Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


Tailor, Neel

WiSec'17 ~ Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices


Tajalizadehkhoob, Samaneh

ASIA CCS'17 ~ The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware


Takabi, Hassan

SACMAT'17 ~ Towards a Top-down Policy Engineering Framework for Attribute-based Access Control


Takeuchi, Ichiro

ASIA CCS'17 ~ Privacy-preserving and Optimal Interval Release for Disease Susceptibility


Talwar, Kunal

CCS'16 ~ Deep Learning with Differential Privacy


Tambe, Amit

CPSS'17 ~ SIPHON: Towards Scalable High-Interaction Physical Honeypots


Tamrakar, Sandeep

ASIA CCS'17 ~ The Circle Game: Scalable Private Membership Test Using Trusted Hardware


Tan, Gaosheng

APKC'17 ~ Access Control Encryption Based on LWE


Tan, Rui

ASIA CCS'17 ~ Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage


Tan, Sheng

CCS'16 ~ VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones


Tan, Tian

CODASPY'17 ~ Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments


Tang, Qiang

SCC'17 ~ Privacy-preserving Hybrid Recommender System

SCC'17 ~ To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification


Tao, Yang

APKC'17 ~ Access Control Encryption Based on LWE


Tapiador, Juan

ASIA CCS'17 ~ TriFlow: Triaging Android Applications using Speculative Information Flows


Tasali, Qais

SACMAT'17 ~ A Flexible Authorization Architecture for Systems of Interoperable Medical Devices


Taylor, Joshua

MTD'16 ~ Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks


Taylor, Vincent F.

CCS'16 ~ DEMO: Starving Permission-Hungry Android Apps Using SecuRank

SPSM'16 ~ SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis

ASIA CCS'17 ~ To Update or Not to Update: Insights from a Two-Year Study of Android App Evolution


Tessaro, Stefano

CCS'16 ~ Message-Recovery Attacks on Feistel-Based Format Preserving Encryption


Testa, Brian

CCS'16 ~ Scalable Graph-based Bug Search for Firmware Images


Tews, Erik

WPES'17 ~ Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection

WiSec'17 ~ Trust the Wire, They Always Told Me! On Practical Non-Destructive Wire-Tap Attacks Against Ethernet


Thakur, Aditya

CODASPY'17 ~ Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure


Thandra, Sahithi

WPES'17 ~ Elxa: Scalable Privacy-Preserving Plagiarism Detection


Thomas, Kurt

SPSM'16 ~ Picasso: Lightweight Device Class Fingerprinting for Web Clients


Thomas, Richard J.

ASIA CCS'17 ~ An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols


Thompson, Brian

IWSPA'17 ~ Identifying Key Cyber-Physical Terrain


Thompson, Christopher

SPSM'16 ~ Securing Recognizers for Rich Video Applications


Thuraisingham, Bhavani

IWSPA'17 ~ IWSPA 2017 Chairs Welcome


Tian, Dave (Jing)

WiSec'17 ~ Detecting SMS Spam in the Age of Legitimate Bulk Messaging

CCS'16 ~ ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices


Tighzert, Walter

CCSW'16 ~ Encrypting Analytical Web Applications


Tikochinski, Shmuel

SACMAT'17 ~ Authorization Enforcement Detection


Tippenhauer, Nils Ole

IoTPTS'17 ~ IoTScanner: Detecting Privacy Threats in IoT Neighborhoods

CCS'16 ~ Limiting the Impact of Stealthy Attacks on Industrial Control Systems

CPSS'17 ~ SIPHON: Towards Scalable High-Interaction Physical Honeypots

CPS-SPC'16 ~ HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems

ASIA CCS'17 ~ Towards Formal Security Analysis of Industrial Control Systems

CPS-SPC'16 ~ Towards High-Interaction Virtual ICS Honeypots-in-a-Box


Toh, Jinghui

IoTPTS'17 ~ Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things

CCS'16 ~ POSTER: Towards Exposing Internet of Things: A Roadmap


Tong, Jonathan

IWSPA'17 ~ MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks


Toorani, Mohsen

ASIA CCS'17 ~ Side Channels in Deduplication: Trade-offs between Leakage and Efficiency


Torii, Naoya

TrustED'16 ~ Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs


Traynor, Patrick

WiSec'17 ~ Detecting SMS Spam in the Age of Legitimate Bulk Messaging


Trickel, Erik

CODASPY'17 ~ Deep Android Malware Detection


Trieu, Ni

CCS'16 ~ Efficient Batched Oblivious PRF with Applications to Private Set Intersection


Trieu Phong, Le

SCC'17 ~ Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption


Triller, Stefan

CCS'16 ~ An In-Depth Study of More Than Ten Years of Java Exploitation


Trinh, Viet Cuong

ASIA CCS'17 ~ A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size and Fast Decryption


Tripathi, Meenakshi

ASIA CCS'17 ~ POSTER: Detection of Information Leaks via Reflection in Android Apps


Tripunitara, Mahesh

CODASPY'17 ~ Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF)


Tromer, Eran

CCS'16 ~ ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels


Troncoso, Carmela

WPES'17 ~ TASP: Towards Anonymity Sets that Persist


Tsankov, Petar

CCS'16 ~ Statistical Deobfuscation of Android Applications


Tselekounis, Yiannis

CCS'16 ~ Practical Non-Malleable Codes from l-more Extractable Hash Functions


Tseng, Yuchia

SDN-NFVSec'17 ~ A First Step Towards Security Extension for NFV Orchestrator


Tsoutsos, Nektarios Georgios

CPSS'17 ~ Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering


Tsudik, Gene

WPES'17 ~ (The Futility of) Data Privacy in Content-Centric Networking

CCS'16 ~ C-FLAT: Control-Flow Attestation for Embedded Systems Software

WiSec'17 ~ DARPA: Device Attestation Resilient to Physical Attacks

ASIA CCS'17 ~ Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP

WPES'17 ~ Generating Secret Keys from Biometric Body Impedance Measurements

ASIA CCS'17 ~ Lightweight Swarm Attestation: A Tale of Two LISA-s

ASIA CCS'17 ~ Security in Personal Genomics: Lest We Forget


Tu, Guan-Hua

CCS'16 ~ New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks


Tuncay, Guliz Seray

CCS'16 ~ Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android


Tupsamudre, Harshal

CCS'16 ~ POSTER: Improved Markov Strength Meters for Passwords

ASIA CCS'17 ~ Short Paper - Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme


Turner, Ronald C.

ABAC'17 ~ Proposed Model for Natural Language ABAC Authoring


Ucan, Ercan

CCS'16 ~ DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How Hard Can It Be to Build a Secure Internet?


Ucci, Daniele

CODASPY'17 ~ Share a pie? Privacy-Preserving Knowledge Base Export through Count-min Sketches


Unger, Nik

WPES'17 ~ Elxa: Scalable Privacy-Preserving Plagiarism Detection


Unterluggauer, Thomas

ASIA CCS'17 ~ Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives


Upadhyaya, Shambhu J.

IWSPA'17 ~ Continuous Authentication Using Behavioral Biometrics


Urbina, David I.

CCS'16 ~ Limiting the Impact of Stealthy Attacks on Industrial Control Systems


Usui, Toshinori

CCS'16 ~ POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity


Uzun, Ersin

CODASPY'17 ~ Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks


Vaidya, Jaideep

SACMAT'17 ~ Poster: Constrained Policy Mining in Attribute Based Access Control


Vaikuntanathan, Vinod

CCS'16 ~ Improvements to Secure Computation with Penalties


Valente, Junia

CCS'16 ~ Limiting the Impact of Stealthy Attacks on Industrial Control Systems


Valenza, Fulvio

MIST'16 ~ Online and Offline Security Policy Assessment


Valizadeh, Saeed

MTD'16 ~ Markov Modeling of Moving Target Defense Games


Vallini, Marco

MIST'16 ~ Online and Offline Security Policy Assessment


Van Acker, Steven

CODASPY'17 ~ Discovering Browser Extensions via Web Accessible Resources


van de Kamp, Tim

WISCS'16 ~ Private Sharing of IOCs and Sightings


van der Kouwe, Erik

CCS'16 ~ TypeSan: Practical Type Confusion Detection


van der Veen, Victor

CCS'16 ~ Drammer: Deterministic Rowhammer Attacks on Mobile Platforms


van Dijk, Marten

SACMAT'17 ~ Leveraging Hardware Isolation for Process Level Access Control & Authentication

MTD'16 ~ Markov Modeling of Moving Target Defense Games


van Oorschot, Paul C.

ASIA CCS'17 ~ Accurate Manipulation of Delay-based Internet Geolocation


van Renesse, Robbert

CCS'16 ~ Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency


Vanhoef, Mathy

WiSec'17 ~ Defeating MAC Address Randomization Through Timing Attacks

ASIA CCS'17 ~ Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing


Varia, Mayank

CCS'16 ~ DEMO: Integrating MPC in Big Data Workflows


Vasek, Marie

WISCS'16 ~ Measuring the Impact of Sharing Abuse Data with Web Hosting Providers


Vasilopoulos, Dimitrios

CCSW'16 ~ Message-Locked Proofs of Retrievability with Secure Deduplication


Vassena, Marco

PLAS'16 ~ On Formalizing Information-Flow Control Libraries


Vasserman, Eugene Y.

SACMAT'17 ~ A Flexible Authorization Architecture for Systems of Interoperable Medical Devices


Vasu, Anne Maria

SDN-NFVSec'17 ~ CommunityGuard: A Crowdsourced Home Cyber-Security System


Vasudevan, Prashant Nalini

CCS'16 ~ Improvements to Secure Computation with Penalties


Vechev, Martin

CCS'16 ~ Statistical Deobfuscation of Android Applications


Velmurugan, Kumaragurubaran

TrustED'16 ~ On the Energy Cost of Channel Based Key Agreement


Venkatakrishnan, V.N.

CCS'16 ~ Chainsaw: Chained Automated Workflow-based Exploit Generation


Venkatesan, Sridhar

MTD'16 ~ A Moving Target Defense Approach to Disrupting Stealthy Botnets

MTD'16 ~ Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis


Verbauwhede, Ingrid

ASIA CCS'17 ~ Short Paper - SCM: Secure Code Memory Architecture


Verma, Akash

WPES'17 ~ Predicting Mobile App Privacy Preferences with Psychographics


Verma, Dinesh C.

SACMAT'17 ~ Distributed Intelligence - Trends in the Management of Complex Systems


Verma, Rakesh

CODASPY'17 ~ Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation

IWSPA'17 ~ IWSPA 2017 Chairs Welcome

ASIA CCS'17 ~ Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation

IWSPA'17 ~ What's in a URL: Fast Feature Extraction and Malicious URL Detection


Vetter, Julian

CODASPY'17 ~ Fault Attacks on Encrypted General Purpose Compute Platforms


Videau, Marion

SPRO'16 ~ Defeating MBA-based Obfuscation


Vigil, Martín

ASIA CCS'17 ~ MoPS: A Modular Protection Scheme for Long-Term Storage


Vigna, Giovanni

CCS'16 ~ Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

ASIA CCS'17 ~ Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions


Vishwamitra, Nishant

IWSPA'17 ~ MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks

SACMAT'17 ~ Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks


Viswanathan, Sreejaya

ASIA CCS'17 ~ Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage


Viticchié, Alessio

SPRO'16 ~ Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks


Vo-Huu, Tien Dang

WiSec'17 ~ Fingerprinting Wi-Fi Devices Using Software Defined Radios

WiSec'17 ~ Interleaving Jamming in Wi-Fi Networks


Vo-Huu, Triet Dang

WiSec'17 ~ Fingerprinting Wi-Fi Devices Using Software Defined Radios

WiSec'17 ~ Interleaving Jamming in Wi-Fi Networks


Voigt, Thiemo

IoTPTS'17 ~ Intrusion Detection in the RPL-connected 6LoWPAN Networks


Volgushev, Nikolaj

CCS'16 ~ DEMO: Integrating MPC in Big Data Workflows


Volkamer, Melanie

CCS'16 ~ POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes


Völp, Marcus

CPS-SPC'16 ~ Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems


von Ronne, Jeffery

SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language

SACMAT'17 ~ Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures


Vorobeychik, Yevgeniy

CODASPY'17 ~ Large-Scale Identification of Malicious Singleton Files


Vovk, Volodya

AISec'16 ~ Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection


Vukolić, Marko

BCC'17 ~ Rethinking Permissioned Blockchains


Vyas, Ketan

ASIA CCS'17 ~ Short Paper - Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)