CCS Best Papers CollectingThe ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM). The conference brings together information security researchers, practitioners, developers, and users from all over the world to explore cutting-edge ideas and results. It provides an environment to conduct intellectual discussions. From its inception, CCS has established itself as a high standard research conference in its area.
Kangjie Lu, Hong Hu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp.1867-1881, (2019)
System software commonly uses indirect calls to realize dynamic program behaviors. However, indirect-calls also bring challenges to constructing a precise control-flow graph that is a standard pre-requisite for many static program-analysis and system-hardening techniques. Unfortu...
Cited by6BibtexViews25Links
0
0
Wenbo Guo, Dongliang Mu,Jun Xu,Purui Su,Gang Wang,Xinyu Xing
ACM Conference on Computer and Communications Security, pp.364-379, (2018)
By evaluating it on two popular deep learning based security applications, we show that the proposed method produces highly accurate explanations
Cited by64BibtexViews106Links
0
0
Zeyu Ding,Yuxin Wang, Guanhong Wang,Danfeng Zhang,Daniel Kifer
ACM Conference on Computer and Communications Security, pp.475-489, (2018)
While it is invaluable to formally verify correct differentially-private algorithms, we believe that it is important to detect incorrect algorithms and provide counterexamples for them, due to the subtleties involved in algorithm development
Cited by33BibtexViews96Links
0
0
Guoming Zhang,Chen Yan,Xiaoyu Ji, Tianchen Zhang, Taimin Zhang,Wenyuan Xu
CCS, (2017): 103-117
Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems (VCS). Prior work on attacking VCS shows that the hidden voice commands that are incom...
Cited by250BibtexViews97Links
0
0
CCS, pp.21-37, (2017)
Our results show that these circuits are no longer large enough to serve as benchmark circuits for malicious 2PC
Cited by74BibtexViews70Links
0
0
IACR Cryptology ePrint Archive, (2017): 2435-2450
We introduced the Trusted Abstract Platform, and performed proofs demonstrating that trusted abstract platform satisfies the three properties required for secure remote execution: secure measurement, integrity and confidentiality
Cited by55BibtexViews103Links
0
0
Jack Doerner,Abhi Shelat
CCS, (2017): 523-535
We created two variants of our Oblivious Random Access Memory, one using the basic construction described in Section 4, and the other using the CPRG method from Section 5
Cited by51BibtexViews67Links
0
0
IACR Cryptology ePrint Archive, (2017): 1019-1036
The threat due to such collisions is often thought to be theoretical in nature, it was recently shown that real attacks can be carried out when 3DES is used in TLS, because of the small block size
Cited by21BibtexViews57Links
0
0
ACM Conference on Computer and Communications Security, pp.1402-1413, (2016)
Phishing attacks constitute a major challenge for Internet Service Providers, as well as for email providers, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distribute...
Cited by52BibtexViews44Links
0
0