 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
Wadhawan,
Yatin
CPS-SPC'16 ~ Evaluating Resilience of Gas
Pipeline Systems Under Cyber-Physical Attacks: A Function-Based Methodology
Wagener,
Gérard
WISCS'16 ~ MISP - The Design and
Implementation of a Collaborative Threat Intelligence Sharing Platform
Wagner,
Cynthia
WISCS'16 ~ MISP - The Design and
Implementation of a Collaborative Threat Intelligence Sharing Platform
Wagner,
Daniel
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
|
| |
Wagner,
David
SPSM'16 ~ Securing Recognizers for Rich
Video Applications
Wagner,
Isabel
WiSec'17 ~ Poster: Design Ideas for Privacy-aware
User Interfaces for Mobile Devices
Waidner,
Michael
CCSW'16 ~ Stratum Filtering: Cloud-based
Detection of Attack Sources
Wan,
Tao
CCS'16 ~ Host of Troubles: Multiple Host
Ambiguities in HTTP Implementations
|
| |
Wang,
Anduo
SDN-NFVSec'17 ~ Reflections on Data Integration
for SDN
Wang,
Cliff
MTD'16 ~ MTD 2016 Chairs' Welcome
CCS'16
~ MTD 2016: Third ACM Workshop on Moving Target Defense
Wang,
Cong
ASIA CCS'17 ~ EncKV: An Encrypted Key-value
Store with Rich Queries
SCC'17
~ SCC'17 Chairs' Welcome
Wang,
Ding
CCS'16 ~ Targeted Online Password Guessing:
An Underestimated Threat
ASIA
CCS'17 ~ Understanding Human-Chosen PINs: Characteristics, Distribution
and Security
Wang,
Gang
ASIA CCS'17 ~ Collusive Data Leak and More:
Large-scale Threat Analysis of Inter-app Communications
CODASPY'17
~ Prioritized Analysis of Inter-App Communication Risks
|
| |
Wang,
Guilin
ASIA CCS'17 ~ VTBPEKE: Verifier-based Two-Basis
Password Exponential Key Exchange
Wang,
Haining
CCS'16 ~ All Your DNS Records Point to
Us: Understanding the Security Threats of Dangling DNS Records
CCS'16
~ High Fidelity Data Reduction for Big Data Security Dependency
Analyses
Wang,
Huangxin
MTD'16 ~ Towards Cost-Effective Moving
Target Defense Against DDoS and Covert Channel Attacks
Wang,
Husen
SCC'17 ~ Privacy-preserving Hybrid Recommender
System
Wang,
Jianhui
SDN-NFVSec'17 ~ Ultimate Forwarding Resilience
in OpenFlow Networks
Wang,
Kai
CCS'16 ~ Call Me Back! Attacks on System
Server and System Apps in Android through Synchronous Callback
|
| |
Wang,
Kevin
SACMAT'17 ~ Towards PII-based Multiparty
Access Control for Photo Sharing in Online Social Networks
Wang,
Kuang-Ching
SACMAT'17 ~ Poster: On the Safety and Efficiency
of Virtual Firewall Elasticity Control
Wang,
Lihua
SCC'17 ~ Efficient Key-Rotatable and Security-Updatable
Homomorphic Encryption
Wang,
Liming
ASIA CCS'17 ~ POSTER: Quantitative Security
Assessment Method based on Entropy for Moving Target Defense
Wang,
Minghua
ASIA CCS'17 ~ Extracting Conditional Formulas
for Cross-Platform Bug Search
Wang,
Pei
CCS'16 ~ CREDAL: Towards Locating a Memory
Corruption Vulnerability with Your Core Dump
|
| |
Wang,
Ping
CCS'16 ~ Targeted Online Password Guessing:
An Underestimated Threat
ASIA
CCS'17 ~ Understanding Human-Chosen PINs: Characteristics, Distribution
and Security
Wang,
Ruowen
ASIA CCS'17 ~ SPOKE: Scalable Knowledge
Collection and Attack Surface Analysis of Access Control Policy for
Security Enhanced Android
Wang,
Tianhao
CCS'16 ~ On the Security and Usability
of Segment-based Visual Cryptographic Authentication Protocols
Wang,
Wenbo
CCS'16 ~ Attacking OpenSSL Implementation
of ECDSA with a Few Signatures
Wang,
XiaoFeng
CCS'16 ~ Acing the IOC Game: Toward Automatic
Discovery and Analysis of Open-Source Cyber Threat Intelligence
CCS'16
~ Lurking Malice in the Cloud: Understanding and Detecting Cloud
Repository as a Malicious Service
Wang,
Xiaoyin
SACMAT'17 ~ NTApps: A Network Traffic Analyzer
of Android Applications
|
| |
Wang,
Xin
SCC'17 ~ Secure Dot Product of Outsourced
Encrypted Vectors and its Application to SVM
Wang,
Xinyu
ASIA CCS'17 ~ EncKV: An Encrypted Key-value
Store with Rich Queries
Wang,
Yongzhi
CCS'16 ~ POSTER: RIA - An Audition-based
Method to Protect the Runtime Integrity of MapReduce Applications
Wang,
Yuchen
CCS'16 ~ Practical Anonymous Password Authentication
and TLS with Anonymous Client Authentication
Wang,
Zhi
ASIA CCS'17 ~ Pinpointing Vulnerabilities
Wary,
Jean-Philippe
MIST'16 ~ A New Risk Assessment Framework
Using Graph Theory for Complex ICT Systems
|
| |
Waseda,
Atsushi
ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage
System Providing Long-Term Integrity, Authenticity, and Confidentiality
Watrigant,
Rémi
SACMAT'17 ~ On the Satisfiability of Workflows
with Release Points
CODASPY'17
~ The Authorization Policy Existence Problem
Weaver,
Nicholas
CCS'16 ~ Host of Troubles: Multiple Host
Ambiguities in HTTP Implementations
Weeden,
Matthew
WISCS'16 ~ Measuring the Impact of Sharing
Abuse Data with Web Hosting Providers
Wegemer,
Daniel
WiSec'17 ~ DEMO: Using NexMon, the C-based
WiFi Firmware Modification Framework
Wehrle,
Klaus
WPES'17 ~ CPPL: Compact Privacy Policy
Language
CCS'16
~ POSTER: Fingerprinting Tor Hidden Services
CCS'16
~ POSTER: I Don't Want That Content! On the Risks of Exploiting
Bitcoin's Blockchain as a Content Store
CODASPY'17
~ Privacy-Preserving HMM Forward Computation
|
| |
Wei,
Lingxiao
CCS'16 ~ On Code Execution Tracking via
Power Side-Channel
Wei,
Tao
CCS'16 ~ TaintART: A Practical Multi-level
Information-Flow Tracking System for Android RunTime
Wei,
Xuetao
ASIA CCS'17 ~ DroidForensics: Accurate
Reconstruction of Android Attacks via Multi-layer Forensic Logging
Weichselbaum,
Lukas
CCS'16 ~ CSP Is Dead, Long Live CSP! On
the Insecurity of Whitelists and the Future of Content Security Policy
Weimerskirch,
André
CPSS'17 ~ A Functional Co-Design towards
Safe and Secure Vehicle Platooning
CPS-SPC'16
~ Risk Assessment for Cooperative Automated Driving
Weinberg,
S. Matthew
CCS'16 ~ On the Instability of Bitcoin
without the Block Reward
|
| |
Weinert,
Christian
ASIA CCS'17 ~ MoPS: A Modular Protection
Scheme for Long-Term Storage
Weinmann,
Ralf-Philipp
CCS'16 ~ A Systematic Analysis of the Juniper
Dual EC Incident
Weinsberg,
Yaron
MIST'16 ~ WatchIT: Who Watches Your IT
Guy?
Weippl,
Edgar
CCS'16 ~ CCS 2016 General Chair's Welcome
CCS'16
~ Condensed Cryptographic Currencies Crash Course (C5)
SACMAT'17
~ Poster: Design of an Anomaly-based Threat Detection & Explication
System
SACMAT'17
~ SACMAT 2017 Conference General and Program Chairs' Welcome
Message
Weiser,
Samuel
CODASPY'17 ~ SGXIO: Generic Trusted I/O
Path for Intel SGX
Wellman,
Michael P.
MTD'16 ~ Moving Target Defense against
DDoS Attacks: An Empirical Game-Theoretic Analysis
|
| |
Wellons,
Christopher C.
SPRO'16 ~ ROP Gadget Prevalence and Survival
under Compiler-based Binary Diversification Schemes
Wendzel,
Steffen
CCS'16 ~ POSTER: An Educational Network
Protocol for Covert Channel Analysis Using Patterns
Werner,
Mario
ASIA CCS'17 ~ Securing Memory Encryption
and Authentication Against Side-Channel Attacks Using Unprotected Primitives
CODASPY'17
~ SGXIO: Generic Trusted I/O Path for Intel SGX
Wetzel,
Susanne
CODASPY'17 ~ Efficient Commodity Matching
for Privacy-Preserving Two-Party Bartering
White,
David H.
CCS'16 ~ POSTER: Identifying Dynamic Data
Structures in Malware
Willemson,
Jan
CCS'16 ~ Alternative Implementations of
Secure Real Numbers
|
| |
Willers,
Oliver
CCS'16 ~ MEMS Gyroscopes as Physical Unclonable
Functions
Williams,
Conrad
SACMAT'17 ~ Attribute Expressions, Policy
Tables and Attribute-Based Access Control
CODASPY'17
~ Canonical Completeness in Lattice-Based Languages for Attribute-Based
Access Control
Wilson,
Christo
CCS'16 ~ Measurement and Analysis of Private
Key Sharing in the HTTPS Ecosystem
Winnicki,
Alexander
CPSS'17 ~ Cyber-Physical System Discovery
- Reverse Engineering Physical Processes
Winslett,
Marianne S.
CCS'16 ~ Leave Your Phone at the Door:Side
Channels that Reveal Factory Floor Secrets
Wolinsky,
David
WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant
Protocol for Local-Area Anonymous Communication
|
| |
Wolters,
Maria
CCS'16 ~ POSTER: Weighing in eHealth Security:
A Security and Privacy Study of Smart Scales
Wood,
Christopher A.
WPES'17 ~ (The Futility of) Data Privacy
in Content-Centric Networking
Woodbridge,
Jonathan
AISec'16 ~ DeepDGA: Adversarially-Tuned
Domain Generation and Detection
Wool,
Avishai
CPS-SPC'16 ~ Automatic Construction of
Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via
Spectral Analysis
SPSM'16
~ Secure Containers in Android: The Samsung KNOX Case Study
Wressnegger,
Christian
ASIA CCS'17 ~ Automatically Inferring Malware
Signatures for Anti-Virus Assisted Attacks
CCS'16
~ Twice the Bits, Twice the Trouble: Vulnerabilities Induced
by Migrating to 64-Bit Platforms
Wright,
Charles V.
CCS'16 ~ The Shadow Nemesis: Inference
Attacks on Efficiently Deployable, Efficiently Searchable Encryption
|
| |
Wright,
Joss
WPES'17 ~ Poisoning the Well - Exploring
the Great Firewall's Poisoned DNS Responses
Wright,
Mason
MTD'16 ~ Moving Target Defense against
DDoS Attacks: An Empirical Game-Theoretic Analysis
Wright,
Mathew
CCS'16 ~ POSTER: Phishing Website Detection
with a Multiphase Framework to Find Visual Similarity
Wright,
Rebecca N.
AISec'16 ~ Differentially Private Online
Active Learning with Applications to Anomaly Detection
Wszoła,
Marta
APKC'17 ~ An Efficient Verification of
CL-LRSW Signatures and a Pseudonym Certificate System
Wu,
David J.
CCS'16 ~ Order-Revealing Encryption: New
Constructions, Applications, and Lower Bounds
|
| |
Wu,
Zhenyu
CCS'16 ~ High Fidelity Data Reduction for
Big Data Security Dependency Analyses
Wurzenberger,
Markus
MIST'16 ~ Discovering Insider Threats from
Log Data with High-Performance Bioinformatics Tools
Wüst,
Karl
CCS'16 ~ On the Security and Performance
of Proof of Work Blockchains
Wustrow,
Eric
SDN-NFVSec'17 ~ Trusted Click: Overcoming
Security issues of NFV in the Cloud
Wyseur,
Brecht
CCS'16 ~ 2nd International Workshop on
Software Protection: SPRO 2016
SPRO'16
~ SPRO'16 Workshop Chairs' Welcome
SPRO'16
~ The ASPIRE Framework for Software Protection
Xi,
Bowei
CCS'16 ~ Adversarial Data Mining: Big Data
Meets Cyber Security
|
| |
Xi,
Wei
CCS'16 ~ Instant and Robust Authentication
and Key Agreement among Mobile Devices
Xia,
Yu
CCS'16 ~ The Honey Badger of BFT Protocols
Xiang,
Yang
CPSS'17 ~ A Cross-Layer Key Establishment
Model for Wireless Devices in Cyber-Physical Systems
Xiao,
Xiaokui
CCS'16 ~ Heavy Hitter Estimation over Set-Valued
Data with Local Differential Privacy
Xiao,
Xusheng
CCS'16 ~ High Fidelity Data Reduction for
Big Data Security Dependency Analyses
Xiao,
Yuan
CCS'16 ~ Return-Oriented Flush-Reload Side
Channels on ARM and Their Implications for Android Devices
|
| |
Xing,
Luyi
CCS'16 ~ Acing the IOC Game: Toward Automatic
Discovery and Analysis of Open-Source Cyber Threat Intelligence
CCS'16
~ Lurking Malice in the Cloud: Understanding and Detecting Cloud
Repository as a Malicious Service
Xing,
Xinyu
CCS'16 ~ CREDAL: Towards Locating a Memory
Corruption Vulnerability with Your Core Dump
Xiong,
Aiping
CCS'16 ~ An Empirical Study of Mnemonic
Sentence-based Password Generation Strategies
Xu,
Chen
SDN-NFVSec'17 ~ CareNet: Building a Secure
Software-defined Infrastructure for Home-based Healthcare
Xu,
Chengcheng
CCS'16 ~ Scalable Graph-based Bug Search
for Firmware Images
Xu,
Fengyuan
CCS'16 ~ High Fidelity Data Reduction for
Big Data Security Dependency Analyses
|
| |
Xu,
Jun
CCS'16 ~ CREDAL: Towards Locating a Memory
Corruption Vulnerability with Your Core Dump
MTD'16
~ Demo: A Symbolic N-Variant System
Xu,
Lei
BCC'17 ~ Enabling the Sharing Economy:
Privacy Respecting Contract based on Public Blockchain
BCC'17
~ Unraveling Blockchain-based Crypto-currency System Supporting
Oblivious Transactions: A Formalized Approach
Xu,
Lihua
CCS'16 ~ POSTER: Accuracy vs. Time Cost:
Detecting Android Malware through Pareto Ensemble Pruning
Xu,
Ming
SCC'17 ~ A Secure Algorithm for Outsourcing
Matrix Multiplication Computation in the Cloud
Xu,
Qiang
CCS'16 ~ On Code Execution Tracking via
Power Side-Channel
Xu,
Wenyao
CCS'16 ~ My Smartphone Knows What You Print:
Exploring Smartphone-based Side-channel Attacks Against 3D Printers
|
| |
Xu,
Wenyuan
CCS'16 ~ On Code Execution Tracking via
Power Side-Channel
Xu,
Zhang
CCS'16 ~ High Fidelity Data Reduction for
Big Data Security Dependency Analyses
Xu,
Zhen
ASIA CCS'17 ~ POSTER: Quantitative Security
Assessment Method based on Entropy for Moving Target Defense
Xuan,
Chaoting
ASIA CCS'17 ~ DroidPill: Pwn Your Daily-Use
Apps
Xue,
Jingling
CODASPY'17 ~ Ripple: Reflection Analysis
for Android Apps in Incomplete Information Environments
Xue,
Minhui
CCS'16 ~ POSTER: Accuracy vs. Time Cost:
Detecting Android Malware through Pareto Ensemble Pruning
|
| |
Yackoski,
Justin
MTD'16 ~ Moving Target Defense - A Journey
from Idea to Product
Yada,
Takeshi
CCS'16 ~ POSTER: Static ROP Chain Detection
Based on Hidden Markov Model Considering ROP Chain Integrity
Yadegari,
Babak
CODASPY'17 ~ Analysis of Exception-Based
Control Transfers
Yamaguchi,
Fabian
ASIA CCS'17 ~ Automatically Inferring Malware
Signatures for Anti-Virus Assisted Attacks
CCS'16
~ Twice the Bits, Twice the Trouble: Vulnerabilities Induced
by Migrating to 64-Bit Platforms
Yamamoto,
Dai
TrustED'16 ~ Evaluation of Latch-based
Physical Random Number Generator Implementation on 40 nm ASICs
Yan,
Hongfei
ASIA CCS'17 ~ DroidForensics: Accurate
Reconstruction of Android Attacks via Multi-layer Forensic Logging
|
| |
Yan,
Jeff
CCS'16 ~ Targeted Online Password Guessing:
An Underestimated Threat
Yanchenko,
Anna K.
IWSPA'17 ~ Predicting Exploitation of Disclosed
Software Vulnerabilities Using Open-source Data
Yang,
Jie
CCS'16 ~ VoiceLive: A Phoneme Localization
based Liveness Detection for Voice Authentication on Smartphones
Yang,
Jingshun
ASIA CCS'17 ~ Toward Detecting Collusive
Ranking Manipulation Attackers in Mobile App Markets
Yang,
Kang
CCS'16 ~ Practical Anonymous Password Authentication
and TLS with Anonymous Client Authentication
Yang,
Mu
ASIA CCS'17 ~ POSTER: Enabling End-Users
to Protect their Privacy
|
| |
Yang,
Wei
SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource
Allocation using Network Function Virtualization
Yang,
Weining
CCS'16 ~ An Empirical Study of Mnemonic
Sentence-based Password Generation Strategies
Yang,
Yin
CCS'16 ~ Heavy Hitter Estimation over Set-Valued
Data with Local Differential Privacy
Yao,
Danfeng (Daphne)
CCS'16 ~ Program Anomaly Detection: Methodology
and Practices
AISec'16
~ Causality-based Sensemaking of Network Traffic for Android
Application Security
SCC'17
~ Cloud Data Analytics for Security: Applications, Challenges,
and Opportunities
ASIA
CCS'17 ~ Collusive Data Leak and More: Large-scale Threat Analysis
of Inter-app Communications
CODASPY'17
~ Prioritized Analysis of Inter-App Communication Risks
Yap,
Roland H. C.
ASIA CCS'17 ~ Android Database Attacks
Revisited
Yarom,
Yuval
CCS'16 ~ "Make Sure DSA Signing Exponentiations
Really are Constant-Time"
CCS'16
~ ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical
Side Channels
|
| |
Yau,
David K. Y.
ASIA CCS'17 ~ Taming Asymmetric Network
Delays for Clock Synchronization Using Power Grid Voltage
Ye,
Jing
CCS'16 ~ POSTER: Attack on Non-Linear Physical
Unclonable Function
Yerima,
Suleiman Y.
IWSPA'17 ~ EMULATOR vs REAL PHONE:
Android Malware Detection Using Machine Learning
CODASPY'17
~ Deep Android Malware Detection
Yerukhimovich,
Arkady
CCS'16 ~ POPE: Partial Order Preserving
Encoding
Yeuk,
Hyeungjun
MIST'16 ~ Analysis on Manipulation of the
MAC Address and Consequent Security Threats
Yi,
Xun
ASIA CCS'17 ~ Foreword
|
| |
Yim,
Kangbin
MIST'16 ~ Analysis on Manipulation of the
MAC Address and Consequent Security Threats
Yin,
Heng
ASIA CCS'17 ~ Extracting Conditional Formulas
for Cross-Platform Bug Search
CCS'16
~ Scalable Graph-based Bug Search for Firmware Images
Yiu,
Siu-Ming
SCC'17 ~ Secure Dot Product of Outsourced
Encrypted Vectors and its Application to SVM
You,
Ilsun
MIST'16 ~ MIST'16 Workshop Chairs' Welcome
Message
MIST'16
~ Ports Distribution Management for Privacy Protection inside
Local Domain Name System
Youssef,
Amr M.
ASIA CCS'17 ~ BinSequence: Fast, Accurate
and Scalable Binary Code Reuse Detection
Yu,
Chia-Mu
CCS'16 ~ POSTER: Efficient Cross-User Chunk-Level
Client-Side Data Deduplication with Symmetrically Encrypted Two-Party
Interactions
ASIA
CCS'17 ~ POSTER: Enabling End-Users to Protect their Privacy
|
| |
Yu,
Lanqing
CCS'16 ~ Differential Privacy as a Mutual
Information Constraint
Yu,
Ting
CCS'16 ~ Heavy Hitter Estimation over Set-Valued
Data with Local Differential Privacy
Yu,
Yijun
ASIA CCS'17 ~ POSTER: Enabling End-Users
to Protect their Privacy
Yu,
Yunpeng
SCC'17 ~ A Secure Algorithm for Outsourcing
Matrix Multiplication Computation in the Cloud
Yuan,
Kan
CCS'16 ~ Acing the IOC Game: Toward Automatic
Discovery and Analysis of Open-Source Cyber Threat Intelligence
CCS'16
~ Lurking Malice in the Cloud: Understanding and Detecting Cloud
Repository as a Malicious Service
Yuan,
Xingliang
SCC'17 ~ Enabling Privacy-assured Mobile
Advertisement Targeting and Dissemination
ASIA
CCS'17 ~ EncKV: An Encrypted Key-value Store with Rich Queries
|
| |
Yuan,
Xingzi
ASIA CCS'17 ~ DroidForensics: Accurate
Reconstruction of Android Attacks via Multi-layer Forensic Logging
Yung,
Moti
ASIA CCS'17 ~ Secure Wallet-Assisted Offline
Bitcoin Payments with Double-Spender Revocation
Zaffarano,
Kara
MTD'16 ~ Automated Effectiveness Evaluation
of Moving Target Defenses: Metrics for Missions and Attacks
Zamani,
Mahdi
WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant
Protocol for Local-Area Anonymous Communication
Zanella-Béguelin,
Santiago
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
Zeitouni,
Shaza
WiSec'17 ~ DARPA: Device Attestation Resilient
to Physical Attacks
|
| |
Zemmari,
Akka
ASIA CCS'17 ~ POSTER: Detecting Inter-App
Information Leakage Paths
Zenger,
Christian T.
WiSec'17 ~ Constructive and Destructive
Aspects of Adaptive Wormholes for the 5G Tactile Internet
Zhang,
Fan
CCS'16 ~ Town Crier: An Authenticated Data
Feed for Smart Contracts
Zhang,
Hang
CCS'16 ~ Android ION Hazard: The Curse
of Customizable Memory Management System
Zhang,
Hao
AISec'16 ~ Causality-based Sensemaking
of Network Traffic for Android Application Security
Zhang,
Hongke
MIST'16 ~ Ports Distribution Management
for Privacy Protection inside Local Domain Name System
|
| |
Zhang,
Hongqi
ASIA CCS'17 ~ POSTER: Quantitative Security
Assessment Method based on Entropy for Moving Target Defense
Zhang,
Jun
SCC'17 ~ Secure Dot Product of Outsourced
Encrypted Vectors and its Application to SVM
Zhang,
Kehuan
CODASPY'17 ~ All Your VMs are Disconnected:
Attacking Hardware Virtualized Network
WiSec'17
~ Evading Android Runtime Analysis Through Detecting Programmed
Interactions
CCS'16
~ On Code Execution Tracking via Power Side-Channel
Zhang,
Li
CCS'16 ~ Deep Learning with Differential
Privacy
Zhang,
Linghan
CCS'16 ~ VoiceLive: A Phoneme Localization
based Liveness Detection for Voice Authentication on Smartphones
Zhang,
Mu
ASIA CCS'17 ~ Extracting Conditional Formulas
for Cross-Platform Bug Search
|
| |
Zhang,
Ning
TrustED'16 ~ Looks Good To Me: Authentication
for Augmented Reality
Zhang,
Nuyun
SDN-NFVSec'17 ~ Towards Effective Virtualization
of Intrusion Detection Systems
Zhang,
Rui
APKC'17 ~ Access Control Encryption Based
on LWE
CCS'16
~ DPSense: Differentially Private Crowdsourced Spectrum Sensing
APKC'17
~ Foreword
Zhang,
Tao
AISec'16 ~ A Dual Perturbation Approach
for Differential Private ADMM-Based Distributed Empirical Risk Minimization
Zhang,
Tianwei
ASIA CCS'17 ~ DoS Attacks on Your Memory
in Cloud
Zhang,
Xiang
IWSPA'17 ~ MCDefender: Toward Effective
Cyberbullying Defense in Mobile Online Social Networks
|
| |
Zhang,
Xiaokuan
ASIA CCS'17 ~ Detecting Privileged Side-Channel
Attacks in Shielded Execution with Déjà Vu
CCS'16
~ Return-Oriented Flush-Reload Side Channels on ARM and Their
Implications for Android Devices
Zhang,
Xiaowen
CODASPY'17 ~ A New Bloom Filter Structure
for Searchable Encryption Schemes
Zhang,
Yanchao
CCS'16 ~ DPSense: Differentially Private
Crowdsourced Spectrum Sensing
CCS'16
~ iLock: Immediate and Automatic Locking of Mobile Devices against
Data Theft
Zhang,
Yifei
CODASPY'17 ~ Ripple: Reflection Analysis
for Android Apps in Incomplete Information Environments
Zhang,
Yinqian
CCS'16 ~ A Software Approach to Defeating
Side Channels in Last-Level Caches
ASIA
CCS'17 ~ Detecting Privileged Side-Channel Attacks in Shielded
Execution with Déjà Vu
ASIA
CCS'17 ~ DoS Attacks on Your Memory in Cloud
CODASPY'17
~ PT-CFI: Transparent Backward-Edge Control Flow Violation Detection
Using Intel Processor Trace
CCS'16
~ Return-Oriented Flush-Reload Side Channels on ARM and Their
Implications for Android Devices
Zhang,
Yuan
CCS'16 ~ Stemming Downlink Leakage from
Training Sequences in Multi-User MIMO Networks
|
| |
Zhang,
Yueqian
SPSM'16 ~ What You See Isn't Always What
You Get: A Measurement Study of Usage Fraud on Android Apps
Zhang,
Yuexin
CPSS'17 ~ A Cross-Layer Key Establishment
Model for Wireless Devices in Cyber-Physical Systems
Zhang,
Yuqing
CCS'16 ~ Call Me Back! Attacks on System
Server and System Apps in Android through Synchronous Callback
Zhang,
Zhenfeng
CCS'16 ~ Practical Anonymous Password Authentication
and TLS with Anonymous Client Authentication
Zhang,
Zijian
SCC'17 ~ A Privacy-Preserving and Vessel
Authentication Scheme Using Automatic Identification System
CCS'16
~ Targeted Online Password Guessing: An Underestimated Threat
Zhang,
Zonghua
SDN-NFVSec'17 ~ A First Step Towards Security
Extension for NFV Orchestrator
|
| |
Zhao,
Jizhong
CCS'16 ~ Instant and Robust Authentication
and Key Agreement among Mobile Devices
Zhao,
Kun
CCS'16 ~ Instant and Robust Authentication
and Key Agreement among Mobile Devices
Zhao,
Lianying
CCS'16 ~ Hypnoguard: Protecting Secrets
across Sleep-wake Cycles
Zhao,
Qingchuan
CODASPY'17 ~ PT-CFI: Transparent Backward-Edge
Control Flow Violation Detection Using Intel Processor Trace
Zhao,
Tianming
MIST'16 ~ Ports Distribution Management
for Privacy Protection inside Local Domain Name System
Zhao,
Yongjun
ASIA CCS'17 ~ Updatable Block-Level Message-Locked
Encryption
|
| |
Zhao,
Yunlei
CCS'16 ~ Identity-Concealed Authenticated
Encryption and Key Exchange
Zhao,
Ziming
CODASPY'17 ~ Deep Android Malware Detection
SACMAT'17
~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity
Control
Zheng,
Chaodong
CCS'16 ~ A Secure Sharding Protocol for
Open Blockchains
Zheng,
Yao
WiSec'17 ~ Profiling the Strength of Physical-Layer
Security: A Study in Orthogonal Blinding
Zheng,
Zhiyuan
CPSS'17 ~ Towards Improving Data Validity
of Cyber-Physical Systems through Path Redundancy
Zhong,
Sheng
CCS'16 ~ Instant and Robust Authentication
and Key Agreement among Mobile Devices
CCS'16
~ Stemming Downlink Leakage from Training Sequences in Multi-User
MIMO Networks
|
| |
Zhou,
Chi
CCS'16 ~ My Smartphone Knows What You Print:
Exploring Smartphone-based Side-channel Attacks Against 3D Printers
Zhou,
Jianying
CPSS'17 ~ ACM CPSS 2017 Chairs' Welcome
Zhou,
Rundong
ASIA CCS'17 ~ Extracting Conditional Formulas
for Cross-Platform Bug Search
CCS'16
~ Scalable Graph-based Bug Search for Firmware Images
Zhou,
Tingzhe
CCS'16 ~ CSPAutoGen: Black-box Enforcement
of Content Security Policy upon Real-world Websites
Zhou,
Yu
CCS'16 ~ CSPAutoGen: Black-box Enforcement
of Content Security Policy upon Real-world Websites
Zhou,
Zhe
CODASPY'17 ~ All Your VMs are Disconnected:
Attacking Hardware Virtualized Network
CCS'16
~ On Code Execution Tracking via Power Side-Channel
|
| |
Zhou,
Ziqiao
CCS'16 ~ A Software Approach to Defeating
Side Channels in Last-Level Caches
Zhu,
Haojin
CPSS'17 ~ A Functional Co-Design towards
Safe and Secure Vehicle Platooning
CCS'16
~ POSTER: Accuracy vs. Time Cost: Detecting Android Malware through
Pareto Ensemble Pruning
CCS'16
~ When CSI Meets Public WiFi: Inferring Your Mobile Phone Password
via WiFi Signals
Zhu,
Liehuang
SCC'17 ~ A Privacy-Preserving and Vessel
Authentication Scheme Using Automatic Identification System
Zhu,
Quanyan
AISec'16 ~ A Dual Perturbation Approach
for Differential Private ADMM-Based Distributed Empirical Risk Minimization
Zhu,
Sencun
ASIA CCS'17 ~ Toward Detecting Collusive
Ranking Manipulation Attackers in Mobile App Markets
Zhu,
Ziyun
CCS'16 ~ FeatureSmith: Automatically Engineering
Features for Malware Detection by Mining the Security Literature
|
| |
Ziegeldorf,
Jan Henrik
CCS'16 ~ POSTER: I Don't Want That Content!
On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
CODASPY'17
~ Privacy-Preserving HMM Forward Computation
WPES'17
~ CPPL: Compact Privacy Policy Language
Zimmer,
Jan
WiSec'17 ~ Constructive and Destructive
Aspects of Adaptive Wormholes for the 5G Tactile Internet
Zipkin,
Joseph R.
IWSPA'17 ~ Predicting Exploitation of Disclosed
Software Vulnerabilities Using Open-source Data
Zolfaghari,
Hadi
CCS'16 ~ Practical Censorship Evasion Leveraging
Content Delivery Networks
Zucchini,
Rébecca
CCS'16 ~ Strong Non-Interference and Type-Directed
Higher-Order Masking
Zunke,
Michael
SPRO'16 ~ The ASPIRE Framework for Software
Protection
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |