 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
ŕ
Nijeholt, Hidde Lycklama
BCC'17 ~ DecReg: A Framework for Preventing
Double-Financing using Blockchain Technology
Abadi,
Martín
CCS'16 ~ Deep Learning with Differential
Privacy
Abdelraheem,
Mohamed Ahmed
CCSW'16 ~ Executing Boolean Queries on
an Encrypted Bitmap Index
Abdou,
AbdelRahman
ASIA CCS'17 ~ Accurate Manipulation of
Delay-based Internet Geolocation
|
| |
Abera,
Tigist
CCS'16 ~ C-FLAT: Control-Flow Attestation
for Embedded Systems Software
Aberer,
Karl
CODASPY'17 ~ "If You Can't Beat them Join
them": A Usability Approach to Interdependent Privacy in Cloud Apps
Abidin,
Aysajan
SACMAT'17 ~ Uncoupling Biometrics from
Templates for Secure and Privacy-Preserving Authentication
Abrath,
Bert
SPRO'16 ~ Reactive Attestation: Automatic
Detection and Reaction to Software Tampering Attacks
|
| |
Achleitner,
Stefan
MIST'16 ~ Cyber Deception: Virtual Networks
to Defend Insider Reconnaissance
Adhikari,
Anku
CCS'16 ~ Leave Your Phone at the Door:Side
Channels that Reveal Factory Floor Secrets
Agrafiotis,
Ioannis
MIST'16 ~ A New Take on Detecting Insider
Threats: Exploring the Use of Hidden Markov Models
MIST'16
~ A Tripwire Grammar for Insider Threat Detection
Agrawal,
Anand
CPS-SPC'16 ~ Towards High-Interaction Virtual
ICS Honeypots-in-a-Box
Ahamad,
Mustaque
SPSM'16 ~ Exploiting Phone Numbers and
Cross-Application Features in Targeted Mobile Attacks
|
| |
Ahmadi,
Mansour
SPSM'16 ~ Detecting Misuse of Google Cloud
Messaging in Android Badware
CODASPY'17
~ DroidSieve: Fast and Accurate Classification of Obfuscated
Android Malware
Ahmadinejad,
Seyed Hossein
SACMAT'17 ~ An Enforcement Model for Preventing
Inference Attacks in Social Computing Platforms
Ahmadvand,
Mohsen
CODASPY'17 ~ Detecting Patching of Executables
without System Calls
Ahmed,
Chuadhry Mujeeb
ASIA CCS'17 ~ Model-based Attack Detection
Scheme for Smart Water Distribution Networks
Ahmed,
Irfan
WiSec'17 ~ Don't Touch that Column: Portable,
Fine-Grained Access Control for Android's Native Content Providers
Ahmed,
Noor O.
MTD'16 ~ Mayflies: A Moving Target
Defense Framework for Distributed Systems
|
| |
Ahmed,
Tahmina
CODASPY'17 ~ Classifying and Comparing
Attribute-Based and Relationship-Based Access Control
Ahn,
Gail-Joon
CODASPY'17 ~ CODASPY'17 Conference/General
Chairs' Welcome Message
SACMAT'17
~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity
Control
SDN-NFVSec'17
~ SDN-NFV Sec'17 Conference/General Chairs' Welcome Message
SACMAT'17
~ Towards PII-based Multiparty Access Control for Photo Sharing
in Online Social Networks
Akand,
Md Mamunur Rashid
CCS'16 ~ POSTER: Privacy Enhanced Secure
Location Verification
Akers,
Gregory
ASIA CCS'17 ~ Advanced Security Research
in the Era of the Internet of Things
Akram,
Raja Naeem
CPSS'17 ~ Evaluation of Apple iDevice Sensors
as a Potential Relay Attack Countermeasure for Apple Pay
Alaggan,
Mohammad
IWSPA'17 ~ Non-interactive (t, n)-Incidence
Counting from Differentially Private Indicator Vectors
|
| |
Alan,
Hasan Faik
WiSec'17 ~ Can Android Applications Be
Identified Using Only TCP/IP Headers of Their Launch Time Traffic?
Albanese,
Massimiliano
MTD'16 ~ A Moving Target Defense Approach
to Disrupting Stealthy Botnets
MTD'16
~ Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic
Analysis
Al-Bassam,
Mustafa
BCC'17 ~ SCPKI: A Smart Contract-based
PKI and Identity System
Albrecht,
Martin R.
CCS'16 ~ A Surfeit of SSH Cipher Suites
Alderman,
James
SACMAT'17 ~ A Framework for the Cryptographic
Enforcement of Information Flow Policies
Alhuzali,
Abeer
CCS'16 ~ Chainsaw: Chained Automated Workflow-based
Exploit Generation
|
| |
Ali-Gombe,
Aisha
WiSec'17 ~ Don't Touch that Column: Portable,
Fine-Grained Access Control for Android's Native Content Providers
Alrwais,
Sumayah
CCS'16 ~ Lurking Malice in the Cloud: Understanding
and Detecting Cloud Repository as a Malicious Service
Alsaleh,
Mohammed Noraden
SafeConfig'16 ~ Towards Automated Verification
of Active Cyber Defense Strategies on Software Defined Networks
Al-Shaer,
Ehab
MTD'16 ~ Formal Approach for Resilient
Reachability based onEnd-System Route Agility
MTD'16
~ INVITED TALK: A Cyber Mutation: Metrics, Techniques and Future
Directions
MTD'16
~ Multi-dimensional Host Identity Anonymization for Defeating
Skilled Attackers
SafeConfig'16
~ Towards Automated Verification of Active Cyber Defense Strategies
on Software Defined Networks
Alshamrani,
Adel
SDN-NFVSec'17 ~ Dynamic Game based Security
framework in SDN-enabled Cloud Networking Environments
Alzaylaee,
Mohammed K.
IWSPA'17 ~ EMULATOR vs REAL PHONE:
Android Malware Detection Using Machine Learning
|
| |
Aman,
Muhammad N.
IoTPTS'17 ~ Secure Data Provenance for
the Internet of Things
Amann,
Johanna
SDN-NFVSec'17 ~ Viable Protection of High-Performance
Networks through Hardware/Software Co-Design
Ambrosin,
Moreno
WiSec'17 ~ POSTER: Toward a Secure and
Scalable Attestation
CCS'16
~ SANA: Secure and Scalable Aggregate Network Attestation
Amira,
Abdelouahab
CODASPY'17 ~ Sound and Static Analysis
of Session Fixation Vulnerabilities in PHP Web Applications
Amir-Mohammadian,
Sepehr
PLAS'16 ~ In-Depth Enforcement of Dynamic
Integrity Taint Analysis
Anand,
S Abhishek
WiSec'17 ~ Vibreaker: Securing Vibrational
Pairing with Deliberate Acoustic Noise
|
| |
Anderson,
Blake
AISec'16 ~ Identifying Encrypted Malware
Traffic with Contextual Flow Data
Anderson,
Hyrum S.
AISec'16 ~ DeepDGA: Adversarially-Tuned
Domain Generation and Detection
Androulaki,
Elli
CCS'16 ~ 8th ACM Cloud Computing Security
Workshop
CCSW'16
~ Foreword
Aniello,
Leonardo
CODASPY'17 ~ Share a pie? Privacy-Preserving
Knowledge Base Export through Count-min Sketches
Antonioli,
Daniele
CPS-SPC'16 ~ Towards High-Interaction Virtual
ICS Honeypots-in-a-Box
Aono,
Yoshinori
SCC'17 ~ Efficient Key-Rotatable and Security-Updatable
Homomorphic Encryption
|
| |
Apon,
Daniel
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
CCS'16
~ POPE: Partial Order Preserving Encoding
Araki,
Toshinori
CCS'16 ~ Demo: High-Throughput Secure Three-Party
Computation of Kerberos Ticket Generation
CCS'16
~ High-Throughput Semi-Honest Secure Three-Party Computation
with an Honest Majority
Archer,
David W.
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
Argones
Rúa, Enrique
SACMAT'17 ~ Uncoupling Biometrics from
Templates for Secure and Privacy-Preserving Authentication
Argyros,
George
CCS'16 ~ SFADiff: Automated Evasion Attacks
and Fingerprinting Using Black-box Differential Automata Learning
Arias,
Emilio Jesús Gallego
CCS'16 ~ Differentially Private Bayesian
Programming
|
| |
Ariu,
Davide
SPSM'16 ~ Detecting Misuse of Google Cloud
Messaging in Android Badware
Armknecht,
Frederik
SCC'17 ~ Cloud Storage File Recoverability
ASIA
CCS'17 ~ Sharing Proofs of Retrievability across Tenants
ASIA
CCS'17 ~ Side Channels in Deduplication: Trade-offs between Leakage
and Efficiency
Arndt,
Stephan
CCS'16 ~ POSTER: Towards Highly Interactive
Honeypots for Industrial Control Systems
Arp,
Daniel
CODASPY'17 ~ Mining Attributed Graphs for
Threat Intelligence
Arzt,
Steven
SPSM'16 ~ Detecting Misuse of Google Cloud
Messaging in Android Badware
Ashby,
Alex
MIST'16 ~ Pragmatic Security: Modelling
IT Security Management Responsibilities for SME Archetypes
|
| |
Asokan,
N.
CCS'16 ~ C-FLAT: Control-Flow Attestation
for Embedded Systems Software
WiSec'17
~ Poster: Friend or Foe? Context Authentication for Trust Domain
Separation in IoT Environments
ASIA
CCS'17 ~ The Circle Game: Scalable Private Membership Test Using
Trusted Hardware
Aspinall,
David
WiSec'17 ~ More Semantics More Robust:
Improving Android Malware Classifiers
CCS'16
~ POSTER: Weighing in eHealth Security: A Security and Privacy
Study of Smart Scales
Asudeh,
Omid
CCS'16 ~ POSTER: Phishing Website Detection
with a Multiphase Framework to Find Visual Similarity
Atluri,
Vijayalakshmi
SACMAT'17 ~ Poster: Constrained Policy
Mining in Attribute Based Access Control
Atwater,
Erinn
WiSec'17 ~ Shatter: Using Threshold Cryptography
to Protect Single Users with Multiple Devices
Au,
Man Ho
ASIA CCS'17 ~ An Efficient KP-ABE with
Short Ciphertexts in Prime OrderGroups under Standard Assumption
|
| |
Avancini,
Andrea
SPRO'16 ~ Reactive Attestation: Automatic
Detection and Reaction to Software Tampering Attacks
Avoine,
Gildas
ASIA CCS'17 ~ A Terrorist-fraud Resistant
and Extractor-free Anonymous Distance-bounding Protocol
Avoine,
Gildas
ASIA CCS'17 ~ Heterogeneous Rainbow Table
Widths Provide Faster Cryptanalyses
Ayache,
Meryeme
CCSW'16 ~ Towards an Efficient Policy Evaluation
Process in Multi-Tenancy Cloud Environments
Ayday,
Erman
CCS'16 ~ Privacy and Security in the Genomic
Era
Azab,
Ahmed M.
ASIA CCS'17 ~ PrivWatcher: Non-bypassable
Monitoring and Protection of Process Credentials from Memory Corruption
Attacks
ASIA
CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface
Analysis of Access Control Policy for Security Enhanced Android
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |