Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


Wadhawan, Yatin

CPS-SPC'16 ~ Evaluating Resilience of Gas Pipeline Systems Under Cyber-Physical Attacks: A Function-Based Methodology


Wagener, Gérard

WISCS'16 ~ MISP - The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform


Wagner, Cynthia

WISCS'16 ~ MISP - The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform


Wagner, Daniel

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs


Wagner, David

SPSM'16 ~ Securing Recognizers for Rich Video Applications


Wagner, Isabel

WiSec'17 ~ Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices


Waidner, Michael

CCSW'16 ~ Stratum Filtering: Cloud-based Detection of Attack Sources


Wan, Tao

CCS'16 ~ Host of Troubles: Multiple Host Ambiguities in HTTP Implementations


Wang, Anduo

SDN-NFVSec'17 ~ Reflections on Data Integration for SDN


Wang, Cliff

MTD'16 ~ MTD 2016 Chairs' Welcome

CCS'16 ~ MTD 2016: Third ACM Workshop on Moving Target Defense


Wang, Cong

ASIA CCS'17 ~ EncKV: An Encrypted Key-value Store with Rich Queries

SCC'17 ~ SCC'17 Chairs' Welcome


Wang, Ding

CCS'16 ~ Targeted Online Password Guessing: An Underestimated Threat

ASIA CCS'17 ~ Understanding Human-Chosen PINs: Characteristics, Distribution and Security


Wang, Gang

ASIA CCS'17 ~ Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications

CODASPY'17 ~ Prioritized Analysis of Inter-App Communication Risks


Wang, Guilin

ASIA CCS'17 ~ VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange


Wang, Haining

CCS'16 ~ All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records

CCS'16 ~ High Fidelity Data Reduction for Big Data Security Dependency Analyses


Wang, Huangxin

MTD'16 ~ Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks


Wang, Husen

SCC'17 ~ Privacy-preserving Hybrid Recommender System


Wang, Jianhui

SDN-NFVSec'17 ~ Ultimate Forwarding Resilience in OpenFlow Networks


Wang, Kai

CCS'16 ~ Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback


Wang, Kevin

SACMAT'17 ~ Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks


Wang, Kuang-Ching

SACMAT'17 ~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control


Wang, Lihua

SCC'17 ~ Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption


Wang, Liming

ASIA CCS'17 ~ POSTER: Quantitative Security Assessment Method based on Entropy for Moving Target Defense


Wang, Minghua

ASIA CCS'17 ~ Extracting Conditional Formulas for Cross-Platform Bug Search


Wang, Pei

CCS'16 ~ CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump


Wang, Ping

CCS'16 ~ Targeted Online Password Guessing: An Underestimated Threat

ASIA CCS'17 ~ Understanding Human-Chosen PINs: Characteristics, Distribution and Security


Wang, Ruowen

ASIA CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android


Wang, Tianhao

CCS'16 ~ On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols


Wang, Wenbo

CCS'16 ~ Attacking OpenSSL Implementation of ECDSA with a Few Signatures


Wang, XiaoFeng

CCS'16 ~ Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

CCS'16 ~ Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service


Wang, Xiaoyin

SACMAT'17 ~ NTApps: A Network Traffic Analyzer of Android Applications


Wang, Xin

SCC'17 ~ Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM


Wang, Xinyu

ASIA CCS'17 ~ EncKV: An Encrypted Key-value Store with Rich Queries


Wang, Yongzhi

CCS'16 ~ POSTER: RIA - An Audition-based Method to Protect the Runtime Integrity of MapReduce Applications


Wang, Yuchen

CCS'16 ~ Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication


Wang, Zhi

ASIA CCS'17 ~ Pinpointing Vulnerabilities


Wary, Jean-Philippe

MIST'16 ~ A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems


Waseda, Atsushi

ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality


Watrigant, Rémi

SACMAT'17 ~ On the Satisfiability of Workflows with Release Points

CODASPY'17 ~ The Authorization Policy Existence Problem


Weaver, Nicholas

CCS'16 ~ Host of Troubles: Multiple Host Ambiguities in HTTP Implementations


Weeden, Matthew

WISCS'16 ~ Measuring the Impact of Sharing Abuse Data with Web Hosting Providers


Wegemer, Daniel

WiSec'17 ~ DEMO: Using NexMon, the C-based WiFi Firmware Modification Framework


Wehrle, Klaus

WPES'17 ~ CPPL: Compact Privacy Policy Language

CCS'16 ~ POSTER: Fingerprinting Tor Hidden Services

CCS'16 ~ POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store

CODASPY'17 ~ Privacy-Preserving HMM Forward Computation


Wei, Lingxiao

CCS'16 ~ On Code Execution Tracking via Power Side-Channel


Wei, Tao

CCS'16 ~ TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime


Wei, Xuetao

ASIA CCS'17 ~ DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging


Weichselbaum, Lukas

CCS'16 ~ CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy


Weimerskirch, André

CPSS'17 ~ A Functional Co-Design towards Safe and Secure Vehicle Platooning

CPS-SPC'16 ~ Risk Assessment for Cooperative Automated Driving


Weinberg, S. Matthew

CCS'16 ~ On the Instability of Bitcoin without the Block Reward


Weinert, Christian

ASIA CCS'17 ~ MoPS: A Modular Protection Scheme for Long-Term Storage


Weinmann, Ralf-Philipp

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Weinsberg, Yaron

MIST'16 ~ WatchIT: Who Watches Your IT Guy?


Weippl, Edgar

CCS'16 ~ CCS 2016 General Chair's Welcome

CCS'16 ~ Condensed Cryptographic Currencies Crash Course (C5)

SACMAT'17 ~ Poster: Design of an Anomaly-based Threat Detection & Explication System

SACMAT'17 ~ SACMAT 2017 Conference General and Program Chairs' Welcome Message


Weiser, Samuel

CODASPY'17 ~ SGXIO: Generic Trusted I/O Path for Intel SGX


Wellman, Michael P.

MTD'16 ~ Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis


Wellons, Christopher C.

SPRO'16 ~ ROP Gadget Prevalence and Survival under Compiler-based Binary Diversification Schemes


Wendzel, Steffen

CCS'16 ~ POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns


Werner, Mario

ASIA CCS'17 ~ Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives

CODASPY'17 ~ SGXIO: Generic Trusted I/O Path for Intel SGX


Wetzel, Susanne

CODASPY'17 ~ Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering


White, David H.

CCS'16 ~ POSTER: Identifying Dynamic Data Structures in Malware


Willemson, Jan

CCS'16 ~ Alternative Implementations of Secure Real Numbers


Willers, Oliver

CCS'16 ~ MEMS Gyroscopes as Physical Unclonable Functions


Williams, Conrad

SACMAT'17 ~ Attribute Expressions, Policy Tables and Attribute-Based Access Control

CODASPY'17 ~ Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control


Wilson, Christo

CCS'16 ~ Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem


Winnicki, Alexander

CPSS'17 ~ Cyber-Physical System Discovery - Reverse Engineering Physical Processes


Winslett, Marianne S.

CCS'16 ~ Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets


Wolinsky, David

WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication


Wolters, Maria

CCS'16 ~ POSTER: Weighing in eHealth Security: A Security and Privacy Study of Smart Scales


Wood, Christopher A.

WPES'17 ~ (The Futility of) Data Privacy in Content-Centric Networking


Woodbridge, Jonathan

AISec'16 ~ DeepDGA: Adversarially-Tuned Domain Generation and Detection


Wool, Avishai

CPS-SPC'16 ~ Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis

SPSM'16 ~ Secure Containers in Android: The Samsung KNOX Case Study


Wressnegger, Christian

ASIA CCS'17 ~ Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks

CCS'16 ~ Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms


Wright, Charles V.

CCS'16 ~ The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption


Wright, Joss

WPES'17 ~ Poisoning the Well - Exploring the Great Firewall's Poisoned DNS Responses


Wright, Mason

MTD'16 ~ Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis


Wright, Mathew

CCS'16 ~ POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity


Wright, Rebecca N.

AISec'16 ~ Differentially Private Online Active Learning with Applications to Anomaly Detection


Wszoła, Marta

APKC'17 ~ An Efficient Verification of CL-LRSW Signatures and a Pseudonym Certificate System


Wu, David J.

CCS'16 ~ Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds


Wu, Zhenyu

CCS'16 ~ High Fidelity Data Reduction for Big Data Security Dependency Analyses


Wurzenberger, Markus

MIST'16 ~ Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools


Wüst, Karl

CCS'16 ~ On the Security and Performance of Proof of Work Blockchains


Wustrow, Eric

SDN-NFVSec'17 ~ Trusted Click: Overcoming Security issues of NFV in the Cloud


Wyseur, Brecht

CCS'16 ~ 2nd International Workshop on Software Protection: SPRO 2016

SPRO'16 ~ SPRO'16 Workshop Chairs' Welcome

SPRO'16 ~ The ASPIRE Framework for Software Protection


Xi, Bowei

CCS'16 ~ Adversarial Data Mining: Big Data Meets Cyber Security


Xi, Wei

CCS'16 ~ Instant and Robust Authentication and Key Agreement among Mobile Devices


Xia, Yu

CCS'16 ~ The Honey Badger of BFT Protocols


Xiang, Yang

CPSS'17 ~ A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems


Xiao, Xiaokui

CCS'16 ~ Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy


Xiao, Xusheng

CCS'16 ~ High Fidelity Data Reduction for Big Data Security Dependency Analyses


Xiao, Yuan

CCS'16 ~ Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices


Xing, Luyi

CCS'16 ~ Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

CCS'16 ~ Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service


Xing, Xinyu

CCS'16 ~ CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump


Xiong, Aiping

CCS'16 ~ An Empirical Study of Mnemonic Sentence-based Password Generation Strategies


Xu, Chen

SDN-NFVSec'17 ~ CareNet: Building a Secure Software-defined Infrastructure for Home-based Healthcare


Xu, Chengcheng

CCS'16 ~ Scalable Graph-based Bug Search for Firmware Images


Xu, Fengyuan

CCS'16 ~ High Fidelity Data Reduction for Big Data Security Dependency Analyses


Xu, Jun

CCS'16 ~ CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump

MTD'16 ~ Demo: A Symbolic N-Variant System


Xu, Lei

BCC'17 ~ Enabling the Sharing Economy: Privacy Respecting Contract based on Public Blockchain

BCC'17 ~ Unraveling Blockchain-based Crypto-currency System Supporting Oblivious Transactions: A Formalized Approach


Xu, Lihua

CCS'16 ~ POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning


Xu, Ming

SCC'17 ~ A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud


Xu, Qiang

CCS'16 ~ On Code Execution Tracking via Power Side-Channel


Xu, Wenyao

CCS'16 ~ My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers


Xu, Wenyuan

CCS'16 ~ On Code Execution Tracking via Power Side-Channel


Xu, Zhang

CCS'16 ~ High Fidelity Data Reduction for Big Data Security Dependency Analyses


Xu, Zhen

ASIA CCS'17 ~ POSTER: Quantitative Security Assessment Method based on Entropy for Moving Target Defense


Xuan, Chaoting

ASIA CCS'17 ~ DroidPill: Pwn Your Daily-Use Apps


Xue, Jingling

CODASPY'17 ~ Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments


Xue, Minhui

CCS'16 ~ POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning


Yackoski, Justin

MTD'16 ~ Moving Target Defense - A Journey from Idea to Product


Yada, Takeshi

CCS'16 ~ POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity


Yadegari, Babak

CODASPY'17 ~ Analysis of Exception-Based Control Transfers


Yamaguchi, Fabian

ASIA CCS'17 ~ Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks

CCS'16 ~ Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms


Yamamoto, Dai

TrustED'16 ~ Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs


Yan, Hongfei

ASIA CCS'17 ~ DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging


Yan, Jeff

CCS'16 ~ Targeted Online Password Guessing: An Underestimated Threat


Yanchenko, Anna K.

IWSPA'17 ~ Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data


Yang, Jie

CCS'16 ~ VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones


Yang, Jingshun

ASIA CCS'17 ~ Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets


Yang, Kang

CCS'16 ~ Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication


Yang, Mu

ASIA CCS'17 ~ POSTER: Enabling End-Users to Protect their Privacy


Yang, Wei

SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource Allocation using Network Function Virtualization


Yang, Weining

CCS'16 ~ An Empirical Study of Mnemonic Sentence-based Password Generation Strategies


Yang, Yin

CCS'16 ~ Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy


Yao, Danfeng (Daphne)

CCS'16 ~ Program Anomaly Detection: Methodology and Practices

AISec'16 ~ Causality-based Sensemaking of Network Traffic for Android Application Security

SCC'17 ~ Cloud Data Analytics for Security: Applications, Challenges, and Opportunities

ASIA CCS'17 ~ Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications

CODASPY'17 ~ Prioritized Analysis of Inter-App Communication Risks


Yap, Roland H. C.

ASIA CCS'17 ~ Android Database Attacks Revisited


Yarom, Yuval

CCS'16 ~ "Make Sure DSA Signing Exponentiations Really are Constant-Time"

CCS'16 ~ ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels


Yau, David K. Y.

ASIA CCS'17 ~ Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage


Ye, Jing

CCS'16 ~ POSTER: Attack on Non-Linear Physical Unclonable Function


Yerima, Suleiman Y.

IWSPA'17 ~ EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning

CODASPY'17 ~ Deep Android Malware Detection


Yerukhimovich, Arkady

CCS'16 ~ POPE: Partial Order Preserving Encoding


Yeuk, Hyeungjun

MIST'16 ~ Analysis on Manipulation of the MAC Address and Consequent Security Threats


Yi, Xun

ASIA CCS'17 ~ Foreword


Yim, Kangbin

MIST'16 ~ Analysis on Manipulation of the MAC Address and Consequent Security Threats


Yin, Heng

ASIA CCS'17 ~ Extracting Conditional Formulas for Cross-Platform Bug Search

CCS'16 ~ Scalable Graph-based Bug Search for Firmware Images


Yiu, Siu-Ming

SCC'17 ~ Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM


You, Ilsun

MIST'16 ~ MIST'16 Workshop Chairs' Welcome Message

MIST'16 ~ Ports Distribution Management for Privacy Protection inside Local Domain Name System


Youssef, Amr M.

ASIA CCS'17 ~ BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection


Yu, Chia-Mu

CCS'16 ~ POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions

ASIA CCS'17 ~ POSTER: Enabling End-Users to Protect their Privacy


Yu, Lanqing

CCS'16 ~ Differential Privacy as a Mutual Information Constraint


Yu, Ting

CCS'16 ~ Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy


Yu, Yijun

ASIA CCS'17 ~ POSTER: Enabling End-Users to Protect their Privacy


Yu, Yunpeng

SCC'17 ~ A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud


Yuan, Kan

CCS'16 ~ Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

CCS'16 ~ Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service


Yuan, Xingliang

SCC'17 ~ Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination

ASIA CCS'17 ~ EncKV: An Encrypted Key-value Store with Rich Queries


Yuan, Xingzi

ASIA CCS'17 ~ DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging


Yung, Moti

ASIA CCS'17 ~ Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation


Zaffarano, Kara

MTD'16 ~ Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks


Zamani, Mahdi

WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication


Zanella-Béguelin, Santiago

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper


Zeitouni, Shaza

WiSec'17 ~ DARPA: Device Attestation Resilient to Physical Attacks


Zemmari, Akka

ASIA CCS'17 ~ POSTER: Detecting Inter-App Information Leakage Paths


Zenger, Christian T.

WiSec'17 ~ Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet


Zhang, Fan

CCS'16 ~ Town Crier: An Authenticated Data Feed for Smart Contracts


Zhang, Hang

CCS'16 ~ Android ION Hazard: The Curse of Customizable Memory Management System


Zhang, Hao

AISec'16 ~ Causality-based Sensemaking of Network Traffic for Android Application Security


Zhang, Hongke

MIST'16 ~ Ports Distribution Management for Privacy Protection inside Local Domain Name System


Zhang, Hongqi

ASIA CCS'17 ~ POSTER: Quantitative Security Assessment Method based on Entropy for Moving Target Defense


Zhang, Jun

SCC'17 ~ Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM


Zhang, Kehuan

CODASPY'17 ~ All Your VMs are Disconnected: Attacking Hardware Virtualized Network

WiSec'17 ~ Evading Android Runtime Analysis Through Detecting Programmed Interactions

CCS'16 ~ On Code Execution Tracking via Power Side-Channel


Zhang, Li

CCS'16 ~ Deep Learning with Differential Privacy


Zhang, Linghan

CCS'16 ~ VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones


Zhang, Mu

ASIA CCS'17 ~ Extracting Conditional Formulas for Cross-Platform Bug Search


Zhang, Ning

TrustED'16 ~ Looks Good To Me: Authentication for Augmented Reality


Zhang, Nuyun

SDN-NFVSec'17 ~ Towards Effective Virtualization of Intrusion Detection Systems


Zhang, Rui

APKC'17 ~ Access Control Encryption Based on LWE

CCS'16 ~ DPSense: Differentially Private Crowdsourced Spectrum Sensing

APKC'17 ~ Foreword


Zhang, Tao

AISec'16 ~ A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk Minimization


Zhang, Tianwei

ASIA CCS'17 ~ DoS Attacks on Your Memory in Cloud


Zhang, Xiang

IWSPA'17 ~ MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks


Zhang, Xiaokuan

ASIA CCS'17 ~ Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu

CCS'16 ~ Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices


Zhang, Xiaowen

CODASPY'17 ~ A New Bloom Filter Structure for Searchable Encryption Schemes


Zhang, Yanchao

CCS'16 ~ DPSense: Differentially Private Crowdsourced Spectrum Sensing

CCS'16 ~ iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft


Zhang, Yifei

CODASPY'17 ~ Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments


Zhang, Yinqian

CCS'16 ~ A Software Approach to Defeating Side Channels in Last-Level Caches

ASIA CCS'17 ~ Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu

ASIA CCS'17 ~ DoS Attacks on Your Memory in Cloud

CODASPY'17 ~ PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace

CCS'16 ~ Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices


Zhang, Yuan

CCS'16 ~ Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks


Zhang, Yueqian

SPSM'16 ~ What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps


Zhang, Yuexin

CPSS'17 ~ A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems


Zhang, Yuqing

CCS'16 ~ Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback


Zhang, Zhenfeng

CCS'16 ~ Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication


Zhang, Zijian

SCC'17 ~ A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System

CCS'16 ~ Targeted Online Password Guessing: An Underestimated Threat


Zhang, Zonghua

SDN-NFVSec'17 ~ A First Step Towards Security Extension for NFV Orchestrator


Zhao, Jizhong

CCS'16 ~ Instant and Robust Authentication and Key Agreement among Mobile Devices


Zhao, Kun

CCS'16 ~ Instant and Robust Authentication and Key Agreement among Mobile Devices


Zhao, Lianying

CCS'16 ~ Hypnoguard: Protecting Secrets across Sleep-wake Cycles


Zhao, Qingchuan

CODASPY'17 ~ PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace


Zhao, Tianming

MIST'16 ~ Ports Distribution Management for Privacy Protection inside Local Domain Name System


Zhao, Yongjun

ASIA CCS'17 ~ Updatable Block-Level Message-Locked Encryption


Zhao, Yunlei

CCS'16 ~ Identity-Concealed Authenticated Encryption and Key Exchange


Zhao, Ziming

CODASPY'17 ~ Deep Android Malware Detection

SACMAT'17 ~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control


Zheng, Chaodong

CCS'16 ~ A Secure Sharding Protocol for Open Blockchains


Zheng, Yao

WiSec'17 ~ Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding


Zheng, Zhiyuan

CPSS'17 ~ Towards Improving Data Validity of Cyber-Physical Systems through Path Redundancy


Zhong, Sheng

CCS'16 ~ Instant and Robust Authentication and Key Agreement among Mobile Devices

CCS'16 ~ Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks


Zhou, Chi

CCS'16 ~ My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers


Zhou, Jianying

CPSS'17 ~ ACM CPSS 2017 Chairs' Welcome


Zhou, Rundong

ASIA CCS'17 ~ Extracting Conditional Formulas for Cross-Platform Bug Search

CCS'16 ~ Scalable Graph-based Bug Search for Firmware Images


Zhou, Tingzhe

CCS'16 ~ CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites


Zhou, Yu

CCS'16 ~ CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites


Zhou, Zhe

CODASPY'17 ~ All Your VMs are Disconnected: Attacking Hardware Virtualized Network

CCS'16 ~ On Code Execution Tracking via Power Side-Channel


Zhou, Ziqiao

CCS'16 ~ A Software Approach to Defeating Side Channels in Last-Level Caches


Zhu, Haojin

CPSS'17 ~ A Functional Co-Design towards Safe and Secure Vehicle Platooning

CCS'16 ~ POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning

CCS'16 ~ When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals


Zhu, Liehuang

SCC'17 ~ A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System


Zhu, Quanyan

AISec'16 ~ A Dual Perturbation Approach for Differential Private ADMM-Based Distributed Empirical Risk Minimization


Zhu, Sencun

ASIA CCS'17 ~ Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets


Zhu, Ziyun

CCS'16 ~ FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature


Ziegeldorf, Jan Henrik

CCS'16 ~ POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store

CODASPY'17 ~ Privacy-Preserving HMM Forward Computation

WPES'17 ~ CPPL: Compact Privacy Policy Language


Zimmer, Jan

WiSec'17 ~ Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet


Zipkin, Joseph R.

IWSPA'17 ~ Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data


Zolfaghari, Hadi

CCS'16 ~ Practical Censorship Evasion Leveraging Content Delivery Networks


Zucchini, Rébecca

CCS'16 ~ Strong Non-Interference and Type-Directed Higher-Order Masking


Zunke, Michael

SPRO'16 ~ The ASPIRE Framework for Software Protection


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)