AsiaCCS 2021 论文录用列表
2021-05-15 22:43:02 Author: mp.weixin.qq.com(查看原文) 阅读量:105 收藏

AsiaCCS 作为目前亚洲地区顶级的安全会议,吸引了全球学者的关注和参与,2021年共收到 362篇论文(2020:308; 2019:258;2018:310),录用了70篇论文(2020:67; 2019:58; 2018:62),录用率为19.34%(2020:21.75%; 2019:22.48%; 2018:20%)。小编将一些跟自己相关的论文标记出来供大家查阅,所有录用论文标题如下:

Session #1A: ML and Security (I)

  • Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes

Jinyuan Jia, Binghui Wang, Neil Gong

  • IPGuard: Protecting Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary

Xiaoyu Cao, Jinyuan Jia, Neil Gong

  • A Diversity Index based Scoring Framework for Identifying Smart Meters Launching Stealthy Data Falsification Attacks

Shameek Bhattacharjee, Praveen Madhavarapu, Sajal K. Das

  • Exploiting the Sensitivity of L2 Adversarial Examples to Erase and Restore

Fei Zuo, Qiang Zeng

Session #1B: Cyber-Physical Systems

  • ConAML: Constrained Adversarial Machine Learning for Cyber-Physical Systems

Jiangnan Li, Yingyuan Yang, Jinyuan Sun, Kevin Tomsovic, Hairong Qi

  • EchoVib: Exploring Voice Authentication via Unique Non-Linear Vibrations of Short Replayed Speech

S Abhishek Anand, Jian Liu, Chen Wang, Maliheh Shirvanian, Nitesh Saxena, Yingying Chen

  • HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks

Yi Wu, Xiangyu Xu, Payton R. Walker, Jian Liu, Nitesh Saxena, Yingying Chen, Jiadi Yu

  • Conware: Automated Modeling of Hardware Peripherals

Chad Spensky, Aravind Machiry, Nilo Redini, Colin Unger, Graham Foster, Evan Blasband, Hamed Okhravi, Christopher Kruegel, Giovanni Vigna

Session #2A: Network and Web Security (I)

  • Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication

Gordod Meiser, Pierre Laperdrix, Ben Stock

  • Oversharing Is Not Caring: How CNAME Cloaking Can Expose Your Session Cookies

Assel Aliyeva, Manuel Egele

  • P2DPI: Practical and Privacy-Preserving Deep Packet Inspection

Jongkil Kim, Seyit Camtepe, Joonsang Baek, Willy Susilo, Josef Pieprzyk, Nepal Surya

  • Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels

Piyush Kumar Sharma, Devashish Gosain, Sambuddho Chakraborty

Session #2B: Hardware Security (I)

  • Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels

Zhenkai Zhang, Sisheng Liang, Fan Yao, Xing Gao

  • PLI-TDC: Super Fine Delay-Time Based Physical-Layer Identification with Time-to-Digital Converter for In-Vehicle Networks

Shuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa

  • HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment

Pascal Nasahl, Robert Schilling, Mario Werner, Stefan Mangard

  • CrypTag: Thwarting Physical and Logical Memory Vulnerabilities using Cryptographically Colored Memory

Pascal Nasahl, Robert Schilling, Mario Werner, Jan Hoogerbrugge, Marcel Medwed, Stefan Mangard

Session #3A: Applied Cryptography (I)

  • Efficient Verifiable Image Redacting based on zk-SNARKs

Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh

  • Secure Role and Rights Management for Automotive Access and Feature Activation

Christian Plappert, Lukas Jäger, Andreas Fuchs

  • Pipa: Privacy-preserving Password Checkup via Homomorphic Encryption

Jie Li, Yamin Liu, Shuang Wu

  • Multi-User Collusion-Resistant Searchable Encryption with Optimal Search Time

Yun Wang, Dimitrios Papadopoulos

Session #3B: ML and Security (II)

  • HoneyGen: Generating Honeywords Using Representation Learning

Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos

  • On Detecting Deception in Space Situational Awareness

James Pavur, Ivan Martinovic

  • AMEBA: An Adaptive Approach to the Black-Box Evasion of Machine Learning Models

Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese

  • Stealing Deep Reinforcement Learning Modelsfor Fun and Profit

Kangjie Chen, Shangwei Guo, Tianwei Zhang, Xiaofei Xie, Yang Liu

Session #4A: ML and Security (III)

  • REFIT: a Unified Watermark Removal Framework for Deep Learning Systems with Limited Data

Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song

  • Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs

Lun-Pin Yuan, Peng Liu, Sencun Zhu

  • Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules

Kaichen Yang, Tzungyu Tsai, Honggang Yu, Max Panoff, Tsung-Yi Ho, Yier Jin

  • DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation

Yi Zeng, Han Qiu, Tianwei Zhang, Shangwei Guo, Meikang Qiu, Bhavani Thuraisingham

Session #4B: Measurement/Empirical Security

  • Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems

Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy Cason, Shreyas Sundaram, Saurabh Bagchi

  • Analyzing the Overhead of Protection on File Accessing Using Linux Security Modules

Wenhui Zhang, Peng Liu, Trent Jaeger

  • Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem

Doowon Kim, Haehyun Cho, Yonghwi Kwon, Adam Oest, Adam Doupe, Sooel Son, Gail-Joon Ahn, Tudor Dumitras

  • ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition

Wei Xie, Chao Zhang, Pengfei Wang, Zhenhua Wang, Qiang Yang

Session #5A: Network and Web Security (II)

  • Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning

Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang

  • Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications

Mohammed Jubur, Prakash Shrestha, Nitesh Saxena, Jay Prakash

  • Click This, Not That: Extending Web Authentication with Deception

Timothy Barron, Johnny So, Nick Nikiforakis

  • Analyzing Spatial Differences in the TLS Security of Delegated Web Services

Joonhee Lee, Hyunwoo Lee, Jongheon Jeong, Doowon Kim, Taekyoung "Ted" Kwon

Session #5B: Applied Cryptography (II)

  • Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits

Ruiyu Zhu, Yan Huang

  • Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations

Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila Yavuz, Elisa Bertino

  • Efficient Graph Encryption Scheme for Shortest Path Queries

Esha Ghosh, Seny Kamara, Roberto Tamassia

Session #6A: Software Security and Vulnerability Analysis (I)

  • How to Take Over Drones

Sebastian Plotz, Frederik Armknecht, Christian Bunse

  • Localizing Vulnerabilities Statistically From One Exploit

Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury

  • Cali: Compiler-Assisted Library Isolation

Markus Bauer, Christian Rossow

  • Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment

Zhuotao Liu, Hao Zhao, Sainan Li, Qi Li, Tao Wei, Yu Wang

Session #6B: Privacy (I)

  • Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps

Trung Tin Nguyen, Duc Cuong Nguyen, Michael Schilling, Gang Wang, Michael Backes

  • Low-Cost Hiding of the Query Pattern

Maryam Sepehri, Florian Kerschbaum

  • Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension

Linpeng Lu, Ning Ding

  • Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks

Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida

Session #7A: Privacy (II)

  • Cryptographic Key Derivation from Biometric Inferences for Remote Authentication

Erkam Uzun, Carter Yagemann, Simon Chung, Vladimir Kolesnikov, Wenke Lee

  • Understanding the Privacy Implications of Adblock Plus‚Äôs Acceptable Ads

Ahsan Zafar, Aafaq Sabir, Dilawer Ahmed, Anupam Das

  • Privacy-preserving Density-based Clustering

Beyza Bozdemir, Sébastien Canard, Orhan Ermis, Helen Möllering, Melek Önen, Thomas Schneider

  • DySan: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks

Theo Jourdan, Antoine Boutet, Carole Frindel, Claude Rosin Ngueveu, Sebastien Gambs

Session #7B: Software Security and Vulnerability Analysis (II)

  • SoK: Enabling Security Analyses of Embedded Systems via Rehosting

Andrew Fasano, Tiemoko Ballo, Marius Muench, Tim Leek, Alexander Oleinik, Brendan Dolan-Gavitt, Manuel Egele, Aurélien Francillon, Long Lu, Nick Gregory, Davide Balzarotti, William Robertson

  • BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network

Yuede Ji, Lei Cui, H. Howie Huang

  • Evaluating Synthetic Bugs

Joshua Bundt, Andrew Fasano, Brendan Dolan-Gavitt, William Robertson, Tim Leek

  • Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms

Dongyu Meng, Michele Guerriero, Aravind Machiry, Hojjat Aghakhani, Priyanka Bose, Andrea Continella, Christopher Kruegel, Giovanni Vigna

Session #8A: Malware and Cybercrime (I)

  • Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

Keane Lucas, Mahmood Sharif, Lujo Bauer. Michael K. Reiter, Saurabh Shintre

  • Identifying Behavior Dispatchers for Malware Analysis

Kyuhong Park, Burak Sahin, Yongheng Chen, Jisheng Zhao, Evan Downing, Hong Hu, Wenke Lee

  • MalPhase: Fine-Grained Malware Detection Using Network Flow Data

Michal Piskozub, Fabio De Gaspari, Freddie Barr-Smith, Luigi Mancini, Ivan Martinovic

Session #8B: Blockchain and Distributed Systems

  • Targeting the Weakest Link: Social Engineering Attacks in Ethereum Smart Contracts

Nikolay Ivanov, Jianzhi Lou, Ting Chen, Jin Li, Qiben Yan

  • PSec: Programming Secure Distributed Systems using Enclaves

Shivendra Kushwah, Ankush Desai, Pramod Subramanyan, Sanjit A. Seshia

  • Fact and Fiction: Challenging the Honest Majority Assumption of Permissionless Blockchains

Runchao Han, Zhimei Sui, Jiangshan Yu, Joseph Liu, Shiping Chen

  • Non-Intrusive and High-Efficient Balance Tomography in the Lightning Network

Yan Qiao, Kui Wu, Majid Khabbazian

  • Redactable Blockchain Supporting Supervision and Self-Management

Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu

  • Non-Equivocation in Blockchain: Double-Authentication-Preventing Signatures Gone Contractual

Yannan Li, Willy Susilo, Guomin Yang, Yong Yu, Tran Viet Xuan Phuong, Dongxi Liu

Session #9A: Hardware Security (II)

  • (Mis)managed: A Novel TLB-based Covert Channel on GPUs

Ajay Nayak, Pratheek B, Vinod Ganapathy, Arkaprava Basu

  • Scanning the Cycle: Timing-based Authentication on PLCs

Chuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Aditya Mathur

  • Transduction Shield: A Case Study of Pressure Sensing Security and Defense to Mitigate EMI Signal Injections on Sensors

Yazhou Tu, Vijay Srinivas Tida, Zhongqi Pan, Xiali Hei

Session #9B: Malware and Cybercrime (II)

  • Analysis and Takeover of the Bitcoin-Coordinated Pony Malware

Tsuyoshi Taniguchi, Harm Griffioen, Christian Doerr

  • See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer

Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, SongSong Liu, Yukun Liu, Xiaoning  Li

  • UltraPIN: Inferring PIN Entries via Ultrasound

Ximing Liu, Yingjiu Li, Robert H. Deng

会议主页

https://asiaccs2021.comp.polyu.edu.hk/

历年录用情况

安全学术圈招募队友-ing, 有兴趣加入学术圈的请联系secdr#qq.com


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247485808&idx=1&sn=6b63e7d3e3c80521e6cab32bebcfd04b&chksm=fe2ef6fbc9597feda54dda1bdf83eecb4de18ef1e83e677c1ae86ddc1375b179791d0e7f13a6#rd
如有侵权请联系:admin#unsafe.sh