ACM ASIACCS 2021
Keynote Session 2
Streamlet: An Absurdly Simple, Textbook Blockchain Protocol
Elaine Shi (Associate Professor, Computer Science Department, Electrical and Computer Engineering, CyLab Security and Privacy Institute, Carnegie Mellon University, Pittsburgh, PA, USA)
Session Chair
Moti Yung
ML and security (III)
REFIT: a Unified Watermark Removal Framework for Deep Learning Systems with Limited Data
Xinyun Chen (University of California, Berkeley, USA), Wenxiao Wang (Tsinghua University, China), Chris Bender (University of California, Berkeley, USA), Yiming Ding (University of California, Berkeley, USA), Ruoxi Jia (Virginia Tech, USA), Bo Li (University of Illinois at Urbana-Champaign, USA), Dawn Song (University of California, Berkeley, USA)
Recompose Event Sequences vs. Predict Next Events: A Novel Anomaly Detection Approach for Discrete Event Logs
Lun-Pin Yuan (Penn State University, USA), Peng Liu (Information Sciences and Technology, Pennsylvania State University, USA), Sencun Zhu (The Pennsylvania State University, USA)
Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules
Kaichen Yang (University of Florida, USA), Tzungyu Tsai (National Tsing Hua University, Taiwan), Honggang Yu (University of Florida, USA), Max Panoff (University of Florida, USA), Tsung-Yi Ho (National Tsing Hua University, Taiwan), Yier Jin (University of Florida, USA)
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation
Yi Zeng (University of California San Diego, USA), Han Qiu (Telecom Paris, France), Tianwei Zhang (Nanyang Technological University, Singapore), Shangwei Guo (Nanyang Technological University, Singapore), Meikang Qiu (Texas A&M University Commerce, USA), Bhavani Thuraisingham (University of Texas Dallas, USA)
Session Chair
Neil Gong
Measurement/Empirical Security
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems
Mustafa Abdallah (Purdue University, USA), Daniel Woods (Purdue University, USA), Parinaz Naghizadeh (Ohio State University, USA), Issa Khalil (Qatar Computing Research Institute (QCRI), HBKU, Qatar), Timothy Cason (Purdue University, USA), Shreyas Sundaram (Purdue University, USA0, Saurabh Bagchi (Purdue University, USA)
Analyzing the Overhead of Protection on File Accessing Using Linux Security Modules
Wenhui Zhang (Penn State University, USA), Peng Liu (Penn State University, USA), Trent Jaeger (Penn State University, USA)
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
Doowon Kim (University of Tennessee, Knoxville, USA), Haehyun Cho (Arizona State University, USA), Yonghwi Kwon (University of Virginia, USA), Adam Oest (PayPal, Inc., USA), Adam Doupe (Arizona State University, USA), Sooel Son (KAIST, South Korea), Gail-Joon Ahn (Arizona State University, USA), Tudor Dumitras (Univ. Maryland, USA)
ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition
Wei Xie (College of Computer, National University of Defense Technology, China), Chao Zhang (Institute for Network Science and Cyberspace of Tsinghua University, China), Pengfei Wang (College of Computer, National University of Defense Technology, China), Zhenhua Wang (College of Computer, National University of Defense Technology, China), Qiang Yang (College of Computer, National University of Defense Technology, China)
Session Chair
Yuan Zhang
Social Event + Poster Session 2
Please follow the link to join the virtual social event
Session Chair
Poster Chair
Network and Web Security (II)
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Wesley Joon-Wie Tann (National University of Singapore, Singapore), Jackie Tan Jin Wei (National University of Singapore, Singapore), Joanna Purba (National University of Singapore, Singapore), Ee-Chien Chang (National University of Singapore, Singapore)
Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications
Mohammed Jubur (The University of Alabama at Birmingham, USA), Prakash Shrestha (University of Florida, USA), Nitesh Saxena (The University of Alabama at Birmingham, USA), Jay Prakash (SUTD, Singapore)
Click This, Not That: Extending Web Authentication with Deception
Timothy Barron (Yale University, USA), Johnny So (Stony Brook University, USA), Nick Nikiforakis (Stony Brook University, USA)
Analyzing Spatial Differences in the TLS Security of Delegated Web Services
Joonhee Lee (Seoul National University, South Korea), Hyunwoo Lee (Purdue University, USA), Jongheon Jeong (Seoul National University, South Korea), Doowon Kim (University of Tennessee, Knoxville, USA), Taekyoung "Ted" Kwon (Seoul National University, South Korea)
Session Chair
Ding Wang
Applied Cryptography (II)
Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits
Ruiyu Zhu (Indiana University, USA), Yan Huang (Indiana University, USA)
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations
Ankush Singla (Purdue University, USA), Rouzbeh Behnia (University of South Florida, USA), Syed Rafiul Hussain (Pennsylvania State University, USA), Attila Yavuz (University of South Florida, USA), Elisa Bertino (Purdue University, USA)
Efficient Graph Encryption Scheme for Shortest Path Queries
Esha Ghosh (Microsoft Research, Redmond, USA), Seny Kamara (Brown University, USA), Roberto Tamassia (Brown University, USA)
Session Chair
Xingliang Yuan
Software Security and Vulnerability Analysis (I)
How to Take Over Drones
Sebastian Plotz (University of Applied Sciences Stralsund, Germany), Frederik Armknecht (University of Mannheim, Germany), Christian Bunse (University of Applied Sciences Stralsund, Germany)
Localizing Vulnerabilities Statistically From One Exploit
Shiqi Shen (National University of Singapore, Singapore), Aashish Kolluri (National University of Singapore, Singapore), Zhen Dong (National University of Singapore, Singapore), Prateek Saxena (National University of Singapore, Singapore), Abhik Roychoudhury (National University of Singapore, Singapore)
Cali: Compiler-Assisted Library Isolation
Markus Bauer (CISPA – Helmholtz Center for Information Security, Germany), Christian Rossow (CISPA – Helmholtz Center for Information Security, Germany)
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment
Zhuotao Liu (Tsinghua University, China), Hao Zhao (Ant Group, China), Sainan Li (Tsinghua University, China), Qi Li (Tsinghua University, China), Tao Wei (Ant Group, China), Yu Wang (Ant Group, China)
Session Chair
Kehuan Zhang
Privacy (I)
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps
Trung Tin Nguyen (CISPA Helmholtz Center for Information Security, Germany), Duc Cuong Nguyen (CISPA Helmholtz Center for Information Security, Germany), Michael Schilling (CISPA Helmholtz Center for Information Security, Germany), Gang Wang (University of Illinois at Urbana-Champaign, USA), Michael Backes (CISPA Helmholtz Center for Information Security, Germany)
Low-Cost Hiding of the Query Pattern
Maryam Sepehri (Milan University, Italy), Florian Kerschbaum (University of Waterloo, Canada)
Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension
Linpeng Lu (Shanghai JiaoTong University, China), Ning Ding (Shanghai JiaoTong University, China)
Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks
Keitaro Hiwatashi (The University of Tokyo / AIST, Japan), Ken Ogura (The University of Tokyo, Japan), Satsuya Ohata (Digital Garage, Inc., Japan), Koji Nuida (The University of Tokyo / AIST, Japan)
Session Chair
Miroslaw Kutylowski
Made with in Toronto · Privacy Policy · © 2022 Duetone Corp.