AsiaCCS 2020 论文录用列表

admin 2020年6月30日16:36:52评论1,050 views字数 6570阅读21分54秒阅读模式

AsiaCCS 2020 论文录用列表

AsiaCCS 作为目前亚洲地区顶级的安全会议,吸引了全球学者的关注和参与,2020年共收到 308篇论文(2019:258;2018:310),录用了 67篇论文(2019:58; 2018:62),录用率为21.75%(2019:22.48%; 2018:20%)。小编将一些跟自己相关的论文标记出来供大家查阅,所有录用论文标题如下:

•  NativeX: Native Executioner Freezes Android

Qinsheng Hou (QI-ANXIN Technology Research Institute & Legendsec Information Technology (Beijing) Inc.); Yao Cheng (Huawei International); Lingyun Ying (QI-ANXIN Technology Research Institute & University of Chinese Academy of Sciences)

•  To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web

Takashi Koide, Daiki Chiba, and Mitsuaki Akiyama (NTT Secure Platform Laboratories)

•  Adversarial Attack against Deep Reinforcement Learning with Static Reward Impact Map

Patrick P. K. Chan, Yaxuan Wang, and Daniel S. Yeung (South China University of Technology)

•  Measuring the Impact of the GDPR on Data Sharing in Ad Networks

Tobias Urban (Insitute for Internet Security; Westphalian University of Applied Sciences); Dennis Tatang, Martin Degeling, and Thorsten Holz (Ruhr University Bochum; Horst Görtz Institute for IT Security); Norbert Pohlmann (Insitute for Internet Security; Westphalian University of Applied Sciences)

•  LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems

Zheng Yang (Singapore University of Technology and Design); Chenglu Jin (University of Connecticut); Yangguang Tian (Singapore Management University); Junyu Lai (University of Electronic Science and Technology of China); Jianying Zhou (Singapore University of Technology and Design)

•   CORSICA: Cross-Origin Web Service Identification

Christian Dresen, Fabian Ising, Damian Poddebniak, and Tobias Kappert (Münster University of Applied Sciences); Thorsten Holz (Ruhr-University Bochum); Sebastian Schinzel (Münster University of Applied Sciences) Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme Stephan Wesemeyer (University of Surrey); Helen Treharne (Surrey Centre for Cyber Security, University of Surrey, UK); Liqun Chen and Christopher Newton (University of Surrey); Ralf Sasse (ETH Zurich); Jorden Whitefield (Ericsson)

•   Revisiting Shared Data Protection Against Key Exposure

Gerard Memmi, Katarzyna Kapusta, and Matthieu Rambaud (Telecom Paris - LTCI - IPP) Fail-safe Watchtowers and Short-lived Assertions for Payment Channels Bowen Liu and Pawel Szalachowski (Singapore University of Technology and Design, Singapore); Siwei Sun (Institute of Information Engineering, Chinese Academy of Sciences)

•  Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception

Joonsang Baek, Jongkil Kim, and Willy Susilo (University of Wollongong)

•  Hunting Sybils in Participatory Mobile Consensus-Based Networks

Nickolai Verchok and Alex Orailoglu (University of California, San Diego)

•  DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX

Jinwoo Ahn (Sogang University); Junghee Lee (Korea University); Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, and Youngjae Kim (Sogang University)

•   Assessing the Impact of Script Gadgets on CSP at Scale

Sebastian Roth, Michael Backes, and Ben Stock (CISPA Helmholtz Center for Information Security) BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior Bushra Alahmadi (University of Oxford); Enrico Mariconti (University College London); Riccardo Spolaor (University of Oxford); Gianluca Stringhini (Boston University); Ivan Martinovic (University of Oxford)

•   Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation

Ankush Singla and Elisa Bertino (Purdue University); Dinesh Verma (IBM Research)

•  Investigating MMM Ponzi scheme on Bitcoin

Yazan Boshmaf (Qatar Computing Research Institute, HBKU); Charitha Elvitigala (University of Colombo); Husam Al Jawaheri (University of Luxembourg); Primal Wijesekera (University of California, Berkeley); Mashael Al Sabah (Qatar Computing Research Institute, HBKU)

•  Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems

Guowen Xu and Hongwei Li (University of Electronic Science and Technology of China); Shengmin Xu (Secure Mobile Center, Singapore Management University); Hao Ren (University of Electronic Science and Technology of China); Yinghui Zhang (Singapore Management University); Jianfei Sun (University of Electronic Science and Technology of China); Robert H. Deng (School of Information Systems, Singapore Management University, Singapore)

•   Cybersecurity Event Detection with New and Re-emerging Words

Hyejin Shin, Woochul Shim, Jiin Moon, Jaewoo Seo, Sol Lee, and Yong Ho Hwang (Samsung Research) Creating Character-based Templates for Log Data to Enable Security Event Classification Markus Wurzenberger, Georg Höld, Max Landauer, and Florian Skopik (AIT Austrian Institute of Technology GmbH); Wolfgang Kastner (Vienna University of Technology)

•   The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things

Manuel Huber, Stefan Hristozov, Simon Ott, and Vasil Sarafov (Fraunhofer AISEC); Marcus Peinado (Microsoft Research)

•  Privacy-Preserving OpenID Connect

Sven Hammann, Ralf Sasse, and David Basin (ETH Zurich)

•  Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS + with mbed TLS

Kevin Bürstinghaus-Steinbach (SEW-EURODRIVE); Christoph Krau枘 and Ruben Niederhagen (Fraunhofer SIT); Michael Schneider (unaffiliated)

•  AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments

Sihan Yu, Xiaonan Zhang, Pei Huang, Linke Guo, Long Cheng, and Kuangching Wang (Clemson University)

•  DeepPower: Non-intrusive Detection of IoT Malware using Power Side Channels

Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao, and Rong Ge (Clemson University)

•  Assessing the Privacy Benefits of Domain Name Encryption

Nguyen Phong Hoang (Stony Brook University); Arian Akhavan Niaki (University of Massachusetts Amherst); Nikita Borisov (UIUC); Phillipa Gill (University of Massachusetts Amherst); Michalis Polychronakis (Stony Brook University)

•  Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services

Roman Matzutt, Jan Pennekamp, Erik Buchholz, and Klaus Wehrle (Communication and Distributed Systems, RWTH Aachen University)

•  I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems

Esha Sarkar (Tandon School of Engineering, New York University); Hadjer Benkraouda and Michail Maniatakos (Center for Cybersecurity, New York University Abu Dhabi)

•  Membership Encoding for Deep Learning

Congzheng Song (Cornell); Reza Shokri (National University of Singapore (NUS))

•  Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic

Shuaike Dong (The Chinese University of Hong Kong); Zhou Li (University of California, Irvine); Di Tang (The Chinese University of Hong Kong); Jiongyi Chen (National University of Defense Technology); Menghan Sun and Kehuan Zhang (The Chinese University of Hong Kong)

•  SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems

Tianyu Du, Shouling Ji, and Jinfeng Li (Zhejiang University); Qinchen Gu (Georgia Institute of Technology); Ting Wang (Pennsylvania State University); Raheem Beyah (Georgia Institute of Techn

历年利用列表

会议主页 
https://asiaccs2020.cs.nthu.edu.tw/
安全学术圈招募队友-ing, 有兴趣加入学术圈的请联系secdr#qq.com

AsiaCCS 2020 论文录用列表

本文来源于互联网:AsiaCCS 2020 论文录用列表

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2020年6月30日16:36:52
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   AsiaCCS 2020 论文录用列表http://cn-sec.com/archives/78206.html

发表评论

匿名网友 填写信息