Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2023
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 1004–1015https://doi.org/10.1145/3579856.3595806Increasingly, with embedded intelligence and control, IoT devices are being adopted faster than ever. However, the IoT landscape and its security implications are not yet fully understood. This paper seeks to shed light on this by focusing on a ...
- research-articleJuly 2023
Investigating Traffic Analysis Attacks on Apple iCloud Private Relay
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 773–784https://doi.org/10.1145/3579856.3595793The iCloud Private Relay (PR) is a new feature introduced by Apple in June 2021 that aims to enhance online privacy by protecting a subset of web traffic from both local eavesdroppers and websites that use IP-based tracking. The service is integrated ...
- research-articleJuly 2023
How Secure Are The Main Real-World Mix Networks — Case Studies To Explore Vulnerabilities And Usability
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 539–551https://doi.org/10.1145/3579856.3595785Mix net is the most frequently used secure MPC (multi-party computation) application in the real world, where multiple routers cooperates to anonymise a batch of data. It builds an important network security mechanism to implement anonymous ...
- short-paperJuly 2023
POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 1034–1036https://doi.org/10.1145/3579856.3592827Traffic fingerprinting allows making inferences about encrypted traffic flows through passive observation. They have been used for tasks such as network performance management and analytics and in attacker settings such as censorship and surveillance. ...
- short-paperJuly 2023
POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 1022–1024https://doi.org/10.1145/3579856.3592825Moving Target Defenses (MTD) are proactive security countermeasures that change the attack surface in a system in ways that make it harder for attackers to succeed. These techniques have been shown to be effective, and their application in software-...
-
- short-paperJuly 2023
POSTER: A Cyberspace Study of the Russia-Ukraine War
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 1016–1018https://doi.org/10.1145/3579856.3592822This paper aims to investigate the resilience of the internet in the face of censorship through a current case study: the war between Russia and Ukraine. We focus on whether Russia, as a major Internet power, has been using its network to deny access to ...
- research-articleJuly 2023
Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 797–811https://doi.org/10.1145/3579856.3590329Containerization allows bundling applications and their dependencies into a single image. The containerization framework Docker eases the use of this concept and enables sharing images publicly, gaining high momentum. However, it can lead to users ...
- research-articleJuly 2023
Security Properties of Virtual Remotes and SPOOKing their violations
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 841–854https://doi.org/10.1145/3579856.3582834As Smart TV devices become more prevalent in our lives, it becomes increasingly important to evaluate the security of these devices. In addition to a smart and connected ecosystem through apps, Smart TV devices expose a WiFi remote protocol, that ...
- research-articleJuly 2023
ZEKRA: Zero-Knowledge Control-Flow Attestation
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 357–371https://doi.org/10.1145/3579856.3582833To detect runtime attacks against programs running on a remote computing platform, Control-Flow Attestation (CFA) lets a (trusted) verifier determine the legality of the program’s execution path, as recorded and reported by the remote platform (prover)...
- research-articleJuly 2023
CryptoShield - Automatic On-Device Mitigation for Crypto API Misuse in Android Applications
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 899–912https://doi.org/10.1145/3579856.3582832Misuse of cryptographic APIs remains one of the most common flaws in Android applications. The complexity of cryptographic APIs frequently overwhelms developers. This can lead to mistakes that leak sensitive user data to trivial attacks. Despite ...
- research-articleJuly 2023
On the Cryptographic Fragility of the Telegram Ecosystem
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications SecurityJuly 2023, pp 328–341https://doi.org/10.1145/3579856.3582811Telegram is a popular messenger with more than 550 million active users per month and with a large ecosystem of different clients. The wide adoption of Telegram by protestors relying on private and secure messaging provides motivation for developing a ...