ACSAC 2019 论文录用列表
2019-08-28 00:00:23 Author: mp.weixin.qq.com(查看原文) 阅读量:54 收藏


Annual Computer Security Applications Conference(ACSAC)会议关注计算机应用安全领域的研究工作,与DSN, ESORICS和RAID并称为网络与信息安全领域的“四小安全顶级会议”(简称四小),代表着国际网络与信息安全学术研究的最高水平。2019年共收到论文266篇(2018:299),录取60篇(2018:60),录用率为22.56%(2018:20.1%),所有录用论文标题如下:

STRIP: A Defence Against Trojan Attacks on Deep Neural Networks

Yansong (Garrison) Gao (NJUST, China and Data61, Australia); Chang Xu (Data61, CSIRO, Sydney, Australia); Derui Wang (Swinburne University of Technology, Australia); Shiping Chen (Data61, CSIRO, Sydney, Australia); Damith C. Ranasinghe (Auto-ID Lab, The School of Computer Science, The University of Adelaide); Nepal Surya (Data61, CSIRO, Sydney, Australia)

MalRank: A Measure of Maliciousness in SIEM-based Knowledge Graphs

Pejman Najafi, Alexander Muehle, Wenzel Puenter, Feng Cheng, and Christoph Meinel (Hasso Plattner Institute)

Survivor: A Fine-Grained Intrusion Response and Recovery Approach for Commodity Operating Systems

Ronny Chevalier (HP Labs, CentraleSupélec / Inria / CNRS / IRISA); David Plaquin and Chris Dalton (HP Labs); Guillaume Hiet (CentraleSupélec / Inria / CNRS / IRISA)

PDoT: Private DNS-over-TLS with TEE Support

Yoshimichi Nakatsuka (UC Irvine); Andrew Paverd ([email protected]); Gene Tsudik (UC Irvine)

The Chatty-Sensor and the Provably-Covert Channel in Cyber Physical System

Yehonatan Kfir (Bar Ilan University, Israel); Amir Herzberg (University of Connecticut, USA)

TF-BIV: Transparent and Fine-grained Binary Integrity Verification in the Cloud

Fangjie Jiang (Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences); Quanwei Cai and Jingqiang Lin (Institute of Information Engineering, Chinese Academy of Sciences); Bo Luo (The University of Kansas); Le Guan (University of Georgia); Ziqiang Ma (Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences)

Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation

Sebastian Poeplau and Aurélien Francillon (EURECOM, France)

VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching

Andre Pawlowski (Ruhr-Universität Bochum); Victor van der Veen and Dennis

Perspectives on Transparency Tools for Online Advertising

Tobias Urban (Institute for Internet Security, Westphalian University of Applied Sciences); Martin Degeling and Thorsten Holz (Ruhr University Bochum; Horst Görtz Institute for IT Security); Norbert Pohlmann (Institute for Internet Security, Westphalian University of Applied Sciences)

FRAMER: Complete Encoding for DoubleStuffing Metadata and Pointers and Capability Systems and Memory Safety

Myoung Jin Nam (Korea University); Periklis Akritidis (Niometrics); David J Greaves (University of Cambridge)

Will You Trust This TLS Certificate? Perceptions of People Working in IT

Martin Ukrop, Lydia Kraus, and Vashek Matyas (Masaryk University); Heider Ahmad Mutleq Wahsheh (Ca' Foscari University of Venice)

How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN

Zheng Li and Chengyu Hu (Shandong University); Yang Zhang (CISPA Helmholtz Center for Information Security); Shanqing Guo (Shandong University)

SafeUSB: Designing a Trusted and Efficient USB Device

Ryad Benadjila, Arnauld Michelizza, Mathieu Renard, Philippe Thierry, And Philippe Trebuchet (ANSSI)

BakingTimer: Privacy Analysis of Server-Side Request Processing Time

Iskander Sanchez-Rola (University of Deusto, Symantec Research Labs); Davide Balzarotti (Eurecom); Igor Santos (University of Deusto)

Koinonia: Verifiable E-Voting with Long-term Privacy

Huangyi Ge, Sze Yiu Chau, and Victor E (Purdue University); Huian Li (Indiana University); Tianhao Wang (Purdue University); Xukai Zou (Indiana University); Ninghui Li (Purdue University)

Mining Least Privilege Attribute Based Access Control Policies

Matthew Sanders and Chuan Yue (Colorado School of Mines)

Analyzing Control Flow Integrity Protections with LLVM-CFI

Paul Muntean and Matthias Neumayer (Technical University of Munich); Zhiqiang Lin (Ohio State University); Gang Tan (Penn State University); Jens Grossklags and Claudia Eckert (Technical University of Munich)

Whisper: A Unilateral Defense Against VoIP Traffic Re-Identification Attacks

Tavish Vaidya, Tim Walsh, and Micah Sherr (Georgetown University)

EIGER: Automated IOC Generation for Accurate and Interpretable Endpoint Malware Detection

Yuma Kurogome, Yuto Otsuki, Yuhei Kawakoya, and Makoto Iwamura (NTT Secure Platform Laboratories); Syogo Hayashi (NTT Security Japan); Tatsuya Mori (Waseda University); Koushik Sen (University of California, Berkeley)

DR.SGX: Automated and Adjustable Side-Channel Protection for SGX using Data Location Randomization

Ferdinand Brasser (Technische Universität Darmstadt); Srdjan Capkun (ETH Zurich); Alexandra Dmitrienko (University of Würzburg); Tommaso Frassetto (Technische Universität Darmstadt); Kari Kostiainen (ETH Zurich); Ahmad-Reza Sadeghi (Technische Universität Darmstadt)

Detecting organized eCommerce fraud using scalable categorical clustering

Samuel Marchal and Sebastian Szyller (Aalto University)

Co-Evaluation of Pattern Matching Algorithms on IoT Devices with Embedded GPUs

Charalampos Stylianopoulos, Simon Kindstrom, and Magnus Almgren (Chalmers University of Technology); Olaf Landsiedel (University of Kiel); Marina Papatriantafilou (Chalmers University of Technology)

How to Kill Symbolic Deobfuscation for Free (or: Unleashing the Potential of Path-Oriented Protections)

Bonichon (CEA LIST); Sébastien Bardin (CEA, LIST, France); Jean-Yves Marion (LORIA, Université de Lorraine, CNRS, Inria); Mathilde Ollivier (CEA LIST)

JStap: A Static Pre-Filter for Malicious JavaScript Detection

Aurore Fass, Michael Backes, and Ben Stock (CISPA Helmholtz Center for Information Security)

Detecting (Absent) App-to-app Authentication on Cross-device Short-distance Channels

Stefano Cristalli (University of Milan); Long Lu (Northeastern University); Danilo Bruschi and Andrea Lanzi (University of Milan)

Mitigating Data Leakage by Protecting Memory-resident Sensitive Data

Tapti Palit (Stony Brook University); Fabian Monrose (University of North Carolina-Chapel Hill); Michalis Polychronakis (Stony Brook University)

Robust Keystroke Transcription from the Acoustic Side-Channel

David Slater, Scott Novotney, Jessica Moore, Sean Morgan, and Scott Tenaglia (Two Six Labs, LLC)

Casino Royale: A Deep Exploration of Illegal Online Gambling

Hao Yang and Kun Du (Tsinghua University); Yubao Zhang (University of Delaware); Shuang Hao (University of Texas at Dallas); Zhou Li (UC Irvine); Mingxuan Liu (Tsinghua University); Haining Wang (University of Delaware); Haixin Duan (Tsinghua University, Beijing National Research Center for information Science and Technology); Yazhou Shi, Xiaodong Su, and Guang Liu (Baidu Inc); Zhifeng Geng (Baidu Inc.)

Progressive Processing of System Behavioral Query

Jiaping Gui (NEC Laboratories America, Inc.); Xusheng Xiao (Case Western Reserve University); Ding Li, Chung Hwan Kim, and Haifeng Chen (NEC Laboratories America, Inc.)

Leveraging Locality of Reference for Certificate Revocation

Luke Dickinson, Trevor Smith, and Kent Seamons (Brigham Young University)

Sleak: Automating Address Space Layout Derandomization

Christophe Hauser (Information Sciences Institute, University of Southern California); Jayakrishna Menon, Yan Shoshitaishvili, and Fish Wang (Arizona State University); Christophe Kruegel (University of California, Santa Barbara); Giovanni Vigna (UC Santa Barbara)

CUBISMO: Decloaking Server-side Malware via Cubist Program Analysis

Abbas Naderi-Afooshteh, Yonghwi Kwon, Anh Nguyen-Tuong, Jack W. Davidson, and Mandana Bagheri-Marzijarani (University of Virginia)

Improving Intrusion Detectors by Crook-sourcing

Frederico Araujo (IBM Research); Gbadebo Ayoade (University of Texas Dallas); Khaled Al-Naami, Yang Gao, and Latifur Khan (The University of Texas at Dallas); Kevin Hamlen (University of Texas at Dallas)

Debloating Binary Software with Nibbler

Ioannis Agadakos (SRI International); Di Jin (Brown University); David Williams-King (Columbia University); Vasileios P. Kemerlis (Brown University); Georgios Portokalidis (Stevens Institute of Technology)

Model Inversion Attacks Against Collaborative Inference

Zecheng He (Princeton University); Tianwei Zhang (Nanyang Technological University); Ruby Lee (Princeton University)

Function Boundary Detection in Stripped Binaries

Jim Alves-Foss and Jia Song (University of Idaho)

SRFuzzer: An Automatic Fuzzing Framework for Physical SOHO Router Devices to Discover Multi-Type Vulnerabilities

Yu Zhang, Wei Huo, Kunpeng Jian, Ji Shi, Haoliang Lu, Longquan Liu, Chen Wang, and Dandan Sun (Institute of Information Engineering, Chinese Academy of Sciences; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences); Chao Zhang (Institute for Network Sciences and Cyberspace of Tsinghua University); Baoxu Liu (Institute of Information Engineering, Chinese Academy of Sciences; Key Laboratory of Network Assessment Technology, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences)

Proof of Aliveness

Chenglu Jin (University of Connecticut); Zheng Yang (Singapore University of Technology and Design); Marten van Dijk (University of Connecticut); Jianying Zhou (Singapore University of Technology and Design)

An Empirical Study of the SMS One-Time Password Authentication in Android Apps

Siqi Ma (CSIRO); Runhan Feng and Juanru Li (Shanghai Jiao Tong University); Surya Nepal (Data61, CSIRO); Diethelm Ostry (CSIRO); Yang Liu (Xidian University); Elisa Bertino (Purdue University); Robert H. Deng (School of Information Systems, Singapore Management University, Singapore); Sanjay Jha (UNSW Sydney); Zhuo Ma (Xidian University)

Revisiting Utility Metrics for Location Privacy-Preserving Mechanisms

Virat Shejwalkar, Amir Houmansadr, Hossein Pishro-Nik, and Dennis Goeckel (University of Massachusetts Amherst)

Defeating Hidden Audio Channel Attacks on Voice Assistants via Audio-Induced Surface Vibrations

Chen Wang (WINLAB, Rutgers University); S Abhishek Anand (University of Alabama at Birmingham); Jian Liu (WINLAB, Rutgers University); Payton R. Walker (University of Alabama at Birmingham); Yingying (Jennifer) Chen (WINLAB, Rutgers University); Nitesh Saxena (University of Alabama at Birmingham)

D2NN: A Fine-Grained Dual Modular Redundancy Framework for Deep Neural Networks

Yu Li (The Chinese University of Hong Kong); Yannan Liu (Sangfor Technologies Inc.); Min Li, Ye Tian, Bo Luo, and Qiang Xu (The Chinese University of Hong Kong)

I Know What You Did Last Login: Inconsistent Messages Tell Existence of a Target's Account to Insiders

Ayako Akiyama Hasegawa, Takuya Watanabe, Eitaro Shioji, and Mitsuaki Akiyama (NTT Secure Platform Laboratories)

Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones

Imtiaz Karim, Fabrizio Cicala, and Syed Rafiul Hussain (Purdue University); Omar Chowdhury (The University of Iowa); Elisa Bertino (Purdue University)

SIMPLE: Single-Frame based Physical Layer Identification for Intrusion Detection and Prevention on In-Vehicle Networks

Mahsa Foruhandeh (Virginia Tech); Yanmao Man (University of Arizona); Ryan Gerdes (Virginia Tech); Ming Li (University of Arizona); Thidapat Chantam (Virginia Tech)

Neurlux: Dynamic Malware Analysis Without Feature Engineering

Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, and Giovanni Vigna (UC Santa Barbara)

Premadoma: An Operational Solution for DNS Registries to Prevent Malicious Domain Registrations

Jan Spooren and Thomas Vissers (imec - DistriNet, KU Leuven, Belgium); Peter Janssen (EURid VZW, Belgium); Wouter Joosen and Lieven Desmet (imec - DistriNet, KU Leuven, Belgium)

Speculator: A Tool to Analyze Speculative Execution Attacks and Mitigations

Andrea Mambretti (Northeastern University); Matthias Neugschwandtner and Alessandro Sorniotti (IBM Research - Zurich); Engin Kirda and William Robertson (Northeastern University); Anil Kurmus (IBM Research - Zurich)

Challenge-Response Behavioral Mobile Authentication: A Comparative Study of Graphical Patterns and Cognitive Games

Manar Mohamed, Prakash Shrestha, and Nitesh Saxena (University of Alabama at Birmingham)

AppVeto: Mobile Application Self-Defense through Resource Access Veto

Tousif Osman and Mohammad Mannan (Concordia University); Urs Hengartner (Waterloo University); Amr Youssef (Concordia University)

Aegis: A Context-aware Security Framework for Smart Home Systems

Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac (Florida International University)

HDMI-WALK: Attacking HDMI Distribution Networks via Consumer Electronic Control Protocol

Luis C Puche Rondon, Leonardo Babun, Kemal Akkaya, and Selcuk Uluagac (Florida International University)

Privacy Preserving Substring Search Protocol with Polylogarithmic Communication Cost

Nicholas Mainardi, Alessandro Barenghi, and Gerardo Pelosi (Politecnico di Milano)

Coordinated Dataflow Protection for Ultra-High Bandwidth Science Networks

Vasudevan Nagendra (Stony Brook University); Vinod Yegneswaran and Phil Porras (SRI International); Samir Das (Stony Brook University)

A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs

Ziya Alper (Genc); Gabriele Lenzini (University of Luxembourg); Daniele Sgandurra (Royal Holloway, University of London)

SecDATAVIEW: A Secure Big Data Workflow Management System for Heterogeneous Computing Environments

Saeid Mofrad, Ishtiaq Ahmed, and Shiyong Lu (Wayne State University); Ping Yang (State University of New York at Binghamton); Heming Cui (University of Hong Kong); Fengwei Zhang (Wayne State University)

FuzzBuilder : Automated building greybox fuzzing environment for C/C++ library

Joonun Jang (Samsung Research, Samsung Electronics); Huy Kang Kim (Korea University)

Out of Control: Stealthy Attacks Against Robotic Vehicles Protected by Control-based Techniques

Pritam Dash, Mehdi Karimibiuki, and Karthik Pattabiraman (University of British Columbia)

SIP Shaker: Software Integrity Protection Composition

Mohsen Ahmadvand, Dennis Fischer, and Sebastian Banescu (Technical University of Munich)

My Script Engines Know What You Did in The Dark: Enhancing Engines into Script API Tracer

Toshinori Usui (NTT Secure Platform Laboratories / Institute of Industrial Science, The University of Tokyo); Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, and Jun Miyoshi (NTT Secure Platform Laboratories); Kanta Matsuura (Institute of Industrial Science, The University of Tokyo)

会议主页https://www.acsac.org/2019/program/

关于安全学术圈, 有兴趣加入学术圈的请联系[email protected]


文章来源: http://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247484543&idx=1&sn=4b2e5734ad12f1a73dd0dd9ae6c17a2a&chksm=fe2efbf4c95972e2faf91745888bc729c5d15427d6ad09e9860686b3ac7e8451bf65ac3e1664#rd
如有侵权请联系:admin#unsafe.sh