default search action
9th AsiaCCS 2014: Kyoto, Japan
- Shiho Moriai, Trent Jaeger, Kouichi Sakurai:
9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014. ACM 2014, ISBN 978-1-4503-2800-5
Keynote
- Christopher Kruegel:
Fighting malicious code: an eternal struggle. 1
Network
- Fabian Lanze, Andriy Panchenko, Benjamin Braatz, Thomas Engel:
Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature. 3-14 - Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik:
Covert ephemeral communication in named data networking. 15-26 - Guowu Xie, Huy Hang, Michalis Faloutsos:
Scanner hunter: understanding HTTP scanning traffic. 27-38 - Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan:
Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. 39-50 - Georges Bossert, Frédéric Guihéry, Guillaume Hiet:
Towards automated protocol reverse engineering using semantic information. 51-62
Reputation and location
- Anupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar:
Re3: relay reliability reputation for anonymity systems. 63-74 - Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
Design and evaluation of persea, a sybil-resistant DHT. 75-86 - Rasib Khan, Shams Zawoad, Munirul M. Haque, Ragib Hasan:
OTIT: towards secure provenance modeling for location proofs. 87-98 - Jaroslav Sedenka, Paolo Gasti:
Privacy-preserving distance computation and proximity testing on earth, done right. 99-110
Processing encrypted data
- Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li:
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. 111-122 - Dongxi Liu, Elisa Bertino, Xun Yi:
Privacy of outsourced k-means clustering. 123-134 - Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello:
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. 135-146 - Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
S-ORAM: a segmentation-based oblivious RAM. 147-158 - Chengfang Fang, Ee-Chien Chang:
Differential privacy with δ-neighbourhood for spatial and dynamic datasets. 159-170
Applications 1
- Davide Canali, Leyla Bilge, Davide Balzarotti:
On the effectiveness of risk prediction based on users browsing behavior. 171-182 - Ben Stock, Martin Johns:
Protecting users against XSS-based password manager abuse. 183-194 - Manar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen:
A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability. 195-206
Crypto
- Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling after-the-fact leakage for key exchange. 207-216 - Rong Jin, Xianru Du, Zi Deng, Kai Zeng, Jing Xu:
Practical secret key agreement for full-duplex near field communications. 217-228 - Alexandre Pinto, Bertram Poettering, Jacob C. N. Schuldt:
Multi-recipient encryption, revisited. 229-238 - Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng:
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. 239-248 - Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang:
Improved anonymous proxy re-encryption with CCA security. 249-258
Access control and flow analysis
- Mu Zhang, Heng Yin:
Efficient, context-aware privacy leakage confinement for android applications without firmware modding. 259-270 - Tobias Wüchner, Martín Ochoa, Alexander Pretschner:
Malware detection with quantitative data flow graphs. 271-282 - Quoc-Sang Phan, Pasquale Malacaria:
Abstract model counting: a novel approach for quantification of information leaks. 283-292 - Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan:
ConXsense: automated context classification for context-aware access control. 293-304
Software and systems security
- Gábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann:
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment. 305-316 - Su Zhang, Xinwen Zhang, Xinming Ou:
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud. 317-328 - Markus Kammerstetter, Christian Platzer, Wolfgang Kastner:
Prospect: peripheral proxying supported embedded code testing. 329-340 - Adonis P. H. Fung, Tielei Wang, K. W. Cheung, Tsz-Yeung Wong:
Scanning of real-world web applications for parameter tampering vulnerabilities. 341-352
Applications 2
- Gianluca Stringhini, Oliver Hohlfeld, Christopher Kruegel, Giovanni Vigna:
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape. 353-364 - Bisheng Liu, Urs Hengartner:
pTwitterRec: a privacy-preserving personalized tweet recommendation framework. 365-376 - Jelena Isacenkova, Davide Balzarotti:
Shades of gray: a closer look at emails in the gray area. 377-388
Authentication
- Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, Yingying Chen:
Practical user authentication leveraging channel state information (CSI). 389-400 - Hu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, Wei Jiang:
Outsourceable two-party privacy-preserving biometric authentication. 401-412 - Yan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng:
Understanding OSN-based facial disclosure against face authentication systems. 413-424 - Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi:
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. 425-434 - Sebastian Mödersheim, Luca Viganò:
Sufficient conditions for vertical composition of security protocols. 435-446
Android
- Timothy Vidas, Nicolas Christin:
Evading android runtime analysis via sandbox detection. 447-458 - Collin Mulliner, William K. Robertson, Engin Kirda:
VirtualSwindle: an automated attack against in-app billing on android. 459-470 - Min Zheng, Mingshen Sun, John C. S. Lui:
DroidRay: a security evaluation system for customized android firmwares. 471-482 - Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu:
APKLancet: tumor payload diagnosis and purification for android applications. 483-494
Short 1 -- network
- Benjamin Johnson, Aron Laszka, Jens Grossklags:
How many down?: toward understanding systematic risk in networks. 495-500 - Sébastien Gambs, Cristina Onete, Jean-Marc Robert:
Prover anonymous and deniable distance-bounding authentication. 501-506 - Sascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith:
Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurations. 507-512 - Tiffany Hyun-Jin Kim, H. Colleen Stuart, Hsu-Chun Hsiao, Yue-Hsun Lin, Leon Zhang, Laura Dabbish, Sara B. Kiesler:
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords. 513-518
Short 1 -- software
- Jakub Szefer, Pramod A. Jamkhedkar, Diego Perez-Botero, Ruby B. Lee:
Cyber defenses for physical attacks and insider threats in cloud computing. 519-524 - Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen:
Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script markets. 525-530 - Kun Yang, Jianwei Zhuge, Yongke Wang, Lujue Zhou, Hai-Xin Duan:
IntentFuzzer: detecting capability leaks of android applications. 531-536 - Xingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, Jiwu Jing:
Remotely wiping sensitive data on stolen smartphones. 537-542
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.