default search action
10th AsiaCCS 2015: Singapore
- Feng Bao, Steven Miller, Jianying Zhou, Gail-Joon Ahn:
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. ACM 2015, ISBN 978-1-4503-3245-3
Keynote Address 1
- Zhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh:
Emerging Security Threats and Countermeasures in IoT. 1-6
Session 1: Mobile Security
- Heqing Huang, Kai Chen, Chuangang Ren, Peng Liu, Sencun Zhu, Dinghao Wu:
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android. 7-18 - Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian Jiang:
Hybrid User-level Sandboxing of Third-party Android Apps. 19-30 - Lee Wang Hao, Murali Srirangam Ramanujam, S. P. T. Krishnan:
On Designing an Efficient Distributed Black-Box Fuzzing System for Mobile Devices. 31-42 - Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi:
XiOS: Extended Application Sandboxing on iOS. 43-54
Keynote Address 2
- Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen:
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? 55-61
Session 2: Cloud Security
- Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui:
Enabling Encrypted Cloud Media Center with Secure Deduplication. 63-72 - Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou:
Group-oriented Proofs of Storage. 73-84 - Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar:
Lucky 13 Strikes Back. 85-96
Session 3: Malware Analysis
- Carlos Gañán, Orçun Çetin, Michel van Eeten:
An Empirical Analysis of ZeuS C&C Lifetime. 97-108 - Junjie Wang, Yinxing Xue, Yang Liu, Tian Huat Tan:
JSDC: A Hybrid Approach for JavaScript Malware Detection and Classification. 109-120 - Guanhua Yan:
Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification. 121-132
Session 4A: Cyber-Physical Security
- Marina Krotofil, Jason Larsen, Dieter Gollmann:
The Process Matters: Ensuring Data Veracity in Cyber-Physical Systems. 133-144 - Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Huang, Johann Großschädl:
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. 145-153 - Matthias Hiller, Meng-Day (Mandel) Yu, Michael Pehl:
Systematic Low Leakage Coding for Physical Unclonable Functions. 155-166 - Soodeh Dadras, Ryan M. Gerdes, Rajnikant Sharma:
Vehicular Platooning in an Adversarial Environment. 167-178
Session 4B: Cryptography
- David Nuñez, Isaac Agudo, Javier López:
NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU. 179-189 - Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:
Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. 191-202 - Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque:
Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism. 203-214 - Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu:
Related Randomness Attacks for Public Key Cryptosystems. 215-223
Session 5A: Network Security
- Olivier Levillain, Baptiste Gourdin, Hervé Debar:
TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPS. 225-236 - Xingliang Yuan, Cong Wang, Kui Ren:
Enabling IP Protection for Outsourced Integrated Circuit Design. 237-247 - Jongho Won, Seung-Hyun Seo, Elisa Bertino:
A Secure Communication Protocol for Drones and Smart Objects. 249-260 - Yantian Hou, Ming Li, Ruchir Chauhan, Ryan M. Gerdes, Kai Zeng:
Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and Practice. 261-272
Session 5B: Security Policy
- Jianxiong Shao, Yu Qin, Dengguo Feng, Weijin Wang:
Formal Analysis of Enhanced Authorization in the TPM 2.0. 273-284 - Huseyin Ulusoy, Pietro Colombo, Elena Ferrari, Murat Kantarcioglu, Erman Pattuk:
GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems. 285-296 - Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise:
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes. 297-308 - Enrico Bacis, Simone Mutti, Stefano Paraboschi:
AppPolicyModules: Mandatory Access Control for Third-Party Apps. 309-320
Session 6A: Systems Security
- Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia:
Now You See Me: Hide and Seek in Physical Address Space. 321-331 - Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou:
TrustLogin: Securing Password-Login on Commodity Operating Systems. 333-344 - Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
Efficient Virtualization-Based Application Protection Against Untrusted Operating System. 345-356 - Xiang Cai, Rucha Lale, Xin Cheng Zhang, Rob Johnson:
Fixing Races For Good: Portable and Reliable UNIX File-System Race Detection. 357-368 - Haoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Chunfu Jia, Debin Gao:
Software Watermarking using Return-Oriented Programming. 369-380
Session 6B: Applied Cryptography
- Ioana Boureanu, Miyako Ohkubo, Serge Vaudenay:
The Limits of Composable Crypto with Transferable Setup Devices. 381-392 - Hua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi:
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data. 393-404 - Gang Xu, George T. Amariucai, Yong Guan:
Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated Substructures. 405-416 - Haibo Tian, Fangguo Zhang, Kui Ren:
Secure Bilinear Pairing Outsourcing Made More Efficient and Flexible. 417-426
Session 7A: Privacy
- Chris Y. T. Ma, David K. Y. Yau:
On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data. 427-438 - Xun Yi, Fang-Yu Rao, Elisa Bertino, Athman Bouguettaya:
Privacy-Preserving Association Rule Mining in Cloud Computing. 439-450 - Wei-Yen Day, Ninghui Li:
Differentially Private Publishing of High-dimensional Data Using Sensitivity Control. 451-462
Session 7B: Attack Analysis I
- Min Zheng, Hui Xue, Yulong Zhang, Tao Wei, John C. S. Lui:
Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates. 463-474 - Kenneth G. Paterson, Mario Strefler:
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System. 475-482 - Hao Sun, Xiangyu Zhang, Chao Su, Qingkai Zeng:
Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability. 483-494
Session 8A: Social and Network Analytics
- Hiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch:
Anonymizing Social Graphs via Uncertainty Semantics. 495-506 - Nitin Chiluka, Nazareno Andrade, Johan A. Pouwelse, Henk J. Sips:
Social Networks Meet Distributed Systems: Towards a Robust Sybil Defense under Churn. 507-518 - Katerina Doka, Mingqiang Xue, Dimitrios Tsoumakos, Panagiotis Karras:
k-Anonymization by Freeform Generalization. 519-530 - Philippe Owezarski:
A Near Real-Time Algorithm for Autonomous Identification and Characterization of Honeypot Attacks. 531-542
Session 8B: Attack Analysis II
- Jun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Peng Liu, Guofei Jiang:
Discover and Tame Long-running Idling Processes in Enterprise Systems. 543-554 - Thurston H. Y. Dang, Petros Maniatis, David A. Wagner:
The Performance Cost of Shadow Stacks and Stack Canaries. 555-566 - Markus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula:
I Know Where You are: Proofs of Presence Resilient to Malicious Provers. 567-577
Short Paper 1A: Attacks & Vulnerabilities
- Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu:
Bittersweet ADB: Attacks and Defenses. 579-584 - Wei You, Bin Liang, Jingzhe Li, Wenchang Shi, Xiangyu Zhang:
Android Implicit Information Flow Demystified. 585-590 - Chaoshun Zuo, Jianliang Wu, Shanqing Guo:
Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web Apps. 591-596 - Daniel Arp, Fabian Yamaguchi, Konrad Rieck:
Torben: A Practical Side-Channel Attack for Deanonymizing Tor Communication. 597-602
Short Paper 1B: Cryptographic Schemes
- Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:
Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove. 603-608 - Jiazhe Chen, Mingjie Liu, Hexin Li, Hongsong Shi:
Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature Algorithm. 609-614 - Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Anonymous Yoking-Group Proofs. 615-620 - Rong Cheng, Jingbo Yan, Chaowen Guan, Fangguo Zhang, Kui Ren:
Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation. 621-626
Short Paper 2A: Network Security
- Lingjun Li, Guoliang Xue, Xinxin Zhao:
The Power of Whispering: Near Field Assertions via Acoustic Communications. 627-632 - Konstantin Böttinger, Dieter Schuster, Claudia Eckert:
Detecting Fingerprinted Data in TLS Traffic. 633-638 - Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran:
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks. 639-644 - Wentao Chang, Aziz Mohaisen, An Wang, Songqing Chen:
Measuring Botnets in the Wild: Some New Trends. 645-650
Short Paper 2B: Cloud Security
- Chung Hwan Kim, Sungjin Park, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu:
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality. 651-656 - James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Access Control in Publicly Verifiable Outsourced Computation. 657-662
Posters
- Gökay Saldamli, Richard Chow, Hongxia Jin:
Albatross: A Privacy-Preserving Location Sharing System. 663 - Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Yung Shin Van Der Sype, Yutaka Miyake:
Practical Private One-way Anonymous Message Routing. 665 - Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:
Disavowable Public Key Encryption with Non-interactive Opening. 667 - Girish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha:
iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel. 669 - Yuan Yao, Bin Zhang, Wenling Wu:
A Single Query Forgery Attack on Raviyoyla v1. 671 - Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. 673 - Paul-Edmond Berthier, Stéphane Cauchie, Zonghua Zhang:
Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices. 675
Keynote Address 3
- Ravi S. Sandhu:
Attribute-Based Access Control Models and Beyond. 677
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.