AsiaCCS 作为目前亚洲地区顶级的安全会议,吸引了全球学者的关注和参与,2020年共收到 308篇论文(2019:258;2018:310),录用了 67篇论文(2019:58; 2018:62),录用率为21.75%(2019:22.48%; 2018:20%)。小编将一些跟自己相关的论文标记出来供大家查阅,所有录用论文标题如下:
• NativeX: Native Executioner Freezes Android
Qinsheng Hou (QI-ANXIN Technology Research Institute & Legendsec Information Technology (Beijing) Inc.); Yao Cheng (Huawei International); Lingyun Ying (QI-ANXIN Technology Research Institute & University of Chinese Academy of Sciences)
• To Get Lost is to Learn the Way: Automatically Collecting Multi-step Social Engineering Attacks on the Web
Takashi Koide, Daiki Chiba, and Mitsuaki Akiyama (NTT Secure Platform Laboratories)
• Adversarial Attack against Deep Reinforcement Learning with Static Reward Impact Map
Patrick P. K. Chan, Yaxuan Wang, and Daniel S. Yeung (South China University of Technology)
• Measuring the Impact of the GDPR on Data Sharing in Ad Networks
Tobias Urban (Insitute for Internet Security; Westphalian University of Applied Sciences); Dennis Tatang, Martin Degeling, and Thorsten Holz (Ruhr University Bochum; Horst Görtz Institute for IT Security); Norbert Pohlmann (Insitute for Internet Security; Westphalian University of Applied Sciences)
• LiS: Lightweight Signature Schemes for Continuous Message Authentication in Cyber-Physical Systems
Zheng Yang (Singapore University of Technology and Design); Chenglu Jin (University of Connecticut); Yangguang Tian (Singapore Management University); Junyu Lai (University of Electronic Science and Technology of China); Jianying Zhou (Singapore University of Technology and Design)
• CORSICA: Cross-Origin Web Service Identification
Christian Dresen, Fabian Ising, Damian Poddebniak, and Tobias Kappert (Münster University of Applied Sciences); Thorsten Holz (Ruhr-University Bochum); Sebastian Schinzel (Münster University of Applied Sciences) Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme Stephan Wesemeyer (University of Surrey); Helen Treharne (Surrey Centre for Cyber Security, University of Surrey, UK); Liqun Chen and Christopher Newton (University of Surrey); Ralf Sasse (ETH Zurich); Jorden Whitefield (Ericsson)
• Revisiting Shared Data Protection Against Key Exposure
Gerard Memmi, Katarzyna Kapusta, and Matthieu Rambaud (Telecom Paris - LTCI - IPP) Fail-safe Watchtowers and Short-lived Assertions for Payment Channels Bowen Liu and Pawel Szalachowski (Singapore University of Technology and Design, Singapore); Siwei Sun (Institute of Information Engineering, Chinese Academy of Sciences)
• Inspecting TLS Anytime Anywhere: A New Approach to TLS Interception
Joonsang Baek, Jongkil Kim, and Willy Susilo (University of Wollongong)
• Hunting Sybils in Participatory Mobile Consensus-Based Networks
Nickolai Verchok and Alex Orailoglu (University of California, San Diego)
• DISKSHIELD: A Data Tamper-Resistant Storage for Intel SGX
Jinwoo Ahn (Sogang University); Junghee Lee (Korea University); Yungwoo Ko, Donghyun Min, Jiyun Park, Sungyong Park, and Youngjae Kim (Sogang University)
• Assessing the Impact of Script Gadgets on CSP at Scale
Sebastian Roth, Michael Backes, and Ben Stock (CISPA Helmholtz Center for Information Security) BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior Bushra Alahmadi (University of Oxford); Enrico Mariconti (University College London); Riccardo Spolaor (University of Oxford); Gianluca Stringhini (Boston University); Ivan Martinovic (University of Oxford)
• Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation
Ankush Singla and Elisa Bertino (Purdue University); Dinesh Verma (IBM Research)
• Investigating MMM Ponzi scheme on Bitcoin
Yazan Boshmaf (Qatar Computing Research Institute, HBKU); Charitha Elvitigala (University of Colombo); Husam Al Jawaheri (University of Luxembourg); Primal Wijesekera (University of California, Berkeley); Mashael Al Sabah (Qatar Computing Research Institute, HBKU)
• Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems
Guowen Xu and Hongwei Li (University of Electronic Science and Technology of China); Shengmin Xu (Secure Mobile Center, Singapore Management University); Hao Ren (University of Electronic Science and Technology of China); Yinghui Zhang (Singapore Management University); Jianfei Sun (University of Electronic Science and Technology of China); Robert H. Deng (School of Information Systems, Singapore Management University, Singapore)
• Cybersecurity Event Detection with New and Re-emerging Words
Hyejin Shin, Woochul Shim, Jiin Moon, Jaewoo Seo, Sol Lee, and Yong Ho Hwang (Samsung Research) Creating Character-based Templates for Log Data to Enable Security Event Classification Markus Wurzenberger, Georg Höld, Max Landauer, and Florian Skopik (AIT Austrian Institute of Technology GmbH); Wolfgang Kastner (Vienna University of Technology)
• The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things
Manuel Huber, Stefan Hristozov, Simon Ott, and Vasil Sarafov (Fraunhofer AISEC); Marcus Peinado (Microsoft Research)
• Privacy-Preserving OpenID Connect
Sven Hammann, Ralf Sasse, and David Basin (ETH Zurich)
• Post-Quantum TLS on Embedded Systems - Integrating and Evaluating Kyber and SPHINCS + with mbed TLS
Kevin Bürstinghaus-Steinbach (SEW-EURODRIVE); Christoph Krau枘 and Ruben Niederhagen (Fraunhofer SIT); Michael Schneider (unaffiliated)
• AuthCTC: Defending Against Waveform Emulation Attack in Heterogeneous IoT Environments
Sihan Yu, Xiaonan Zhang, Pei Huang, Linke Guo, Long Cheng, and Kuangching Wang (Clemson University)
• DeepPower: Non-intrusive Detection of IoT Malware using Power Side Channels
Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao, and Rong Ge (Clemson University)
• Assessing the Privacy Benefits of Domain Name Encryption
Nguyen Phong Hoang (Stony Brook University); Arian Akhavan Niaki (University of Massachusetts Amherst); Nikita Borisov (UIUC); Phillipa Gill (University of Massachusetts Amherst); Michalis Polychronakis (Stony Brook University)
• Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
Roman Matzutt, Jan Pennekamp, Erik Buchholz, and Klaus Wehrle (Communication and Distributed Systems, RWTH Aachen University)
• I came, I saw, I hacked: Automated Generation of Process-independent Attacks for Industrial Control Systems
Esha Sarkar (Tandon School of Engineering, New York University); Hadjer Benkraouda and Michail Maniatakos (Center for Cybersecurity, New York University Abu Dhabi)
• Membership Encoding for Deep Learning
Congzheng Song (Cornell); Reza Shokri (National University of Singapore (NUS))
• Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic
Shuaike Dong (The Chinese University of Hong Kong); Zhou Li (University of California, Irvine); Di Tang (The Chinese University of Hong Kong); Jiongyi Chen (National University of Defense Technology); Menghan Sun and Kehuan Zhang (The Chinese University of Hong Kong)
• SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
Tianyu Du, Shouling Ji, and Jinfeng Li (Zhejiang University); Qinchen Gu (Georgia Institute of Technology); Ting Wang (Pennsylvania State University); Raheem Beyah (Georgia Institute of Techn
历年利用列表
安全学术圈招募队友-ing, 有兴趣加入学术圈的请联系secdr#qq.com
本文来源于互联网:AsiaCCS 2020 论文录用列表
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论