AsiaCCS 2022
ABOUT
ASIACCS
Sponsors
FAQ
COMMITTEE
Organization
Program Committee
Steering Committee
DATES&CALL
Important Dates
Call for Papers
Call for Tutorials
Call for Posters
Call for Workshops
PROGRAM
Main Conference
Workshop: APKC
Workshop: BSCI
Workshop: CPSS
Workshop: CySSS
Workshop: WDC
Workshop: WoRMA
Accepted Papers
KEYNOTE
Main Conference
APKC
BSCI
CPSS
CySSS
WDC
WoRMA
MyPage
Registration
Proceedings
Workshops
PARTICIPATE
Conference Venue
Travel
Accommodation
Visa Information
Accepted Papers
All
Main conf: 1st round
Main conf: 2nd round
Main conf: Poster Session
WS: APKC
WS: BSCI
WS: CPSS
WS: CySSS
WS: WDC
WS: WoRMA
Nagasaki
Accepted papers (1st round)
last update: 21 November, 2021
Confusing and Detecting ML Adversarial Attacks with Injected Attractors
J. Zhang; E. Chang; H. Lee
TargetFuzz: Using DARTs to Guide Directed Greybox Fuzzers
S. Canakci; N. Matyunin; K. Graffi; A. Joshi; M. Egele
Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realisation
B. Wu; X. Yang; S. Pan; X. YUAN
Proximity Searchable Encryption for the Iris Biometric
S. Ahmad; C. Cachet; L. Demarest; B. Fuller; A. Hamlin
Mixed Certificate Chains for the Transition to Post-Quantum Authentication in TLS 1.3
S. Paul; Y. Kuzovkova; N. Lahr; R. Niederhagen
SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication
C. Peeters; C. Patton; I. Sherman; D. Olszewski; T. Shrimpton; P. Traynor
Hopper: Per-Device Nano Segmentation for the Industrial IoT
P. De Vaere; A. Tulimiero; A. Perrig
Evaluating Blockchain Protocols with Abusive Modeling
V. SHARMA; P. SZALACHOWSKI; J. ZHOU
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities
L. Harrison; S. Bag; H. Luo; F. Hao
Symbolic synthesis of indifferentiability attacks
I. Rakotonirina; M. Ambrona; A. Aguirre; G. Barthe
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation
Z. Liu; Y. Tseng; R. Tso; M. Mambo; Y. Chen
Efficient Oblivious Permutation via the Waksman Network
W. Holland; O. Ohrimenko; A. Wirth
Missed Opportunities: Measuring the Untapped TLS Support in the Industrial Internet of Things
M. Dahlmanns; J. Lohmöller; J. Pennekamp; J. Bodenhausen; K. Wehrle; M. Henze
Towards a Utopia of Dataset Sharing: A Case Study on Machine Learning-based Malware Detection Algorithms
P. Chuang; C. Hsu; Y. Chu; S. Huang; C. Huang
The Convergence of Source Code and Binary Vulnerability Discovery -- A Case Study
A. Mantovani; L. Compagna; Y. Shoshitaishvili; D. Balzarotti
Driving execution of target paths in Android applications with (a) CAR
M. Wong; D. Lie
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands
S. Esposito; D. Sgandurra; G. Bella
Mirror Mirror on the Wall: Wireless Environment Reconfiguration Attacks Based on Fast Software-Controlled Surfaces
P. Staat; H. Elders-Boll; M. Heinrichs; C. Zenger; C. Paar
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware
W. Song; X. Li; S. Afroz; D. Garg; D. Kuznetsov; H. Yin
On Measuring Vulnerable JavaScript Functions in the Wild
M. Kluban; M. Mannan; A. Youssef
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation
J. Ma; S. Chow
Understanding Disparate Effects of Membership Inference Attacks and Their Countermeasures
D. Zhong; H. SUN; J. Xu; N. Gong; H. Wang
Multi-Key Homomorphic MACs with Efficient Verification for Quadratic Arithmetic Circuits
S. Feng; S. Xu; L. Zhang
Signal Injection Attacks against CCD Image Sensors
S. Köhler; R. Baker; I. Martinovic
Membership Feature Disentanglement Network
H. Ha; J. Jang; Y. Jeong; S. Yoon
Byzantine-Robust Private Information Retrieval with Low Communication and Efficient Decoding
L. Zhang; H. Wang