ACM ASIACCS 2018
The 13th ACM ASIA Conference on Information, Computer and Communications Security
June 4 – 8, 2018, Songdo, Korea
Monday, June 4 Pre-Conference Workshops |
|||||
Time |
Workshop on Blockchains, |
||||
09:00 – 10:30 |
BCC |
CPSS |
RESEC |
SCC |
|
10:30 – 11:00 |
|
|
Coffee Break |
|
|
11:00 – 12:30 |
BCC |
CPSS |
RESEC |
SCC |
|
12:30 – 14:00 |
|
|
Lunch |
|
APKC |
14:00 – 15:30 |
BCC |
CPSS |
RESEC |
SCC |
APKC |
15:30 – 16:00 |
|
|
Coffee Break |
|
APKC |
16:00 – 17:30 |
BCC |
CPSS |
RESEC |
SCC |
APKC |
Tuesday, June 5 AsiaCCS Main Conference |
||||
Time |
Diamond Hall (2F) |
Ruby Hall (2F) |
Emerald Hall (2F) |
Sapphire Hall (3F) |
09:00 – 09:30 |
Welcome Message (General Chair/Program Committee Chair) |
|||
09:30 – 10:30 |
Keynote : Cliff Wang(US Army Research), “Cyber Deception: an emergent research area” |
|||
10:30 – 11:00 |
Coffee Break |
|||
11:00 – 12:20 |
Embedded System Security |
Applied Crypto 1 |
||
|
DeWiCam: Detecting Hidden Wireless Cameras via Smartphones Yushi Cheng, Xiaoyu Ji(Zhejiang University/ Alibaba-Zhejiang University Joint Institute of Frontier Technologies); Tianyang Lu, and Wenyuan Xu (Zhejiang University)Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires Ilias Giechaskiel, Kasper B. Rasmussen (University of Oxford); and Ken Eguro(Microsoft Research)HlcAuth: Key-free and Secure Communications via Home-Limited Channel Chaohao Li, Xiaoyu Ji(Zhejiang University & Alibaba-Zhejiang University Joint Institute of Frontier Technologies); Xinyan Zhou, Juchuan Zhang (Zhejiang University); Jing Tian (University of South Carolina); Yanmiao Zhang, and Wenyuan Xu (Zhejiang University) |
Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric Primitives Francesco Berti, François Koeune, Olivier Pereira, Thomas Peters, and François-Xavier Standaert (Universite Catholique de Louvain)On the Memory-Hardness of Data-Independent Password-Hashing Functions Joel Alwen (IST Austria / Wickr Inc.); Peter Gazi (IOHK); Chethan Kamath, Karen Klein, Georg Osang, Krzyszt of Pietrzak (IST Austria); Lenoid Reyzin (Boston University); Michal Rolinek, and Michal Rybar (IST Austria)Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption and the Applications Wen-jie Lu, Jun-jie Zhou, and Jun Sakuma (University of Tsukuba) |
|
|
12:20 – 13:50 |
Lunch |
|||
13:50 – 15:20 |
Authentication |
Mobile |
||
|
The Personal Identification Chord: A Four Button Authentication System for Smartwatches 2MA: Verifying Voice Commands via Two Microphone Authentication Beat-PIN: A User Authentication Mechanism for Wearable Devices Through Secret Beats |
iOracle: Automated Evaluation of Access Control Policies in iOS Source Attribution of Cryptographic API Misuse in Android Applications Don’t throw me away: Threats Caused by |
|
|
15:20 – 15:50 |
Coffee Break |
|||
15:50 – 17:40 |
Machine Learning 1 |
Privacy 1 |
|
|
|
Protecting Intellectual Property of Deep Neural Networks with Watermarking Towards Fast and Semi-supervised Identification of Smart Meters launching Data Falsification Attacks Detecting Malicious PowerShell Commands using Deep Neural Networks Detection under Privileged Information |
Entwining Sanitization and Personalization on Databases Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association Studies Secure Similar Sequence Query on Outsourced Genomic Data A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation |
|
|
17:40 – 20:30 |
Poster Session |
|||
18:30 – 20:30 |
Welcome Reception |
|||
Wednesday, June 6 AsiaCCS Main Conference |
||||
Time |
Diamond Hall (2F) |
Ruby Hall (2F) |
Emerald Hall (2F) |
Sapphire Hall (3F) |
09:00 – 10:00 |
Keynote : Jaeyeon Jung(Samsung Electronics), “Securing a Large scale IoT ecosystem” |
|||
10:00 – 10:30 |
Coffee Break |
|||
10:30 – 12:30 |
Cellular, Phone, and |
Trust |
|
|
|
FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting Zhou Zhuang, Taimin Zhang, Juchuan Zhang, Wenyuan Xu(Zhejiang University); Zhenhua Li (Tsinghua University); and Yunhao Liu (Tsinghua University; Michigan State University)Augmenting Telephone Spam Blacklists by Mining Large CDR Datasets Jienan Liu (University of Georgia); Babak Rahbarinia (Auburn University Montgomery); Roberto Perdisci (University of Georgia); Haitao Du, and Li Su (China Mobile Research Institute)Towards Measuring the Role of Phone Numbers in Twitter-Advertised Spam Payas Gupta (Pindrop); Roberto Perdisci (University of Georgia); and Mustaque Ahamad (Georgia Institute of Technology)Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services Daniel Gruss, Michael Schwarz (Graz University of Technology); Matthias Wübbeling (Fraunhofer FKIE & University of Bonn); Simon Guggi (Graz University of Technology); Timo Malderle (University of Bonn); Stefan More, and Moritz Lipp (Graz University of Technology) |
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive Networks Can You Trust Your Encrypted Cloud? An On the strategy and behavior of Bitcoin mining with N-attackers |
|
|
12:30 – 14:00 |
Lunch |
|||
14:00 – 15:20 |
Software Security |
Network Security 1 |
|
|
|
A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity CUP: Comprehensive User-Space Protection for C/C++ BCD: Decomposing Binary Code Into Components Using Graph Clustering |
To Intercept or not to Intercept: Analyzing TLS Interception in Network Appliances Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control Where’s Wally? How to Privately Discover your Friends on the Internet |
|
|
15:20 – 15:50 |
Coffee Break |
|||
15:50 – 18:00 |
Malware and Web |
Physical Attacks and |
|
|
|
You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet Marketplaces Investigating Web Defacement Campaigns at Large Hardware Performance Counters Can Detect Malware: Myth or Fact? le-git–imate: Towards Verifiable Web-based Git Repositories |
NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems Electromagnetic Induction Attacks Against Embedded Systems Jayaprakash Selvaraj(Iowa State University); Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection Attack TABOR: A Graphical Framework for Anomaly Detection in Industrial Control Systems |
|
|
18:00 – 20:30 |
Poster Session |
|||
18:30 – 20:30 |
Banquet |
|||
Thursday, June 7 AsiaCCS Main Conference |
||||
Time |
Diamond Hall (2F) |
Ruby Hall (2F) |
Emerald Hall (2F) |
Sapphire Hall (3F) |
08:30 – 09:30 |
Keynote : Kevin Fu (University of Michigan), “Analog Sensor Cybersecurity and Transduction Attacks” |
|||
09:30 – 09:50 |
Coffee Break |
|||
09:50 – 11:10 |
Privacy 2 |
CPU Security |
||
|
SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI Reconstruction Highly-Efficient Fully-Anonymous Dynamic Group Signatures Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System |
Single Trace Attack against RSA Key Generation in Intel SGX SSL Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses |
|
|
11:30 – 19:00 |
DMZ Tour |
|||
Friday, June 8 AsiaCCS Main Conference |
||||
Time |
Diamond Hall (2F) |
Ruby Hall (2F) |
Emerald Hall (2F) |
Sapphire Hall (3F) |
09:00 – 10:50 |
Network Security 2 |
Applied Crypto 2 |
||
|
Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDs Who is knocking on Telnet Port: A Large-Scale Empirical Study of Network Scanning Towards Sustainable Evolution for the TLS Public-Key Infrastructure No One In The Middle: Enabling Network Access Control Via Transparent Attribution |
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly Isogrammic-Fusion ORAM: Improved Statistically Secure Privacy-Preserving Cloud Data Access for Thin Clients |
|
|
10:50 – 11:20 |
Coffee Break |
|||
11:20 – 12:50 |
Machine Learning 2 |
Android |
|
|
|
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications A Data-driven Attack against Support Vector Machine Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning |
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android Droid M+: Developer Support for Imbibing Android’s New Permission Model Dazed Droids: A Longitudinal Study of Android Inter-App Vulnerabilities |
|