researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2021
2022
2023
2024
2025
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Aravind Machiry
Dario Facchinetti
Debdeep Mukhopadhyay
Ee-Chien Chang
Fengwei Zhang
Hyoungshick Kim
Ioana Boureanu
Ivan Martinovic
Jianying Zhou 0001
Jinyuan Jia
Leo Yu Zhang
Luyao Niu
Manuel Egele
Qiben Yan
Radha Poovendran
Roopa Vishwanathan
Stefan Mangard
Surya Nepal
Thomas Schneider 0003
Willy Susilo
Filter by Top terms
[+]
OR
AND
NOT
1
adversarial
analysis
attacks
authentication
data
detection
efficient
encryption
framework
learning
model
networks
poster
preserving
privacy
secure
security
systems
using
via
AsiaCCS (AsiaCCS)
Editions
Publications
Viewing Publication 1 - 100 from 554
2025
Breaking Bad: How Compilers Break Constant-Time Implementations
Moritz Schneider 0001
,
Daniele Lain
,
Ivan Puddu
,
Nicolas Dutly
,
Srdjan Capkun
.
AsiaCCS 2025
:
1690-1706
[doi]
Robust Locally Differentially Private Graph Analysis
Amrita Roy Chowdhury 0001
,
Jacob Imola
,
Kamalika Chaudhuri
.
AsiaCCS 2025
:
635-650
[doi]
Transferable Adversarial Examples with Bayesian Approach
Mingyuan Fan 0003
,
Cen Chen 0001
,
Wenmeng Zhou
,
Yinggui Wang
.
AsiaCCS 2025
:
517-529
[doi]
BIP32-Compatible Threshold Wallets
Poulami Das 0003
,
Andreas Erwig
,
Sebastian Faust
,
Philipp-Florens Lehwalder
,
Julian Loss
,
Ziyan Qu
,
Siavash Riahi 0002
.
AsiaCCS 2025
:
856-872
[doi]
Unraveling Elevated Data Leakage in Split Learning for Fine-Tuning Stable Diffusion Models
Fei Wang 0075
,
Yan Zhu
,
Baochun Li
.
AsiaCCS 2025
:
501-516
[doi]
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2025, Hanoi, Vietnam, August 25-29, 2025
ACM,
2025.
[doi]
Scalable Time-Lock Puzzle
Aydin Abadi
,
Dan Ristea
,
Artem Grigor
,
Steven J. Murdoch
.
AsiaCCS 2025
:
839-855
[doi]
Enabling Microarchitectural Agility: Taking ML-KEM & ML-DSA from Cortex-M4 to M7 with SLOTHY
Amin Abdulrahman
,
Matthias J. Kannwischer
,
Thing-Han Lim
.
AsiaCCS 2025
:
1756-1771
[doi]
Prior-Based Label Differential Privacy via Secure Two-Party Computation
Amit Agarwal
,
Stanislav Peceny
,
Mariana Raykova 0001
,
Phillipp Schoppmann
,
Karn Seth
.
AsiaCCS 2025
:
163-179
[doi]
Eradicating the Unseen: Detecting, Exploiting, and Remediating a Path Traversal Vulnerability across GitHub
Jafar Akhoundali
,
HamidReza Hamidi
,
Kristian F. D. Rietveld
,
Olga Gadyatskaya
.
AsiaCCS 2025
:
542-558
[doi]
Proxies as Sensors: Measuring Censorship of Refraction Networking in Iran
Abdulrahman Alaraj
,
Eric Wustrow
.
AsiaCCS 2025
:
759-772
[doi]
Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation
Arwa Abdulkarim Al Alsadi
,
Mathew Vermeer
,
Takayuki Sasaki
,
Katsunari Yoshioka
,
Michel van Eeten
,
Carlos Gañán
.
AsiaCCS 2025
:
1032-1049
[doi]
An Automated Blackbox Noncompliance Checker for QUIC Server Implementations
Kian Kai Ang
,
Guy Farrelly
,
Cheryl Pope
,
Damith C. Ranasinghe
.
AsiaCCS 2025
:
1459-1475
[doi]
POSTER: Disappearing Ink: How Partial Model Extraction Erases Watermarks
Venkata Sai Pranav Bachina
,
Ankit Gangwal
.
AsiaCCS 2025
:
1794-1796
[doi]
ProbeShooter: A New Practical Approach for Probe Aiming
Daehyeon Bae
,
Sujin Park
,
Minsig Choi
,
Young-Giu Jung
,
Changmin Jeong
,
Heeseok Kim
,
Seokhie Hong
.
AsiaCCS 2025
:
1158-1174
[doi]
SoK: A Literature and Engineering Review of Regular Expression Denial of Service (ReDoS)
Masudul Hasan Masud Bhuiyan
,
Berk Çakar
,
Ethan H. Burmane
,
James C. Davis 0001
,
Cristian-Alexandru Staicu
.
AsiaCCS 2025
:
1659-1675
[doi]
Rejection Sampling for Covert Information Channel: Symmetric Power-Of-2-Choices
Dominik Bojko
,
Jacek Cichon
,
Miroslaw Kutylowski
,
Oliwer Sobolewski
.
AsiaCCS 2025
:
198-214
[doi]
Post-Compromise Security with Application-Level Key-Controls - with a comprehensive study of the 5G AKMA protocol
Ioana Boureanu
,
Cristina Onete
,
Stephan Wesemeyer
,
Léo Robert
,
Rhys Miller
,
Pascal Lafourcade 0001
,
Fortunat Rajaona
.
AsiaCCS 2025
:
231-247
[doi]
Different Seas, Different Phishes - Large-Scale Analysis of Phishing Simulations Across Different Industries
Oskar Braun
,
Jan Hörnemann
,
Norbert Pohlmann
,
Tobias Urban
,
Matteo Große-Kampmann
.
AsiaCCS 2025
:
1520-1534
[doi]
Concretely Efficient Private Set Union via Circuit-Based PSI
Gowri R. Chandran
,
Thomas Schneider 0003
,
Maximilian Stillger
,
Christian Weinert
.
AsiaCCS 2025
:
149-162
[doi]
Vulnerable Intel GPU Context: Prohibit Complete Context Restore by Modifying Kernel Driver
Wonseok Choi
,
Youngjoo Shin
.
AsiaCCS 2025
:
1632-1642
[doi]
NoBU: An effective and viable cyber-physical solution to thwart BadUSB attacks
Andrea Ciccotelli
,
Maurantonio Caprolu
,
Roberto Di Pietro
.
AsiaCCS 2025
:
1003-1015
[doi]
POSTER: Multimodal Graph Networks for Systematic Generalization in Code Clone Detection
Cuong Dao
,
Van Tong
,
Hai Anh Tran
,
Duc Tran
,
Giang Nguyen
.
AsiaCCS 2025
:
1815-1817
[doi]
Virtual End-to-End Encryption: Analysis of the Doctolib Protocol
Dennis Dayanikli
,
Laura Holz
,
Anja Lehmann
.
AsiaCCS 2025
:
773-789
[doi]
FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack
Kemal Derya
,
M. Caner Tol
,
Berk Sunar
.
AsiaCCS 2025
:
1219-1234
[doi]
N-Tracer: A Trace Driven Attack on NoC-Based MPSoC Architecture
Dipesh
,
Urbi Chatterjee
.
AsiaCCS 2025
:
1127-1140
[doi]
SEEC: Memory Safety Meets Efficiency in Secure Two-Party Computation
Henri Dohmen
,
Robin Hundt
,
Nora Khayata
,
Thomas Schneider 0003
.
AsiaCCS 2025
:
118-135
[doi]
Sounds Vishy: Automating Vishing Attacks with AI-Powered Systems
João Figueiredo
,
Afonso Carvalho
,
Daniel Castro
,
Daniel Gonçalves
,
Nuno Santos
.
AsiaCCS 2025
:
407-424
[doi]
A Cryptographic Analysis of Google's PSP and Falcon Channel Protocols
Marc Fischlin
,
Sascha Hoffmann
,
Leonhard Ruppel
,
Gözde Saçiak
,
Tobias Schnitzler
,
Christian Schwarz
,
Maximilian Stillger
.
AsiaCCS 2025
:
180-197
[doi]
POSTER: Investigating Transferability of Adversarial Examples in Model Merging
Ankit Gangwal
,
Aaryan Ajay Sharma
.
AsiaCCS 2025
:
1812-1814
[doi]
Key Extension: Multi-Key FHE Utilizing LWR
Mansi Goyal
,
Aditi Kar Gangopadhyay
.
AsiaCCS 2025
:
58-71
[doi]
QUIC-Exfil: Exploiting QUIC's Server Preferred Address Feature to Perform Data Exfiltration Attacks
Thomas Grübl
,
Weijie Niu
,
Jan von der Assen
,
Burkhard Stiller
.
AsiaCCS 2025
:
682-695
[doi]
NailKey: Mutable Biometric Using Fingernails
Yihong Hang
,
Zhice Yang
.
AsiaCCS 2025
:
1506-1519
[doi]
Formal Analysis of SDNsec: Attacks and Corrections for Payload, Route Integrity and Accountability
Ayoub Ben Hassen
,
Pascal Lafourcade 0001
,
Dhekra Mahmoud
,
Maxime Puys
.
AsiaCCS 2025
:
1476-1489
[doi]
BISON: Blind Identification with Stateless scOped pseudoNyms
Jakob Heher
,
Stefan More
,
Lena Heimberger
.
AsiaCCS 2025
:
1355-1371
[doi]
Minerva: A File-Based Ransomware Detector
Dorjan Hitaj
,
Giulio Pagnotta
,
Fabio De Gaspari
,
Lorenzo De Carli
,
Luigi V. Mancini
.
AsiaCCS 2025
:
576-590
[doi]
Enhancing Search Privacy on Tor: Advanced Deep Keyword Fingerprinting Attacks and BurstGuard Defense
Chaiwon Hwang
,
Haeseung Jeon
,
Jiwoo Hong
,
Hosung Kang
,
Nate Mathews
,
Goun Kim
,
Se Eun Oh
.
AsiaCCS 2025
:
621-634
[doi]
Your Control Host Intrusion Left Some Physical Breadcrumbs: Physical Evidence-Guided Post-Mortem Triage of SCADA Attacks
Moses Ike
,
Keaton Sadoski
,
Romuald Valme
,
Burak Sahin
,
Saman A. Zonouz
,
Wenke Lee
.
AsiaCCS 2025
:
1016-1031
[doi]
Preventing Radio Fingerprinting through Low-Power Jamming
Muhammad Irfan
,
Savio Sciancalepore
,
Gabriele Oligeri
.
AsiaCCS 2025
:
1114-1126
[doi]
POSTER: An Empirical Study of Smart Contract Patching Practices in the Wild
Taeyoung Kim
,
Gilhee Lee
,
Hyoungshick Kim
.
AsiaCCS 2025
:
1803-1805
[doi]
AVXProbe: Enhancing Website Fingerprinting with Side-Channel-Assisted Kernel-Level Traces
Suryeon Kim
,
Seung Ho Na
,
Jaehan Kim
,
Seungwon Shin 0001
,
Hyunwoo Choi
.
AsiaCCS 2025
:
1250-1264
[doi]
SigN: SIMBox Activity Detection Through Latency Anomalies at the Cellular Edge
Anne Josiane Kouam
,
Aline Carneiro Viana
,
Philippe Martins
,
Cédric Adjih
,
Alain Tchana
.
AsiaCCS 2025
:
1442-1458
[doi]
POSTER: Automating ICS Malware Analysis with MITRE ATT&CK
Fatih Kurt
,
Neetesh Saxena
,
Vijay Kumar
,
George Theodorakopoulos
.
AsiaCCS 2025
:
1806-1808
[doi]
poqeth: Efficient, post-quantum signature verification on Ethereum
Ruslan Kysil
,
István András Seres
,
Péter Kutas
,
Nándor Kelecsényi
.
AsiaCCS 2025
:
327-343
[doi]
Three Glitches to Rule One Car: Fault Injection Attacks on a Connected EV
Niclas Kühnapfel
,
Christian Werling
,
Hans Niklas Jacob
,
Jean-Pierre Seifert
.
AsiaCCS 2025
:
1235-1249
[doi]
Slice it up: Unmasking User Identities in Smartwatch Health Data
Lucas Lange
,
Tobias Schreieder
,
Victor Christen
,
Erhard Rahm
.
AsiaCCS 2025
:
710-726
[doi]
GAE4HT: Detecting Hardware Trojans with Graph Autoencoder-Trained on Golden Model Data Flow Graphs
Daehyeon Lee
,
JungHee Lee
.
AsiaCCS 2025
:
1175-1187
[doi]
POSTER: Stealthy SWAP-Based Side-Channel Attack on Multi-Tenant Quantum Cloud Systems
Wei Jie Bryan Lee
,
Siyi Wang
,
Suman Dutta 0001
,
Walid El Maouaki
,
Anupam Chattopadhyay
.
AsiaCCS 2025
:
1788-1790
[doi]
Unveiling Privacy Risks in Quantum Optimization Services
Mateusz Lesniak
,
Michal Wronski
,
Ewa Syta
,
Miroslaw Kutylowski
.
AsiaCCS 2025
:
665-681
[doi]
Efficient Updatable Private Information Retrieval From Simulatable Homomorphic Ciphertexts
Yini Lin
,
Haibo Tian
.
AsiaCCS 2025
:
45-57
[doi]
Telescope: Top-Down Hierarchical Pre-silicon Side-channel Leakage Assessment in System-on-Chip Design
Zhenyuan Liu
,
Andrew Malnicof
,
Arna Roy
,
Patrick Schaumont
.
AsiaCCS 2025
:
1280-1293
[doi]
Secure Steganography Based on Chaos-Aided Quantization Index Modulation
Shanxiang Lyu
,
Xinquan Xu
,
Ling Liu
,
Lip Yee Por
.
AsiaCCS 2025
:
727-738
[doi]
Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation
Seonhong Min
,
Joon-Woo Lee
,
Yongsoo Song
.
AsiaCCS 2025
:
1-12
[doi]
DTL: Data Tumbling Layer A Composable Unlinkability for Smart Contracts
Mohsen Minaei
,
Pedro Moreno-Sanchez
,
Zhiyong Fang
,
Srinivasan Raghuraman
,
Navid Alamati
,
Panagiotis Chatzigiannis
,
Ranjit Kumaresan
,
Duc V. Le
.
AsiaCCS 2025
:
971-984
[doi]
PITCH: AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response
Govind Mittal
,
Arthur Jakobsson
,
Kelly O. Marshall
,
Chinmay Hegde
,
Nasir D. Memon
.
AsiaCCS 2025
:
559-575
[doi]
From Transients to Flips: Hardware-level Bit Manipulation of In-Vehicle Serial Communication
Abdullah Zubair Mohammed
,
Ryan M. Gerdes
.
AsiaCCS 2025
:
1101-1113
[doi]
Glitch in Time: Exploiting Temporal Misalignment of IMU For Eavesdropping
Ahmed Najeeb
,
Abdul Rafay 0002
,
Muhammad Hamad Alizai
,
Naveed Anwar Bhatti
.
AsiaCCS 2025
:
530-541
[doi]
Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI
Meghali Nandi
,
Arash Shaghaghi
,
Nazatul Haque Sultan
,
Gustavo Batista
,
Raymond K. Zhao
,
Sanjay K. Jha
.
AsiaCCS 2025
:
473-487
[doi]
PRISM: To Fortify Widget Based User-App Data Exchanges Using Android Virtualization Framework
YingTat Ng
,
Zhe Chen
,
Haiqing Qiu
,
Xuhua Ding
.
AsiaCCS 2025
:
1567-1581
[doi]
Open Access Alert: Studying the Privacy Risks in Android WebView's Web Permission Enforcement
Trung Tin Nguyen
,
Ben Stock
.
AsiaCCS 2025
:
1309-1322
[doi]
Practical Deniable Post-Quantum X3DH: A Lightweight Split-KEM for K-Waay
Guilhem Niot
.
AsiaCCS 2025
:
298-312
[doi]
Monocle: Transient Execution Proof Memory Views for Runtime Compiled Code
Matteo Oldani
,
William Blair
,
Shweta Shinde
,
Matthias Neugschwandtner
.
AsiaCCS 2025
:
1188-1202
[doi]
TrustyMon: Practical Detection of DOM-based Cross-Site Scripting Attacks Using Trusted Types
Sunnyeo Park
,
Jihwan Kim
,
Seongho Keum
,
Hyunjoon Lee
,
Sooel Son
.
AsiaCCS 2025
:
1323-1337
[doi]
CryptoGuard: Lightweight Hybrid Detection and Response to Host-based Cryptojackers in Linux Cloud Environments
Gyeonghoon Park
,
Jaehan Kim
,
Jinu Choi
,
Jinwoo Kim
.
AsiaCCS 2025
:
1617-1631
[doi]
AuthentiSafe: Lightweight and Future-Proof Device-to-Device Authentication for IoT
Lukas Petzi
,
Torsten Krauß
,
Alexandra Dmitrienko
,
Gene Tsudik
.
AsiaCCS 2025
:
1050-1064
[doi]
Can You Run My Code? A Close Look at Process Injection in Windows Malware
Giorgia Di Pietro
,
Daniele Cono D'Elia
,
Leonardo Querzoni
.
AsiaCCS 2025
:
1600-1616
[doi]
Systematic Analysis of Kernel Security Performance and Energy Costs
Fabian Rauscher
,
Benedict Herzog
,
Timo Hönig
,
Daniel Gruss
.
AsiaCCS 2025
:
1676-1689
[doi]
Quantum-safe Signatureless DNSSEC
Aditya Singh Rawat
,
Mahabir Prasad Jhanwar
.
AsiaCCS 2025
:
267-282
[doi]
Evaluating Robustness of Reference-based Phishing Detectors
Eunjin Roh
,
Sungwoo Jeon
,
Sooel Son
,
Sanghyun Hong 0001
.
AsiaCCS 2025
:
591-604
[doi]
POSTER: Policy-driven security-aware scheduling in Kubernetes
Matthew Rossi
,
Michele Beretta 0001
,
Dario Facchinetti
,
Stefano Paraboschi
.
AsiaCCS 2025
:
1800-1802
[doi]
POSTER: Transparent Temporally-Specialized System Call Filters
Matthew Rossi
,
Michele Beretta 0001
,
Dario Facchinetti
,
Stefano Paraboschi
.
AsiaCCS 2025
:
1797-1799
[doi]
Generalized Adversarial Code-Suggestions: Exploiting Contexts of LLM-based Code-Completion
Karl Rubel
,
Maximilian Noppel
,
Christian Wressnegger
.
AsiaCCS 2025
:
358-374
[doi]
App-solutely Modded: Surveying Modded App Market Operators and Original App Developers
Luis Adan Saavedra
,
Hridoy S. Dutta
,
Alastair R. Beresford
,
Alice Hutchings
.
AsiaCCS 2025
:
739-758
[doi]
FIRST: FrontrunnIng Resistant Smart ConTracts
Emrah Sariboz
,
Gaurav Panwar
,
Roopa Vishwanathan
,
Satyajayant Misra
.
AsiaCCS 2025
:
873-889
[doi]
Okapi: Efficiently Safeguarding Speculative Data Accesses in Sandboxed Environments
Philipp Schmitz
,
Tobias Jauch
,
Alex Wezel
,
Mohammad Rahmani Fadiheh
,
Thore Tiemann
,
Jonah Heller
,
Thomas Eisenbarth 0001
,
Dominik Stoffel
,
Wolfgang Kunz
.
AsiaCCS 2025
:
1203-1218
[doi]
Learning to Identify Conflicts in RPKI
Haya Schulmann
,
Shujie Zhao
.
AsiaCCS 2025
:
1490-1505
[doi]
Enhancing Binary Code Similarity Analysis for Software Updates: A Contextual Diffing Framework
August See
,
Moritz Mönnich
,
Mathias Fischer 0001
.
AsiaCCS 2025
:
1724-1740
[doi]
A Quantum-Secure Framework for IoD: Strengthening Authentication and Key-Establishment
Salman Shamshad
,
Sana Belguith
,
Alma Oracevic
.
AsiaCCS 2025
:
313-326
[doi]
SoK: The Privacy Paradox of Large Language Models: Advancements, Privacy Risks, and Mitigation
Yashothara Shanmugarasa
,
Ming Ding 0001
,
Mahawaga Arachchige Pathum Chamikara
,
Thierry Rakotoarivelo
.
AsiaCCS 2025
:
425-441
[doi]
Protocols and Formal Models for Delegated Authorisation with Server-Side Secrecy
Jean Snyman
,
Chris Culnane
,
Ioana Boureanu
,
Gerault David
.
AsiaCCS 2025
:
1372-1393
[doi]
ProwseBox: A Framework for the Analysis of the Web at Scale
Dolière Francis Somé
.
AsiaCCS 2025
:
1338-1354
[doi]
Sigy: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
Supraja Sridhara
,
Andrin Bertschi
,
Benedict Schlüter
,
Shweta Shinde
.
AsiaCCS 2025
:
1643-1658
[doi]
Adversarial Fog: Exploiting the Vulnerabilities of LiDAR Point Cloud Preprocessing Filters
Yuna Tanaka
,
Kazuki Nomoto
,
Ryunosuke Kobayashi
,
Go Tsuruoka
,
Tatsuya Mori
.
AsiaCCS 2025
:
1083-1100
[doi]
POSTER: SuriCap - A Measurement Platform to Study and Evaluate Intrusion Detection Rule Engineering
Koen T. W. Teuwen
,
Emmanuele Zambon
,
Luca Allodi
.
AsiaCCS 2025
:
1818-1820
[doi]
Ruling the Unruly: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations Centers
Koen T. W. Teuwen
,
Tom Mulders
,
Emmanuele Zambon
,
Luca Allodi
.
AsiaCCS 2025
:
1428-1441
[doi]
LogaLookup: Efficient Multivariate Lookup Argument for Accelerated Proof Generation
Dien H. A. Tran
,
Tam N. B. Nguyen
,
Nhien-An Le-Khac
,
Thuc D. Nguyen
.
AsiaCCS 2025
:
215-230
[doi]
Poster: Typosquatting Attacks on the Rust Ecosystem
Minh-Khanh Vu
,
Thanh Cong Nguyen
,
Duc Ly Vu
.
AsiaCCS 2025
:
1791-1793
[doi]
Pace: Privacy-Preserving and Atomic Cross-chain Swaps for Cryptocurrency Exchanges
Jianhuan Wang
,
Bin Xiao
.
AsiaCCS 2025
:
985-1002
[doi]
Perses: Unlocking Privilege Escalation for Small LLMs via Extensible Heterogeneity
Dominik M. Weber
,
Ioannis Tzachristas
,
Aifen Sui
.
AsiaCCS 2025
:
344-357
[doi]
The Impact of Emerging Phishing Threats: Assessing Quishing and LLM-generated Phishing Emails against Organizations
Marie Weinz
,
Nicola Zannone
,
Luca Allodi
,
Giovanni Apruzzese
.
AsiaCCS 2025
:
1550-1566
[doi]
OMAD5G: Online Malware Detection in 5G Networks using Compound Paths
Zhixin Wen
,
Guanhua Yan
.
AsiaCCS 2025
:
1411-1427
[doi]
Evaluating Disassembly Errors With Only Binaries
Lambang Akbar Wijayadi
,
Yuancheng Jiang
,
Roland H. C. Yap
,
Zhenkai Liang
,
Zhuohao Liu
.
AsiaCCS 2025
:
1741-1755
[doi]
Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension
Mingli Wu
,
Tsz Hon Yuen
,
Siu-Ming Yiu
.
AsiaCCS 2025
:
104-117
[doi]
EXAM: Exploiting Exclusive System-Level Cache in Apple M-Series SoCs for Enhanced Cache Occupancy Attacks
Tianhong Xu
,
Aidong Adam Ding
,
Yunsi Fei
.
AsiaCCS 2025
:
1294-1308
[doi]
An Empirical Study on Cross-chain Transactions: Costs, Inconsistencies, and Activities
Kailun Yan
,
Bo Lu
,
Pranav Agrawal 0002
,
Jiasun Li
,
Wenrui Diao
,
Xiaokuan Zhang
.
AsiaCCS 2025
:
939-954
[doi]
Mining Attack with Zero Knowledge in the Blockchain
Jiaping Yu
,
Shang Gao 0006
,
Rui Song
,
Zhiping Cai
,
Bin Xiao 0001
.
AsiaCCS 2025
:
890-905
[doi]
POSTER: When Models Speak Too Much: Privacy Leakage on Large Language Models
Mingjun Zhang
,
Mahrokh Abdollahi
,
Thilina Ranbaduge
,
Ming Ding 0001
.
AsiaCCS 2025
:
1809-1811
[doi]
REFLECTA: Reflection-based Scalable and Semantic Scripting Language Fuzzing
Chibin Zhang
,
Gwangmu Lee
,
Qiang Liu 0034
,
Mathias Payer
.
AsiaCCS 2025
:
1772-1787
[doi]
Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems
Xugui Zhou
,
Anqi Chen
,
Maxfield Kouzel
,
Haotian Ren
,
Morgan McCarty
,
Cristina Nita-Rotaru
,
Homa Alemzadeh
.
AsiaCCS 2025
:
1065-1082
[doi]
VeRange: Verification-efficient Zero-knowledge Range Arguments with Transparent Setup for Blockchain Applications and More
Yue Zhou
,
Sid Chi-Kin Chau
.
AsiaCCS 2025
:
823-838
[doi]
Sign in
or
sign up
to see more results.