Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


S R, Sivaramakrishnan

SDN-NFVSec'17 ~ Enabling SDN Experimentation in Network Testbeds


Saarinen, Markku-Juhani O.

IoTPTS'17 ~ Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography


Sabelfeld, Andrei

CODASPY'17 ~ Discovering Browser Extensions via Web Accessible Resources


Sabt, Mohamed

ASIA CCS'17 ~ BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic


Sachidananda, Vinay

IoTPTS'17 ~ Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things

CCS'16 ~ POSTER: Towards Exposing Internet of Things: A Roadmap


Sadeghi, Ahmad-Reza

CCS'16 ~ C-FLAT: Control-Flow Attestation for Embedded Systems Software

WiSec'17 ~ DARPA: Device Attestation Resilient to Physical Attacks

ASIA CCS'17 ~ Foreword

WiSec'17 ~ POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs

Sadeghi, Ahmad-Reza

WiSec'17 ~ Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments

WiSec'17 ~ POSTER: Toward a Secure and Scalable Attestation

CCS'16 ~ SANA: Secure and Scalable Aggregate Network Attestation

CCS'16 ~ SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles


Safaei, Yeganeh

CODASPY'17 ~ Deep Android Malware Detection


Safavi-Naini, Reihaneh

CODASPY'17 ~ Decompression Quines and Anti-Viruses

CCS'16 ~ POSTER: A Behavioural Authentication System for Mobile Users

CCS'16 ~ POSTER: Privacy Enhanced Secure Location Verification


Sahin, Cetin

CODASPY'17 ~ Towards Practical Privacy-Preserving Life Cycle Assessment Computations


Sahin, Merve

CCS'16 ~ Over-The-Top Bypass: Study of a Recent Telephony Fraud


Sakuma, Jun

ASIA CCS'17 ~ Mis-operation Resistant Searchable Homomorphic Encryption

ASIA CCS'17 ~ Privacy-preserving and Optimal Interval Release for Disease Susceptibility


Sakurai, Kouichi

BCC'17 ~ BCC'17 Chairs' Welcome


Saldamli, Gokay

IoTPTS'17 ~ Foreword


Samarati, Pierangela

WISCS'16 ~ Managing Data Sharing in OpenStack Swift with Over-Encryption

CCS'16 ~ Mix&Slice: Efficient Access Revocation in the Cloud


Samotyja, Jacek

TIS'16 ~ Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor


Sánchez-Artigas, Marc

CCSW'16 ~ Oblivious RAM as a Substrate for Cloud Storage - The Leakage Challenge Ahead


Sandberg, Henrik

CCS'16 ~ Limiting the Impact of Stealthy Attacks on Industrial Control Systems


Sander, Tomas

CCS'16 ~ WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security


Sandhu, Ravi

ABAC'17 ~ ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine

ABAC'17 ~ Attribute Transformation for Attribute-Based Access Control

CODASPY'17 ~ Classifying and Comparing Attribute-Based and Relationship-Based Access Control

SACMAT'17 ~ Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment

SACMAT'17 ~ POSTER: Access Control Model for the Hadoop Ecosystem

CCS'16 ~ POSTER: Security Enhanced Administrative Role Based Access Control Models

SACMAT'17 ~ SACMAT 2017 Conference General and Program Chairs' Welcome Message


Santone, Antonella

ASIA CCS'17 ~ How Discover a Malware using Model Checking


Saracino, Andrea

ASIA CCS'17 ~ BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware


Sarwate, Anand D.

AISec'16 ~ Differentially Private Online Active Learning with Applications to Anomaly Detection


Sasaki, Masahide

ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality


Sauerwein, Clemens

WISCS'16 ~ Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice


Saullo, Alessandro

WISCS'16 ~ Managing Data Sharing in OpenStack Swift with Over-Encryption


Saxena, Nitesh

WiSec'17 ~ Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise

CCS'16 ~ The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio

WiSec'17 ~ Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise


Saxena, Prateek

CCS'16 ~ "The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing

CCS'16 ~ A Secure Sharding Protocol for Open Blockchains

CCS'16 ~ Making Smart Contracts Smarter


Schäfer, Matthias

ASIA CCS'17 ~ POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System

WiSec'17 ~ Secure Motion Verification using the Doppler Effect


Schepers, Domien

ASIA CCS'17 ~ Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing


Schliep, Mike

WPES'17 ~ ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks


Schmerl, Bradley

IWSPA'17 ~ Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software


Schmerling, Sascha

WPES'17 ~ CPPL: Compact Privacy Policy Language


Schmitt, Jens

ASIA CCS'17 ~ POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System

WiSec'17 ~ Secure Motion Verification using the Doppler Effect


Schmitz, Guido

CCS'16 ~ A Comprehensive Formal Security Analysis of OAuth 2.0


Schneider, Jonas

CCS'16 ~ Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments


Schneider, Tobias

TIS'16 ~ ParTI - Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks


Scholl, Peter

CCS'16 ~ MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer

CCS'16 ~ MPC-Friendly Symmetric Key Primitives


Schranz, Oliver

CCS'16 ~ POSTER: The ART of App Compartmentalization


Schreck, Thomas

CODASPY'17 ~ Mining Attributed Graphs for Threat Intelligence


Schrittwieser, Sebastian

SACMAT'17 ~ Poster: Design of an Anomaly-based Threat Detection & Explication System


Schröder, Dominique

CCS'16 ~ Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments


Schuldt, Jacob C. N.

ASIA CCS'17 ~ On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures


Schultes, Tobias

WiSec'17 ~ DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices


Schulz, Matthias

WiSec'17 ~ DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems

WiSec'17 ~ DEMO: Using NexMon, the C-based WiFi Firmware Modification Framework

WiSec'17 ~ Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding

WiSec'17 ~ Trust the Wire, They Always Told Me! On Practical Non-Destructive Wire-Tap Attacks Against Ethernet


Schunter, Matthias

SPRO'16 ~ Intel Software Guard Extensions - Introduction and Open Research Challenges

WiSec'17 ~ POSTER: Toward a Secure and Scalable Attestation

CCS'16 ~ SANA: Secure and Scalable Aggregate Network Attestation


Schwarzkopf, Malte

CCS'16 ~ DEMO: Integrating MPC in Big Data Workflows


Schwenk, Jörg

ASIA CCS'17 ~ SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor


Scott, Will

ASIA CCS'17 ~ POSTER: A Secure, Practical & Safe Packet Spoofing Service


Segal, Aaron

WPES'17 ~ Privacy-Preserving Lawful Contact Chaining: [Preliminary Report]


Seidel, Helmut

CCS'16 ~ MEMS Gyroscopes as Physical Unclonable Functions


Seifert, Jean-Pierre

CODASPY'17 ~ Fault Attacks on Encrypted General Purpose Compute Platforms

SPSM'16 ~ White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones


Selby, Paige

SPSM'16 ~ On a (Per)Mission: Building Privacy Into the App Marketplace


Sepehri, Maryam

SCC'17 ~ Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud


Setayeshfar, Omid

ASIA CCS'17 ~ DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging


Settanni, Giuseppe

CCS'16 ~ POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data


Sezer, Sakir

IWSPA'17 ~ EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning

CODASPY'17 ~ Deep Android Malware Detection


Sforzin, Alessandro

BCC'17 ~ Towards Scalable and Private Industrial Blockchains


Shabtai, Asaf

IoTPTS'17 ~ Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things

CCS'16 ~ POSTER: Towards Exposing Internet of Things: A Roadmap

AISec'16 ~ SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research

CPSS'17 ~ SIPHON: Towards Scalable High-Interaction Physical Honeypots


Shacham, Hovav

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Shaghaghi, Arash

MIST'16 ~ Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

ASIA CCS'17 ~ WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks


Shah, Nolan

BCC'17 ~ Enabling the Sharing Economy: Privacy Respecting Contract based on Public Blockchain

BCC'17 ~ Unraveling Blockchain-based Crypto-currency System Supporting Oblivious Transactions: A Formalized Approach


Shaik, Altaf

SPSM'16 ~ White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones


Shalev, Noam

MIST'16 ~ WatchIT: Who Watches Your IT Guy?


Shannon, Gregory

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel: Verification of Active and Resilient Systems: Practical or Utopian?


Shao, Yuru

CCS'16 ~ The Misuse of Android Unix Domain Sockets and Security Implications


Shapira, Bracha

AISec'16 ~ SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research


Sharad, Kumar

AISec'16 ~ Change of Guard: The Next Generation of Social Graph De-anonymization Attacks

AISec'16 ~ True Friends Let You Down: Benchmarking Social Graph Anonymization Schemes


Sharaf Eldin, Ahmed

ASIA CCS'17 ~ POSTER: A Behavioral Biometric Authentication Framework on Smartphones


Sharif, Mahmood

CCS'16 ~ Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition


Sharkov, George

SafeConfig'16 ~ From Cybersecurity to Collaborative Resiliency


She, Dongdong

CCS'16 ~ Android ION Hazard: The Curse of Customizable Memory Management System


Sheff, Isaac

CCS'16 ~ Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency


shelat, abhi

CCS'16 ~ Secure Stable Matching at Scale


Shen, Wenbo

ASIA CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android


Shen, Yilin

CCS'16 ~ EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation

SACMAT'17 ~ Secure Pick Up: Implicit Authentication When You Start Using the Smartphone


Shen, Yulong

CCS'16 ~ POSTER: RIA - An Audition-based Method to Protect the Runtime Integrity of MapReduce Applications


Shepherd, Carlton

CPSS'17 ~ Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay


Shi, Elaine

CCS'16 ~ The Honey Badger of BFT Protocols

CCS'16 ~ The Ring of Gyges: Investigating the Future of Criminal Smart Contracts

CCS'16 ~ Town Crier: An Authenticated Data Feed for Smart Contracts


Shi, Weidong

BCC'17 ~ Enabling the Sharing Economy: Privacy Respecting Contract based on Public Blockchain

BCC'17 ~ Unraveling Blockchain-based Crypto-currency System Supporting Oblivious Transactions: A Formalized Approach


Shi, Zhenkui

SCC'17 ~ Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination


Shield, Robert

CODASPY'17 ~ Detecting Patching of Executables without System Calls


Shikfa, Abdullatif

ASIA CCS'17 ~ A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size and Fast Decryption


Shin, Hocheol

WiSec'17 ~ Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4


Shin, Kang G.

CCS'16 ~ Error Handling of In-vehicle Networks Makes Them Vulnerable

CODASPY'17 ~ Research Issues and Approaches for Connected and Automated Vehicles


Shin, Seungwon

SDN-NFVSec'17 ~ SDN-NFV Sec'17 Conference/General Chairs' Welcome Message


Shinagawa, Kazumasa

ASIA CCS'17 ~ On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures

APKC'17 ~ One-time Programs with Cloud Storage and Its Application to Electronic Money


Shirazi, Hossein

ABAC'17 ~ Attribute Based Access Control for Healthcare Resources


Shirvanian, Maliheh

CCS'16 ~ The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio


Shmatikov, Vitaly

CCS'16 ~ Breaking Web Applications Built On Top of Encrypted Data

ASIA CCS'17 ~ Using Program Analysis to Synthesize Sensor Spoofing Attacks


Shook, James M.

MIST'16 ~ Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems


Shreenivas, Dharmini

IoTPTS'17 ~ Intrusion Detection in the RPL-connected 6LoWPAN Networks


Shrestha, Babins

CCS'16 ~ The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio


Shrestha, Prakash

WiSec'17 ~ Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise

CCS'16 ~ The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio


Shu, Rui

CODASPY'17 ~ A Study of Security Vulnerabilities on Docker Hub


Shu, Xiaokui

CCS'16 ~ Program Anomaly Detection: Methodology and Practices


Shukla, Manish

CCS'16 ~ POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat


Shulman, Haya

CCSW'16 ~ Stratum Filtering: Cloud-based Detection of Attack Sources


Siboni, Shachar

IoTPTS'17 ~ Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things

CCS'16 ~ POSTER: Towards Exposing Internet of Things: A Roadmap


Sibut-Pinote, Thomas

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper


Siby, Sandra

IoTPTS'17 ~ IoTScanner: Detecting Privacy Threats in IoT Neighborhoods


Sigl, Georg

TIS'16 ~ Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box

TrustED'16 ~ Online Reliability Testing for PUF Key Derivation


Sikdar, Biplab

IoTPTS'17 ~ Secure Data Provenance for the Internet of Things

CPSS'17 ~ Spatio-Temporal Correlations in Cyber-Physical Systems: A Defense Against Data Availability Attacks


Sillaber, Christian

WISCS'16 ~ Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice


Silvestri, Simone

CODASPY'17 ~ Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure


Simon, Benedek

WPES'17 ~ An Efficient and Robust Social Network De-anonymization Attack


Singh, Baljit

ASIA CCS'17 ~ On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters


Singhal, Anoop

CCS'16 ~ SafeConfig'16 - Testing and Evaluation for Active and Resilient Cyber Systems

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel: Verification of Active and Resilient Systems: Practical or Utopian?


Sinha, Arunesh

CCS'16 ~ 9th International Workshop on Artificial Intelligence and Security: AISec 2016

AISec'16 ~ Chairs' Introduction and Welcome to AISec 2016


Sion, Radu

CCS'16 ~ POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM

CCS'16 ~ POSTER: DataLair - A Storage Block Device with Plausible Deniability

CCS'16 ~ POSTER: DroidShield: Protecting User Applications from Normal World Access

CCS'16 ~ POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints


Siswantoro, Hari

SACMAT'17 ~ Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems


Sivakorn, Suphannee

WPES'17 ~ That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms


Sivaraman, Vijay

WiSec'17 ~ Smart-Phones Attacking Smart-Homes


Sjösten, Alexander

CODASPY'17 ~ Discovering Browser Extensions via Web Accessible Resources


Skalka, Christian

PLAS'16 ~ In-Depth Enforcement of Dynamic Integrity Taint Analysis

SACMAT'17 ~ On Risk in Access Control Enforcement


Sklower, Keith

SDN-NFVSec'17 ~ Enabling SDN Experimentation in Network Testbeds


Skopik, Florian

MIST'16 ~ Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools

CCS'16 ~ POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data


Skowyra, Richard

MTD'16 ~ Have No PHEAR: Networks Without Identifiers


Słowik, Marcin

APKC'17 ~ An Efficient Verification of CL-LRSW Signatures and a Pseudonym Certificate System


Sluganovic, Ivo

WPES'17 ~ Generating Secret Keys from Biometric Body Impedance Measurements

CCS'16 ~ Using Reflexive Eye Movements for Fast Challenge-Response Authentication


Smart, Nigel P.

TIS'16 ~ Masking and MPC: When Crypto Theory Meets Crypto Practice

CCS'16 ~ MPC-Friendly Symmetric Key Primitives


Smith, Christopher L.

IWSPA'17 ~ Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data


Smullen, Daniel

WISCS'16 ~ Privacy Risk in Cybersecurity Data Sharing


Socher, Gudrun

WiSec'17 ~ Poster: Security Design Patterns With Good Usability


Sommer, David

ASIA CCS'17 ~ CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks


Sommer, Robin

SDN-NFVSec'17 ~ Viable Protection of High-Performance Networks through Hardware/Software Co-Design


Somol, Petr

AISec'16 ~ Discriminative Models for Multi-instance Problems with Tree Structure


Somorovsky, Juraj

CCS'16 ~ Systematic Fuzzing and Testing of TLS Libraries


Son, Yunmok

WiSec'17 ~ Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4


Song, Chen

CCS'16 ~ My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers


Song, Chengyu

CCS'16 ~ UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages


Song, Dawn

CCS'16 ~ The Honey Badger of BFT Protocols


Song, Fei

MIST'16 ~ Ports Distribution Management for Privacy Protection inside Local Domain Name System


Soriente, Claudio

SPSM'16 ~ Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking

CCSW'16 ~ On Information Leakage in Deduplicated Storage Systems


Spagnuolo, Michele

CCS'16 ~ CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy


Spreitzer, Raphael

WiSec'17 ~ Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android


Spruyt, Valentijn

PLAS'16 ~ Static Detection of User-specified Security Vulnerabilities in Client-side JavaScript


Srinivasa Rao, Routhu

CPSS'17 ~ Detecting Phishing Websites using Automation of Human Behavior


Staddon, Jessica

WPES'17 ~ Predicting Mobile App Privacy Preferences with Psychographics


Stais, Ioannis

CCS'16 ~ SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning


Stallings, Jon

WPES'17 ~ Predicting Mobile App Privacy Preferences with Psychographics


Standaert, François-Xavier

TIS'16 ~ Moments-Correlating DPA

CCS'16 ~ Private Circuits III: Hardware Trojan-Resilience via Testing Amplification


Stavrou, Angelos

CODASPY'17 ~ Detecting ROP with Statistical Learning of Program Characteristics

ASIA CCS'17 ~ Strict Virtual Call Integrity Checking for C++ Binaries


Stebila, Douglas

CCS'16 ~ Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE


Stefan, Deian

PLAS'16 ~ PLAS 2016 Chairs' Welcome

CCS'16 ~ PLAS'16 - ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security


Steiert, Douglas

SACMAT'17 ~ Poster: A Location-Privacy Approach for Continuous Queries


Steinhauser, Antonín

PLAS'16 ~ JSPChecker: Static Detection of Context-Sensitive Cross-Site Scripting Flaws in Legacy Web Applications


Steinke, Michael

CCS'16 ~ POSTER: VUDEC - A Framework for Vulnerability Management in Decentralized Communication Networks


Steinmetzer, Daniel

WiSec'17 ~ DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices


Stephens, Jon

CODASPY'17 ~ Analysis of Exception-Based Control Transfers


Stewart, Chase E.

SDN-NFVSec'17 ~ CommunityGuard: A Crowdsourced Home Cyber-Security System


Stock, Ben

CCS'16 ~ POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications


Stoller, Scott D.

SACMAT'17 ~ Mining Relationship-Based Access Control Policies


Stopczynski, Martin

WPES'17 ~ Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection


Stringhini, Gianluca

ASIA CCS'17 ~ PAYBREAK: Defense Against Cryptographic Ransomware


Strub, Pierre-Yves

CCS'16 ~ Advanced Probabilistic Couplings for Differential Privacy

CCS'16 ~ Differentially Private Bayesian Programming

CCS'16 ~ Strong Non-Interference and Type-Directed Higher-Order Masking


Struckmann, Katarina

CCS'16 ~ Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets


Stulman, Ariel

SACMAT'17 ~ Authorization Enforcement Detection


Stuntebeck, Erich

ASIA CCS'17 ~ DroidPill: Pwn Your Daily-Use Apps


Su, Pengchuan

SCC'17 ~ A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System


Suarez-Tangil, Guillermo

CODASPY'17 ~ DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

AISec'16 ~ Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

ASIA CCS'17 ~ TriFlow: Triaging Android Applications using Speculative Information Flows


Such, Jose M.

CCSW'16 ~ Assured Deletion in the Cloud: Requirements, Challenges and Future Directions


Suciu, Darius

CCS'16 ~ POSTER: DroidShield: Protecting User Applications from Normal World Access

CCS'16 ~ POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints


Sugrim, Shridatt

MIST'16 ~ Cyber Deception: Virtual Networks to Defend Insider Reconnaissance


Sullivan, Nick

SPRO'16 ~ Attacking White-Box AES Constructions


Sun, Bo

CCS'16 ~ Poster: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs


Sun, Jingchao

CCS'16 ~ iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft


Sun, Mingshen

CCS'16 ~ TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime


Sun, Nan

SCC'17 ~ A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System


Sunar, Berk

ASIA CCS'17 ~ Cache-Based Application Detection in the Cloud Using Machine Learning

ASIA CCS'17 ~ Hit by the Bus: QoS Degradation Attack on Android


Sural, Shamik

SACMAT'17 ~ Poster: Constrained Policy Mining in Attribute Based Access Control


Susilo, Willy

ASIA CCS'17 ~ An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption


Sutton, Charles

WiSec'17 ~ More Semantics More Robust: Improving Android Malware Classifiers


Svetinovic, Davor

IoTPTS'17 ~ Blockchain Engineering for the Internet of Things: Systems Security Perspective


Swami, Ananthram

ASIA CCS'17 ~ Practical Black-Box Attacks against Machine Learning


Swamy, Nikhil

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper


Syversen, Jason

MTD'16 ~ Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)