ACM ASIACCS 2021
Measurement/Empirical Security
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems
Mustafa Abdallah (Purdue University, USA), Daniel Woods (Purdue University, USA), Parinaz Naghizadeh (Ohio State University, USA), Issa Khalil (Qatar Computing Research Institute (QCRI), HBKU, Qatar), Timothy Cason (Purdue University, USA), Shreyas Sundaram (Purdue University, USA0, Saurabh Bagchi (Purdue University, USA)
Analyzing the Overhead of Protection on File Accessing Using Linux Security Modules
Wenhui Zhang (Penn State University, USA), Peng Liu (Penn State University, USA), Trent Jaeger (Penn State University, USA)
Security Analysis on Practices of Certificate Authorities in the HTTPS Phishing Ecosystem
Doowon Kim (University of Tennessee, Knoxville, USA), Haehyun Cho (Arizona State University, USA), Yonghwi Kwon (University of Virginia, USA), Adam Oest (PayPal, Inc., USA), Adam Doupe (Arizona State University, USA), Sooel Son (KAIST, South Korea), Gail-Joon Ahn (Arizona State University, USA), Tudor Dumitras (Univ. Maryland, USA)
ARGUS: Assessing Unpatched Vulnerable Devices on the Internet via Efficient Firmware Recognition
Wei Xie (College of Computer, National University of Defense Technology, China), Chao Zhang (Institute for Network Science and Cyberspace of Tsinghua University, China), Pengfei Wang (College of Computer, National University of Defense Technology, China), Zhenhua Wang (College of Computer, National University of Defense Technology, China), Qiang Yang (College of Computer, National University of Defense Technology, China)
Session Chair
Yuan Zhang
Applied Cryptography (II)
Hash-Enabled Garbling and the Insecurity of Free-Hashing Garbled Circuits
Ruiyu Zhu (Indiana University, USA), Yan Huang (Indiana University, USA)
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations
Ankush Singla (Purdue University, USA), Rouzbeh Behnia (University of South Florida, USA), Syed Rafiul Hussain (Pennsylvania State University, USA), Attila Yavuz (University of South Florida, USA), Elisa Bertino (Purdue University, USA)
Efficient Graph Encryption Scheme for Shortest Path Queries
Esha Ghosh (Microsoft Research, Redmond, USA), Seny Kamara (Brown University, USA), Roberto Tamassia (Brown University, USA)
Session Chair
Xingliang Yuan
Privacy (I)
Measuring User Perception for Detecting Unexpected Access to Sensitive Resource in Mobile Apps
Trung Tin Nguyen (CISPA Helmholtz Center for Information Security, Germany), Duc Cuong Nguyen (CISPA Helmholtz Center for Information Security, Germany), Michael Schilling (CISPA Helmholtz Center for Information Security, Germany), Gang Wang (University of Illinois at Urbana-Champaign, USA), Michael Backes (CISPA Helmholtz Center for Information Security, Germany)
Low-Cost Hiding of the Query Pattern
Maryam Sepehri (Milan University, Italy), Florian Kerschbaum (University of Waterloo, Canada)
Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension
Linpeng Lu (Shanghai JiaoTong University, China), Ning Ding (Shanghai JiaoTong University, China)
Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks
Keitaro Hiwatashi (The University of Tokyo / AIST, Japan), Ken Ogura (The University of Tokyo, Japan), Satsuya Ohata (Digital Garage, Inc., Japan), Koji Nuida (The University of Tokyo / AIST, Japan)
Session Chair
Miroslaw Kutylowski
Made with in Toronto · Privacy Policy · © 2022 Duetone Corp.