default search action
16th AsiaCCS 2021: Virtual Event, Hong Kong
- Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8
Keynote I
- Somesh Jha:
Trustworthy Machine Learning: Past, Present, and Future. 1
Session 1A: ML and Security (I)
- Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong:
Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes. 2-13 - Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong:
IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary. 14-25 - Shameek Bhattacharjee, Venkata Praveen Kumar Madhavarapu, Sajal K. Das:
A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification Attacks. 26-39 - Fei Zuo, Qiang Zeng:
Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore. 40-51
Session 1B: Cyber-physical Systems
- Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun, Kevin Tomsovic, Hairong Qi:
ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems. 52-66 - S. Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen:
EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech. 67-81 - Yi Wu, Xiangyu Xu, Payton R. Walker, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu:
HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks. 82-94 - Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi, Christopher Kruegel, Giovanni Vigna:
Conware: Automated Modeling of Hardware Peripherals. 95-109
Session 2A: Network and Web Security (I)
- Gordon Meiser, Pierre Laperdrix, Ben Stock:
Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication. 110-122 - Assel Aliyeva, Manuel Egele:
Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session Cookies. 123-134 - Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Surya Nepal:
P2DPI: Practical and Privacy-Preserving Deep Packet Inspection. 135-146 - Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakravarty:
Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels. 147-161
Session 2B: Hardware Security (I)
- Zhenkai Zhang, Sisheng Liang, Fan Yao, Xing Gao:
Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels. 162-175 - Shuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa:
PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks. 176-186 - Pascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard:
HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment. 187-199 - Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard:
CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory. 200-212
Session 3A: Applied Cryptography (I)
- Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. 213-226 - Christian Plappert, Lukas Jäger, Andreas Fuchs:
Secure Role and Rights Management for Automotive Access and Feature Activation. 227-241 - Jie Li, Yamin Liu, Shuang Wu:
Pipa: Privacy-preserving Password Checkup via Homomorphic Encryption. 242-251 - Yun Wang, Dimitrios Papadopoulos:
Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time. 252-264
Session 3B: ML and Security (II)
- Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos:
HoneyGen: Generating Honeywords Using Representation Learning. 265-279 - James Pavur, Ivan Martinovic:
On Detecting Deception in Space Situational Awareness. 280-291 - Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese:
AMEBA: An Adaptive Approach to the Black-Box Evasion of Machine Learning Models. 292-306 - Kangjie Chen, Shangwei Guo, Tianwei Zhang, Xiaofei Xie, Yang Liu:
Stealing Deep Reinforcement Learning Models for Fun and Profit. 307-319
Keynote II
- Elaine Shi:
Streamlet: An Absurdly Simple, Textbook Blockchain Protocol. 320
Session 4A: ML and Security (III)
- Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song:
REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data. 321-335 - Lun-Pin Yuan, Peng Liu, Sencun Zhu:
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs. 336-348 - Kaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, Yier Jin:
Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules. 349-362 - Han Qiu, Yi Zeng, Shangwei Guo, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham:
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation. 363-377
Session 4B: Measurement/Empirical Security
- Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems. 378-392 - Wenhui Zhang, Peng Liu, Trent Jaeger:
Analyzing the Overhead of File Protection by Linux Security Modules. 393-406 - Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Doupé, Sooel Son, Gail-Joon Ahn, Tudor Dumitras:
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem. 407-420 - Wei Xie, Chao Zhang, Pengfei Wang, Zhenhua Wang, Qiang Yang:
ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition. 421-431
Sessionn 5A: Network and Web Security (II)
- Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang:
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning. 432-446 - Mohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash:
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications. 447-461 - Timothy Barron, Johnny So, Nick Nikiforakis:
Click This, Not That: Extending Web Authentication with Deception. 462-474 - Joonhee Lee, Hyunwoo Lee, Jongheon Jeong, Doowon Kim, Ted Taekyoung Kwon:
Analyzing Spatial Differences in the TLS Security of Delegated Web Services. 475-487
Session 5B: Applied Cryptography (II)
- Ruiyu Zhu, Yan Huang:
Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits. 488-500 - Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz, Elisa Bertino:
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. 501-515 - Esha Ghosh, Seny Kamara, Roberto Tamassia:
Efficient Graph Encryption Scheme for Shortest Path Queries. 516-525
Session 6A: Software Security and Vulnerability Analysis (I)
- Sebastian Plotz, Frederik Armknecht, Christian Bunse:
How to Take Over Drones. 526-536 - Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury:
Localizing Vulnerabilities Statistically From One Exploit. 537-549 - Markus Bauer, Christian Rossow:
Cali: Compiler-Assisted Library Isolation. 550-564 - Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang:
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment. 565-577
Session 6B: Privacy (I)
- Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes:
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps. 578-592 - Maryam Sepehri, Florian Kerschbaum:
Low-Cost Hiding of the Query Pattern. 593-603 - Linpeng Lu, Ning Ding:
Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension. 604-615 - Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida:
Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks. 616-627
Keynote III
- Kui Ren:
Encrypted Databases: Progresses and Challenges. 628
Session 7A: Privacy (II)
- Erkam Uzun, Carter Yagemann, Simon P. Chung, Vladimir Kolesnikov, Wenke Lee:
Cryptographic Key Derivation from Biometric Inferences for Remote Authentication. 629-643 - Ahsan Zafar, Aafaq Sabir, Dilawer Ahmed, Anupam Das:
Understanding the Privacy Implications of Adblock Plus's Acceptable Ads. 644-657 - Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider:
Privacy-preserving Density-based Clustering. 658-671 - Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Rosin Claude Ngueveu:
DySan: Dynamically Sanitizing Motion Sensor Data Against Sensitive Inferences through Adversarial Networks. 672-686
Session 7B: Software Security and Vulnerability Analysis (II)
- Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Bulekov, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson:
SoK: Enabling Security Analyses of Embedded Systems via Rehosting. 687-701 - Yuede Ji, Lei Cui, H. Howie Huang:
BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network. 702-715 - Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek:
Evaluating Synthetic Bugs. 716-730 - Dongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella, Christopher Kruegel, Giovanni Vigna:
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms. 731-743
Session 8A: Malware and Cybercrime (I)
- Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre:
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. 744-758 - Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu, Wenke Lee:
Identifying Behavior Dispatchers for Malware Analysis. 759-773 - Michal Piskozub, Fabio De Gaspari, Freddie Barr-Smith, Luigi V. Mancini, Ivan Martinovic:
MalPhase: Fine-Grained Malware Detection Using Network Flow Data. 774-786
Session 8B: Blockchain and Distributed Systems
- Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan:
Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts. 787-801 - Shivendra Kushwah, Ankush Desai, Pramod Subramanyan, Sanjit A. Seshia:
PSec: Programming Secure Distributed Systems using Enclaves. 802-816 - Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph K. Liu, Shiping Chen:
Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains. 817-831 - Yan Qiao, Kui Wu, Majid Khabbazian:
Non-Intrusive and High-Efficient Balance Tomography in the Lightning Network. 832-843 - Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu:
Redactable Blockchain Supporting Supervision and Self-Management. 844-858 - Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu:
Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual. 859-871
Session 9A: Hardware Security (II)
- Ajay Nayak, B. Pratheek, Vinod Ganapathy, Arkaprava Basu:
(Mis)managed: A Novel TLB-based Covert Channel on GPUs. 872-885 - Chuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya Mathur:
Scanning the Cycle: Timing-based Authentication on PLCs. 886-900 - Yazhou Tu, Vijay Srinivas Tida, Zhongqi Pan, Xiali Hei:
Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on Sensors. 901-915
Session 9B: Malware and Cybercrime (II)
- Tsuyoshi Taniguchi, Harm Griffioen, Christian Doerr:
Analysis and Takeover of the Bitcoin-Coordinated Pony Malware. 916-930 - Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li:
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. 931-943 - Ximing Liu, Yingjiu Li, Robert H. Deng:
UltraPIN: Inferring PIN Entries via Ultrasound. 944-957
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.