Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- keynoteJune 2014
Fighting malicious code: an eternal struggle
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPage 1https://doi.org/10.1145/2590296.2590348Despite many years of research and significant commercial investment, the malware problem is far from being solved (or even reasonably well contained). Every week, the mainstream press publishes articles that describe yet another incident where millions ...
- short-paperJune 2014
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords
- Tiffany Hyun-Jin Kim,
- H. Colleen Stuart,
- Hsu-Chun Hsiao,
- Yue-Hsun Lin,
- Leon Zhang,
- Laura Dabbish,
- Sara Kiesler
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 513–518https://doi.org/10.1145/2590296.2590345Various mechanisms exist to secure users' passwords, yet users continue to struggle with the complexity of multiple password management. We explore the effectiveness of a feedback loop to improve users' password management. We introduce YourPassword, a ...
- research-articleJune 2014
Outsourceable two-party privacy-preserving biometric authentication
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 401–412https://doi.org/10.1145/2590296.2590343Biometric authentication, a key component for many secure protocols and applications, is a process of authenticating a user by matching her biometric data against a biometric database stored at a server managed by an entity. If there is a match, the ...
- research-articleJune 2014
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 425–434https://doi.org/10.1145/2590296.2590342Most existing proposals for access control over outsourced data mainly aim at guaranteeing that the data are only accessible to authorized requestors who have the access credentials. This paper proposes TRLAC, an a posteriori approach for tracing and ...
- research-articleJune 2014
OTIT: towards secure provenance modeling for location proofs
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 87–98https://doi.org/10.1145/2590296.2590339Personal mobile devices and location based services are gaining popularity every day. Since the location based services are often customized based on the location information, it is important to securely generate, preserve, and validate the claim of ...
-
- research-articleJune 2014
Re3: relay reliability reputation for anonymity systems
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 63–74https://doi.org/10.1145/2590296.2590338To conceal user identities, Tor, a popular anonymity system, forwards traffic through multiple relays. These relays, however, are often unreliable, leading to a degraded user experience. Worse yet, malicious relays may strategically introduce deliberate ...
- research-articleJune 2014
ConXsense: automated context classification for context-aware access control
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 293–304https://doi.org/10.1145/2590296.2590337We present ConXsense, the first framework for context-aware access control on mobile devices based on context classification. Previous context-aware access control systems often require users to laboriously specify detailed policies or they rely on pre-...
- research-articleJune 2014
Protecting users against XSS-based password manager abuse
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 183–194https://doi.org/10.1145/2590296.2590336To ease the burden of repeated password authentication on multiple sites, modern Web browsers provide password managers, which offer to automatically complete password fields on Web pages, after the password has been stored once. Unfortunately, these ...
- research-articleJune 2014
VirtualSwindle: an automated attack against in-app billing on android
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 459–470https://doi.org/10.1145/2590296.2590335Since its introduction, Android's in-app billing service has quickly gained popularity. The in-app billing service allows users to pay for options, services, subscriptions, and virtual goods from within mobile apps themselves. In-app billing is ...
- research-articleJune 2014
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 239–248https://doi.org/10.1145/2590296.2590334Attribute-based encryption (ABE), introduced by Sahai and Waters, is a promising cryptographic primitive, which has been widely applied to implement fine-grained access control system for encrypted data. In its key-policy flavor, attribute sets are used ...
- research-articleJune 2014
Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 3–14https://doi.org/10.1145/2590296.2590333The only available IEEE 802.11 network identifiers (i.e., the network name and the MAC address) can be easily spoofed. Consequently, an attacker is able to fake a real hotspot and attract its traffic. By this means, the attacker can intercept, collect, ...
- research-articleJune 2014
Privacy of outsourced k-means clustering
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 123–134https://doi.org/10.1145/2590296.2590332It is attractive for an organization to outsource its data analytics to a service provider who has powerful platforms and advanced analytics skills. However, the organization (data owner) may have concerns about the privacy of its data. In this paper, ...
- short-paperJune 2014
Prover anonymous and deniable distance-bounding authentication
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 501–506https://doi.org/10.1145/2590296.2590331In distance-bounding authentication protocols, a verifier assesses that a prover is (1) legitimate and (2) in the verifier's proximity. Proximity checking is done by running time-critical exchanges between both parties. This enables the verifier to ...
- research-articleJune 2014
Sufficient conditions for vertical composition of security protocols
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 435–446https://doi.org/10.1145/2590296.2590330Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality ...
- research-articleJune 2014
Abstract model counting: a novel approach for quantification of information leaks
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 283–292https://doi.org/10.1145/2590296.2590328We present a novel method for Quantitative Information Flow analysis. We show how the problem of computing information leakage can be viewed as an extension of the Satisfiability Modulo Theories (SMT) problem. This view enables us to develop a framework ...
- research-articleJune 2014
Practical secret key agreement for full-duplex near field communications
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 217–228https://doi.org/10.1145/2590296.2590327Near Field Communication (NFC) is a promising short distance radio communication technology for many useful applications. Although its communication range is short, NFC alone does not guarantee secure communication and is subject to security attacks, ...
- research-articleJune 2014
Evading android runtime analysis via sandbox detection
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 447–458https://doi.org/10.1145/2590296.2590325The large amounts of malware, and its diversity, have made it necessary for the security community to use automated dynamic analysis systems. These systems often rely on virtualization or emulation, and have recently started to be available to process ...
- research-articleJune 2014
Scanning of real-world web applications for parameter tampering vulnerabilities
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 341–352https://doi.org/10.1145/2590296.2590324Web applications require exchanging parameters between a client and a server to function properly. In real-world systems such as online banking transfer, traversing multiple pages with parameters contributed by both the user and server is a must, and ...
- research-articleJune 2014
S-ORAM: a segmentation-based oblivious RAM
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 147–158https://doi.org/10.1145/2590296.2590323As outsourcing data to remote storage servers gets popular, protecting user's pattern in accessing these data has become a big concern. ORAM constructions are promising solutions to this issue, but their application in practice has been impeded by the ...
- research-articleJune 2014
Improved anonymous proxy re-encryption with CCA security
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 249–258https://doi.org/10.1145/2590296.2590322Outsourcing private data and heavy computation tasks to the cloud may lead to privacy breach as attackers (e.g., malicious outsiders or cloud administrators) may correlate any relevant information to penetrate information of their interests. Therefore, ...