default search action
18th AsiaCCS 2023: Melbourne, VIC, Australia
- Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik:
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023
Keynote 1
- Wenyuan Xu:
Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities. 1
Session 1: Applied Cryptography (I)
- Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song:
Faster TFHE Bootstrapping with Block Binary Keys. 2-13 - Laasya Bangalore, Mohammad Hossein Faghihi Sereshgi, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
Flag: A Framework for Lightweight Robust Secure Aggregation. 14-28 - Johannes Mono, Tim Güneysu:
Implementing and Optimizing Matrix Triples with Homomorphic Encryption. 29-40
Session 2: Privacy Application
- Hyunsoo Kim, Youngbae Jeon, Ji Won Yoon:
Invasion of location privacy using online map services and smartphone sensors. 41-52 - Nan Wu, Dinusha Vatsalan, Mohamed Ali Kâafar, Sanath Kumar Ramesh:
Privacy-Preserving Record Linkage for Cardinality Counting. 53-64 - Baiqi Chen, Tingmin Wu, Yanjun Zhang, Mohan Baruwal Chhetri, Guangdong Bai:
Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant Applications. 65-79
Session 3: Privacy and Machine Learning
- Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu:
RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy Defense. 80-94 - Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran:
LDL: A Defense for Label-Based Membership Inference Attacks. 95-108 - Chenhan Zhang, Weiqi Wang, James J. Q. Yu, Shui Yu:
Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck. 109-121 - Mengyao Ma, Yanjun Zhang, Mahawaga Arachchige Pathum Chamikara, Leo Yu Zhang, Mohan Baruwal Chhetri, Guangdong Bai:
LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks. 122-135 - Jiadong Lou, Xu Yuan, Miao Pan, Hao Wang, Nian-Feng Tzeng:
Data Privacy Examination against Semi-Supervised Learning. 136-148
Session 4: Architecture Security (I)
- Marco Abbadini, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi:
Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses. 149-162 - Daniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval Yarom:
CacheFX: A Framework for Evaluating Cache Security. 163-176 - Martin Unterguggenberger, David Schrammel, Pascal Nasahl, Robert Schilling, Lukas Lamster, Stefan Mangard:
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging. 177-189 - Jingquan Ge, Fengwei Zhang:
FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A. 190-204 - Antoon Purnal, Marton Bognar, Frank Piessens, Ingrid Verbauwhede:
ShowTime: Amplifying Arbitrary CPU Timing Side Channels. 205-217
Session 5: Software Security (I)
- Abdulla Aldoseri, Tom Chothia, José Moreira, David F. Oswald:
Symbolic modelling of remote attestation protocols for device and app integrity on Android. 218-231 - Sirus Shahini, Mu Zhang, Mathias Payer, Robert Ricci:
Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis. 232-246 - Alexander Küchler, Leon Wenning, Florian Wendland:
AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation. 247-258 - Mohamad Mansouri, Jun Xu, Georgios Portokalidis:
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs. 259-273
Session 6: Hardware Security
- Bin Hu, Yan Wang, Jerry Cheng, Tianming Zhao, Yucheng Xie, Xiaonan Guo, Yingying Chen:
Secure and Efficient Mobile DNN Using Trusted Execution Environments. 274-285 - Gildas Avoine, Xavier Carpent, Diane Leblanc-Albarel:
Stairway To Rainbow. 286-299 - Ruyi Ding, Cheng Gongye, Siyue Wang, A. Adam Ding, Yunsi Fei:
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage. 300-313 - Youqian Zhang, Kasper Rasmussen:
Electromagnetic Signal Injection Attacks on Differential Signaling. 314-325
Keynote 2
- David A. Basin:
Formal Methods for Payment Protocols. 326
Keynote 3
- N. Asokan:
Model Stealing Attacks and Defenses: Where Are We Now? 327
Session 7: Applied Cryptography (II)
- Theo von Arx, Kenneth G. Paterson:
On the Cryptographic Fragility of the Telegram Ecosystem. 328-341 - Yongha Son, Jinhyuck Jeong:
PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption. 342-356 - Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi:
ZEKRA: Zero-Knowledge Control-Flow Attestation. 357-371 - Pascal Reisert, Marc Rivinius, Toomas Krips, Ralf Küsters:
Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice. 372-386
Session 8: Software Security (II)
- Marc Miltenberger, Steven Arzt, Philipp Holzinger, Julius Näumann:
Benchmarking the Benchmarks. 387-400 - Guy Farrelly, Michael Chesser, Damith C. Ranasinghe:
Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO. 401-414 - Jiashuo Liang, Ming Yuan, Zhanzhao Ding, Siqi Ma, Xinhui Han, Chao Zhang:
RaceBench: A Triggerable and Observable Concurrency Bug Benchmark. 415-428 - George Christou, Grigoris Ntousakis, Eric Lahtinen, Sotiris Ioannidis, Vasileios P. Kemerlis, Nikos Vasilakis:
BinWrap: Hybrid Protection against Native Node.js Add-ons. 429-442
Session 9: Architecture Security (II)
- Abdullah Qasem, Mourad Debbabi, Bernard Lebel, Marthe Kassouf:
Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures. 443-456 - David Schrammel, Moritz Waser, Lukas Lamster, Martin Unterguggenberger, Stefan Mangard:
SPEAR-V: Secure and Practical Enclave Architecture for RISC-V. 457-468 - Jiwon Seo, Junseung You, Yungi Cho, Yeongpil Cho, Donghyun Kwon, Yunheung Paek:
Sfitag: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions. 469-480 - Matthew Rogers, Kasper Rasmussen:
An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks. 481-493
Session 10: User-Centric Security (I)
- Raj Vardhan, Alok Chandrawal, Phakpoom Chinprutthiwong, Yangyong Zhang, Guofei Gu:
#DM-Me: Susceptibility to Direct Messaging-Based Scams. 494-508 - Behzad Ousat, Mohammad Ali Tofighi, Amin Kharraz:
An End-to-End Analysis of Covid-Themed Scams in the Wild. 509-523 - Avirup Mukherjee, Kousshik Murali, Shivam Kumar Jha, Niloy Ganguly, Rahul Chatterjee, Mainack Mondal:
MASCARA : Systematically Generating Memorable And Secure Passphrases. 524-538 - Kun Peng:
How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability. 539-551
Keynote 4
- Vanessa Teague:
Democratizing election verification: new methods for addressing an ancient attacker model. 552
Session 11: Machine Learning and Security
- Atul Sharma, Wei Chen, Joshua C. Zhao, Qiang Qiu, Saurabh Bagchi, Somali Chaterji:
FLAIR: Defense against Model Poisoning Attack in Federated Learning. 553-566 - Weiqi Wang, Zhiyi Tian, Chenhan Zhang, An Liu, Shui Yu:
BFU: Bayesian Federated Unlearning with Parameter Self-Sharing. 567-578 - Geetanjli Sharma, M. A. P. Chamikara, Mohan Baruwal Chhetri, Yi-Ping Phoebe Chen:
SoK: Systematizing Attack Studies in Federated Learning - From Sparseness to Completeness. 579-592 - William Aiken, Paula Branco, Guy-Vincent Jourdan:
Going Haywire: False Friends in Federated Learning and How to Find Them. 593-607 - Lior Yasur, Guy Frankovits, Fred Matanel Grabovski, Yisroel Mirsky:
Deepfake CAPTCHA: A Method for Preventing Fake Calls. 608-622
Session 12: Applied Cryptography (III)
- Muhammed F. Esgin, Oguzhan Ersoy, Veronika Kuchta, Julian Loss, Amin Sakzad, Ron Steinfeld, Xiangwen Yang, Raymond K. Zhao:
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. 623-637 - Lili Yan, Jingyi Cui, Jian Liu, Guangquan Xu, Lidong Han, Alireza Jolfaei, Xi Zheng:
IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. 638-648 - Lennart Braun, Moritz Huppert, Nora Khayata, Thomas Schneider, Oleksandr Tkachenko:
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. 649-663 - Leizhang Wang, Yuntao Wang, Baocang Wang:
A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator. 664-677 - Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida:
Communication-Efficient Inner Product Private Join and Compute with Cardinality. 678-688
Session 13: Adversarial Machine Learning
- Zitao Chen, Pritam Dash, Karthik Pattabiraman:
Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks. 689-703 - Jiyi Zhang, Han Fang, Wesley Joon-Wie Tann, Ke Xu, Chengfang Fang, Ee-Chien Chang:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers. 704-715 - Mengdie Huang, Yi Xie, Xiaofeng Chen, Jin Li, Changyu Dong, Zheli Liu, Willy Susilo:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. 716-730 - Zhicong Yan, Shenghong Li, Ruijie Zhao, Yuan Tian, Yuanyuan Zhao:
DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation. 731-745
Session 14: Network Security
- Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks:
T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. 746-759 - Oleg Schell, Marcel Kneib:
SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks. 760-772 - Ali Zohaib, Jade Sheffey, Amir Houmansadr:
Investigating Traffic Analysis Attacks on Apple iCloud Private Relay. 773-784 - Yeomin Jeong, Woonghee Lee, Junbeom Hur:
A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessage. 785-796
Session 15: Cloud Security
- Markus Dahlmanns, Constantin Sander, Robin Decker, Klaus Wehrle:
Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact. 797-811 - Michael V. Le, Salman Ahmed, Dan Williams, Hani Jamjoom:
Securing Container-based Clouds with Syscall-aware Scheduling. 812-826 - Thore Tiemann, Zane Weissman, Thomas Eisenbarth, Berk Sunar:
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems. 827-840 - Joshua David Oetting Majors, Edgardo Barsallo Yi, Amiya Maji, Darren Wu, Saurabh Bagchi, Aravind Machiry:
Security Properties of Virtual Remotes and SPOOKing their violations. 841-854
Session 16: User-Centric Security (II)
- Aydin Abadi, Steven J. Murdoch:
Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims. 855-869 - Yangyong Zhang, Raj Vardhan, Phakpoom Chinprutthiwong, Guofei Gu:
Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators. 870-883 - Chris Culnane, Ioana Boureanu, Jean Snyman, Stephan Wesemeyer, Helen Treharne:
Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices. 884-898 - Florian Draschbacher, Johannes Feichtner:
CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications. 899-912
Session 17: Model Security
- Zijun Lin, Ke Xu, Chengfang Fang, Huadi Zheng, Aneez Ahmed Jaheezuddin, Jie Shi:
QUDA: Query-Limited Data-Free Model Extraction. 913-924 - Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang:
Masked Language Model Based Textual Adversarial Example Detection. 925-937 - Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. 938-950 - Hyunjin Kim, Jinyeong Bak, Kyunghyun Cho, Hyungjoon Koo:
A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing. 951-965
Session 18: Application Security
- William Blair, William K. Robertson, Manuel Egele:
ThreadLock: Native Principal Isolation Through Memory Protection Keys. 966-979 - Barbara Gigerl, Robert Primas, Stefan Mangard:
Secure Context Switching of Masked Software Implementations. 980-992 - Yumeng Zhang, Max Ward, Mingyu Guo, Hung Nguyen:
A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems. 993-1003 - Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco:
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. 1004-1015
Posters
- Gursimran Singh, Hrishikesh B. Acharya:
POSTER: A Cyberspace Study of the Russia-Ukraine War. 1016-1018 - Muhammad Akbar Husnoo, Adnan Anwar, Haftu Tasew Reda, Nasser Hosseinzadeh:
POSTER: A Semi-asynchronous Federated Intrusion Detection Framework for Power Systems. 1019-1021 - Tina Moghaddam, Guowei Yang, Chandra Thapa, Seyit Camtepe, Dan Dongseong Kim:
POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. 1022-1024 - Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design. 1025-1027 - Marco Abbadini, Michele Beretta, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi:
POSTER: Leveraging eBPF to enhance sandboxing of WebAssembly runtimes. 1028-1030 - Zhibo Jin, Zhiyu Zhu, Hongsheng Hu, Minhui Xue, Huaming Chen:
POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models. 1031-1033 - Yiyan Wang, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne:
POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting. 1034-1036 - Cheng-Yao Guo, Fang Yu:
POSTER: On searching information leakage of Python model execution to detect adversarial examples. 1037-1039 - Abdullahi Chowdhury, Hung Nguyen, Debi Ashenden, Ganna Pogrebna:
POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity. 1040-1042 - Qiaoran Meng, Nay Oo, Hoon Wei Lim, Biplab Sikdar:
POSTER: Security Logs Graph Analytics for Industry Network System. 1043-1045
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.