


default search action
12th AsiaCCS 2017: Abu Dhabi, United Arab Emirates
- Ramesh Karri

, Ozgur Sinanoglu, Ahmad-Reza Sadeghi, Xun Yi
:
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017. ACM 2017, ISBN 978-1-4503-4944-4
Keynote & Invited Talks
- Christof Paar:

Hardware Trojans and Other Threats against Embedded Systems. 1 - Gregory Akers:

Advanced Security Research in the Era of the Internet of Things. 2 - David M. Sommer, Aritra Dhar

, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun:
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks. 3 - Mathias Payer:

Control-Flow Hijacking: Are We Making Progress? 4 - Gene Tsudik:

Security in Personal Genomics: Lest We Forget. 5 - Marc Beunardeau, Aisling Connolly

, Rémi Géraud, David Naccache:
The Case for System Command Encryption. 6
SGX
- Sanchuan Chen

, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang:
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. 7-18 - Vishal Karande, Erick Bauman, Zhiqiang Lin, Latifur Khan

:
SGX-Log: Securing System Logs With SGX. 19-30 - Sandeep Tamrakar, Jian Liu, Andrew Paverd

, Jan-Erik Ekberg, Benny Pinkas, N. Asokan
:
The Circle Game: Scalable Private Membership Test Using Trusted Hardware. 31-44
Mobile Apps & Markets
- Vincent F. Taylor, Ivan Martinovic:

To Update or Not to Update: Insights From a Two-Year Study of Android App Evolution. 45-57 - Hao Chen, Daojing He

, Sencun Zhu, Jingshun Yang:
Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets. 58-70 - Amiangshu Bosu

, Fang Liu, Danfeng (Daphne) Yao
, Gang Wang:
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications. 71-85
Embedded Systems Security 1
- Xavier Carpent

, Karim El Defrawy, Norrathep Rattanavipanon
, Gene Tsudik:
Lightweight Swarm Attestation: A Tale of Two LISA-s. 86-100 - Chuadhry Mujeeb Ahmed

, Carlos Murguia
, Justin Ruths:
Model-based Attack Detection Scheme for Smart Water Distribution Networks. 101-113 - Marco Rocchetto

, Nils Ole Tippenhauer
:
Towards Formal Security Analysis of Industrial Control Systems. 114-126 - Daniele Midi, Mathias Payer, Elisa Bertino:

Memory Safety for Embedded Devices with nesCheck. 127-139
Memory Corruption Att. & Def.
- Mohamed Elsabagh

, Dan Fleck
, Angelos Stavrou
:
Strict Virtual Call Integrity Checking for C++ Binaries. 140-154 - He Huang, Amr M. Youssef, Mourad Debbabi

:
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. 155-166 - Quan Chen, Ahmed M. Azab, Guruprasad Ganesh, Peng Ning:

PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks. 167-178 - Taehun Kim, Hyeonmin Ha, Seoyoon Choi, Jaeyeon Jung, Byung-Gon Chun:

Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps. 179-192 - Scott A. Carr, Mathias Payer:

DataShield: Configurable Data Confidentiality and Integrity. 193-204
Encryption
- Pierre-Alain Dupont

, David Pointcheval
:
Functional Encryption with Oblivious Helper. 205-214 - Keita Emura

, Takuya Hayashi
, Noboru Kunihiro
, Jun Sakuma:
Mis-operation Resistant Searchable Homomorphic Encryption. 215-229 - Qutaibah M. Malluhi, Abdullatif Shikfa

, Viet Cuong Trinh
:
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. 230-240 - Jacob C. N. Schuldt, Kazumasa Shinagawa:

On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures. 241-252
Cloud Security
- Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:

DoS Attacks on Your Memory in Cloud. 253-265 - Frederik Armknecht

, Colin Boyd, Gareth T. Davies
, Kristian Gjøsteen, Mohsen Toorani
:
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency. 266-274 - Frederik Armknecht

, Jens-Matthias Bohli, David Froelicher, Ghassan Karame:
Sharing Proofs of Retrievability across Tenants. 275-287 - Berk Gülmezoglu

, Thomas Eisenbarth
, Berk Sunar:
Cache-Based Application Detection in the Cloud Using Machine Learning. 288-300
Password & Auth 1
- David Pointcheval

, Guilin Wang:
VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange. 301-312 - Seunghun Cha, Sungsu Kwag

, Hyoungshick Kim, Jun Ho Huh:
Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks. 313-326 - Yan Li, Yao Cheng, Yingjiu Li, Robert H. Deng

:
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses. 327-333
Vulnerability Analysis
- Yue Chen, Mustakimur Khandaker

, Zhi Wang:
Pinpointing Vulnerabilities. 334-345 - Qian Feng, Minghua Wang

, Mu Zhang
, Rundong Zhou, Andrew Henderson, Heng Yin
:
Extracting Conditional Formulas for Cross-Platform Bug Search. 346-359 - Mathy Vanhoef

, Domien Schepers, Frank Piessens:
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing. 360-371
Password & Auth 2
- Ding Wang

, Qianchen Gu, Xinyi Huang, Ping Wang:
Understanding Human-Chosen PINs: Characteristics, Distribution and Security. 372-385 - Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders

, Ivan Martinovic:
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics. 386-399 - Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha, Ketan Vyas:

Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme. 400-407
Storage Security
- Hung Dang, Erick Purwanto, Ee-Chien Chang

:
Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated. 408-422 - Xingliang Yuan

, Yu Guo, Xinyu Wang
, Cong Wang, Baochun Li, Xiaohua Jia:
EncKV: An Encrypted Key-value Store with Rich Queries. 423-435 - Christian Weinert

, Denise Demirel, Martín A. Gagliotti Vigil, Matthias Geihs, Johannes Buchmann:
MoPS: A Modular Protection Scheme for Long-Term Storage. 436-448 - Yongjun Zhao

, Sherman S. M. Chow
:
Updatable Block-Level Message-Locked Encryption. 449-460 - Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda:

LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality. 461-468
Malware & Machine Learning 1
- Shahryar Baki, Rakesh M. Verma

, Arjun Mukherjee, Omprakash Gnawali
:
Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation. 469-482 - Baljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato:

On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters. 483-493 - Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang

, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. 494-505 - Nicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami:

Practical Black-Box Attacks against Machine Learning. 506-519
Privacy
- Alexandra Dmitrienko, David Noack, Moti Yung:

Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation. 520-531 - Kosuke Kusano, Ichiro Takeuchi, Jun Sakuma:

Privacy-preserving and Optimal Interval Release for Disease Susceptibility. 532-545 - Krzysztof Grining, Marek Klonowski

:
Towards Extending Noiseless Privacy: Dependent Data and More Practical Approach. 546-560 - Sébastien Canard, Aïda Diop, Nizar Kheir, Marie Paindavoine, Mohamed Sabt:

BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic. 561-574
Malware & Machine Learning 2
- Samaneh Tajalizadehkhoob, Carlos Gañán

, Arman Noroozian, Michel van Eeten
:
The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware. 575-586 - Christian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck:

Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks. 587-598 - Eugene Kolodenker, William Koch, Gianluca Stringhini, Manuel Egele:

PayBreak: Defense Against Cryptographic Ransomware. 599-611
Mobile Security 1
- Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng:

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. 612-624 - Behnaz Hassanshahi, Roland H. C. Yap:

Android Database Attacks Revisited. 625-639 - Omid Mirzaei

, Guillermo Suarez-Tangil
, Juan E. Tapiador
, José María de Fuentes
:
TriFlow: Triaging Android Applications using Speculative Information Flows. 640-651
Mobile Security 2
- Drew Davidson, Yaohui Chen, Franklin George, Long Lu, Somesh Jha:

Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems. 652-665 - Xingzi Yuan

, Omid Setayeshfar, Hongfei Yan, Pranav Panage, Xuetao Wei, Kyu Hyung Lee:
DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging. 666-677 - Chaoting Xuan, Gong Chen, Erich Stuntebeck:

DroidPill: Pwn Your Daily-Use Apps. 678-689
Side Channel Attacks
- Thomas Unterluggauer, Mario Werner, Stefan Mangard

:
Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives. 690-702 - Alberto Compagno, Mauro Conti

, Daniele Lain
, Gene Tsudik:
Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP. 703-715 - Mehmet Sinan Inci, Thomas Eisenbarth

, Berk Sunar:
Hit by the Bus: QoS Degradation Attack on Android. 716-727
Embedded Systems Security 2
- Andre Rein

:
DRIVE: Dynamic Runtime Integrity Verification and Evaluation. 728-742 - Tom Chothia, Mihai Ordean

, Joeri de Ruiter
, Richard James Thomas
:
An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols. 743-756 - Ivan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov:

Using Program Analysis to Synthesize Sensor Spoofing Attacks. 757-770 - Ruan de Clercq, Ronald De Keulenaer, Pieter Maene

, Bart Preneel
, Bjorn De Sutter, Ingrid Verbauwhede
:
SCM: Secure Code Memory Architecture. 771-776
Applied Crypto
- Keita Emura

, Takuya Hayashi
, Ai Ishida:
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction. 777-788 - Jiqiang Lu:

Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms. 789-799 - Gildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade

, Cristina Onete
, Jean-Marc Robert:
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol. 800-814 - Gildas Avoine, Xavier Carpent

:
Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses. 815-822 - Jongkil Kim

, Willy Susilo
, Fuchun Guo
, Man Ho Au
, Surya Nepal
:
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. 823-834
Web & Network Security
- Dennis Felsch, Christian Mainka

, Vladislav Mladenov, Jörg Schwenk:
SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor. 835-848 - Arash Shaghaghi, Mohamed Ali Kâafar

, Sanjay Jha
:
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. 849-861 - Taeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu:

The Case for In-Network Replay Suppression. 862-873 - Dima Rabadi

, Rui Tan, David K. Y. Yau, Sreejaya Viswanathan:
Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage. 874-886 - AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot

:
Accurate Manipulation of Delay-based Internet Geolocation. 887-898
Demonstrations
- Fabio Martinelli, Francesco Mercaldo, Andrea Saracino

:
BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware. 899-901 - Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone:

How Discover a Malware using Model Checking. 902-904
Posters
- Mahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu

, Arosha K. Bandara
, Djamal Benslimane, Bashar Nuseibeh
:
Enabling End-Users to Protect their Privacy. 905-907 - Shweta Bhandari

, Frédéric Herbreteau, Vijay Laxmi
, Akka Zemmari
, Partha S. Roop, Manoj Singh Gaur:
Detecting Inter-App Information Leakage Paths. 908-910 - Jyoti Gajrani

, Li Li, Vijay Laxmi
, Meenakshi Tripathi
, Manoj Singh Gaur, Mauro Conti
:
Detection of Information Leaks via Reflection in Android Apps. 911-913 - Kai Jansen, Matthias Schäfer, Vincent Lenders

, Christina Pöpper
, Jens B. Schmitt:
Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System. 914-916 - Katharina Siobhan Kohls, Christina Pöpper

:
Traffic Analysis Attacks in Anonymity Networks. 917-919 - Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:

Quantitative Security Assessment Method based on Entropy for Moving Target Defense. 920-922 - Ahmed Mahfouz, Tarek M. Mahmoud

, Ahmed Sharaf Eldin
:
A Behavioral Biometric Authentication Framework on Smartphones. 923-925 - Will Scott:

A Secure, Practical & Safe Packet Spoofing Service. 926-928

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














