 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
S
R, Sivaramakrishnan
SDN-NFVSec'17 ~ Enabling SDN Experimentation
in Network Testbeds
Saarinen,
Markku-Juhani O.
IoTPTS'17 ~ Ring-LWE Ciphertext Compression
and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Sabelfeld,
Andrei
CODASPY'17 ~ Discovering Browser Extensions
via Web Accessible Resources
Sabt,
Mohamed
ASIA CCS'17 ~ BlindIDS: Market-Compliant
and Privacy-Friendly Intrusion Detection System over Encrypted Traffic
|
| |
Sachidananda,
Vinay
IoTPTS'17 ~ Let the Cat Out of the Bag:
A Holistic Approach Towards Security Analysis of the Internet of Things
CCS'16
~ POSTER: Towards Exposing Internet of Things: A Roadmap
Sadeghi,
Ahmad-Reza
CCS'16 ~ C-FLAT: Control-Flow Attestation
for Embedded Systems Software
WiSec'17
~ DARPA: Device Attestation Resilient to Physical Attacks
ASIA
CCS'17 ~ Foreword
WiSec'17
~ POSTER: Exploiting Dynamic Partial Reconfiguration for Improved
Resistance Against Power Analysis Attacks on FPGAs
Sadeghi,
Ahmad-Reza
WiSec'17 ~ Poster: Friend or Foe? Context
Authentication for Trust Domain Separation in IoT Environments
WiSec'17
~ POSTER: Toward a Secure and Scalable Attestation
CCS'16
~ SANA: Secure and Scalable Aggregate Network Attestation
CCS'16
~ SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Safaei,
Yeganeh
CODASPY'17 ~ Deep Android Malware Detection
|
| |
Safavi-Naini,
Reihaneh
CODASPY'17 ~ Decompression Quines and Anti-Viruses
CCS'16
~ POSTER: A Behavioural Authentication System for Mobile Users
CCS'16
~ POSTER: Privacy Enhanced Secure Location Verification
Sahin,
Cetin
CODASPY'17 ~ Towards Practical Privacy-Preserving
Life Cycle Assessment Computations
Sahin,
Merve
CCS'16 ~ Over-The-Top Bypass: Study of
a Recent Telephony Fraud
Sakuma,
Jun
ASIA CCS'17 ~ Mis-operation Resistant Searchable
Homomorphic Encryption
ASIA
CCS'17 ~ Privacy-preserving and Optimal Interval Release for
Disease Susceptibility
Sakurai,
Kouichi
BCC'17 ~ BCC'17 Chairs' Welcome
|
| |
Saldamli,
Gokay
IoTPTS'17 ~ Foreword
Samarati,
Pierangela
WISCS'16 ~ Managing Data Sharing in OpenStack
Swift with Over-Encryption
CCS'16
~ Mix&Slice: Efficient Access Revocation in the Cloud
Samotyja,
Jacek
TIS'16 ~ Practical Results of ECC Side
Channel Countermeasures on an ARM Cortex M3 Processor
Sánchez-Artigas,
Marc
CCSW'16 ~ Oblivious RAM as a Substrate
for Cloud Storage - The Leakage Challenge Ahead
Sandberg,
Henrik
CCS'16 ~ Limiting the Impact of Stealthy
Attacks on Industrial Control Systems
Sander,
Tomas
CCS'16 ~ WISCS'16: The 3rd ACM Workshop
on Information Sharing and Collaborative Security
|
| |
Sandhu,
Ravi
ABAC'17 ~ ABAC with Group Attributes and
Attribute Hierarchies Utilizing the Policy Machine
ABAC'17
~ Attribute Transformation for Attribute-Based Access Control
CODASPY'17
~ Classifying and Comparing Attribute-Based and Relationship-Based
Access Control
SACMAT'17
~ Multi-Layer Authorization Framework for a Representative Hadoop
Ecosystem Deployment
SACMAT'17
~ POSTER: Access Control Model for the Hadoop Ecosystem
CCS'16
~ POSTER: Security Enhanced Administrative Role Based Access
Control Models
SACMAT'17
~ SACMAT 2017 Conference General and Program Chairs' Welcome
Message
Santone,
Antonella
ASIA CCS'17 ~ How Discover a Malware using
Model Checking
Saracino,
Andrea
ASIA CCS'17 ~ BRIDEMAID: An Hybrid Tool
for Accurate Detection of Android Malware
Sarwate,
Anand D.
AISec'16 ~ Differentially Private Online
Active Learning with Applications to Anomaly Detection
Sasaki,
Masahide
ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage
System Providing Long-Term Integrity, Authenticity, and Confidentiality
Sauerwein,
Clemens
WISCS'16 ~ Data Quality Challenges and
Future Research Directions in Threat Intelligence Sharing Practice
|
| |
Saullo,
Alessandro
WISCS'16 ~ Managing Data Sharing in OpenStack
Swift with Over-Encryption
Saxena,
Nitesh
WiSec'17 ~ Slogger: Smashing Motion-based
Touchstroke Logging with Transparent System Noise
CCS'16
~ The Sounds of the Phones: Dangers of Zero-Effort Second Factor
Login based on Ambient Audio
WiSec'17
~ Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic
Noise
Saxena,
Prateek
CCS'16 ~ "The Web/Local" Boundary Is Fuzzy:
A Security Study of Chrome's Process-based Sandboxing
CCS'16
~ A Secure Sharding Protocol for Open Blockchains
CCS'16
~ Making Smart Contracts Smarter
Schäfer,
Matthias
ASIA CCS'17 ~ POSTER: Localization of Spoofing
Devices using a Large-scale Air Traffic Surveillance System
WiSec'17
~ Secure Motion Verification using the Doppler Effect
Schepers,
Domien
ASIA CCS'17 ~ Discovering Logical Vulnerabilities
in the Wi-Fi Handshake Using Model-Based Testing
Schliep,
Mike
WPES'17 ~ ABRA CADABRA: Magically Increasing
Network Utilization in Tor by Avoiding Bottlenecks
|
| |
Schmerl,
Bradley
IWSPA'17 ~ Model-based Cluster Analysis
for Identifying Suspicious Activity Sequences in Software
Schmerling,
Sascha
WPES'17 ~ CPPL: Compact Privacy Policy
Language
Schmitt,
Jens
ASIA CCS'17 ~ POSTER: Localization of Spoofing
Devices using a Large-scale Air Traffic Surveillance System
WiSec'17
~ Secure Motion Verification using the Doppler Effect
Schmitz,
Guido
CCS'16 ~ A Comprehensive Formal Security
Analysis of OAuth 2.0
Schneider,
Jonas
CCS'16 ~ Efficient Cryptographic Password
Hardening Services from Partially Oblivious Commitments
Schneider,
Tobias
TIS'16 ~ ParTI - Towards Combined Hardware
Countermeasures against Side-Channeland Fault-Injection Attacks
|
| |
Scholl,
Peter
CCS'16 ~ MASCOT: Faster Malicious Arithmetic
Secure Computation with Oblivious Transfer
CCS'16
~ MPC-Friendly Symmetric Key Primitives
Schranz,
Oliver
CCS'16 ~ POSTER: The ART of App Compartmentalization
Schreck,
Thomas
CODASPY'17 ~ Mining Attributed Graphs for
Threat Intelligence
Schrittwieser,
Sebastian
SACMAT'17 ~ Poster: Design of an Anomaly-based
Threat Detection & Explication System
Schröder,
Dominique
CCS'16 ~ Efficient Cryptographic Password
Hardening Services from Partially Oblivious Commitments
Schuldt,
Jacob C. N.
ASIA CCS'17 ~ On the Robustness of RSA-OAEP
Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures
|
| |
Schultes,
Tobias
WiSec'17 ~ DEMO: Far Away and Yet Nearby
- A Framework for Practical Distance Fraud on Proximity Services for
Mobile Devices
Schulz,
Matthias
WiSec'17 ~ DEMO: Demonstrating Practical
Known-Plaintext Attacks against Physical Layer Security in Wireless
MIMO Systems
WiSec'17
~ DEMO: Using NexMon, the C-based WiFi Firmware Modification
Framework
WiSec'17
~ Profiling the Strength of Physical-Layer Security: A Study
in Orthogonal Blinding
WiSec'17
~ Trust the Wire, They Always Told Me! On Practical Non-Destructive
Wire-Tap Attacks Against Ethernet
Schunter,
Matthias
SPRO'16 ~ Intel Software Guard Extensions
- Introduction and Open Research Challenges
WiSec'17
~ POSTER: Toward a Secure and Scalable Attestation
CCS'16
~ SANA: Secure and Scalable Aggregate Network Attestation
Schwarzkopf,
Malte
CCS'16 ~ DEMO: Integrating MPC in Big Data
Workflows
Schwenk,
Jörg
ASIA CCS'17 ~ SECRET: On the Feasibility
of a Secure, Efficient, and Collaborative Real-Time Web Editor
Scott,
Will
ASIA CCS'17 ~ POSTER: A Secure, Practical
& Safe Packet Spoofing Service
|
| |
Segal,
Aaron
WPES'17 ~ Privacy-Preserving Lawful Contact
Chaining: [Preliminary Report]
Seidel,
Helmut
CCS'16 ~ MEMS Gyroscopes as Physical Unclonable
Functions
Seifert,
Jean-Pierre
CODASPY'17 ~ Fault Attacks on Encrypted
General Purpose Compute Platforms
SPSM'16
~ White Rabbit in Mobile: Effect of Unsecured Clock Source in
Smartphones
Selby,
Paige
SPSM'16 ~ On a (Per)Mission: Building Privacy
Into the App Marketplace
Sepehri,
Maryam
SCC'17 ~ Efficient Implementation of a
Proxy-based Protocol for Data Sharing on the Cloud
Setayeshfar,
Omid
ASIA CCS'17 ~ DroidForensics: Accurate
Reconstruction of Android Attacks via Multi-layer Forensic Logging
|
| |
Settanni,
Giuseppe
CCS'16 ~ POSTER: (Semi)-Supervised Machine
Learning Approaches for Network Security in High-Dimensional Network
Data
Sezer,
Sakir
IWSPA'17 ~ EMULATOR vs REAL PHONE:
Android Malware Detection Using Machine Learning
CODASPY'17
~ Deep Android Malware Detection
Sforzin,
Alessandro
BCC'17 ~ Towards Scalable and Private Industrial
Blockchains
Shabtai,
Asaf
IoTPTS'17 ~ Let the Cat Out of the Bag:
A Holistic Approach Towards Security Analysis of the Internet of Things
CCS'16
~ POSTER: Towards Exposing Internet of Things: A Roadmap
AISec'16
~ SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity
Research
CPSS'17
~ SIPHON: Towards Scalable High-Interaction Physical Honeypots
Shacham,
Hovav
CCS'16 ~ A Systematic Analysis of the Juniper
Dual EC Incident
Shaghaghi,
Arash
MIST'16 ~ Function-Based Access Control
(FBAC): From Access Control Matrix to Access Control Tensor
ASIA
CCS'17 ~ WedgeTail: An Intrusion Prevention System for the Data
Plane of Software Defined Networks
|
| |
Shah,
Nolan
BCC'17 ~ Enabling the Sharing Economy:
Privacy Respecting Contract based on Public Blockchain
BCC'17
~ Unraveling Blockchain-based Crypto-currency System Supporting
Oblivious Transactions: A Formalized Approach
Shaik,
Altaf
SPSM'16 ~ White Rabbit in Mobile: Effect
of Unsecured Clock Source in Smartphones
Shalev,
Noam
MIST'16 ~ WatchIT: Who Watches Your IT
Guy?
Shannon,
Gregory
SafeConfig'16 ~ SafeConfig'16: Testing
and Evaluation for Active & Resilient Cyber Systems Panel: Verification
of Active and Resilient Systems: Practical or Utopian?
Shao,
Yuru
CCS'16 ~ The Misuse of Android Unix Domain
Sockets and Security Implications
Shapira,
Bracha
AISec'16 ~ SherLock vs Moriarty: A Smartphone
Dataset for Cybersecurity Research
|
| |
Sharad,
Kumar
AISec'16 ~ Change of Guard: The Next Generation
of Social Graph De-anonymization Attacks
AISec'16
~ True Friends Let You Down: Benchmarking Social Graph Anonymization
Schemes
Sharaf
Eldin, Ahmed
ASIA CCS'17 ~ POSTER: A Behavioral Biometric
Authentication Framework on Smartphones
Sharif,
Mahmood
CCS'16 ~ Accessorize to a Crime: Real and
Stealthy Attacks on State-of-the-Art Face Recognition
Sharkov,
George
SafeConfig'16 ~ From Cybersecurity to Collaborative
Resiliency
She,
Dongdong
CCS'16 ~ Android ION Hazard: The Curse
of Customizable Memory Management System
Sheff,
Isaac
CCS'16 ~ Safe Serializable Secure Scheduling:
Transactions and the Trade-Off Between Security and Consistency
|
| |
shelat,
abhi
CCS'16 ~ Secure Stable Matching at Scale
Shen,
Wenbo
ASIA CCS'17 ~ SPOKE: Scalable Knowledge
Collection and Attack Surface Analysis of Access Control Policy for
Security Enhanced Android
Shen,
Yilin
CCS'16 ~ EpicRec: Towards Practical Differentially
Private Framework for Personalized Recommendation
SACMAT'17
~ Secure Pick Up: Implicit Authentication When You Start Using
the Smartphone
Shen,
Yulong
CCS'16 ~ POSTER: RIA - An Audition-based
Method to Protect the Runtime Integrity of MapReduce Applications
Shepherd,
Carlton
CPSS'17 ~ Evaluation of Apple iDevice Sensors
as a Potential Relay Attack Countermeasure for Apple Pay
Shi,
Elaine
CCS'16 ~ The Honey Badger of BFT Protocols
CCS'16
~ The Ring of Gyges: Investigating the Future of Criminal Smart
Contracts
CCS'16
~ Town Crier: An Authenticated Data Feed for Smart Contracts
|
| |
Shi,
Weidong
BCC'17 ~ Enabling the Sharing Economy:
Privacy Respecting Contract based on Public Blockchain
BCC'17
~ Unraveling Blockchain-based Crypto-currency System Supporting
Oblivious Transactions: A Formalized Approach
Shi,
Zhenkui
SCC'17 ~ Enabling Privacy-assured Mobile
Advertisement Targeting and Dissemination
Shield,
Robert
CODASPY'17 ~ Detecting Patching of Executables
without System Calls
Shikfa,
Abdullatif
ASIA CCS'17 ~ A Ciphertext-Policy Attribute-based
Encryption Scheme With Optimized Ciphertext Size and Fast Decryption
Shin,
Hocheol
WiSec'17 ~ Dissecting Customized Protocols:
Automatic Analysis for Customized Protocols based on IEEE 802.15.4
Shin,
Kang G.
CCS'16 ~ Error Handling of In-vehicle Networks
Makes Them Vulnerable
CODASPY'17
~ Research Issues and Approaches for Connected and Automated
Vehicles
|
| |
Shin,
Seungwon
SDN-NFVSec'17 ~ SDN-NFV Sec'17 Conference/General
Chairs' Welcome Message
Shinagawa,
Kazumasa
ASIA CCS'17 ~ On the Robustness of RSA-OAEP
Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures
APKC'17
~ One-time Programs with Cloud Storage and Its Application to
Electronic Money
Shirazi,
Hossein
ABAC'17 ~ Attribute Based Access Control
for Healthcare Resources
Shirvanian,
Maliheh
CCS'16 ~ The Sounds of the Phones: Dangers
of Zero-Effort Second Factor Login based on Ambient Audio
Shmatikov,
Vitaly
CCS'16 ~ Breaking Web Applications Built
On Top of Encrypted Data
ASIA
CCS'17 ~ Using Program Analysis to Synthesize Sensor Spoofing
Attacks
Shook,
James M.
MIST'16 ~ Restricting Insider Access Through
Efficient Implementation of Multi-Policy Access Control Systems
|
| |
Shreenivas,
Dharmini
IoTPTS'17 ~ Intrusion Detection in the
RPL-connected 6LoWPAN Networks
Shrestha,
Babins
CCS'16 ~ The Sounds of the Phones: Dangers
of Zero-Effort Second Factor Login based on Ambient Audio
Shrestha,
Prakash
WiSec'17 ~ Slogger: Smashing Motion-based
Touchstroke Logging with Transparent System Noise
CCS'16
~ The Sounds of the Phones: Dangers of Zero-Effort Second Factor
Login based on Ambient Audio
Shu,
Rui
CODASPY'17 ~ A Study of Security Vulnerabilities
on Docker Hub
Shu,
Xiaokui
CCS'16 ~ Program Anomaly Detection: Methodology
and Practices
Shukla,
Manish
CCS'16 ~ POSTER: Locally Virtualized Environment
for Mitigating Ransomware Threat
|
| |
Shulman,
Haya
CCSW'16 ~ Stratum Filtering: Cloud-based
Detection of Attack Sources
Siboni,
Shachar
IoTPTS'17 ~ Let the Cat Out of the Bag:
A Holistic Approach Towards Security Analysis of the Internet of Things
CCS'16
~ POSTER: Towards Exposing Internet of Things: A Roadmap
Sibut-Pinote,
Thomas
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
Siby,
Sandra
IoTPTS'17 ~ IoTScanner: Detecting Privacy
Threats in IoT Neighborhoods
Sigl,
Georg
TIS'16 ~ Hiding Higher-Order Univariate
Leakages by Shuffling Polynomial Masking Schemes: A More Efficient,
Shuffled, and Higher-Order Masked AES S-box
TrustED'16
~ Online Reliability Testing for PUF Key Derivation
Sikdar,
Biplab
IoTPTS'17 ~ Secure Data Provenance for
the Internet of Things
CPSS'17
~ Spatio-Temporal Correlations in Cyber-Physical Systems: A Defense
Against Data Availability Attacks
|
| |
Sillaber,
Christian
WISCS'16 ~ Data Quality Challenges and
Future Research Directions in Threat Intelligence Sharing Practice
Silvestri,
Simone
CODASPY'17 ~ Statistical Security Incident
Forensics against Data Falsification in Smart Grid Advanced Metering
Infrastructure
Simon,
Benedek
WPES'17 ~ An Efficient and Robust Social
Network De-anonymization Attack
Singh,
Baljit
ASIA CCS'17 ~ On the Detection of Kernel-Level
Rootkits Using Hardware Performance Counters
Singhal,
Anoop
CCS'16 ~ SafeConfig'16 - Testing and Evaluation
for Active and Resilient Cyber Systems
SafeConfig'16
~ SafeConfig'16: Testing and Evaluation for Active & Resilient
Cyber Systems
SafeConfig'16
~ SafeConfig'16: Testing and Evaluation for Active & Resilient
Cyber Systems Panel: Verification of Active and Resilient Systems: Practical
or Utopian?
Sinha,
Arunesh
CCS'16 ~ 9th International Workshop on
Artificial Intelligence and Security: AISec 2016
AISec'16
~ Chairs' Introduction and Welcome to AISec 2016
|
| |
Sion,
Radu
CCS'16 ~ POSTER: ConcurORAM: High-Throughput
Parallel Multi-Client ORAM
CCS'16
~ POSTER: DataLair - A Storage Block Device with Plausible Deniability
CCS'16
~ POSTER: DroidShield: Protecting User Applications from Normal
World Access
CCS'16
~ POSTER: KXRay: Introspecting the Kernel for Rootkit Timing
Footprints
Siswantoro,
Hari
SACMAT'17 ~ Security Analysis and Legal
Compliance Checking for the Design of Privacy-friendly Information Systems
Sivakorn,
Suphannee
WPES'17 ~ That's the Way the Cookie Crumbles:
Evaluating HTTPS Enforcing Mechanisms
Sivaraman,
Vijay
WiSec'17 ~ Smart-Phones Attacking Smart-Homes
Sjösten,
Alexander
CODASPY'17 ~ Discovering Browser Extensions
via Web Accessible Resources
Skalka,
Christian
PLAS'16 ~ In-Depth Enforcement of Dynamic
Integrity Taint Analysis
SACMAT'17
~ On Risk in Access Control Enforcement
|
| |
Sklower,
Keith
SDN-NFVSec'17 ~ Enabling SDN Experimentation
in Network Testbeds
Skopik,
Florian
MIST'16 ~ Discovering Insider Threats from
Log Data with High-Performance Bioinformatics Tools
CCS'16
~ POSTER: (Semi)-Supervised Machine Learning Approaches for Network
Security in High-Dimensional Network Data
Skowyra,
Richard
MTD'16 ~ Have No PHEAR: Networks Without
Identifiers
Słowik,
Marcin
APKC'17 ~ An Efficient Verification of
CL-LRSW Signatures and a Pseudonym Certificate System
Sluganovic,
Ivo
WPES'17 ~ Generating Secret Keys from Biometric
Body Impedance Measurements
CCS'16
~ Using Reflexive Eye Movements for Fast Challenge-Response Authentication
Smart,
Nigel P.
TIS'16 ~ Masking and MPC: When Crypto Theory
Meets Crypto Practice
CCS'16
~ MPC-Friendly Symmetric Key Primitives
|
| |
Smith,
Christopher L.
IWSPA'17 ~ Predicting Exploitation of Disclosed
Software Vulnerabilities Using Open-source Data
Smullen,
Daniel
WISCS'16 ~ Privacy Risk in Cybersecurity
Data Sharing
Socher,
Gudrun
WiSec'17 ~ Poster: Security Design Patterns
With Good Usability
Sommer,
David
ASIA CCS'17 ~ CoverUp: Privacy Through
"Forced" Participation in Anonymous Communication Networks
Sommer,
Robin
SDN-NFVSec'17 ~ Viable Protection of High-Performance
Networks through Hardware/Software Co-Design
Somol,
Petr
AISec'16 ~ Discriminative Models for Multi-instance
Problems with Tree Structure
|
| |
Somorovsky,
Juraj
CCS'16 ~ Systematic Fuzzing and Testing
of TLS Libraries
Son,
Yunmok
WiSec'17 ~ Dissecting Customized Protocols:
Automatic Analysis for Customized Protocols based on IEEE 802.15.4
Song,
Chen
CCS'16 ~ My Smartphone Knows What You Print:
Exploring Smartphone-based Side-channel Attacks Against 3D Printers
Song,
Chengyu
CCS'16 ~ UniSan: Proactive Kernel Memory
Initialization to Eliminate Data Leakages
Song,
Dawn
CCS'16 ~ The Honey Badger of BFT Protocols
Song,
Fei
MIST'16 ~ Ports Distribution Management
for Privacy Protection inside Local Domain Name System
|
| |
Soriente,
Claudio
SPSM'16 ~ Hardened Setup of Personalized
Security Indicators to Counter Phishing Attacks in Mobile Banking
CCSW'16
~ On Information Leakage in Deduplicated Storage Systems
Spagnuolo,
Michele
CCS'16 ~ CSP Is Dead, Long Live CSP! On
the Insecurity of Whitelists and the Future of Content Security Policy
Spreitzer,
Raphael
WiSec'17 ~ Exploiting Data-Usage Statistics
for Website Fingerprinting Attacks on Android
Spruyt,
Valentijn
PLAS'16 ~ Static Detection of User-specified
Security Vulnerabilities in Client-side JavaScript
Srinivasa
Rao, Routhu
CPSS'17 ~ Detecting Phishing Websites using
Automation of Human Behavior
Staddon,
Jessica
WPES'17 ~ Predicting Mobile App Privacy
Preferences with Psychographics
|
| |
Stais,
Ioannis
CCS'16 ~ SFADiff: Automated Evasion Attacks
and Fingerprinting Using Black-box Differential Automata Learning
Stallings,
Jon
WPES'17 ~ Predicting Mobile App Privacy
Preferences with Psychographics
Standaert,
François-Xavier
TIS'16 ~ Moments-Correlating DPA
CCS'16
~ Private Circuits III: Hardware Trojan-Resilience via Testing
Amplification
Stavrou,
Angelos
CODASPY'17 ~ Detecting ROP with Statistical
Learning of Program Characteristics
ASIA
CCS'17 ~ Strict Virtual Call Integrity Checking for C++ Binaries
Stebila,
Douglas
CCS'16 ~ Frodo: Take off the Ring! Practical,
Quantum-Secure Key Exchange from LWE
Stefan,
Deian
PLAS'16 ~ PLAS 2016 Chairs' Welcome
CCS'16
~ PLAS'16 - ACM SIGPLAN 11th Workshop on Programming Languages
and Analysis for Security
|
| |
Steiert,
Douglas
SACMAT'17 ~ Poster: A Location-Privacy
Approach for Continuous Queries
Steinhauser,
Antonín
PLAS'16 ~ JSPChecker: Static Detection
of Context-Sensitive Cross-Site Scripting Flaws in Legacy Web Applications
Steinke,
Michael
CCS'16 ~ POSTER: VUDEC - A Framework for
Vulnerability Management in Decentralized Communication Networks
Steinmetzer,
Daniel
WiSec'17 ~ DEMO: Far Away and Yet Nearby
- A Framework for Practical Distance Fraud on Proximity Services for
Mobile Devices
Stephens,
Jon
CODASPY'17 ~ Analysis of Exception-Based
Control Transfers
Stewart,
Chase E.
SDN-NFVSec'17 ~ CommunityGuard: A Crowdsourced
Home Cyber-Security System
|
| |
Stock,
Ben
CCS'16 ~ POSTER: Mapping the Landscape
of Large-Scale Vulnerability Notifications
Stoller,
Scott D.
SACMAT'17 ~ Mining Relationship-Based Access
Control Policies
Stopczynski,
Martin
WPES'17 ~ Disguised Chromium Browser: Robust
Browser, Flash and Canvas Fingerprinting Protection
Stringhini,
Gianluca
ASIA CCS'17 ~ PAYBREAK: Defense Against
Cryptographic Ransomware
Strub,
Pierre-Yves
CCS'16 ~ Advanced Probabilistic Couplings
for Differential Privacy
CCS'16
~ Differentially Private Bayesian Programming
CCS'16
~ Strong Non-Interference and Type-Directed Higher-Order Masking
Struckmann,
Katarina
CCS'16 ~ Leave Your Phone at the Door:Side
Channels that Reveal Factory Floor Secrets
|
| |
Stulman,
Ariel
SACMAT'17 ~ Authorization Enforcement Detection
Stuntebeck,
Erich
ASIA CCS'17 ~ DroidPill: Pwn Your Daily-Use
Apps
Su,
Pengchuan
SCC'17 ~ A Privacy-Preserving and Vessel
Authentication Scheme Using Automatic Identification System
Suarez-Tangil,
Guillermo
CODASPY'17 ~ DroidSieve: Fast and Accurate
Classification of Obfuscated Android Malware
AISec'16
~ Prescience: Probabilistic Guidance on the Retraining Conundrum
for Malware Detection
ASIA
CCS'17 ~ TriFlow: Triaging Android Applications using Speculative
Information Flows
Such,
Jose M.
CCSW'16 ~ Assured Deletion in the Cloud:
Requirements, Challenges and Future Directions
Suciu,
Darius
CCS'16 ~ POSTER: DroidShield: Protecting
User Applications from Normal World Access
CCS'16
~ POSTER: KXRay: Introspecting the Kernel for Rootkit Timing
Footprints
|
| |
Sugrim,
Shridatt
MIST'16 ~ Cyber Deception: Virtual Networks
to Defend Insider Reconnaissance
Sullivan,
Nick
SPRO'16 ~ Attacking White-Box AES Constructions
Sun,
Bo
CCS'16 ~ Poster: Toward Automating the
Generation of Malware Analysis Reports Using the Sandbox Logs
Sun,
Jingchao
CCS'16 ~ iLock: Immediate and Automatic
Locking of Mobile Devices against Data Theft
Sun,
Mingshen
CCS'16 ~ TaintART: A Practical Multi-level
Information-Flow Tracking System for Android RunTime
Sun,
Nan
SCC'17 ~ A Privacy-Preserving and Vessel
Authentication Scheme Using Automatic Identification System
|
| |
Sunar,
Berk
ASIA CCS'17 ~ Cache-Based Application Detection
in the Cloud Using Machine Learning
ASIA
CCS'17 ~ Hit by the Bus: QoS Degradation Attack on Android
Sural,
Shamik
SACMAT'17 ~ Poster: Constrained Policy
Mining in Attribute Based Access Control
Susilo,
Willy
ASIA CCS'17 ~ An Efficient KP-ABE with
Short Ciphertexts in Prime OrderGroups under Standard Assumption
Sutton,
Charles
WiSec'17 ~ More Semantics More Robust:
Improving Android Malware Classifiers
Svetinovic,
Davor
IoTPTS'17 ~ Blockchain Engineering for
the Internet of Things: Systems Security Perspective
Swami,
Ananthram
ASIA CCS'17 ~ Practical Black-Box Attacks
against Machine Learning
|
| |
Swamy,
Nikhil
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
Syversen,
Jason
MTD'16 ~ Automated Effectiveness Evaluation
of Moving Target Defenses: Metrics for Missions and Attacks
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |