Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


ŕ Nijeholt, Hidde Lycklama

BCC'17 ~ DecReg: A Framework for Preventing Double-Financing using Blockchain Technology


Abadi, Martín

CCS'16 ~ Deep Learning with Differential Privacy


Abdelraheem, Mohamed Ahmed

CCSW'16 ~ Executing Boolean Queries on an Encrypted Bitmap Index


Abdou, AbdelRahman

ASIA CCS'17 ~ Accurate Manipulation of Delay-based Internet Geolocation


Abera, Tigist

CCS'16 ~ C-FLAT: Control-Flow Attestation for Embedded Systems Software


Aberer, Karl

CODASPY'17 ~ "If You Can't Beat them Join them": A Usability Approach to Interdependent Privacy in Cloud Apps


Abidin, Aysajan

SACMAT'17 ~ Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication


Abrath, Bert

SPRO'16 ~ Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks


Achleitner, Stefan

MIST'16 ~ Cyber Deception: Virtual Networks to Defend Insider Reconnaissance


Adhikari, Anku

CCS'16 ~ Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets


Agrafiotis, Ioannis

MIST'16 ~ A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models

MIST'16 ~ A Tripwire Grammar for Insider Threat Detection


Agrawal, Anand

CPS-SPC'16 ~ Towards High-Interaction Virtual ICS Honeypots-in-a-Box


Ahamad, Mustaque

SPSM'16 ~ Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks


Ahmadi, Mansour

SPSM'16 ~ Detecting Misuse of Google Cloud Messaging in Android Badware

CODASPY'17 ~ DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware


Ahmadinejad, Seyed Hossein

SACMAT'17 ~ An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms


Ahmadvand, Mohsen

CODASPY'17 ~ Detecting Patching of Executables without System Calls


Ahmed, Chuadhry Mujeeb

ASIA CCS'17 ~ Model-based Attack Detection Scheme for Smart Water Distribution Networks


Ahmed, Irfan

WiSec'17 ~ Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers


Ahmed, Noor O.

MTD'16 ~ Mayflies: A Moving Target Defense Framework for Distributed Systems


Ahmed, Tahmina

CODASPY'17 ~ Classifying and Comparing Attribute-Based and Relationship-Based Access Control


Ahn, Gail-Joon

CODASPY'17 ~ CODASPY'17 Conference/General Chairs' Welcome Message

SACMAT'17 ~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control

SDN-NFVSec'17 ~ SDN-NFV Sec'17 Conference/General Chairs' Welcome Message

SACMAT'17 ~ Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks


Akand, Md Mamunur Rashid

CCS'16 ~ POSTER: Privacy Enhanced Secure Location Verification


Akers, Gregory

ASIA CCS'17 ~ Advanced Security Research in the Era of the Internet of Things


Akram, Raja Naeem

CPSS'17 ~ Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay


Alaggan, Mohammad

IWSPA'17 ~ Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors


Alan, Hasan Faik

WiSec'17 ~ Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic?


Albanese, Massimiliano

MTD'16 ~ A Moving Target Defense Approach to Disrupting Stealthy Botnets

MTD'16 ~ Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis


Al-Bassam, Mustafa

BCC'17 ~ SCPKI: A Smart Contract-based PKI and Identity System


Albrecht, Martin R.

CCS'16 ~ A Surfeit of SSH Cipher Suites


Alderman, James

SACMAT'17 ~ A Framework for the Cryptographic Enforcement of Information Flow Policies


Alhuzali, Abeer

CCS'16 ~ Chainsaw: Chained Automated Workflow-based Exploit Generation


Ali-Gombe, Aisha

WiSec'17 ~ Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers


Alrwais, Sumayah

CCS'16 ~ Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service


Alsaleh, Mohammed Noraden

SafeConfig'16 ~ Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks


Al-Shaer, Ehab

MTD'16 ~ Formal Approach for Resilient Reachability based onEnd-System Route Agility

MTD'16 ~ INVITED TALK: A Cyber Mutation: Metrics, Techniques and Future Directions

MTD'16 ~ Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers

SafeConfig'16 ~ Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks


Alshamrani, Adel

SDN-NFVSec'17 ~ Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments


Alzaylaee, Mohammed K.

IWSPA'17 ~ EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning


Aman, Muhammad N.

IoTPTS'17 ~ Secure Data Provenance for the Internet of Things


Amann, Johanna

SDN-NFVSec'17 ~ Viable Protection of High-Performance Networks through Hardware/Software Co-Design


Ambrosin, Moreno

WiSec'17 ~ POSTER: Toward a Secure and Scalable Attestation

CCS'16 ~ SANA: Secure and Scalable Aggregate Network Attestation


Amira, Abdelouahab

CODASPY'17 ~ Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications


Amir-Mohammadian, Sepehr

PLAS'16 ~ In-Depth Enforcement of Dynamic Integrity Taint Analysis


Anand, S Abhishek

WiSec'17 ~ Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise


Anderson, Blake

AISec'16 ~ Identifying Encrypted Malware Traffic with Contextual Flow Data


Anderson, Hyrum S.

AISec'16 ~ DeepDGA: Adversarially-Tuned Domain Generation and Detection


Androulaki, Elli

CCS'16 ~ 8th ACM Cloud Computing Security Workshop

CCSW'16 ~ Foreword


Aniello, Leonardo

CODASPY'17 ~ Share a pie? Privacy-Preserving Knowledge Base Export through Count-min Sketches


Antonioli, Daniele

CPS-SPC'16 ~ Towards High-Interaction Virtual ICS Honeypots-in-a-Box


Aono, Yoshinori

SCC'17 ~ Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption


Apon, Daniel

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs

CCS'16 ~ POPE: Partial Order Preserving Encoding


Araki, Toshinori

CCS'16 ~ Demo: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation

CCS'16 ~ High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority


Archer, David W.

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs


Argones Rúa, Enrique

SACMAT'17 ~ Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication


Argyros, George

CCS'16 ~ SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning


Arias, Emilio Jesús Gallego

CCS'16 ~ Differentially Private Bayesian Programming


Ariu, Davide

SPSM'16 ~ Detecting Misuse of Google Cloud Messaging in Android Badware


Armknecht, Frederik

SCC'17 ~ Cloud Storage File Recoverability

ASIA CCS'17 ~ Sharing Proofs of Retrievability across Tenants

ASIA CCS'17 ~ Side Channels in Deduplication: Trade-offs between Leakage and Efficiency


Arndt, Stephan

CCS'16 ~ POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems


Arp, Daniel

CODASPY'17 ~ Mining Attributed Graphs for Threat Intelligence


Arzt, Steven

SPSM'16 ~ Detecting Misuse of Google Cloud Messaging in Android Badware


Ashby, Alex

MIST'16 ~ Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes


Asokan, N.

CCS'16 ~ C-FLAT: Control-Flow Attestation for Embedded Systems Software

WiSec'17 ~ Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments

ASIA CCS'17 ~ The Circle Game: Scalable Private Membership Test Using Trusted Hardware


Aspinall, David

WiSec'17 ~ More Semantics More Robust: Improving Android Malware Classifiers

CCS'16 ~ POSTER: Weighing in eHealth Security: A Security and Privacy Study of Smart Scales


Asudeh, Omid

CCS'16 ~ POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity


Atluri, Vijayalakshmi

SACMAT'17 ~ Poster: Constrained Policy Mining in Attribute Based Access Control


Atwater, Erinn

WiSec'17 ~ Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices


Au, Man Ho

ASIA CCS'17 ~ An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption


Avancini, Andrea

SPRO'16 ~ Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks


Avoine, Gildas

ASIA CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol


Avoine, Gildas

ASIA CCS'17 ~ Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses


Ayache, Meryeme

CCSW'16 ~ Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments


Ayday, Erman

CCS'16 ~ Privacy and Security in the Genomic Era


Azab, Ahmed M.

ASIA CCS'17 ~ PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks

ASIA CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)