 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
Tailor,
Neel
WiSec'17 ~ Poster: Design Ideas for Privacy-aware
User Interfaces for Mobile Devices
Tajalizadehkhoob,
Samaneh
ASIA CCS'17 ~ The Role of Hosting Providers
in Fighting Command and Control Infrastructure of Financial Malware
Takabi,
Hassan
SACMAT'17 ~ Towards a Top-down Policy Engineering
Framework for Attribute-based Access Control
Takeuchi,
Ichiro
ASIA CCS'17 ~ Privacy-preserving and Optimal
Interval Release for Disease Susceptibility
|
| |
Talwar,
Kunal
CCS'16 ~ Deep Learning with Differential
Privacy
Tambe,
Amit
CPSS'17 ~ SIPHON: Towards Scalable High-Interaction
Physical Honeypots
Tamrakar,
Sandeep
ASIA CCS'17 ~ The Circle Game: Scalable
Private Membership Test Using Trusted Hardware
Tan,
Gaosheng
APKC'17 ~ Access Control Encryption Based
on LWE
|
| |
Tan,
Rui
ASIA CCS'17 ~ Taming Asymmetric Network
Delays for Clock Synchronization Using Power Grid Voltage
Tan,
Sheng
CCS'16 ~ VoiceLive: A Phoneme Localization
based Liveness Detection for Voice Authentication on Smartphones
Tan,
Tian
CODASPY'17 ~ Ripple: Reflection Analysis
for Android Apps in Incomplete Information Environments
Tang,
Qiang
SCC'17 ~ Privacy-preserving Hybrid Recommender
System
SCC'17
~ To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced
Computation Verification
Tao,
Yang
APKC'17 ~ Access Control Encryption Based
on LWE
|
| |
Tapiador,
Juan
ASIA CCS'17 ~ TriFlow: Triaging Android
Applications using Speculative Information Flows
Tasali,
Qais
SACMAT'17 ~ A Flexible Authorization Architecture
for Systems of Interoperable Medical Devices
Taylor,
Joshua
MTD'16 ~ Automated Effectiveness Evaluation
of Moving Target Defenses: Metrics for Missions and Attacks
Taylor,
Vincent F.
CCS'16 ~ DEMO: Starving Permission-Hungry
Android Apps Using SecuRank
SPSM'16
~ SecuRank: Starving Permission-Hungry Apps Using Contextual
Permission Analysis
ASIA
CCS'17 ~ To Update or Not to Update: Insights from a Two-Year
Study of Android App Evolution
Tessaro,
Stefano
CCS'16 ~ Message-Recovery Attacks on Feistel-Based
Format Preserving Encryption
Testa,
Brian
CCS'16 ~ Scalable Graph-based Bug Search
for Firmware Images
|
| |
Tews,
Erik
WPES'17 ~ Disguised Chromium Browser: Robust
Browser, Flash and Canvas Fingerprinting Protection
WiSec'17
~ Trust the Wire, They Always Told Me! On Practical Non-Destructive
Wire-Tap Attacks Against Ethernet
Thakur,
Aditya
CODASPY'17 ~ Statistical Security Incident
Forensics against Data Falsification in Smart Grid Advanced Metering
Infrastructure
Thandra,
Sahithi
WPES'17 ~ Elxa: Scalable Privacy-Preserving
Plagiarism Detection
Thomas,
Kurt
SPSM'16 ~ Picasso: Lightweight Device Class
Fingerprinting for Web Clients
Thomas,
Richard J.
ASIA CCS'17 ~ An Attack Against Message
Authentication in the ERTMS Train to Trackside Communication Protocols
Thompson,
Brian
IWSPA'17 ~ Identifying Key Cyber-Physical
Terrain
|
| |
Thompson,
Christopher
SPSM'16 ~ Securing Recognizers for Rich
Video Applications
Thuraisingham,
Bhavani
IWSPA'17 ~ IWSPA 2017 Chairs Welcome
Tian,
Dave (Jing)
WiSec'17 ~ Detecting SMS Spam in the Age
of Legitimate Bulk Messaging
CCS'16
~ ProvUSB: Block-level Provenance-Based Data Protection for USB
Storage Devices
Tighzert,
Walter
CCSW'16 ~ Encrypting Analytical Web Applications
Tikochinski,
Shmuel
SACMAT'17 ~ Authorization Enforcement Detection
Tippenhauer,
Nils Ole
IoTPTS'17 ~ IoTScanner: Detecting Privacy
Threats in IoT Neighborhoods
CCS'16
~ Limiting the Impact of Stealthy Attacks on Industrial Control
Systems
CPSS'17
~ SIPHON: Towards Scalable High-Interaction Physical Honeypots
CPS-SPC'16
~ HAMIDS: Hierarchical Monitoring Intrusion Detection System
for Industrial Control Systems
ASIA
CCS'17 ~ Towards Formal Security Analysis of Industrial Control
Systems
CPS-SPC'16
~ Towards High-Interaction Virtual ICS Honeypots-in-a-Box
|
| |
Toh,
Jinghui
IoTPTS'17 ~ Let the Cat Out of the Bag:
A Holistic Approach Towards Security Analysis of the Internet of Things
CCS'16
~ POSTER: Towards Exposing Internet of Things: A Roadmap
Tong,
Jonathan
IWSPA'17 ~ MCDefender: Toward Effective
Cyberbullying Defense in Mobile Online Social Networks
Toorani,
Mohsen
ASIA CCS'17 ~ Side Channels in Deduplication:
Trade-offs between Leakage and Efficiency
Torii,
Naoya
TrustED'16 ~ Evaluation of Latch-based
Physical Random Number Generator Implementation on 40 nm ASICs
Traynor,
Patrick
WiSec'17 ~ Detecting SMS Spam in the Age
of Legitimate Bulk Messaging
Trickel,
Erik
CODASPY'17 ~ Deep Android Malware Detection
|
| |
Trieu,
Ni
CCS'16 ~ Efficient Batched Oblivious PRF
with Applications to Private Set Intersection
Trieu
Phong, Le
SCC'17 ~ Efficient Key-Rotatable and Security-Updatable
Homomorphic Encryption
Triller,
Stefan
CCS'16 ~ An In-Depth Study of More Than
Ten Years of Java Exploitation
Trinh,
Viet Cuong
ASIA CCS'17 ~ A Ciphertext-Policy Attribute-based
Encryption Scheme With Optimized Ciphertext Size and Fast Decryption
Tripathi,
Meenakshi
ASIA CCS'17 ~ POSTER: Detection of Information
Leaks via Reflection in Android Apps
Tripunitara,
Mahesh
CODASPY'17 ~ Graph Automorphism-Based,
Semantics-Preserving Security for the Resource Description Framework
(RDF)
|
| |
Tromer,
Eran
CCS'16 ~ ECDSA Key Extraction from Mobile
Devices via Nonintrusive Physical Side Channels
Troncoso,
Carmela
WPES'17 ~ TASP: Towards Anonymity Sets
that Persist
Tsankov,
Petar
CCS'16 ~ Statistical Deobfuscation of Android
Applications
Tselekounis,
Yiannis
CCS'16 ~ Practical Non-Malleable Codes
from l-more Extractable Hash Functions
Tseng,
Yuchia
SDN-NFVSec'17 ~ A First Step Towards Security
Extension for NFV Orchestrator
Tsoutsos,
Nektarios Georgios
CPSS'17 ~ Secure 3D Printing: Reconstructing
and Validating Solid Geometries using Toolpath Reverse Engineering
|
| |
Tsudik,
Gene
WPES'17 ~ (The Futility of) Data Privacy
in Content-Centric Networking
CCS'16
~ C-FLAT: Control-Flow Attestation for Embedded Systems Software
WiSec'17
~ DARPA: Device Attestation Resilient to Physical Attacks
ASIA
CCS'17 ~ Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
WPES'17
~ Generating Secret Keys from Biometric Body Impedance Measurements
ASIA
CCS'17 ~ Lightweight Swarm Attestation: A Tale of Two LISA-s
ASIA
CCS'17 ~ Security in Personal Genomics: Lest We Forget
Tu,
Guan-Hua
CCS'16 ~ New Security Threats Caused by
IMS-based SMS Service in 4G LTE Networks
Tuncay,
Guliz Seray
CCS'16 ~ Draco: A System for Uniform and
Fine-grained Access Control for Web Code on Android
Tupsamudre,
Harshal
CCS'16 ~ POSTER: Improved Markov Strength
Meters for Passwords
ASIA
CCS'17 ~ Short Paper - Pass-O: A Proposal to Improve the Security
of Pattern Unlock Scheme
Turner,
Ronald C.
ABAC'17 ~ Proposed Model for Natural Language
ABAC Authoring
Ucan,
Ercan
CCS'16 ~ DEMO: Easy Deployment of a Secure
Internet Architecture for the 21st Century: How Hard Can It Be to Build
a Secure Internet?
|
| |
Ucci,
Daniele
CODASPY'17 ~ Share a pie? Privacy-Preserving
Knowledge Base Export through Count-min Sketches
Unger,
Nik
WPES'17 ~ Elxa: Scalable Privacy-Preserving
Plagiarism Detection
Unterluggauer,
Thomas
ASIA CCS'17 ~ Securing Memory Encryption
and Authentication Against Side-Channel Attacks Using Unprotected Primitives
Upadhyaya,
Shambhu J.
IWSPA'17 ~ Continuous Authentication Using
Behavioral Biometrics
Urbina,
David I.
CCS'16 ~ Limiting the Impact of Stealthy
Attacks on Industrial Control Systems
Usui,
Toshinori
CCS'16 ~ POSTER: Static ROP Chain Detection
Based on Hidden Markov Model Considering ROP Chain Integrity
|
| |
Uzun,
Ersin
CODASPY'17 ~ Achieving Differential Privacy
in Secure Multiparty Data Aggregation Protocols on Star Networks
Vaidya,
Jaideep
SACMAT'17 ~ Poster: Constrained Policy
Mining in Attribute Based Access Control
Vaikuntanathan,
Vinod
CCS'16 ~ Improvements to Secure Computation
with Penalties
Valente,
Junia
CCS'16 ~ Limiting the Impact of Stealthy
Attacks on Industrial Control Systems
Valenza,
Fulvio
MIST'16 ~ Online and Offline Security Policy
Assessment
Valizadeh,
Saeed
MTD'16 ~ Markov Modeling of Moving Target
Defense Games
|
| |
Vallini,
Marco
MIST'16 ~ Online and Offline Security Policy
Assessment
Van
Acker, Steven
CODASPY'17 ~ Discovering Browser Extensions
via Web Accessible Resources
van
de Kamp, Tim
WISCS'16 ~ Private Sharing of IOCs and
Sightings
van
der Kouwe, Erik
CCS'16 ~ TypeSan: Practical Type Confusion
Detection
van
der Veen, Victor
CCS'16 ~ Drammer: Deterministic Rowhammer
Attacks on Mobile Platforms
van
Dijk, Marten
SACMAT'17 ~ Leveraging Hardware Isolation
for Process Level Access Control & Authentication
MTD'16
~ Markov Modeling of Moving Target Defense Games
|
| |
van
Oorschot, Paul C.
ASIA CCS'17 ~ Accurate Manipulation of
Delay-based Internet Geolocation
van
Renesse, Robbert
CCS'16 ~ Safe Serializable Secure Scheduling:
Transactions and the Trade-Off Between Security and Consistency
Vanhoef,
Mathy
WiSec'17 ~ Defeating MAC Address Randomization
Through Timing Attacks
ASIA
CCS'17 ~ Discovering Logical Vulnerabilities in the Wi-Fi Handshake
Using Model-Based Testing
Varia,
Mayank
CCS'16 ~ DEMO: Integrating MPC in Big Data
Workflows
Vasek,
Marie
WISCS'16 ~ Measuring the Impact of Sharing
Abuse Data with Web Hosting Providers
Vasilopoulos,
Dimitrios
CCSW'16 ~ Message-Locked Proofs of Retrievability
with Secure Deduplication
|
| |
Vassena,
Marco
PLAS'16 ~ On Formalizing Information-Flow
Control Libraries
Vasserman,
Eugene Y.
SACMAT'17 ~ A Flexible Authorization Architecture
for Systems of Interoperable Medical Devices
Vasu,
Anne Maria
SDN-NFVSec'17 ~ CommunityGuard: A Crowdsourced
Home Cyber-Security System
Vasudevan,
Prashant Nalini
CCS'16 ~ Improvements to Secure Computation
with Penalties
Vechev,
Martin
CCS'16 ~ Statistical Deobfuscation of Android
Applications
Velmurugan,
Kumaragurubaran
TrustED'16 ~ On the Energy Cost of Channel
Based Key Agreement
|
| |
Venkatakrishnan,
V.N.
CCS'16 ~ Chainsaw: Chained Automated Workflow-based
Exploit Generation
Venkatesan,
Sridhar
MTD'16 ~ A Moving Target Defense Approach
to Disrupting Stealthy Botnets
MTD'16
~ Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic
Analysis
Verbauwhede,
Ingrid
ASIA CCS'17 ~ Short Paper - SCM: Secure
Code Memory Architecture
Verma,
Akash
WPES'17 ~ Predicting Mobile App Privacy
Preferences with Psychographics
Verma,
Dinesh C.
SACMAT'17 ~ Distributed Intelligence -
Trends in the Management of Complex Systems
Verma,
Rakesh
CODASPY'17 ~ Comprehensive Method for Detecting
Phishing EmailsUsing Correlation-based Analysis and User Participation
IWSPA'17
~ IWSPA 2017 Chairs Welcome
ASIA
CCS'17 ~ Scaling and Effectiveness of Email Masquerade Attacks:
Exploiting Natural Language Generation
IWSPA'17
~ What's in a URL: Fast Feature Extraction and Malicious URL
Detection
|
| |
Vetter,
Julian
CODASPY'17 ~ Fault Attacks on Encrypted
General Purpose Compute Platforms
Videau,
Marion
SPRO'16 ~ Defeating MBA-based Obfuscation
Vigil,
Martín
ASIA CCS'17 ~ MoPS: A Modular Protection
Scheme for Long-Term Storage
Vigna,
Giovanni
CCS'16 ~ Drammer: Deterministic Rowhammer
Attacks on Mobile Platforms
ASIA
CCS'17 ~ Gossip: Automatically Identifying Malicious Domains
from Mailing List Discussions
Vishwamitra,
Nishant
IWSPA'17 ~ MCDefender: Toward Effective
Cyberbullying Defense in Mobile Online Social Networks
SACMAT'17
~ Towards PII-based Multiparty Access Control for Photo Sharing
in Online Social Networks
Viswanathan,
Sreejaya
ASIA CCS'17 ~ Taming Asymmetric Network
Delays for Clock Synchronization Using Power Grid Voltage
|
| |
Viticchié,
Alessio
SPRO'16 ~ Reactive Attestation: Automatic
Detection and Reaction to Software Tampering Attacks
Vo-Huu,
Tien Dang
WiSec'17 ~ Fingerprinting Wi-Fi Devices
Using Software Defined Radios
WiSec'17
~ Interleaving Jamming in Wi-Fi Networks
Vo-Huu,
Triet Dang
WiSec'17 ~ Fingerprinting Wi-Fi Devices
Using Software Defined Radios
WiSec'17
~ Interleaving Jamming in Wi-Fi Networks
Voigt,
Thiemo
IoTPTS'17 ~ Intrusion Detection in the
RPL-connected 6LoWPAN Networks
Volgushev,
Nikolaj
CCS'16 ~ DEMO: Integrating MPC in Big Data
Workflows
Volkamer,
Melanie
CCS'16 ~ POSTER: Towards Collaboratively
Supporting Decision Makers in Choosing Suitable Authentication Schemes
|
| |
Völp,
Marcus
CPS-SPC'16 ~ Towards Safe and Secure Autonomous
and Cooperative Vehicle Ecosystems
von
Ronne, Jeffery
SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant
Release of Medical Records Using the History Aware Programming Language
SACMAT'17
~ Verifiable Assume-Guarantee Privacy Specifications for Actor
Component Architectures
Vorobeychik,
Yevgeniy
CODASPY'17 ~ Large-Scale Identification
of Malicious Singleton Files
Vovk,
Volodya
AISec'16 ~ Prescience: Probabilistic Guidance
on the Retraining Conundrum for Malware Detection
Vukolić,
Marko
BCC'17 ~ Rethinking Permissioned Blockchains
Vyas,
Ketan
ASIA CCS'17 ~ Short Paper - Pass-O: A Proposal
to Improve the Security of Pattern Unlock Scheme
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |