Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


Ba, Zhongjie

CCS'16 ~ My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers


Bacis, Enrico

WISCS'16 ~ Managing Data Sharing in OpenStack Swift with Over-Encryption

CCS'16 ~ Mix&Slice: Efficient Access Revocation in the Cloud


Backes, Michael

CCS'16 ~ Computational Soundness for Dalvik Bytecode

CCS'16 ~ Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments

CCS'16 ~ Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks

CCS'16 ~ Membership Privacy in MicroRNA-based Studies

WPES'17 ~ On Profile Linkability despite Anonymity in Social Media Systems

CCS'16 ~ POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications

CCS'16 ~ POSTER: The ART of App Compartmentalization

CCS'16 ~ Reliable Third-Party Library Detection in Android and its Security Applications


Badache, Nadjib

CODASPY'17 ~ Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications


Baek, Joonsang

APKC'17 ~ Foreword


Bailey, Michael

CCS'16 ~ MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet


Baker, Richard

CPS-SPC'16 ~ Secure Location Verification with a Mobile Receiver


Baki, Shahryar

ASIA CCS'17 ~ Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation


Baldoni, Roberto

CODASPY'17 ~ Share a pie? Privacy-Preserving Knowledge Base Export through Count-min Sketches


Baldor, Kevin

SACMAT'17 ~ Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures


Ball, Marshall

CCS'16 ~ Garbling Gadgets for Boolean and Arithmetic Circuits


Balzarotti, Davide

CCS'16 ~ PhishEye: Live Monitoring of Sandboxed Phishing Kits


Banahatti, Vijayanand

CCS'16 ~ POSTER: Improved Markov Strength Meters for Passwords

ASIA CCS'17 ~ Short Paper - Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme


Bancroft, Charlie

MTD'16 ~ Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks


Bandara, Arosha K.

ASIA CCS'17 ~ POSTER: Enabling End-Users to Protect their Privacy


Banescu, Sebastian

CODASPY'17 ~ Detecting Patching of Executables without System Calls

SPRO'16 ~ StIns4CS: A State Inspection Tool for C#

SPRO'16 ~ VOT4CS: A Virtualization Obfuscation Tool for C#


Barak, Assaf

CCS'16 ~ Demo: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation


Barbara, Daniel

CODASPY'17 ~ Detecting ROP with Statistical Learning of Program Characteristics


Barhamgi, Mahmoud

ASIA CCS'17 ~ POSTER: Enabling End-Users to Protect their Privacy


Barhelemy, Lucas

SPRO'16 ~ Binary Permutation Polynomial Inversion and Application to Obfuscation Techniques


Barman, Ludovic

WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication


Bartel, Alexandre

CCS'16 ~ An In-Depth Study of More Than Ten Years of Java Exploitation


Barthe, Gilles

CCS'16 ~ Advanced Probabilistic Couplings for Differential Privacy

CCS'16 ~ Differentially Private Bayesian Programming

CCS'16 ~ Strong Non-Interference and Type-Directed Higher-Order Masking


Basile, Cataldo

SPRO'16 ~ Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks

SPRO'16 ~ The ASPIRE Framework for Software Protection


Bates, Adam

CCS'16 ~ ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices


Bauer, Kevin

MTD'16 ~ Have No PHEAR: Networks Without Identifiers


Bauer, Lujo

CCS'16 ~ Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition


Bauer, Tobias

TIS'16 ~ Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box


Bauman, Erick

ASIA CCS'17 ~ SGX-Log: Securing System Logs with SGX


Baumann, Peter

WPES'17 ~ Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection


Baweja, Kunal

CCS'16 ~ A Secure Sharding Protocol for Open Blockchains


Belaïd, Sonia

CCS'16 ~ Strong Non-Interference and Type-Directed Higher-Order Masking


Bellala, Gowtham

SACMAT'17 ~ A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics


Bellare, Mihir

CCS'16 ~ Message-Recovery Attacks on Feistel-Based Format Preserving Encryption


Ben- Adar Bessos, Mai

CPS-SPC'16 ~ Exposing Transmitters in Mobile Multi-Agent Games


Ben Jaballah, Wafa

MIST'16 ~ A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications


Ben Rajeb, Narjes

CCSW'16 ~ Co-location Resistant Strategy with Full Resources Optimization


Ben-Efraim, Aner

CCS'16 ~ Optimizing Semi-Honest Secure Multiparty Computation for the Internet


Benitez, Sergio

PLAS'16 ~ Short Paper: Rusty Types for Solid Safety


Benslimane, Djamal

ASIA CCS'17 ~ POSTER: Enabling End-Users to Protect their Privacy


Benson, James

SACMAT'17 ~ Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment


Benton, Kevin

SafeConfig'16 ~ Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies


Bentov, Iddo

CCS'16 ~ Amortizing Secure Computation with Penalties


Berg, Mark

ABAC'17 ~ A Systematic Approach to Implementing ABAC


Bergé, Pierre

CODASPY'17 ~ The Authorization Policy Existence Problem


Berrang, Pascal

CCS'16 ~ Membership Privacy in MicroRNA-based Studies

WPES'17 ~ On Profile Linkability despite Anonymity in Social Media Systems


Berrima, Mouhebeddine

CCSW'16 ~ Co-location Resistant Strategy with Full Resources Optimization


Bertino, Elisa

SACMAT'17 ~ A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics

SACMAT'17 ~ Distributed Intelligence - Trends in the Management of Complex Systems

CODASPY'17 ~ Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses

ASIA CCS'17 ~ Memory Safety for Embedded Devices with nesChec

MIST'16 ~ MIST'16 Workshop Chairs' Welcome Message

SACMAT'17 ~ SACMAT 2017 Conference General and Program Chairs' Welcome Message

CODASPY'17 ~ Seamless and Secure Bluetooth LE Connection Migration


Bestavros, Azer

CCS'16 ~ DEMO: Integrating MPC in Big Data Workflows

MTD'16 ~ Markov Modeling of Moving Target Defense Games


Beunardeau, Marc

ASIA CCS'17 ~ The Case for System Command Encryption


Beuscher, Benedict

CCS'16 ~ On the Security of Cracking-Resistant Password Vaults


Beyah, Raheem

CCS'16 ~ Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

CCS'16 ~ Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service


Bhagavatula, Sruti

CCS'16 ~ Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition


Bhairav, Suhas

IoTPTS'17 ~ Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things


Bhandari, Shweta

ASIA CCS'17 ~ POSTER: Detecting Inter-App Information Leakage Paths


Bhargava, Bharat

MTD'16 ~ Mayflies: A Moving Target Defense Framework for Distributed Systems


Bhargavan, Karthikeyan

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper

CCS'16 ~ On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN


Bhatia, Jaspreet

WISCS'16 ~ Privacy Risk in Cybersecurity Data Sharing


Bhatt, Smriti

ABAC'17 ~ ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine


Bhattacharjee, Shameek

CODASPY'17 ~ Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure


Bhunia, Suman Sankar

CPSS'17 ~ SIPHON: Towards Scalable High-Interaction Physical Honeypots


Bhunia, Swarup

CCS'16 ~ MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection


Bi, Rongrong

SCC'17 ~ A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System


Bichsel, Benjamin

CCS'16 ~ Statistical Deobfuscation of Android Applications


Bielova, Nataliia

PLAS'16 ~ Short Paper: Dynamic Leakage - A Need for a New Quantitative Information Flow Measure


Biggio, Battista

SPSM'16 ~ Detecting Misuse of Google Cloud Messaging in Android Badware

AISec'16 ~ Secure Kernel Machines against Evasion Attacks


Bilgin, Begul

CCS'16 ~ Theory of Implementation Security Workshop (TIs 2016)

TIS'16 ~ Masking AES with d+1 Shares in Hardware

TIS'16 ~ Theory of Implementation Security Workshop 2016: TIS 2016


Bindschaedler, Vincent

CODASPY'17 ~ Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks


Birnbach, Simon

CPS-SPC'16 ~ Exposing Transmitters in Mobile Multi-Agent Games


Biswas, Prosunjit

ABAC'17 ~ Attribute Transformation for Attribute-Based Access Control


Blass, Erik-Oliver

WISCS'16 ~ Foreword

CCS'16 ~ WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security


Blue, Logan

WiSec'17 ~ Detecting SMS Spam in the Age of Legitimate Bulk Messaging


Bobba, Rakesh B.

CPS-SPC'16 ~ 2016 CPS-SPC Chairs' Welcome

CCS'16 ~ Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16)


Bocovich, Cecylia

CCS'16 ~ Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement


Bodden, Eric

CCS'16 ~ An In-Depth Study of More Than Ten Years of Java Exploitation


Bohli, Jens-Matthias

ASIA CCS'17 ~ Sharing Proofs of Retrievability across Tenants


Böhme, Marcel

CCS'16 ~ Coverage-based Greybox Fuzzing as Markov Chain


Böhme, Rainer

WISCS'16 ~ Back to the Roots: Information Sharing Economics and What We Can Learn for Security


Boneh, Dan

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs


Bonné, Bram

WiSec'17 ~ POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability


Boreli, Roksana

WiSec'17 ~ Smart-Phones Attacking Smart-Homes


Borgaonkar, Ravishankar

SPSM'16 ~ White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones


Bos, Herbert

CCS'16 ~ Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

CCS'16 ~ POSTER: Identifying Dynamic Data Structures in Malware

CCS'16 ~ TypeSan: Practical Type Confusion Detection


Bos, Joppe

CCS'16 ~ Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE


Bossert, Martin

TrustED'16 ~ Online Reliability Testing for PUF Key Derivation


Bost, Raphael

CCS'16 ~ ????? - Forward Secure Searchable Encryption


Bosu, Amiangshu

ASIA CCS'17 ~ Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications


Boyd, Colin

ASIA CCS'17 ~ Side Channels in Deduplication: Trade-offs between Leakage and Efficiency


Boyle, Elette

CCS'16 ~ Function Secret Sharing: Improvements and Extensions


Braun, Johannes

ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality


Breaux, Travis D.

WISCS'16 ~ Privacy Risk in Cybersecurity Data Sharing


Breu, Ruth

WISCS'16 ~ Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice


Brito, Alejandro

CODASPY'17 ~ Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks


Brossard, David

ABAC'17 ~ A Systematic Approach to Implementing ABAC


Brown, Fraser

PLAS'16 ~ Short Paper: Superhacks: Exploring and Preventing Vulnerabilities in Browser Binding Code


Brumley, Billy Bob

CCS'16 ~ "Make Sure DSA Signing Exponentiations Really are Constant-Time"


Büchler, Matthias

SPSM'16 ~ CRIOS: Toward Large-Scale iOS Application Analysis


Buchmann, Johannes

ASIA CCS'17 ~ MoPS: A Modular Protection Scheme for Long-Term Storage

ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality


Bugiel, Sven

CCS'16 ~ POSTER: The ART of App Compartmentalization

CCS'16 ~ Reliable Third-Party Library Detection in Android and its Security Applications


Bugliesi, Michele

CCS'16 ~ Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild


Buhren, Robert

CODASPY'17 ~ Fault Attacks on Encrypted General Purpose Compute Platforms


Bui, Thang

SACMAT'17 ~ Mining Relationship-Based Access Control Policies


Bullough, Benjamin L.

IWSPA'17 ~ Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data


Bultel, Xavier

WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

ASIA CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol


Burkard, Cody

IWSPA'17 ~ Analysis of Causative Attacks against SVMs Learning from Data Streams


Bursztein, Elie

SPSM'16 ~ Picasso: Lightweight Device Class Fingerprinting for Web Clients


Busby, Jeremy S.

ABAC'17 ~ Verification of Resilience Policies that Assist Attribute Based Access Control


Butler, Kevin R. B.

WiSec'17 ~ Detecting SMS Spam in the Age of Legitimate Bulk Messaging

CCS'16 ~ ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices


Cai, Haipeng

CODASPY'17 ~ Prioritized Analysis of Inter-App Communication Risks


Caine, Kelly

SACMAT'17 ~ Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks


Calo, Seraphin B.

SACMAT'17 ~ Distributed Intelligence - Trends in the Management of Complex Systems


Calzavara, Stefano

CCS'16 ~ Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild


Cámara, Javier

IWSPA'17 ~ Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software


Camenisch, Jan

WPES'17 ~ Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs


Camp, L. Jean

SafeConfig'16 ~ Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies


Canard, Sébastien

ASIA CCS'17 ~ BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic


Candell, Richard

CCS'16 ~ Limiting the Impact of Stealthy Attacks on Industrial Control Systems


Canet, Margaux

CODASPY'17 ~ Decompression Quines and Anti-Viruses


Cangialosi, Frank

CCS'16 ~ Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem


Cao, Yinzhi

CCS'16 ~ CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites


Cao, Yu

SDN-NFVSec'17 ~ CareNet: Building a Secure Software-defined Infrastructure for Home-based Healthcare


Čapkun, Srdjan

ASIA CCS'17 ~ CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks

CODASPY'17 ~ Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception

SPSM'16 ~ Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking

CCSW'16 ~ On Information Leakage in Deduplicated Storage Systems

CCS'16 ~ On the Security and Performance of Proof of Work Blockchains


Capobianco, Frank

SACMAT'17 ~ On Risk in Access Control Enforcement


Cardenas, Alvaro A.

CPS-SPC'16 ~ 2016 CPS-SPC Chairs' Welcome

CCS'16 ~ Limiting the Impact of Stealthy Attacks on Industrial Control Systems

CCS'16 ~ Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16)


Carle, Georg

WISCS'16 ~ Collaborative Incident Handling Based on the Blackboard-Pattern


Carlsten, Miles

CCS'16 ~ On the Instability of Bitcoin without the Block Reward


Carmer, Brent

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs


Carminati, Barbara

CODASPY'17 ~ SAMPAC: Socially-Aware collaborative Multi-Party Access Control


Carpent, Xavier

ASIA CCS'17 ~ Heterogeneous Rainbow Table Widths Provide Faster Cryptanalyses

ASIA CCS'17 ~ Lightweight Swarm Attestation: A Tale of Two LISA-s


Carpineto, Caudio

WPES'17 ~ Automatic Assessment of Website Compliance to the European Cookie Law with CooLCheck


Carr, Scott A.

ASIA CCS'17 ~ DataShield: Configurable Data Confidentiality and Integrity


Casas, Pedro

CCS'16 ~ POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data


Cash, David

CCS'16 ~ What Else is Revealed by Order-Revealing Encryption?


Cavallaro, Lorenzo

CODASPY'17 ~ DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

AISec'16 ~ Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection


Ceccato, Mariano

SPRO'16 ~ Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks

SPRO'16 ~ The ASPIRE Framework for Software Protection


Cecchetti, Ethan

CCS'16 ~ Town Crier: An Authenticated Data Feed for Smart Contracts


Celik, Z. Berkay

IWSPA'17 ~ Feature Cultivation in Privileged Information-augmented Detection

ASIA CCS'17 ~ Practical Black-Box Attacks against Machine Learning


Cervesato, Iliano

ASIA CCS'17 ~ On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters


Cha, Seunghun

ASIA CCS'17 ~ Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks

CCS'16 ~ POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack


Chadha, Ritu

MIST'16 ~ Cyber Deception: Virtual Networks to Defend Insider Reconnaissance


Chaidos, Pyrros

CCS'16 ~ BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme


Chakraborti, Anrin

CCS'16 ~ POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM

CCS'16 ~ POSTER: DataLair - A Storage Block Device with Plausible Deniability


Chan, Dominic

WiSec'17 ~ Smart-Phones Attacking Smart-Homes


Chan, Philip K.

CODASPY'17 ~ Scalable Function Call Graph-based Malware Classification


Chandaliya, Pritesh

SDN-NFVSec'17 ~ Dynamic Defense Provision via Network Functions Virtualization


Chang, Ee-Chien

ASIA CCS'17 ~ Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated


Chase, Melissa

CCS'16 ~ Transparency Overlays and Applications


Chatterjee, Samrat

MTD'16 ~ Formal Approach for Resilient Reachability based onEnd-System Route Agility


Chaudhuri, Avik

PLAS'16 ~ Flow: Abstract Interpretation of JavaScript for Type Checking and Beyond: (Invited Talk)


Checkoway, Stephen

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Chen, Binbin

CPS-SPC'16 ~ SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions


Chen, Bo

MTD'16 ~ Demo: A Symbolic N-Variant System


Chen, Chen

CCS'16 ~ POSTER: DataLair - A Storage Block Device with Plausible Deniability

CCS'16 ~ POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints

SDN-NFVSec'17 ~ Ultimate Forwarding Resilience in OpenFlow Networks


Chen, Gong

ASIA CCS'17 ~ DroidPill: Pwn Your Daily-Use Apps


Chen, Hao

ASIA CCS'17 ~ Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets


Chen, Jianjun

CCS'16 ~ Host of Troubles: Multiple Host Ambiguities in HTTP Implementations


Chen, Lin

BCC'17 ~ Enabling the Sharing Economy: Privacy Respecting Contract based on Public Blockchain

BCC'17 ~ Unraveling Blockchain-based Crypto-currency System Supporting Oblivious Transactions: A Formalized Approach


Chen, Ping

CCS'16 ~ CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump

MTD'16 ~ Demo: A Symbolic N-Variant System


Chen, Quan

ASIA CCS'17 ~ PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks


Chen, Sanchuan

ASIA CCS'17 ~ Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu


Chen, Sen

CCS'16 ~ POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning


Chen, Shuo

CCS'16 ~ "The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing


Chen, Songqing

MTD'16 ~ Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks


Chen, Wei

WiSec'17 ~ More Semantics More Robust: Improving Android Malware Classifiers


Chen, Xi

CCS'16 ~ POSTER: Identifying Dynamic Data Structures in Malware


Chen, Xun

ASIA CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android


Chen, Yan

CCS'16 ~ CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites


Chen, Yaohui

ASIA CCS'17 ~ Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems


Chen, Yimin

CCS'16 ~ DPSense: Differentially Private Crowdsourced Spectrum Sensing

CCS'16 ~ iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft


Chen, Yingying

CCS'16 ~ VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones


Chen, Yue

ASIA CCS'17 ~ Pinpointing Vulnerabilities


Cheng, Qingfeng

CCS'16 ~ Attacking OpenSSL Implementation of ECDSA with a Few Signatures


Cheng, Yao

CCS'16 ~ Scalable Graph-based Bug Search for Firmware Images

ASIA CCS'17 ~ Short Paper - What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses


Cheng, Yueqiang

ASIA CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android


Chhawri, Sumeet

CPS-SPC'16 ~ Risk Assessment for Cooperative Automated Driving


Chiroiu, Mihai

CCS'16 ~ SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles


Cho, Beumjin

SACMAT'17 ~ FACT: Functionality-centric Access Control System for IoT Programming Frameworks


Cho, Geumhwan

CCS'16 ~ POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack


Cho, Kyong-Tak

CCS'16 ~ Error Handling of In-vehicle Networks Makes Them Vulnerable


Choffnes, David

CCS'16 ~ Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem


Choi, Jaeyeong

WiSec'17 ~ Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4


Choi, Jiwon

SACMAT'17 ~ FACT: Functionality-centric Access Control System for IoT Programming Frameworks


Choi, Kibum

WiSec'17 ~ Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4


Choi, Seoyoon

ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps


Choi, Seung Geol

CCS'16 ~ POPE: Partial Order Preserving Encoding


Chothia, Tom

ASIA CCS'17 ~ An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols


Chou, Edward

CCS'16 ~ Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets


Chow, Richard

IoTPTS'17 ~ Foreword


Chow, Sherman S. M.

ASIA CCS'17 ~ Updatable Block-Level Message-Locked Encryption


Chowdhary, Ankur

SDN-NFVSec'17 ~ Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments

MTD'16 ~ SDN based Scalable MTD Solution in Cloud Network


Chowdhury, Chandan

SACMAT'17 ~ A Flexible Authorization Architecture for Systems of Interoperable Medical Devices


Chowdhury, Omar

CCS'16 ~ An Empirical Study of Mnemonic Sentence-based Password Generation Strategies

CCS'16 ~ On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols


Chu, Andy

CCS'16 ~ Deep Learning with Differential Privacy


Chu, Duc-Hiep

CCS'16 ~ Making Smart Contracts Smarter


Chua, Kee Chaing

IoTPTS'17 ~ Secure Data Provenance for the Internet of Things


Chua, Zheng Leong

CCS'16 ~ "The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing


Chum, Chi Sing

CODASPY'17 ~ A New Bloom Filter Structure for Searchable Encryption Schemes


Chun, Byung-Gon

ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps


Chung, Taejoong

CCS'16 ~ Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem


Cid, Carlos

WISCS'16 ~ A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

SCC'17 ~ Cloud Storage File Recoverability


Cimato, Stelvio

SCC'17 ~ Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud


Classen, Jiska

SPSM'16 ~ Analyzing TETRA Location Privacy and Network Availability


Coffman, Joel

SPRO'16 ~ ROP Gadget Prevalence and Survival under Compiler-based Binary Diversification Schemes


Cohney, Shaanan

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Compagna, Luca

CODASPY'17 ~ Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications


Compagno, Alberto

ASIA CCS'17 ~ Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP


Conduff, Quincy

SACMAT'17 ~ Poster: A Location-Privacy Approach for Continuous Queries


Connolly, Aisling

ASIA CCS'17 ~ The Case for System Command Encryption


Conti, Mauro

ASIA CCS'17 ~ Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP

ASIA CCS'17 ~ POSTER: Detection of Information Leaks via Reflection in Android Apps

WiSec'17 ~ POSTER: Toward a Secure and Scalable Attestation

CCS'16 ~ SANA: Secure and Scalable Aggregate Network Attestation


Coppens, Bart

SPRO'16 ~ Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks


Cortier, Véronique

CCS'16 ~ BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme


Costello, Craig

CCS'16 ~ Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE


Costin, Andrei

TrustED'16 ~ Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations


Coughlin, Michael

SDN-NFVSec'17 ~ Trusted Click: Overcoming Security issues of NFV in the Cloud


Cowles, Robert

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel: Verification of Active and Resilient Systems: Practical or Utopian?


Crampton, Jason

SACMAT'17 ~ A Framework for the Cryptographic Enforcement of Information Flow Policies

SACMAT'17 ~ Attribute Expressions, Policy Tables and Attribute-Based Access Control

CODASPY'17 ~ Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

SACMAT'17 ~ On the Satisfiability of Workflows with Release Points

CODASPY'17 ~ The Authorization Policy Existence Problem


Creese, Sadie

MIST'16 ~ A Tripwire Grammar for Insider Threat Detection


Crockett, Eric

CCS'16 ~ ???: Functional Lattice Cryptography


Croft, Jason

SDN-NFVSec'17 ~ Reflections on Data Integration for SDN


Croman, Kyle

CCS'16 ~ The Honey Badger of BFT Protocols

CCS'16 ~ Town Crier: An Authenticated Data Feed for Smart Contracts


Cuellar, Jorge

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel: Verification of Active and Resilient Systems: Practical or Utopian?


Cuff, Paul

CCS'16 ~ Differential Privacy as a Mutual Information Constraint


Cunche, Mathieu

WiSec'17 ~ Defeating MAC Address Randomization Through Timing Attacks

WiSec'17 ~ DEMO: Panoptiphone: How Unique is Your Wi-Fi Device?

IWSPA'17 ~ Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors


Cybenko, George

MTD'16 ~ A Moving Target Defense Approach to Disrupting Stealthy Botnets


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)