AsiaCCS 2024 论文录用列表
2024-7-3 15:57:10 Author: mp.weixin.qq.com(查看原文) 阅读量:1 收藏

AsiaCCS 作为目前亚洲地区顶级的安全会议,吸引了全球学者的关注和参与,2024年共收到 588 篇论文(2021:362; 2020:308; 2019:258;2018:310),录用了 129 篇论文(2021:70; 2020:67; 2019:58; 2018:62),录用率为 21.94% (2021:19.34%; 2020:21.75%; 2019:22.48%; 2018:20%)。国内高校入围众多,南京邮电大学、南开大学、华为欧洲研究中心、香港大学、上海复旦微电子集团、中科院信工所、翼支付、北京邮电大学、南方科技大学等。小编将一些跟自己相关的论文标记出来供大家查阅,所有录用论文标题如下,所有论文全文均可以通过底部的(原文链接)直接下载:

Session 1: Network Security

  • Towards Robust Domain Generation Algorithm Classification

Arthur Drichel, Marc Meyer, Ulrike Meyer (RWTH Aachen University)

  • Kirin: Hitting the Internet with Distributed BGP Announcements

Lars Prehn (Max Planck Institute for Informatics); Pawel Foremski (IITiS PAN / DomainTools); Oliver Gasser (IPinfo / Max Planck Institute for Informatics)

  • X-Ray-TLS: Transparent Decryption of TLS Sessions by Extracting Session Keys from Memory

Florent Moriconi (EURECOM, Amadeus); Olivier Levillain (Samovar, Télécom SudParis, Institut Polytechnique de Paris); Aurélien Francillon, Raphael Troncy (EURECOM)

  • Semantic Ranking for Automated Adversarial Technique Annotation in Security Text

Udesh Kumarasinghe (University of Colombo); Ahmed Lekssays, Husrev Taha Sencar, Sabri Boughorbel (Qatar Computing Research Institute); Charitha Elvitigala (C2SI); Preslav Nakov (MBZUAI)

  • Exposed by Default: A Security Analysis of Home Router Default Settings

Junjian Ye (Nanjing University of Posts and Telecommunications); Xavier de Carné de Carnavalet (The Hong Kong Polytechnic University); Lianying Zhao (Carleton University); Mengyuan Zhang (Vrije Universiteit Amsterdam); Lifa Wu, Wei Zhang (Nanjing University of Posts and Telecommunications)

  • Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION

Sebastian Zillien (Worms University of Applied Sciences); Tobias Schmidbauer (Nuremberg Institute of Technology); Mario Kubek (Georgia State University); Joerg Keller (FernUniversität in Hagen); Steffen Wendzel (Worms University of Applied Sciences/FernUniversität in Hagen)

  • Decoding the MITRE Engenuity ATT&CK Enterprise Evaluation: An Analysis of EDR Performance in Real-World Environments

Xiangmin Shen (Northwestern University); Zhenyuan Li (Zhejiang University); Graham Burleigh, Lingzhi Wang, Yan Chen (Northwestern University)

  • C2Miner: Tricking IoT Malware into Revealing Live Command & Control Servers

Ali Davanian, Michail Faloutsos (University of California Riverside); Martina Lindorfer (TU Wien)

Session 2: Side Channels

  • Generic and Automated Drive-by GPU Cache Attacks from the Browser

Lukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler (Graz University of Technology); Daniel De Almeida Braga (University of Rennes, CNRS, IRISA); Daniel Gruss (Graz University of Technology)

  • Cloud-Based Machine Learning Models as Covert Communication Channels

Torsten Krauß, Jasper Stang, Alexandra Dmitrienko (University of Würzburg)

  • WebGPU-SPY: Finding Fingerprints in the Sandbox through GPU Cache Attacks

Ethan Ferguson, Adam Wilson, Hoda Naghibijouybari (Binghamton University)

  • SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?

William Kosasih (University of Adelaide); Yusi Feng (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences); Chitchanok Chuengsatiansup (The University of Melbourne); Yuval Yarom (Ruhr University Bochum); Ziyuan Zhu (Institute of Information Engineering, Chinese Academy of Sciences)

  • Non-Fusion Based Coherent Cache Randomization Using Cross-Domain Accesses

Kartik Ramkrishnan (University Of Minnesota); Stephen McCamant, Antonia Zhai (University of Minnesota); Pen Chung Yew (University of Minnesota at Twin Cities)

  • Beyond Over-Protection: A Targeted Approach to Spectre Mitigation and Performance Optimization

Tiziano Marinaro (CISPA Helmholtz Center for Information Security and Saarland University); Pablo Buiras, Andreas Lindner, Roberto Guanciale, Hamed Nemati (KTH Royal Institute of Technology)

  • Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8

Markus Bauer, Lorenz Hetterich, Michael Schwarz, Christian Rossow (CISPA Helmholtz Center for Information Security)

  • ABBY: Automating leakage modelling for side-channel analysis

Omid Bazangani, Alexandre Iooss, Ileana Buhan, Lejla Batina (Radboud University)

Session 3: Privacy-Preserving Protocols

  • Privacy-Preserving Popularity-Based Deduplication against Malicious Behaviors of the Cloud

Xiaowei Ge, Guanxiong Ha (College of Cyber Science, Nankai University); Chunfu Jia (Nankai University); Zhen Su (College of Cyber Science, Nankai University)

  • Nomadic: Normalising Maliciously-Secure Distance with Cosine Similarity for Two-Party Biometric Authentication

Nan Cheng (University of St. Gallen); Melek Önen (EURECOM); Aikaterini Mitrokotsa (University of St. Gallen); Oubaïda Chouchane, Massimiliano Todisco (EURECOM); Alberto Ibarrondo (Copper.co)

  • SiGBDT: Large-Scale Gradient Boosting Decision Tree Training via Function Secret Sharing

Yufan Jiang, Fei Mei, Tianxiang Dai, Yong Li (Huawei European Research Center)

  • zkMatrix: Batched Short Proof for Committed Matrix Multiplication

Mingshu Cong (The University of Hong Kong); Tsz Hon Yuen (Monash University); Siu-Ming Yiu (The University of Hong Kong)

  • Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem

Malte Breuer, Ulrike Meyer (RWTH Aachen University); Susanne Wetzel (Stevens Institute of Technology)

  • Honest Majority Multiparty Computation over Rings with Constant Online Communication

Minghua Zhao (Shanghai Fudan Microelectronics Group Company Limited)

  • Ratel: MPC-extensions for Smart Contracts

Yunqi Li, Kyle Soska (University of Illinois at Urbana-Champaign); Zhen Huang (Shanghai Jiao Tong University); Sylvain Bellemare (The Initiative for CryptoCurrencies and Contracts); Mikerah Quintyne-Collins (HashCloack Inc.); Lun Wang (Google); Xiaoyuan Liu, Dawn Song (University of California, Berkeley); Andrew Miller (University of Illinois at Urbana-Champaign)

Session 4: Wireless and Mobile Security

  • Physical-Layer Public Key Encryption Through Massive MIMO

Senlin Liu, Tong Gao, Yijian Liu, Xianhui Lu (Institute of Information Engineering, CAS, University of Chinese Academy of Sciences)

  • Battle of Wits: To What Extent Can Fraudsters Disguise Their Tracks in International bypass Fraud?

Anne Josiane Kouam (TU Berlin); Aline Carneiro Viana (INRIA); Alain Tchana (Grenoble INP)

  • Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware

Antonio Ruggia (University of Genova); Dario Nisi, Savino Dambra (EURECOM); Alessio Merlo (CASD – School for Advanced Defense Studies); Davide Balzarotti, Simone Aonzo (EURECOM)

  • TriSAS: Toward Dependable Inter-SAS Coordination with Auditability

Shanghao Shi (Virginia Tech); Yang Xiao (University of Kentucky); Changlai Du, Yi Shi (Virginia Tech); Chonggang Wang, Robert Gazda (InterDigital); Y. Thomas Hou, Eric Burger, Luiz DaSilva, Wenjing Lou (Virginia Tech)

  • Key Establishment for Secure Asymmetric Cross-Technology Communication

Wei Wang (Saint Louis University); Xin Liu (The Ohio State University); Zicheng Chi (Cleveland State University); Stuart Ray (Saint Louis University); Ting Zhu (The Ohio State University)

Session 5: Hardware Security

  • Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs

Florian Frank, Martin Schmid, Felix Klement (University of Passau); Purushothaman Palani (Virginia Tech); Andreas Weber, Elif Bilge Kavun (University of Passau); Wenjie Xiong (Virginia Tech); Tolga Arul, Stefan Katzenbeisser (University of Passau)

  • SoK: Rowhammer on Commodity Operating Systems

Zhi Zhang (The University of Western Australia); Decheng Chen, Jiahao Qi (School of Microelectronics, South China University of Technology, China); Yueqiang Cheng (NIO); Shijie Jiang, Yiyang Lin (School of Microelectronics, South China University of Technology, China); Yansong Gao, Surya Nepal (CSIRO’s Data61); Yi Zou (School of Microelectronics, South China University of Technology, China); Jiliang Zhang (College of Integrated Circuits, Hunan University, China); Yang Xiang (School of Software and Electrical Engineering, Swinburne University of Technology, Australia)

  • SRAM Imprinting for System Protection and Differentiation

Jubayer Mahmod, Matthew Hicks (Virginia Tech)

  • Mayhem: Targeted Corruption of Register and Stack Variables

Andrew Adiletta, M. Caner Tol, Yarkın Doröz, Berk Sunar (Worcester Polytechnic Institute)

  • On The Effect of Replacement Policies on The Security of Randomized Cache Architectures

Moritz Peters (Horst Görtz Institute for IT-Security, Ruhr University Bochum); Nicolas Gaudin (UMR 6285, Lab-STICC, Univ. Bretagne-Sud, Lorient, France); Jan Philipp Thoma (Horst Görtz Institute for IT-Security, Ruhr University Bochum); Vianney Lapôtre (UMR 6285, Lab-STICC, Univ. Bretagne-Sud, Lorient, France); Pascal Cotret (UMR 6285, Lab-STICC, ENSTA Bretagne, Brest, France); Guy Gogniat (UMR 6285, Lab-STICC, Univ. Bretagne-Sud, Lorient, France); Tim Güneysu (Ruhr University Bochum, Bochum, DFKI GmbH, Bremen)

  • PowSpectre: Powering Up Speculation Attacks with TSX-based Replay

Md Hafizul Islam Chowdhuryy (University of Central Florida); Zhenkai Zhang (Clemson University); Fan Yao (University of Central Florida)

Session 6: Post Quantum

  • HQsFL: A Novel Training Strategy for Constructing High-performance and Quantum-safe Federated Learning

Bo Yu, Huajie Shen, Qian Xu, Wei He, Wankui Mao, Qing Zhang (Bestpay Co., Ltd.); Fan Zhang (Zhejiang University)

  • Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies

Poulami Das (CISPA Helmholtz Center for Information Security); Andreas Erwig (Technical University of Darmstadt); Michael Meyer (University of Regensburg); Patrick Struck (University of Konstanz)

  • REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography

Samuel Pagliarini (Carnegie Mellon University/Tallinn University of Technology); Aikata Aikata (Institute of Applied Information Processing and Communications, Graz University of Technology); Malik Imran (Tallinn University of Technology); Sujoy Sinha Roy (Institute of Applied Information Processing and Communications, Graz University of Technology)

  • Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond

Mingyao Shao (Institute of Information Engineering, CAS & School of Cyber Security, UCAS); Yuejun Liu (School of Cyber Science and Engineering, NJUST ); Yongbin Zhou (School of Cyber Science and Engineering, NJUST & Institute of Information Enginee, CAS & School of Cyber Security, UCAS)

  • SoK: CryptographicEstimators – a Software Library for Cryptographic Hardness Estimation

Andre Esser, Javier Verbel, Floyd Zweydinger, Emanuele Bellini (Technology Innovation Institute)

  • OPRFs from Isogenies: Designs and Analysis

Lena Heimberger, Tobias Hennerbichler (Graz University of Technology); Fredrik Meisingseth (Graz University of Technology and Know-Center); Sebastian Ramacher (AIT Austrian Institute of Technology); Christian Rechberger (Graz University of Technology)

Session 7: Measurements

  • External Attack-Surface of Modern Organizations

Nethanel Gelernter (IONIX ); Haya Schulmann (Goethe-Universität Frankfurt); Michael Waid- ner (Fraunhofer SIT and TU Darmstadt)

  • Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries

Jenny Blessing (University of Cambridge); Michael Specter (Georgia Institute of Technology); Daniel J. Weitzner (MIT )

  • Username Squatting on Online Social Networks: A Study on X

Anastasios Lepipas, Anastasia Borovykh, Soteris Demetriou (Imperial College London)

  • Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry

Rana Pourmohamad, Steven Wirsz, Adam Oest, Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Adam Doupé, Rida A. Bazzi (Arizona State University)

Session 8: IoT and Voice Assistants

  • Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform

Wenbo Ding (University at Buffalo); Song Liao, Long Cheng (Clemson University); Xianghang Mi (University of Science and Technology of China); Ziming Zhao, Hongxin Hu (University at Buffalo)

  • WhisperVoiceTrace: A Comprehensive Analysis of Voice Command Fingerprinting

Hyojin Kim, Minji Jo, Jiwoo Hong, Hosung Kang (Ewha Womans University); Nate Mathews (Rochester Institute of Technology); Se Eun Oh (Ewha Womans University)

  • SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms

Mehreen Jabbeen, Vireshwar Kumar (Indian Institute of Technology, Delhi); Rijurekha Sen (IIT Delhi)

  • OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers

Romain Cayre (EURECOM); Vincent Nicomette, Guillaume Auriol, Mohamed Kaâniche (LAAS-CNRS); Aurélien Francillon (EURECOM)

Session 9: Formal Methods

  • A Formal Analysis of Data Distribution Service Security

Binghan Wang, Hui Li, Jingjing Guan (Beijing University of Posts and Telecommunications, Beijing, China)

  • Formal Verification and Solutions for Estonian E-Voting

Sevdenur Baloglu, Sergiu Bursuc, Sjouke Mauw, Jun Pang (University of Luxembourg)

  • Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities

Luke Harrison, Samiran Bag, Feng Hao (University of Warwick)

  • Segment-Based Formal Verification of WiFi Fragmentation and Power Save Mode

Zilin Shen, Imtiaz Karim, Elisa Bertino (Purdue University)

Session 10: Web Security

  • FakeX: A Framework for Detecting Fake Reviews of Browser Extensions

Eric Olsson, Benjamin Eriksson (Chalmers University of Technology); Pablo Picazo-Sanchez (Chalmers University of Technology, Halmstad University); Lukas Andersson, Andrei Sabelfeld (Chalmers University of Technology)

  • What is in the Chrome Web Store

Sheryl Hsu, Manda Tran (Stanford University); Aurore Fass (Stanford University, CISPA Helmholtz Center for Information Security)

  • Sync-Millibottleneck Attack on Microservices Cloud Architecture

Xuhang Gu, Qingyang Wang (Louisiana State University); Qiben Yan (Michigan State University); Jianshu Liu (Louisiana State University); Calton Pu (Georgia Tech)

  • Towards Understanding and Improving Security-Relevant Web Application Logging

Merve Sahin, Noemi Daniele (SAP Security Research)

  • RootFree Attacks: Exploiting Mobile Platform’s Super Apps From Desktop

Chao Wang (The Ohio State University); Yue Zhang (Drexel University); Zhiqiang Lin (The Ohio State University)

  • Who’s Breaking the Rules? Studying Conformance to the HTTP Specifications and its Security Impact

Jannis Rautenstrauch, Ben Stock (CISPA Helmholtz Center for Information Security)

  • Beneath the Phishing Scripts: A Script-Level Analysis of Phishing Kits and Their Impact on Real-World Phishing Websites

Woonghee Lee, Junbeom Hur (Korea University); Doowon Kim (University of Tennessee, Knoxville)

  • BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary

Nozima Murodova, Hyungjoon Koo (Sungkyunkwan University)

Session 11: Cyber-Physical Systems

  • The SA4P Framework: Sensing and Actuation as a Privilege

Piet De Vaere (ETH Zürich); Felix Stöger, Adrian Perrig (ETH Zürich); Gene Tsudik (UCI )

  • ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial Vehicles

Muneeba Asif (Florida International University); Ahmad Mohammad (Middle Tennessee State University); Mohammad Ashiqur Rahman, Kemal Akkaya (Florida International University)

  • Catch me if you can: Covert Information Leakage from Drones using MAVLink Protocol

Maryna Veksler, Kemal Akkaya, Selcuk Uluagac (Florida International University)

  • Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception Attacks

Pritam Dash (University of British Columbia); Guanpeng Li (University of Iowa); Mehdi Karimibiuki, Karthik Pattabiraman (University of British Columbia)

  • FAKEPCD: Fake Point Cloud Detection via Source Attribution

Yiting Qu, Zhikun Zhang (CISPA Helmholtz Center for Information Security); Yun Shen (Netapp); Michael Backes, Yang Zhang (CISPA Helmholtz Center for Information Security)

  • On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers

Zhiang Li (National University of Singapore); Daisuke Mashima, Wen Shei Ong, Ertem Esiner (Illinois ARCS); Zbigniew Kalbarczyk (University of Illinois at Urbana-Champaign); Ee-Chien Chang (School of Computing, NUS)

  • Madtls: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication

Eric Wagner (Fraunhofer FKIE & RWTH Aachen University); David Heye (RWTH Aachen University & Fraunhofer FKIE); Martin Serror (Fraunhofer FKIE); Ike Kunze, Klaus Wehrle (RWTH Aachen University); Martin Henze (RWTH Aachen University & Fraunhofer FKIE)

  • Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System

Khaled Sarieddine, Mohammad Ali Sayed (Concordia University); Sadegh Torabi (George Mason University); Ribal Attallah, Danial Jafarigiv (Hydro-Quebec Research Institute); Chadi Assi (Concordia University); Mourad Debbabi (Security Research Centre, Concordia University, Quebec, Canada)

Session 12: Crypto and Privacy

  • Exploiting Data Redundancy in CKKS Encoding for High-Speed Homomorphic Encryption

Amir Sabbagh Molahosseini (Queen’s University Belfast); Hans Vandierendonck (Queen’s University of Belfast)

  • Efficient Unbalanced Quorum PSI from Homomorphic Encryption

Xinpeng Yang, Liang Cai, Yinghao Wang, Keting Yin, Lu Sun (Zhejiang University); Jingwei Hu (Nanyang Technological University)

  • SweetPAKE: Key exchange with decoy passwords

Afonso Arriaga (SnT, University of Luxembourg); Peter Y.A. Ryan (SnT, Univeristy of Luxembourg); Marjan Skrobot (SnT, University of Luxembourg)

  • MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep Learning

Yifei Cai (Old Dominion University); Qiao Zhang (Chongqing University); Rui Ning, Chunsheng Xin (Old Dominion University); Hongyi Wu (University of Arizona)

  • LightPIR: Single-Server PIR via FHE without Gaussian Noise

Han Xia, Mingsheng Wang (Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, CAS; School of Cyber Security, University of Chinese Academy of Sciences)

  • Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting

Kwan Yin Chan (The University of Hong Kong); Liqun Chen, Yangguang Tian (University of Surrey); Tsz Hon Yuen (Monash University)

  • Skye: An Expanding PRF based Fast KDF and its Applications

Amit Singh Bhati (COSIC, KU Leuven); Antonín Dufka (Masaryk University); Elena Andreeva (Technical University of Vienna); Arnab Roy (University of Innsbruck); Bart Preneel (COSIC, KU Leuven)

  • Publishing Common Neighbors Histograms of Social Networks under Edge Differential Privacy

Chaojie Lv (University of Science and Technology of China); Xiaokui Xiao (NUS); Lan Zhang (University of Science and Technology of China); Ting Yu (Qatar Computing Research Institute)

Session 13: Software Security

  • Cross-Language Differential Testing of JSON Parsers

Jonas Möller, Felix Weißberg, Lukas Pirch, Thorsten Eisenhofer, Konrad Rieck (Technische Universität Berlin)

  • VFCFinder: Pairing Security Advisories and Patches

Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves (North Carolina State University)

  • On the Role of Pre-trained Embeddings in Binary Code Analysis

Alwin Maier, Felix Weißberg, Konrad Rieck (TU Berlin)

  • ISLAB: Immutable Memory Management Metadata for Commodity Operating System Kernels

Marius Momeu, Fabian Kilger, Christopher Roemheld, Simon Schnückel (Technical University of Munich); Sergej Proskurin (BedRock Systems); Michalis Polychronakis (Stony Brook University); Vasileios P. Kemerlis (Brown University)

  • DMTI: Accelerating Memory Error Detection in Precompiled C/C++ Binaries with ARM Memory Tagging Extension

Andreas Hager-Clukas (University of Applied Sciences Munich); Konrad Hohentanner (Fraunhofer AISEC)

  • BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning

Xu He, Shu Wang (George Mason University); Pengbin Feng (Xidian University); Xinda Wang (The University of Texas at Dallas); Shiyu Sun (George Mason University); Qi Li (Tsinghua University); Kun Sun (George Mason University)

  • Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI

Lukas Maar, Pascal Nasahl, Stefan Mangard (Graz University of Technology, Graz)

Session 14: Machine Learning

  • Model Extraction Attacks Revisited

Jiacheng Liang (Stony Brook University); Ren Pang (Penn State University); Changjiang Li, Ting Wang (Stony Brook University)

  • A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference

Abhinav Kumar (Saint Louis University); Miguel A. Guirao Aguilera (New Mexico State University); Reza Tourani (Saint Louis University); Satyajayant Misra (New Mexico State University)

  • VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models

Thirasara Ariyarathna (University of New South Wales); Meisam Mohammady (Iowa State University of Science and Technology, Iowa, The USA); Hye-Young Paik, Salil S. Kanhere (University of New South Wales)

  • Self-Supervised Fine-Tuning of Automatic Speech Recognition Systems against Signal Processing Attacks

Oshan Jayawardena, Dilmi Caldera, Sandani Jayawardena, Avishka Sandeepa (University of Moratuwa); Vincent Bindschaedler (University of Florida); Subodha Charles (University of Moratuwa)

  • Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity

Kane Walter (UNSW, Sydney, Australia); Meisam Mohammady (Iowa State University of Science and Technology, Iowa, The USA); Surya Nepal (Data61, CSIRO); Salil S. Kanhere (UNSW, Sydney, Australia)

  • An Investigation into Misuse of Java Security APIs by Large Language Models

Zahra Mousavi (CREST – The Centre for Research on Engineering Software Technologies, University of Adelaide, Cyber Security Cooperative Research Centre, CSIRO/Data61, Australia); Chadni Islam (Queensland University of Technology); Kristen Moore, Alsharif Abuadbba (CSIRO’s Data61, Australia); M. Ali Babar (CREST – The Centre for Research on Engineering Software Technologies, University of Adelaide)

  • Multi-Turn Hidden Backdoor in Large Language Model-powered Chatbot Models

Bocheng Chen (Michigan State University); Nikolay Ivanov (Rowan University); Guangjing Wang, Qiben Yan (Michigan State University)

  • PARL: Poisoning Attacks Against Reinforcement Learning-based Recommender Systems

Linkang Du, Quan Yuan (Zhejiang University); Min Chen (CISPA Helmholtz Center for Information Security); Mingyang Sun, Peng Cheng, Jiming Chen, Zhikun Zhang (Zhejiang University)

Session 15: Distributed and Decentralized Systems

  • An Empirical Study of Consensus Protocols’ DoS Resilience

Giacomo Giuliari (ETH Zürich & Mysten Labs); Alberto Sonnino (Mysten Labs & University College London (UCL)); Marc Frei (ETH Zürich); Fabio Streun (Anapaya Systems); Lefteris Kokoris-Kogias (Mysten Labs & IST Austria); Adrian Perrig (ETH Zürich & Mysten Labs)

  • SilentProof: Anonymous Authentication with Blockchain-Backed Offloading

Jamal H. Mosakheil, Kan Yang (The University of Memphis)

  • Revocable TACO: Revocable Threshold based Anonymous Credentials over Blockchains

Kanchan Bisht, Neel Yogendra Kansagra, Reisha Ali, Mohammed Sayeed Shaik, Maria Francis, Kotaro Kataoka (IIT Hyderabad)

  • SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks

Sanidhay Arora, Yingjiu Li (University of Oregon); Yebo Feng (Nanyang Technological University); Jiahua Xu (UCL)

  • zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain

Jongho Kim, Junhee Lee, Hyunok Oh (Hanyang University); Jihye Kim (Kookmin University)

  • CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification

Xiang Zhou, Xi Xiao (Shenzhen International Graduate School, Tsinghua University, China); Qing Li (Peng Cheng Laboratory); Bin Zhang (Pengcheng Laboratory); Guangwu Hu (School of Computer Science, Shenzhen Institute of Information Technology,Shenzhen, China); Xiapu Luo (The Hong Kong Polytechnic University); Tianwei Zhang (Nanyang Technological University)

  • BlindShuffler: Universal and Trustless Mixing for Confidential Transactions

Chenke Wang, Zhonghui Ge, Yu Long (Shanghai Jiao Tong University); Xian Xu (East China University of Science and Technology); Shi-Feng Sun, Dawu Gu (Shanghai Jiao Tong University)

  • PEPPER: Privacy-prEserving, auditable, and fair Payment based resource discovery at the PERvasive edge

Emrah Sariboz (New Mexico State University); Reza Tourani (Saint Louis University); Roopa Vishwanathan, Satyajayant Misra (New Mexico State University)

Session 16: Fuzzing

  • Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler

Simon Luo (The University of New South Wales); Adrian Herrera (Australian National Univeristy); Paul Quirk, Michael Chase (DSTG); Damith C. Ranasinghe (University of Adelaide); Salil S Kanhere (The University of New South Wales)

  • SyzRisk: A Change-Pattern-Based Continuous Kernel Regression Fuzzer

Gwangmu Lee, Duo Xu (EPFL); Solmaz Salimi (Sharif University of Technology); Byoungyoung Lee (Seoul National University); Mathias Payer (EPFL)

  • Fuzzing API Error Handling Behaviors using Coverage Guided Fault Injection

Shashank Sharma, Sai Ritvik Tanksalkar, Sourag Cherupattamoolayil, Aravind Machiry (Purdue University)

  • AIMFuzz: Automated Function-Level In-Memory Fuzzing on Binaries

TaeWook Kim, Seokhyun Hong, Yeongpil Cho (Hanyang University)

  • What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications

Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert (Technische Universität Berlin)

  • SoK: Where to Fuzz? Assessing Target Selection Methods in Directed Fuzzing

Felix Weissberg, Jonas Möller (Technische Universität Berlin); Tom Ganz, Erik Imgrund (SAP Security Research); Lukas Pirch (Technische Universität Berlin); Lukas Seidel (Binarly); Moritz Schloegel (CISPA Helmholtz Center for Information Security); Thorsten Eisenhofer, Konrad Rieck (Technische Universität Berlin)

Session 17: Trusted Execution Environments and Enclaves

  • ESem: To Harden Process Synchronization for Servers

Zhanbo Wang (Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China, and Peng Cheng Laboratory, China); Jiaxin Zhan (Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China, and Department of Computer Science and Engineering, Southern University of Science and Technology, China); Xuhua Ding (Singapore Management University); Fengwei Zhang (Department of Computer Science and Engineering, Southern University of Science and Technology, China, and Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, China); Ning Hu (Peng Cheng Laboratory, China)

  • TeeFilter: High-Assurance Network Filtering Engine for High-End IoT and Edge Devices based on TEEs

Jonas Röckl, Nils Bernsdorf (FAU Erlangen-Nürnberg); Tilo Müller (Hof University of Applied Sciences)

  • Building Your Own Trusted Execution Environments Using FPGA

MD Armanuzzaman (University at Buffalo); Ahmad-Reza Sadeghi (Technische Universität Darmstadt); Ziming Zhao (University at Buffalo)

  • SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments

Mengyuan Li, Yuheng Yang (Massachusetts Institute of Technology); Guoxing Chen (Shanghai Jiao Tong University); Mengjia Yan (Massachusetts Institute of Technology); Yinqian Zhang (Southern University of Science and Technology)

  • MultiTEE: Distributing Trusted Execution Environments

Simon Ott, Benjamin Orthen, Alexander Weidinger, Julian Horsch (Fraunhofer AISEC); Vijayanand Nayani, Jan-Erik Ekberg (Huawei Technologies)

  • (In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices

Yurak Choe (Sungkyunkwan University); Hyungseok Yu, Taeho Kim, Shinjae Lee (Samsung Electronics); Hojoon Lee, Hyoungshick Kim (Sungkyunkwan University)

Session 18: ORAM and Searchable Encryption

  • Single Round-trip Hierarchical ORAM via Succinct Indices

William Holland (CSIRO’s data61); Olga Ohrimenko (The University of Melbourne); Anthony Wirth (the University of Melbourne)

  • CryptGraph: An Efficient Privacy-Enhancing Solution for Accurate Shortest Path Retrieval in Cloud Environments

Fuyi Wang (Deakin University); Zekai Chen (Fuzhou University); Lei Pan (Deakin University); Leo Yu Zhang (Griffith University); Jianying Zhou (Singapore University of Technology and Design)

  • Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage

Leonie Reichert, Gowri R Chandran (Technical University of Darmstadt); Phillipp Schoppmann (Google); Thomas Schneider, Björn Scheuermann (Technical University of Darmstadt)

  • Tokenised Multi-client Provisioning for Dynamic Searchable Encryption with Forward and Backward Privacy

Arnab Bag (Indian Institute of Technology Kharagpur); Sikhar Patranabis (IBM Research India); Debdeep Mukhopadhyay (Department of Computer Science and Engineering, IIT Kharagpur)

  • ALLOSAUR: Accumulator with Low-Latency Oblivious Sublinear Anonymous credential Updates with Revocations

Samuel Jaques (University of Waterloo); Hart Montgomery (The Linux Foundation); Michael Lodder

  • DISCO: Dynamic Searchable Encryption with Constant State

Xiangfu Song (National University of Singapore); Yu Zheng (Chinese University of Hong Kong); Jianli Bai (University of Auckland); Changyu Dong (Guangzhou University); Zheli Liu (Nankai University); Ee-Chien Chang (National University of Singapore)

Session 19: Usability

  • The Catcher in the Eye: Recognizing Users by their Blinks

Ryo Iijima (National Institute of Advanced Industrial Science and Technology, Waseda University); Tatsuya Takehisa (National Institute of Information and Communications Technology); Tetsushi Ohki (Shizuoka University, RIKEN AIP); Tatsuya Mori (Waseda University, NICT, RIKEN AIP)

  • From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser Extensions

Ritik Roongta, Rachel Greenstadt (New York University)

  • Charting the Path to SBOM Adoption: A Business Stakeholder-Centric Approach

Berend Kloeg (Northwave Cyber Security); Aaron Yi Ding (TU Delft); Sjoerd Pellegrom (Northwave Cyber Security); Yury Zhauniarovich (TU Delft)

  • SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations

Mohammad Majid Akhtar, Rahat Masood (University of New South Wales); Muhammad Ikram (Macquarie University); Salil S Kanhere (UNSW, Sydney, Australia)

Session 20: Authentication and Signatures

  • Delegating FIDO Credentials Using Single-use ECDSA Signatures

Wei-Zhu Yeoh, Lucjan Hanzlik, Oliver Valta (CISPA Helmholtz Center for Information Security)

  • Quantum-Safe Account Recovery for WebAuthn

Douglas Stebila, Spencer Wilson (University of Waterloo)

  • Byzantine Fault-Tolerant Aggregate Signatures

Quentin Kniep, Roger Wattenhofer (ETH Zürich)

  • Unstoppable Wallets: Chain-assisted Threshold ECDSA and its Applications

Guy Zyskind (MIT ); Avishay Yanai (unaffiliated); Alex Pentland (MIT)

Session 21: Payment Channel Networks and Ticket Payments

  • Auroch: Auction-Based Multipath Routing for Payment Channel Networks

Mohammed Ababneh, Kartick Kolachala, Roopa Vishwanathan (New Mexico State University)

  • SPRITE: Secure and Private Routing in Payment Channel Networks

Gaurav Panwar, Roopa Vishwanathan, George Torres, Satyajayant Misra (New Mexico State University)

  • RACED: Routing in Payment Channel Networks Using Distributed Hash Tables

Kartick Kolachala, Mohammed Ababneh, Roopa Vishwanathan (New Mexico State University)

  • Transferable, Auditable and Anonymous Ticketing Protocol

Pascal Lafourcade, Dhekra Mahmoud, Gael Marcadet (Université Clermont-Auvergne, CNRS, Clermont-Auvergne-INP, LIMOS); Charles Olivier-Anclin (be ys Pay and Université Clermont-Auvergne, CNRS, Clermont-Auvergne-INP, LIMOS and LIFO, Université d’Orléans, INSA Centre Val de Loire)

https://asiaccs2024.sutd.edu.sg/

历年会议

安全学术圈招募队友-ing
有兴趣加入学术圈的请联系secdr#qq.com

文章来源: https://mp.weixin.qq.com/s?__biz=MzU5MTM5MTQ2MA==&mid=2247491031&idx=1&sn=6228f200e07da52f4789fea6b601ce0e&chksm=fe2ee25cc9596b4a3103ee3f68272fe47d790c124b41763805bbe6438b631d0d300c3090b167&scene=58&subscene=0#rd
如有侵权请联系:admin#unsafe.sh