy-Vincent Jourdan
:
Going Haywire: False Friends in Federated Learning and How to Find Them. 593-607 - Lior Yasur

, Guy Frankovits
, Fred Matanel Grabovski
, Yisroel Mirsky
:
Deepfake CAPTCHA: A Method for Preventing Fake Calls. 608-622
Session 12: Applied Cryptography (III)
- Muhammed F. Esgin

, Oguzhan Ersoy
, Veronika Kuchta
, Julian Loss
, Amin Sakzad
, Ron Steinfeld
, Xiangwen Yang
, Raymond K. Zhao
:
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. 623-637 - Lili Yan

, Jingyi Cui
, Jian Liu
, Guangquan Xu
, Lidong Han
, Alireza Jolfaei
, Xi Zheng
:
IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. 638-648 - Lennart Braun

, Moritz Huppert
, Nora Khayata
, Thomas Schneider
, Oleksandr Tkachenko
:
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. 649-663 - Leizhang Wang

, Yuntao Wang
, Baocang Wang
:
A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator. 664-677 - Koji Chida

, Koki Hamada
, Atsunori Ichikawa
, Masanobu Kii
, Junichi Tomida
:
Communication-Efficient Inner Product Private Join and Compute with Cardinality. 678-688
Session 13: Adversarial Machine Learning
- Zitao Chen

, Pritam Dash
, Karthik Pattabiraman
:
Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks. 689-703 - Jiyi Zhang

, Han Fang
, Wesley Joon-Wie Tann
, Ke Xu
, Chengfang Fang
, Ee-Chien Chang
:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers. 704-715 - Mengdie Huang

, Yi Xie
, Xiaofeng Chen
, Jin Li
, Changyu Dong
, Zheli Liu
, Willy Susilo
:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. 716-730 - Zhicong Yan

, Shenghong Li
, Ruijie Zhao
, Yuan Tian
, Yuanyuan Zhao
:
DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation. 731-745
Session 14: Network Security
- Timothy Trippel

, Kang G. Shin
, Kevin B. Bush
, Matthew Hicks
:
T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. 746-759 - Oleg Schell

, Marcel Kneib
:
SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks. 760-772 - Ali Zohaib

, Jade Sheffey
, Amir Houmansadr
:
Investigating Traffic Analysis Attacks on Apple iCloud Private Relay. 773-784 - Yeomin Jeong

, Woonghee Lee
, Junbeom Hur
:
A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessage. 785-796
Session 15: Cloud Security
- Markus Dahlmanns

, Constantin Sander
, Robin Decker
, Klaus Wehrle
:
Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact. 797-811 - Michael V. Le

, Salman Ahmed
, Dan Williams
, Hani Jamjoom
:
Securing Container-based Clouds with Syscall-aware Scheduling. 812-826 - Thore Tiemann

, Zane Weissman
, Thomas Eisenbarth
, Berk Sunar
:
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems. 827-840 - Joshua David Oetting Majors

, Edgardo Barsallo Yi
, Amiya Maji
, Darren Wu
, Saurabh Bagchi
, Aravind Machiry
:
Security Properties of Virtual Remotes and SPOOKing their violations. 841-854
Session 16: User-Centric Security (II)
- Aydin Abadi

, Steven J. Murdoch
:
Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims. 855-869 - Yangyong Zhang

, Raj Vardhan
, Phakpoom Chinprutthiwong
, Guofei Gu
:
Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators. 870-883 - Chris Culnane

, Ioana Boureanu
, Jean Snyman
, Stephan Wesemeyer
, Helen Treharne
:
Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices. 884-898 - Florian Draschbacher

, Johannes Feichtner
:
CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications. 899-912
Session 17: Model Security
- Zijun Lin

, Ke Xu
, Chengfang Fang
, Huadi Zheng
, Aneez Ahmed Jaheezuddin
, Jie Shi
:
QUDA: Query-Limited Data-Free Model Extraction. 913-924 - Xiaomei Zhang

, Zhaoxi Zhang
, Qi Zhong
, Xufei Zheng
, Yanjun Zhang
, Shengshan Hu
, Leo Yu Zhang
:
Masked Language Model Based Textual Adversarial Example Detection. 925-937 - Shang Wang

, Yansong Gao
, Anmin Fu
, Zhi Zhang
, Yuqing Zhang
, Willy Susilo
, Dongxi Liu
:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. 938-950 - Hyunjin Kim

, Jinyeong Bak
, Kyunghyun Cho
, Hyungjoon Koo
:
A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing. 951-965
Session 18: Application Security
- William Blair

, William K. Robertson
, Manuel Egele
:
ThreadLock: Native Principal Isolation Through Memory Protection Keys. 966-979 - Barbara Gigerl

, Robert Primas
, Stefan Mangard
:
Secure Context Switching of Masked Software Implementations. 980-992 - Yumeng Zhang

, Max Ward
, Mingyu Guo
, Hung Nguyen
:
A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems. 993-1003 - Pallavi Sivakumaran

, Chaoshun Zuo
, Zhiqiang Lin
, Jorge Blasco
:
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. 1004-1015
Posters
- Gursimran Singh

, Hrishikesh B. Acharya
:
POSTER: A Cyberspace Study of the Russia-Ukraine War. 1016-1018 - Muhammad Akbar Husnoo

, Adnan Anwar
, Haftu Tasew Reda
, Nasser Hosseinzadeh
:
POSTER: A Semi-asynchronous Federated Intrusion Detection Framework for Power Systems. 1019-1021 - Tina Moghaddam

, Guowei Yang
, Chandra Thapa
, Seyit Camtepe
, Dan Dongseong Kim
:
POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. 1022-1024 - Luyao Niu

, Abdullah Al Maruf
, Andrew Clark
, J. Sukarno Mertoguno
, Radha Poovendran
:
POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design. 1025-1027 - Marco Abbadini

, Michele Beretta
, Dario Facchinetti
, Gianluca Oldani
, Matthew Rossi
, Stefano Paraboschi
:
POSTER: Leveraging eBPF to enhance sandboxing of WebAssembly runtimes. 1028-1030 - Zhibo Jin

, Zhiyu Zhu
, Hongsheng Hu
, Minhui Xue
, Huaming Chen
:
POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models. 1031-1033 - Yiyan Wang

, Thilini Dahanayaka
, Guillaume Jourjon
, Suranga Seneviratne
:
POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting. 1034-1036 - Cheng-Yao Guo

, Fang Yu
:
POSTER: On searching information leakage of Python model execution to detect adversarial examples. 1037-1039 - Abdullahi Chowdhury

, Hung Nguyen
, Debi Ashenden
, Ganna Pogrebna
:
POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity. 1040-1042 - Qiaoran Meng

, Nay Oo
, Hoon Wei Lim
, Biplab Sikdar
:
POSTER: Security Logs Graph Analytics for Industry Network System. 1043-1045

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














