It is our great pleasure to welcome you to the 16th ACM ASIA Conference on Computer and Communications Security 2021 (ACM ASIACCS 2021).
Planning for ASIACCS 2021 began more than a year ago as a physical event in Hong Kong. However, due to the global COVID-19 pandemic and the resulting travel restrictions, it was decided in early 2021 that the conference will be hosted wholly online. Despite the change, this year's conference continues and extends its tradition as a premier venue for researchers and practitioners to present and discuss the latest security and privacy research. As in the past, the conference program also includes pre-conference workshops on specific subjects. To create a more interactive virtual experience for all participants through this challenging period, we also prepared an online social event to provide the participants with additional social networking opportunities.
ASIACCS 2021 has benefited from many contributors for its success. We would like to thank the authors and the program committee for the outstanding program. We are grateful to the distinguished keynote speakers, Prof. Somesh Jha, Prof. Kui Ren, and Prof. Elaine Shi. We are deeply indebted to the organizing committee, including the Program Chairs: Zhiqiang Lin and Moti Yung; Local Organization Chair: Xiapu Luo; Publicity Chair: Weizhi Meng; Finance Chair: Dennis Y. W. Liu; Workshop Chair: Cong Wang; Publication Chair: Tsz Hon Yuen; Poster Chair: Yajin Zhou. We would like to express our deep gratitude to the steering committee for their valuable support and suggestions.
(Mis)managed: A Novel TLB-based Covert Channel on GPUs
GPUs are now commonly available in most modern computing platforms. They are increasingly being adopted in cloud platforms and data centers due to their immense computing capability. In response to this growth in usage, manufacturers continuously try to ...
Scanning the Cycle: Timing-based Authentication on PLCs
Programmable Logic Controllers (PLCs) are a core component of an Industrial Control System (ICS). However, if a PLC is compromised or the commands sent across a network from the PLCs are spoofed, consequences could be catastrophic. In this work, a novel ...
Transduction Shield: A Low-Complexity Method to Detect and Correct the Effects of EMI Injection Attacks on Sensors
The reliability of control systems often relies on the trustworthiness of sensors. As process automation and robotics keep evolving, sensing methods such as pressure sensing are extensively used in both conventional systems and rapidly emerging ...
Cited By
-
Chaudhari A, Pawar A, Pawar A, Pawar A and Pawar G (2023). A Comprehensive Study on Authentication Systems 2023 7th International Conference On Computing, Communication, Control And Automation (ICCUBEA), 10.1109/ICCUBEA58933.2023.10392029, 979-8-3503-0426-8, (1-5)
-
Jiang Z, Li R, Tang C and Xia J (2022). BugAnaBench: benchmark for software vulnerability analysis and its construction method Second International Symposium on Computer Technology and Information Science (ISCTIS 2022), 10.1117/12.2653414, 9781510660557, (2)
- Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
ASIACCS '18 | 310 | 52 | 17% |
ASIA CCS '17 | 359 | 67 | 19% |
ASIA CCS '16 | 350 | 73 | 21% |
ASIA CCS '15 | 269 | 48 | 18% |
ASIA CCS '14 | 255 | 50 | 20% |
ASIA CCS '13 | 216 | 35 | 16% |
ASIACCS '11 | 217 | 35 | 16% |
ASIACCS '10 | 166 | 25 | 15% |
ASIACCS '07 | 180 | 33 | 18% |
Overall | 2,322 | 418 | 18% |