![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
18th AsiaCCS 2023: Melbourne, VIC, Australia
- Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik:
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023
Keynote 1
- Wenyuan Xu
:
Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities. 1
Session 1: Applied Cryptography (I)
- Changmin Lee
, Seonhong Min
, Jinyeong Seo
, Yongsoo Song
:
Faster TFHE Bootstrapping with Block Binary Keys. 2-13 - Laasya Bangalore
, Mohammad Hossein Faghihi Sereshgi
, Carmit Hazay
, Muthuramakrishnan Venkitasubramaniam
:
Flag: A Framework for Lightweight Robust Secure Aggregation. 14-28 - Johannes Mono
, Tim Güneysu
:
Implementing and Optimizing Matrix Triples with Homomorphic Encryption. 29-40
Session 2: Privacy Application
- Hyunsoo Kim
, Youngbae Jeon
, Ji Won Yoon
:
Invasion of location privacy using online map services and smartphone sensors. 41-52 - Nan Wu
, Dinusha Vatsalan
, Mohamed Ali Kâafar
, Sanath Kumar Ramesh
:
Privacy-Preserving Record Linkage for Cardinality Counting. 53-64 - Baiqi Chen
, Tingmin Wu
, Yanjun Zhang
, Mohan Baruwal Chhetri
, Guangdong Bai
:
Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant Applications. 65-79
Session 3: Privacy and Machine Learning
- Yue Cui
, Syed Irfan Ali Meerza
, Zhuohang Li
, Luyang Liu
, Jiaxin Zhang
, Jian Liu
:
RecUP-FL: Reconciling Utility and Privacy in Federated learning via User-configurable Privacy Defense. 80-94 - Arezoo Rajabi
, Dinuka Sahabandu
, Luyao Niu
, Bhaskar Ramasubramanian
, Radha Poovendran
:
LDL: A Defense for Label-Based Membership Inference Attacks. 95-108 - Chenhan Zhang
, Weiqi Wang
, James J. Q. Yu
, Shui Yu
:
Extracting Privacy-Preserving Subgraphs in Federated Graph Learning using Information Bottleneck. 109-121 - Mengyao Ma
, Yanjun Zhang
, Mahawaga Arachchige Pathum Chamikara
, Leo Yu Zhang
, Mohan Baruwal Chhetri
, Guangdong Bai
:
LoDen: Making Every Client in Federated Learning a Defender Against the Poisoning Membership Inference Attacks. 122-135 - Jiadong Lou
, Xu Yuan
, Miao Pan
, Hao Wang
, Nian-Feng Tzeng
:
Data Privacy Examination against Semi-Supervised Learning. 136-148
Session 4: Architecture Security (I)
- Marco Abbadini
, Dario Facchinetti
, Gianluca Oldani
, Matthew Rossi
, Stefano Paraboschi
:
Cage4Deno: A Fine-Grained Sandbox for Deno Subprocesses. 149-162 - Daniel Genkin
, William Kosasih
, Fangfei Liu
, Anna Trikalinou
, Thomas Unterluggauer
, Yuval Yarom
:
CacheFX: A Framework for Evaluating Cache Security. 163-176 - Martin Unterguggenberger
, David Schrammel
, Pascal Nasahl
, Robert Schilling
, Lukas Lamster
, Stefan Mangard
:
Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging. 177-189 - Jingquan Ge
, Fengwei Zhang
:
FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A. 190-204 - Antoon Purnal
, Marton Bognar
, Frank Piessens
, Ingrid Verbauwhede
:
ShowTime: Amplifying Arbitrary CPU Timing Side Channels. 205-217
Session 5: Software Security (I)
- Abdulla Aldoseri
, Tom Chothia
, José Moreira
, David F. Oswald
:
Symbolic modelling of remote attestation protocols for device and app integrity on Android. 218-231 - Sirus Shahini
, Mu Zhang
, Mathias Payer
, Robert Ricci
:
Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis. 232-246 - Alexander Küchler
, Leon Wenning
, Florian Wendland
:
AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation. 247-258 - Mohamad Mansouri
, Jun Xu
, Georgios Portokalidis
:
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs. 259-273
Session 6: Hardware Security
- Bin Hu
, Yan Wang
, Jerry Cheng
, Tianming Zhao
, Yucheng Xie
, Xiaonan Guo
, Yingying Chen
:
Secure and Efficient Mobile DNN Using Trusted Execution Environments. 274-285 - Gildas Avoine
, Xavier Carpent
, Diane Leblanc-Albarel
:
Stairway To Rainbow. 286-299 - Ruyi Ding
, Cheng Gongye
, Siyue Wang
, A. Adam Ding
, Yunsi Fei
:
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage. 300-313 - Youqian Zhang
, Kasper Rasmussen
:
Electromagnetic Signal Injection Attacks on Differential Signaling. 314-325
Keynote 2
- David A. Basin
:
Formal Methods for Payment Protocols. 326
Keynote 3
- N. Asokan
:
Model Stealing Attacks and Defenses: Where Are We Now? 327
Session 7: Applied Cryptography (II)
- Theo von Arx
, Kenneth G. Paterson
:
On the Cryptographic Fragility of the Telegram Ecosystem. 328-341 - Yongha Son
, Jinhyuck Jeong
:
PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption. 342-356 - Heini Bergsson Debes
, Edlira Dushku
, Thanassis Giannetsos
, Ali Marandi
:
ZEKRA: Zero-Knowledge Control-Flow Attestation. 357-371 - Pascal Reisert
, Marc Rivinius
, Toomas Krips
, Ralf Küsters
:
Overdrive LowGear 2.0: Reduced-Bandwidth MPC without Sacrifice. 372-386
Session 8: Software Security (II)
- Marc Miltenberger
, Steven Arzt
, Philipp Holzinger
, Julius Näumann
:
Benchmarking the Benchmarks. 387-400 - Guy Farrelly
, Michael Chesser
, Damith C. Ranasinghe
:
Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO. 401-414 - Jiashuo Liang
, Ming Yuan
, Zhanzhao Ding
, Siqi Ma
, Xinhui Han
, Chao Zhang
:
RaceBench: A Triggerable and Observable Concurrency Bug Benchmark. 415-428 - George Christou
, Grigoris Ntousakis
, Eric Lahtinen
, Sotiris Ioannidis
, Vasileios P. Kemerlis
, Nikos Vasilakis
:
BinWrap: Hybrid Protection against Native Node.js Add-ons. 429-442
Session 9: Architecture Security (II)
- Abdullah Qasem
, Mourad Debbabi
, Bernard Lebel
, Marthe Kassouf
:
Binary Function Clone Search in the Presence of Code Obfuscation and Optimization over Multi-CPU Architectures. 443-456 - David Schrammel
, Moritz Waser
, Lukas Lamster
, Martin Unterguggenberger
, Stefan Mangard
:
SPEAR-V: Secure and Practical Enclave Architecture for RISC-V. 457-468 - Jiwon Seo
, Junseung You
, Yungi Cho
, Yeongpil Cho
, Donghyun Kwon
, Yunheung Paek
:
Sfitag: Efficient Software Fault Isolation with Memory Tagging for ARM Kernel Extensions. 469-480 - Matthew Rogers
, Kasper Rasmussen
:
An Evaluation Framework for Intrusion Prevention Systems on Serial Data Bus Networks. 481-493
Session 10: User-Centric Security (I)
- Raj Vardhan
, Alok Chandrawal
, Phakpoom Chinprutthiwong
, Yangyong Zhang
, Guofei Gu
:
#DM-Me: Susceptibility to Direct Messaging-Based Scams. 494-508 - Behzad Ousat
, Mohammad Ali Tofighi
, Amin Kharraz
:
An End-to-End Analysis of Covid-Themed Scams in the Wild. 509-523 - Avirup Mukherjee
, Kousshik Murali
, Shivam Kumar Jha
, Niloy Ganguly
, Rahul Chatterjee
, Mainack Mondal
:
MASCARA : Systematically Generating Memorable And Secure Passphrases. 524-538 - Kun Peng
:
How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability. 539-551
Keynote 4
- Vanessa Teague
:
Democratizing election verification: new methods for addressing an ancient attacker model. 552
Session 11: Machine Learning and Security
- Atul Sharma
, Wei Chen
, Joshua C. Zhao
, Qiang Qiu
, Saurabh Bagchi
, Somali Chaterji
:
FLAIR: Defense against Model Poisoning Attack in Federated Learning. 553-566 - Weiqi Wang
, Zhiyi Tian
, Chenhan Zhang
, An Liu
, Shui Yu
:
BFU: Bayesian Federated Unlearning with Parameter Self-Sharing. 567-578 - Geetanjli Sharma
, M. A. P. Chamikara
, Mohan Baruwal Chhetri
, Yi-Ping Phoebe Chen
:
SoK: Systematizing Attack Studies in Federated Learning - From Sparseness to Completeness. 579-592 - William Aiken
, Paula Branco
, Guy-Vincent Jourdan
:
Going Haywire: False Friends in Federated Learning and How to Find Them. 593-607 - Lior Yasur
, Guy Frankovits
, Fred Matanel Grabovski
, Yisroel Mirsky
:
Deepfake CAPTCHA: A Method for Preventing Fake Calls. 608-622
Session 12: Applied Cryptography (III)
- Muhammed F. Esgin
, Oguzhan Ersoy
, Veronika Kuchta
, Julian Loss
, Amin Sakzad
, Ron Steinfeld
, Xiangwen Yang
, Raymond K. Zhao
:
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. 623-637 - Lili Yan
, Jingyi Cui
, Jian Liu
, Guangquan Xu
, Lidong Han
, Alireza Jolfaei
, Xi Zheng
:
IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. 638-648 - Lennart Braun
, Moritz Huppert
, Nora Khayata
, Thomas Schneider
, Oleksandr Tkachenko
:
FUSE - Flexible File Format and Intermediate Representation for Secure Multi-Party Computation. 649-663 - Leizhang Wang
, Yuntao Wang
, Baocang Wang
:
A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator. 664-677 - Koji Chida
, Koki Hamada
, Atsunori Ichikawa
, Masanobu Kii
, Junichi Tomida
:
Communication-Efficient Inner Product Private Join and Compute with Cardinality. 678-688
Session 13: Adversarial Machine Learning
- Zitao Chen
, Pritam Dash
, Karthik Pattabiraman
:
Jujutsu: A Two-stage Defense against Adversarial Patch Attacks on Deep Neural Networks. 689-703 - Jiyi Zhang
, Han Fang
, Wesley Joon-Wie Tann
, Ke Xu
, Chengfang Fang
, Ee-Chien Chang
:
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers. 704-715 - Mengdie Huang
, Yi Xie
, Xiaofeng Chen
, Jin Li
, Changyu Dong
, Zheli Liu
, Willy Susilo
:
Boost Off/On-Manifold Adversarial Robustness for Deep Learning with Latent Representation Mixup. 716-730 - Zhicong Yan
, Shenghong Li
, Ruijie Zhao
, Yuan Tian
, Yuanyuan Zhao
:
DHBE: Data-free Holistic Backdoor Erasing in Deep Neural Networks via Restricted Adversarial Distillation. 731-745
Session 14: Network Security
- Timothy Trippel
, Kang G. Shin
, Kevin B. Bush
, Matthew Hicks
:
T-TER: Defeating A2 Trojans with Targeted Tamper-Evident Routing. 746-759 - Oleg Schell
, Marcel Kneib
:
SPARTA: Signal Propagation-based Attack Recognition and Threat Avoidance for Automotive Networks. 760-772 - Ali Zohaib
, Jade Sheffey
, Amir Houmansadr
:
Investigating Traffic Analysis Attacks on Apple iCloud Private Relay. 773-784 - Yeomin Jeong
, Woonghee Lee
, Junbeom Hur
:
A Honey postMessage, but a Heart of Gall: Exploiting Push Service in Service Workers Via postMessage. 785-796
Session 15: Cloud Security
- Markus Dahlmanns
, Constantin Sander
, Robin Decker
, Klaus Wehrle
:
Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact. 797-811 - Michael V. Le
, Salman Ahmed
, Dan Williams
, Hani Jamjoom
:
Securing Container-based Clouds with Syscall-aware Scheduling. 812-826 - Thore Tiemann
, Zane Weissman
, Thomas Eisenbarth
, Berk Sunar
:
IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems. 827-840 - Joshua David Oetting Majors
, Edgardo Barsallo Yi
, Amiya Maji
, Darren Wu
, Saurabh Bagchi
, Aravind Machiry
:
Security Properties of Virtual Remotes and SPOOKing their violations. 841-854
Session 16: User-Centric Security (II)
- Aydin Abadi
, Steven J. Murdoch
:
Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims. 855-869 - Yangyong Zhang
, Raj Vardhan
, Phakpoom Chinprutthiwong
, Guofei Gu
:
Do Users Really Know Alexa? Understanding Alexa Skill Security Indicators. 870-883 - Chris Culnane
, Ioana Boureanu
, Jean Snyman
, Stephan Wesemeyer
, Helen Treharne
:
Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices. 884-898 - Florian Draschbacher
, Johannes Feichtner
:
CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications. 899-912
Session 17: Model Security
- Zijun Lin
, Ke Xu
, Chengfang Fang
, Huadi Zheng
, Aneez Ahmed Jaheezuddin
, Jie Shi
:
QUDA: Query-Limited Data-Free Model Extraction. 913-924 - Xiaomei Zhang
, Zhaoxi Zhang
, Qi Zhong
, Xufei Zheng
, Yanjun Zhang
, Shengshan Hu
, Leo Yu Zhang
:
Masked Language Model Based Textual Adversarial Example Detection. 925-937 - Shang Wang
, Yansong Gao
, Anmin Fu
, Zhi Zhang
, Yuqing Zhang
, Willy Susilo
, Dongxi Liu
:
CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses. 938-950 - Hyunjin Kim
, Jinyeong Bak
, Kyunghyun Cho
, Hyungjoon Koo
:
A Transformer-based Function Symbol Name Inference Model from an Assembly Language for Binary Reversing. 951-965
Session 18: Application Security
- William Blair
, William K. Robertson
, Manuel Egele
:
ThreadLock: Native Principal Isolation Through Memory Protection Keys. 966-979 - Barbara Gigerl
, Robert Primas
, Stefan Mangard
:
Secure Context Switching of Masked Software Implementations. 980-992 - Yumeng Zhang
, Max Ward
, Mingyu Guo
, Hung Nguyen
:
A Scalable Double Oracle Algorithm for Hardening Large Active Directory Systems. 993-1003 - Pallavi Sivakumaran
, Chaoshun Zuo
, Zhiqiang Lin
, Jorge Blasco
:
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. 1004-1015
Posters
- Gursimran Singh
, Hrishikesh B. Acharya
:
POSTER: A Cyberspace Study of the Russia-Ukraine War. 1016-1018 - Muhammad Akbar Husnoo
, Adnan Anwar
, Haftu Tasew Reda
, Nasser Hosseinzadeh
:
POSTER: A Semi-asynchronous Federated Intrusion Detection Framework for Power Systems. 1019-1021 - Tina Moghaddam
, Guowei Yang
, Chandra Thapa
, Seyit Camtepe
, Dan Dongseong Kim
:
POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking. 1022-1024 - Luyao Niu
, Abdullah Al Maruf
, Andrew Clark
, J. Sukarno Mertoguno
, Radha Poovendran
:
POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design. 1025-1027 - Marco Abbadini
, Michele Beretta
, Dario Facchinetti
, Gianluca Oldani
, Matthew Rossi
, Stefano Paraboschi
:
POSTER: Leveraging eBPF to enhance sandboxing of WebAssembly runtimes. 1028-1030 - Zhibo Jin
, Zhiyu Zhu
, Hongsheng Hu
, Minhui Xue
, Huaming Chen
:
POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models. 1031-1033 - Yiyan Wang
, Thilini Dahanayaka
, Guillaume Jourjon
, Suranga Seneviratne
:
POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting. 1034-1036 - Cheng-Yao Guo
, Fang Yu
:
POSTER: On searching information leakage of Python model execution to detect adversarial examples. 1037-1039 - Abdullahi Chowdhury
, Hung Nguyen
, Debi Ashenden
, Ganna Pogrebna
:
POSTER: A Teacher-Student with Human Feedback Model for Human-AI Collaboration in Cybersecurity. 1040-1042 - Qiaoran Meng
, Nay Oo
, Hoon Wei Lim
, Biplab Sikdar
:
POSTER: Security Logs Graph Analytics for Industry Network System. 1043-1045
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.