 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
ASIA
CCS '17 Table of Contents
Foreword
Ahmad-Reza Sadeghi (TU Darmstadt)
Xun Yi (RMIT University)
William Enck (North Carolina State University)
Long Lu (Stony Brook University)
ASIA
CCS'17 Organizing Committee
ASIA
CCS'17 Sponsor & Supporters
|
| (Return
to Top) |
Keynote & Invited Talks
Hardware
Trojans and Other Threats against Embedded Systems (Page
1)
Christof Paar (Ruhr Universitat Bochum & University of Massachusetts
- Amherst)
Advanced
Security Research in the Era of the Internet of Things (Page
2)
Gregory Akers (Cisco Systems)
CoverUp:
Privacy Through "Forced" Participation in Anonymous Communication Networks (Page
3)
David Sommer (ETH Zurich)
Aritra Dhar (ETH Zurich)
Luka Malisa (ETH Zurich)
Esfandiar Mohammadi (ETH Zurich)
Daniel Ronzani (Ronzani Schlauri Attorneys)
Srdjan Capkun (ETH Zurich)
Control-Flow
Hijacking: Are We Making Progress? (Page
4)
Mathias Payer (Purdue University)
Security
in Personal Genomics: Lest We Forget (Page
5)
Gene Tsudik (University of California, Irvine)
The
Case for System Command Encryption (Page
6)
Marc Beunardeau (Ecole normale supérieure)
Aisling Connolly (Ecole normale supérieure)
Rémi Géraud (Ecole normale supérieure)
David Naccache (Ecole normale supérieure) |
| (Return
to Top) |
Session: SGX
Session Chair:
Mathias Payer (Purdue University)
Detecting
Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu (Page
7)
Sanchuan Chen (The Ohio State University)
Xiaokuan Zhang (The Ohio State University)
Michael K. Reiter (University of North Carolina)
Yinqian Zhang (The Ohio State University)
SGX-Log:
Securing System Logs With SGX (Page
19)
Vishal Karande (University of Texas at Dallas)
Erick Bauman (University of Texas at Dallas)
Zhiqiang Lin (University of Texas at Dallas)
Latifur Khan (University of Texas at Dallas)
The
Circle Game: Scalable Private Membership Test Using Trusted Hardware (Page
31)
Sandeep Tamrakar (Aalto University)
Jian Liu (Aalto University)
Andrew Paverd (Aalto University)
Jan-Erik Ekberg (Darkmatter)
Benny Pinkas (Bar-Ilan University)
N. Asokan (Aalto University & University of Helsinki) |
| (Return
to Top) |
Session: Mobile Apps & Markets
Session Chair:
William Enck (North Carolina State University)
To
Update or Not to Update: Insights from a Two-Year Study of Android App
Evolution (Page
45)
Vincent F. Taylor (University of Oxford)
Ivan Martinovic (University of Oxford)
Toward
Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets (Page
58)
Hao Chen (East China Normal University)
Daojing He (East China Normal University)
Sencun Zhu (The Pennsylvania State University)
Jingshun Yang (East China Normal University)
Collusive
Data Leak and More: Large-scale Threat Analysis of Inter-app Communications (Page
71)
Amiangshu Bosu (Southern Illinois University Carbondale)
Fang Liu (Virginia Tech)
Danfeng (Daphne) Yao (Virginia Tech)
Gang Wang (Virginia Tech) |
| (Return
to Top) |
Session: Embedded Systems Security 1
Session Chair:
Daphne Yao (Virginia Polytechnic Institute & State University)
Lightweight
Swarm Attestation: A Tale of Two LISA-s (Page
86)
Xavier Carpent (University of California, Irvine)
Karim ElDefrawy (SRI International)
Norrathep Rattanavipanon (University of California, Irvine)
Gene Tsudik (University of California, Irvine)
Model-based
Attack Detection Scheme for Smart Water Distribution Networks (Page
101)
Chuadhry Mujeeb Ahmed (Singapore University of Technology and Design)
Carlos Murguia (Singapore University of Technology and Design)
Justin Ruths (University of Texas Dallas)
Towards
Formal Security Analysis of Industrial Control Systems (Page
114)
Marco Rocchetto (University of Luxembourg)
Nils Ole Tippenhauer (Singapore University of Technology and Design)
Memory
Safety for Embedded Devices with nesCheck (Page
127)
Daniele Midi (Purdue University)
Mathias Payer (Purdue University)
Elisa Bertino (Purdue University) |
| (Return
to Top) |
Session: Memory Corruption Att. & Def.
Session Chair:
Heng Yin (University of California, Riverside)
Strict
Virtual Call Integrity Checking for C++ Binaries (Page
140)
Mohamed Elsabagh (George Mason University)
Dan Fleck (George Mason University)
Angelos Stavrou (George Mason University)
BinSequence:
Fast, Accurate and Scalable Binary Code Reuse Detection (Page
155)
He Huang (Concordia University)
Amr M. Youssef (Concordia University)
Mourad Debbabi (Concordia University)
PrivWatcher:
Non-bypassable Monitoring and Protection of Process Credentials from
Memory Corruption Attacks (Page
167)
Quan Chen (North Carolina State University)
Ahmed M. Azab (Samsung Research America)
Guruprasad Ganesh (Samsung Research America)
Peng Ning (Samsung Research America)
Breaking
Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial
Apps (Page 179)
Taehun Kim (Seoul National University)
Hyeonmin Ha (Seoul National University)
Seoyoon Choi (SAP Labs, Korea)
Jaeyeon Jung (Samsung Electronics)
Byung-Gon Chun (Seoul National University)
DataShield:
Configurable Data Confidentiality and Integrity (Page
193)
Scott A. Carr (Purdue University)
Mathias Payer (Purdue University) |
| (Return
to Top) |
Session: Encryption
Session Chair:
Di Ma (University of Michigan)
Functional
Encryption with Oblivious Helper (Page
205)
Pierre-Alain Dupont (DGA, CNRS, INRIA, & ENS/PSL Research University)
David Pointcheval (CNRS, INRIA, & ENS/PSL Research University)
Mis-operation
Resistant Searchable Homomorphic Encryption (Page
215)
Keita Emura (National Institute of Information and Communications
Technology)
Takuya Hayashi (National Institute of Information and Communications
Technology)
Noboru Kunihiro (The University of Tokyo & JST CREST)
Jun Sakuma (University of Tsukuba, JST CREST, & RIKEN Center for
AIP)
A
Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext
Size and Fast Decryption (Page
230)
Qutaibah M. Malluhi (Qatar University)
Abdullatif Shikfa (Qatar University)
Viet Cuong Trinh (Qatar University and Hong Duc University)
On
the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against
(Malicious) Randomness Failures (Page
241)
Jacob C. N. Schuldt (AIST)
Kazumasa Shinagawa (AIST & University of Tsukuba) |
| (Return
to Top) |
Session: Cloud Security
Session Chair:
Dieter Gollmann (Hamburg University of Technology)
DoS
Attacks on Your Memory in Cloud (Page
253)
Tianwei Zhang (Princeton University)
Yinqian Zhang (The Ohio State University)
Ruby B. Lee (Princeton University)
Side
Channels in Deduplication: Trade-offs between Leakage and Efficiency (Page
266)
Frederik Armknecht (University of Mannheim)
Colin Boyd (Norwegian University of Science and Technology)
Gareth T. Davies (Norwegian University of Science and Technology)
Kristian Gjøsteen (Norwegian University of Science and Technology)
Mohsen Toorani (University of Bergen)
Sharing
Proofs of Retrievability across Tenants (Page
275)
Frederik Armknecht (University of Mannheim)
Jens-Matthias Bohli (NEC Laboratories Europe & Hochschule Mannheim)
David Froelicher (NEC Laboratories Europe)
Ghassan O. Karame (NEC Laboratories Europe)
Cache-Based
Application Detection in the Cloud Using Machine Learning (Page
288)
Berk Gulmezoglu (Worcester Polytechnic Institute)
Thomas Eisenbarth (Worcester Polytechnic Institute)
Berk Sunar (Worcester Polytechnic Institute) |
| (Return
to Top) |
Session: Password & Auth 1
Session Chair:
Jianying Zhou (Institute for Infocomm Research)
VTBPEKE:
Verifier-based Two-Basis Password Exponential Key Exchange (Page
301)
David Pointcheval (CNRS, INRIA, ENS/PSL Research University)
Guilin Wang (Huawei)
Boosting
the Guessing Attack Performance on Android Lock Patterns with Smudge
Attacks (Page 313)
Seunghun Cha (Sungkyunkwan University)
Sungsu Kwag (Sungkyunkwan University)
Hyoungshick Kim (Sungkyunkwan University)
Jun Ho Huh (Honeywell ACS Labs)
Short
Paper - What You See is Not What You Get: Leakage-Resilient Password
Entry Schemes for Smart Glasses (Page
327)
Yan Li (Singapore Management University)
Yao Cheng (Singapore Management University)
Yingjiu Li (Singapore Management University)
Robert H. Deng (Singapore Management University) |
| (Return
to Top) |
Session: Vulnerability Analysis
Session Chair:
Manuel Egele (Boston University)
Pinpointing
Vulnerabilities (Page
334)
Yue Chen (Florida State University)
Mustakimur Khandaker (Florida State University)
Zhi Wang (Florida State University)
Extracting
Conditional Formulas for Cross-Platform Bug Search (Page
346)
Qian Feng (Syracuse University)
Minghua Wang (BaiDu X-Lab)
Mu Zhang (NEC Laboratories America)
Rundong Zhou (Syracuse University)
Andrew Henderson (Syracuse University)
Heng Yin (University of California, Riverside)
Discovering
Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing (Page
360)
Mathy Vanhoef (KU Leuven)
Domien Schepers (KU Leuven)
Frank Piessens (KU Leuven) |
| (Return
to Top) |
Session: Password & Auth 2
Session Chair:
Gene Tsudik (University of California, Irvine)
Understanding
Human-Chosen PINs: Characteristics, Distribution and Security (Page
372)
Ding Wang (Peking University)
Qianchen Gu (Peking University)
Xinyi Huang (Fujian Normal University)
Ping Wang (Peking University)
Evaluating
Behavioral Biometrics for Continuous Authentication: Challenges and
Metrics (Page 386)
Simon Eberz (University of Oxford)
Kasper B. Rasmussen (University of Oxford)
Vincent Lenders (armasuisse)
Ivan Martinovic (University of Oxford)
Short
Paper - Pass-O: A Proposal to Improve the Security of Pattern Unlock
Scheme (Page 400)
Harshal Tupsamudre (TCS Research)
Vijayanand Banahatti (TCS Research)
Sachin Lodha (TCS Research)
Ketan Vyas (TCS Research) |
| (Return
to Top) |
Session: Storage Security
Session Chair:
Long Lu (Stony Brook University)
Proofs
of Data Residency: Checking whether Your Cloud Files Have Been Relocated (Page
408)
Hung Dang (National University of Singapore)
Erick Purwanto (National University of Singapore)
Ee-Chien Chang (National University of Singapore)
EncKV:
An Encrypted Key-value Store with Rich Queries (Page
423)
Xingliang Yuan (City University of Hong Kong)
Yu Guo (City University of Hong Kong)
Xinyu Wang (City University of Hong Kong)
Cong Wang (City University of Hong Kong)
Baochun Li (University of Toronto)
Xiaohua Jia (City University of Hong Kong)
MoPS:
A Modular Protection Scheme for Long-Term Storage (Page
436)
Christian Weinert (TU Darmstadt)
Denise Demirel (TU Darmstadt)
Martín Vigil (UFSC)
Matthias Geihs (TU Darmstadt)
Johannes Buchmann (TU Darmstadt)
Updatable
Block-Level Message-Locked Encryption (Page
449)
Yongjun Zhao (The Chinese University of Hong Kong)
Sherman S. M. Chow (The Chinese University of Hong Kong)
SHORT
PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity,
and Confidentiality (Page
461)
Johannes Braun (TU Darmstadt)
Johannes Buchmann (TU Darmstadt)
Denise Demirel (TU Darmstadt)
Matthias Geihs (TU Darmstadt)
Mikio Fujiwara (NICT)
Shiho Moriai (NICT)
Masahide Sasaki (NICT)
Atsushi Waseda (NICT) |
| (Return
to Top) |
Session: Malware & Machine Learning 1
Session Chair:
Ivan Martinovic (University of Oxford)
Scaling
and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language
Generation (Page
469)
Shahryar Baki (University of Houston)
Rakesh Verma (University of Houston)
Arjun Mukherjee (University of Houston)
Omprakash Gnawali (University of Houston)
On
the Detection of Kernel-Level Rootkits Using Hardware Performance Counters (Page
483)
Baljit Singh (Qatar University)
Dmitry Evtyushkin (State University of New York at Binghamton)
Jesse Elwell (Vencore Labs)
Ryan Riley (Qatar University)
Iliano Cervesato (Carnegie Mellon University)
Gossip:
Automatically Identifying Malicious Domains from Mailing List Discussions (Page
494)
Cheng Huang (Sichuan University)
Shuang Hao (University of California, Santa Barbara)
Luca Invernizzi (University of California, Santa Barbara)
Jiayong Liu (Sichuan University)
Yong Fang (Sichuan University)
Christopher Kruegel (University of California, Santa Barbara & Lastline,
Inc.)
Giovanni Vigna (University of California, Santa Barbara & Lastline,
Inc.)
Practical
Black-Box Attacks against Machine Learning (Page
506)
Nicolas Papernot (Pennsylvania State University)
Patrick McDaniel (Pennsylvania State University)
Ian Goodfellow (OpenAI)
Somesh Jha (University of Wisconsin)
Z. Berkay Celik (Pennsylvania State University)
Ananthram Swami (US Army Research Laboratory) |
| (Return
to Top) |
Session: Privacy
Session Chair:
Cong Wang (City University of Hong Kong, Hong Kong)
Secure
Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation (Page
520)
Alexandra Dmitrienko (ETH Zurich)
David Noack (Technische Universität Darmstadt)
Moti Yung (Snapchat, Inc. & Columbia University)
Privacy-preserving
and Optimal Interval Release for Disease Susceptibility (Page
532)
Kosuke Kusano (University of Tsukuba)
Ichiro Takeuchi (Nagoya Institute of Technology & RIKEN Center for
AIP)
Jun Sakuma (University of Tsukuba, JST CREST, & RIKEN Center for
AIP)
Towards
Extending Noiseless Privacy - Dependent Data and More Practical Approach (Page
546)
Krzysztof Grining (Wroclaw University of Science and Technology)
Marek Klonowski (Wroclaw University of Science and Technology)
BlindIDS:
Market-Compliant and Privacy-Friendly Intrusion Detection System over
Encrypted Traffic (Page
561)
Sébastien Canard (Orange Labs)
Aïda Diop (Orange Labs)
Nizar Kheir (Thales Group)
Marie Paindavoine (Orange Labs)
Mohamed Sabt (DejaMobile) |
| (Return
to Top) |
Session: Malware & Machine Learning 2
Session Chair:
Robert H. Deng (Singapore Management University, Singapore)
The
Role of Hosting Providers in Fighting Command and Control Infrastructure
of Financial Malware (Page
575)
Samaneh Tajalizadehkhoob (Delft University of Technology)
Carlos Gañán (Delft University of Technology)
Arman Noroozian (Delft University of Technology)
Michel van Eeten (Delft University of Technology)
Automatically
Inferring Malware Signatures for Anti-Virus Assisted Attacks (Page
587)
Christian Wressnegger (TU Braunschweig)
Kevin Freeman (University of Göttingen)
Fabian Yamaguchi (TU Braunschweig)
Konrad Rieck (TU Braunschweig)
PAYBREAK:
Defense Against Cryptographic Ransomware (Page
599)
Eugene Kolodenker (Boston University & MITRE)
William Koch (Boston University)
Gianluca Stringhini (University College London)
Manuel Egele (Boston University) |
| (Return
to Top) |
Session: Mobile Security 1
Session Chair:
N. Asokan (Aalto University)
SPOKE:
Scalable Knowledge Collection and Attack Surface Analysis of Access
Control Policy for Security Enhanced Android (Page
612)
Ruowen Wang (Samsung Research America)
Ahmed M. Azab (Samsung Research America)
William Enck (North Carolina State University)
Ninghui Li (Purdue University)
Peng Ning (Samsung Research America)
Xun Chen (Samsung Research America)
Wenbo Shen (Samsung Research America)
Yueqiang Cheng (Samsung Research America)
Android
Database Attacks Revisited (Page
625)
Behnaz Hassanshahi (National University of Singapore)
Roland H. C. Yap (National University of Singapore)
TriFlow:
Triaging Android Applications using Speculative Information Flows (Page
640)
Omid Mirzaei (Universidad Carlos III de Madrid)
Guillermo Suarez-Tangil (University College London)
Juan Tapiador (Universidad Carlos III de Madrid)
Jose M. de Fuentes (Universidad Carlos III de Madrid) |
| (Return
to Top) |
Session: Mobile Security 2
Session Chair:
Andrew Paverd (Aalto University)
Secure
Integration of Web Content and Applications on Commodity Mobile Operating
Systems (Page 652)
Drew Davidson (University of Wisconsin-Madison)
Yaohui Chen (Stony Brook University)
Franklin George (Stony Brook University)
Long Lu (Stony Brook University)
Somesh Jha (University of Wisconsin-Madison)
DroidForensics:
Accurate Reconstruction of Android Attacks via Multi-layer Forensic
Logging (Page 666)
Xingzi Yuan (University of Georgia)
Omid Setayeshfar (University of Georgia)
Hongfei Yan (University of Georgia)
Pranav Panage (University of Georgia)
Xuetao Wei (University of Cincinnati)
Kyu Hyung Lee (University of Georgia)
DroidPill:
Pwn Your Daily-Use Apps (Page
678)
Chaoting Xuan (VMWare)
Gong Chen (Georgia Institute of Technology)
Erich Stuntebeck (VMWare) |
| (Return
to Top) |
Session: Side Channel Attacks
Session Chair:
Hoda A. Khezaimy (Emirates Advanced Investment Group)
Securing
Memory Encryption and Authentication Against Side-Channel Attacks Using
Unprotected Primitives (Page
690)
Thomas Unterluggauer (Graz University of Technology)
Mario Werner (Graz University of Technology)
Stefan Mangard (Graz University of Technology)
Don't
Skype & Type! Acoustic Eavesdropping in Voice-Over-IP (Page
703)
Alberto Compagno (Sapienza University of Rome)
Mauro Conti (University of Padua)
Daniele Lain (University of Padua)
Gene Tsudik (University of California, Irvine)
Hit
by the Bus: QoS Degradation Attack on Android (Page
716)
Mehmet Sinan Inci (Worcester Polytechnic Institute)
Thomas Eisenbarth (Worcester Polytechnic Institute)
Berk Sunar (Worcester Polytechnic Institute) |
| (Return
to Top) |
Session: Embedded Systems Security 2
Session Chair:
Michail Maniatakos (New York University Abu Dhabi)
DRIVE:
Dynamic Runtime Integrity Verification and Evaluation (Page
728)
Andre Rein (Huawei Technologies)
An
Attack Against Message Authentication in the ERTMS Train to Trackside
Communication Protocols (Page
743)
Tom Chothia (University of Birmingham)
Mihai Ordean (University of Birmingham)
Joeri de Ruiter (Radboud University)
Richard J. Thomas (University of Birmingham)
Using
Program Analysis to Synthesize Sensor Spoofing Attacks (Page
757)
Ivan Pustogarov (Cornell Tech)
Thomas Ristenpart (Cornell Tech)
Vitaly Shmatikov (Cornell Tech)
Short
Paper - SCM: Secure Code Memory Architecture (Page
771)
Ruan de Clercq (KU Leuven)
Ronald de Keulenaer (Ghent University)
Pieter Maena (KU Leuven)
Bart Preneel (KU Leuven)
Bjorn De Sutter (Ghent University)
Ingrid Verbauwhede (KU Leuven) |
| (Return
to Top) |
Session: Applied Crypto
Session Chair:
Frederik Armknecht (University of Mannheim)
Group
Signatures with Time-bound Keys Revisited: A New Model and an Efficient
Construction (Page
777)
Keita Emura (National Institute of Information and Communications
Technology)
Takuya Hayashi (National Institute of Information and Communications
Technology)
Ai Ishida (Tokyo Institute of Technology & National Institute of
Advanced Industrial Science and Technology)
Almost
Universal Forgery Attacks on the COPA and Marble Authenticated Encryption
Algorithms (Page
789)
Jiqiang Lu (Institute for Infocomm Research)
A
Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding
Protocol (Page
800)
Gildas Avoine (INSA & IRISA Rennes)
Xavier Bultel (Université Clermont Auvergne)
Sébastien Gambs (Université du Québec à Montréal)
David Gérault (Université Clermont Auvergne)
Pascal Lafourcade (Université Clermont Auvergne)
Cristina Onete (INSA/IRISA Rennes)
Jean-Marc Robert (École de Technologie Supérieure)
Heterogeneous
Rainbow Table Widths Provide Faster Cryptanalyses (Page
815)
Gildas Avoine (INSA Rennes & IRISA)
Xavier Carpent (University of California, Irvine)
An
Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard
Assumption (Page
823)
Jongkil Kim (CSIRO)
Willy Susilo (University of Wollongong)
Fuchun Guo (University of Wollongong)
Man Ho Au (The Hong Kong Polytechnic University)
Surya Nepal (CSIRO) |
| (Return
to Top) |
Session: Web & Network Security
Session Chair:
Christina Pöpper (New York University Abu Dhabi)
SECRET:
On the Feasibility of a Secure, Efficient, and Collaborative Real-Time
Web Editor (Page
835)
Dennis Felsch (Ruhr-University Bochum)
Christian Mainka (Ruhr-University Bochum)
Vladislav Mladenov (Ruhr-University Bochum)
Jörg Schwenk (Ruhr-University Bochum)
WedgeTail:
An Intrusion Prevention System for the Data Plane of Software Defined
Networks (Page
849)
Arash Shaghaghi (The University of New South Wales & Data61, CSIRO)
Mohamed Ali Kaafar (Data61, CSIRO)
Sanjay Jha (The University of New South Wales)
The
Case for In-Network Replay Suppression (Page
862)
Taeho Lee (ETH Zürich)
Christos Pappas (ETH Zürich)
Adrian Perrig (ETH Zürich)
Virgil Gligor (Carnegie Mellon University)
Yih-Chun Hu (University of Illinois at Urbana-Champaign)
Taming
Asymmetric Network Delays for Clock Synchronization Using Power Grid
Voltage (Page 874)
Dima Rabadi (Singapore University of Technology and Design & Advanced
Digital Science Center, Illinois at Singapore)
Rui Tan (Nanyang Technological University)
David K. Y. Yau (Singapore University of Technology and Design &
Advanced Digital Science Center, Illinois at Singapore)
Sreejaya Viswanathan (Advanced Digital Science Center, Illinois at
Singapore)
Accurate
Manipulation of Delay-based Internet Geolocation (Page
887)
AbdelRahman Abdou (Carleton University)
Ashraf Matrawy (Carleton University)
Paul C. van Oorschot (Carleton University) |
| (Return
to Top) |
Demonstrations
BRIDEMAID:
An Hybrid Tool for Accurate Detection of Android Malware (Page
899)
Fabio Martinelli (IIT-CNR)
Francesco Mercaldo (IIT-CNR)
Andrea Saracino (IIT-CNR)
How
Discover a Malware using Model Checking (Page
902)
Fabio Martinelli (IIT-CNR)
Francesco Mercaldo (IIT-CNR)
Vittoria Nardone (University of Sannio)
Antonella Santone (University of Sannio) |
| (Return
to Top) |
Posters
POSTER:
Enabling End-Users to Protect their Privacy (Page
905)
Mahmoud Barhamgi (The Open University & Claude Bernard University)
Mu Yang (The Open University)
Chia-Mu Yu (National Chung Hsing University)
Yijun Yu (The Open University)
Arosha K. Bandara (The Open University)
Djamal Benslimane (Claude Bernard University)
Bashar Nuseibeh (The Open University The Irish Software Research
Centre)
POSTER:
Detecting Inter-App Information Leakage Paths (Page
908)
Shweta Bhandari (MNIT Jaipur)
Frederic Herbreteau (University of Bordeaux)
Vijay Laxmi (MNIT Jaipur)
Akka Zemmari (University of Bordeaux)
Partha S. Roop (The University of Auckland)
Manoj Singh Gaur (MNIT Jaipur)
POSTER:
Detection of Information Leaks via Reflection in Android Apps (Page
911)
Jyoti Gajrani (MNIT Jaipur)
Li Li (SnT, University of Luxembourg)
Vijay Laxmi (MNIT)
Meenakshi Tripathi (MNIT)
Manoj Singh Gaur (MNIT)
Mauro Conti (University of Padua)
POSTER:
Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance
System (Page 914)
Kai Jansen (Ruhr-University Bochum)
Matthias Schäfer (University of Kaiserslautern)
Vincent Lenders (armasuisse)
Christina Pöpper (New York University Abu Dhabi)
Jens Schmitt (University of Kaiserslautern)
POSTER:
Traffic Analysis Attacks in Anonymity Networks (Page
917)
Katharina Siobhan Kohls (Ruhr-University)
Christina Poepper (New York University)
POSTER:
Quantitative Security Assessment Method based on Entropy for Moving
Target Defense (Page
920)
Duohe Ma (CAS)
Liming Wang (CAS)
Cheng Lei (China National Digital Switching System Engineering &
Technological Research Center)
Zhen Xu (CAS)
Hongqi Zhang (China National Digital Switching System Engineering
& Technological Research Center)
Meng Li (Hong Kong Baptist University)
POSTER:
A Behavioral Biometric Authentication Framework on Smartphones (Page
923)
Ahmed Mahfouz (Minia University)
Tarek M. Mahmoud (Minia University & Canadian Interntional College)
Ahmed Sharaf Eldin (Helwan University & Sinai University)
POSTER:
A Secure, Practical & Safe Packet Spoofing Service (Page
926)
Will Scott (NYUAD) |
| |
|