 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
Ba,
Zhongjie
CCS'16 ~ My Smartphone Knows What You Print:
Exploring Smartphone-based Side-channel Attacks Against 3D Printers
Bacis,
Enrico
WISCS'16 ~ Managing Data Sharing in OpenStack
Swift with Over-Encryption
CCS'16
~ Mix&Slice: Efficient Access Revocation in the Cloud
Backes,
Michael
CCS'16 ~ Computational Soundness for Dalvik
Bytecode
CCS'16
~ Efficient Cryptographic Password Hardening Services from Partially
Oblivious Commitments
CCS'16
~ Identifying the Scan and Attack Infrastructures Behind Amplification
DDoS Attacks
CCS'16
~ Membership Privacy in MicroRNA-based Studies
WPES'17
~ On Profile Linkability despite Anonymity in Social Media Systems
CCS'16
~ POSTER: Mapping the Landscape of Large-Scale Vulnerability
Notifications
CCS'16
~ POSTER: The ART of App Compartmentalization
CCS'16
~ Reliable Third-Party Library Detection in Android and its Security
Applications
|
| |
Badache,
Nadjib
CODASPY'17 ~ Sound and Static Analysis
of Session Fixation Vulnerabilities in PHP Web Applications
Baek,
Joonsang
APKC'17 ~ Foreword
Bailey,
Michael
CCS'16 ~ MiddlePolice: Toward Enforcing
Destination-Defined Policies in the Middle of the Internet
Baker,
Richard
CPS-SPC'16 ~ Secure Location Verification
with a Mobile Receiver
|
| |
Baki,
Shahryar
ASIA CCS'17 ~ Scaling and Effectiveness
of Email Masquerade Attacks: Exploiting Natural Language Generation
Baldoni,
Roberto
CODASPY'17 ~ Share a pie? Privacy-Preserving
Knowledge Base Export through Count-min Sketches
Baldor,
Kevin
SACMAT'17 ~ Verifiable Assume-Guarantee
Privacy Specifications for Actor Component Architectures
Ball,
Marshall
CCS'16 ~ Garbling Gadgets for Boolean and
Arithmetic Circuits
Balzarotti,
Davide
CCS'16 ~ PhishEye: Live Monitoring of Sandboxed
Phishing Kits
|
| |
Banahatti,
Vijayanand
CCS'16 ~ POSTER: Improved Markov Strength
Meters for Passwords
ASIA
CCS'17 ~ Short Paper - Pass-O: A Proposal to Improve the Security
of Pattern Unlock Scheme
Bancroft,
Charlie
MTD'16 ~ Automated Effectiveness Evaluation
of Moving Target Defenses: Metrics for Missions and Attacks
Bandara,
Arosha K.
ASIA CCS'17 ~ POSTER: Enabling End-Users
to Protect their Privacy
Banescu,
Sebastian
CODASPY'17 ~ Detecting Patching of Executables
without System Calls
SPRO'16
~ StIns4CS: A State Inspection Tool for C#
SPRO'16
~ VOT4CS: A Virtualization Obfuscation Tool for C#
Barak,
Assaf
CCS'16 ~ Demo: High-Throughput Secure Three-Party
Computation of Kerberos Ticket Generation
Barbara,
Daniel
CODASPY'17 ~ Detecting ROP with Statistical
Learning of Program Characteristics
|
| |
Barhamgi,
Mahmoud
ASIA CCS'17 ~ POSTER: Enabling End-Users
to Protect their Privacy
Barhelemy,
Lucas
SPRO'16 ~ Binary Permutation Polynomial
Inversion and Application to Obfuscation Techniques
Barman,
Ludovic
WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant
Protocol for Local-Area Anonymous Communication
Bartel,
Alexandre
CCS'16 ~ An In-Depth Study of More Than
Ten Years of Java Exploitation
Barthe,
Gilles
CCS'16 ~ Advanced Probabilistic Couplings
for Differential Privacy
CCS'16
~ Differentially Private Bayesian Programming
CCS'16
~ Strong Non-Interference and Type-Directed Higher-Order Masking
Basile,
Cataldo
SPRO'16 ~ Reactive Attestation: Automatic
Detection and Reaction to Software Tampering Attacks
SPRO'16
~ The ASPIRE Framework for Software Protection
|
| |
Bates,
Adam
CCS'16 ~ ProvUSB: Block-level Provenance-Based
Data Protection for USB Storage Devices
Bauer,
Kevin
MTD'16 ~ Have No PHEAR: Networks Without
Identifiers
Bauer,
Lujo
CCS'16 ~ Accessorize to a Crime: Real and
Stealthy Attacks on State-of-the-Art Face Recognition
Bauer,
Tobias
TIS'16 ~ Hiding Higher-Order Univariate
Leakages by Shuffling Polynomial Masking Schemes: A More Efficient,
Shuffled, and Higher-Order Masked AES S-box
Bauman,
Erick
ASIA CCS'17 ~ SGX-Log: Securing System
Logs with SGX
Baumann,
Peter
WPES'17 ~ Disguised Chromium Browser: Robust
Browser, Flash and Canvas Fingerprinting Protection
|
| |
Baweja,
Kunal
CCS'16 ~ A Secure Sharding Protocol for
Open Blockchains
Belaïd,
Sonia
CCS'16 ~ Strong Non-Interference and Type-Directed
Higher-Order Masking
Bellala,
Gowtham
SACMAT'17 ~ A Secure Sum Protocol and Its
Application to Privacy-preserving Multi-party Analytics
Bellare,
Mihir
CCS'16 ~ Message-Recovery Attacks on Feistel-Based
Format Preserving Encryption
Ben-
Adar Bessos, Mai
CPS-SPC'16 ~ Exposing Transmitters in Mobile
Multi-Agent Games
Ben
Jaballah, Wafa
MIST'16 ~ A Grey-Box Approach for Detecting
Malicious User Interactions in Web Applications
|
| |
Ben
Rajeb, Narjes
CCSW'16 ~ Co-location Resistant Strategy
with Full Resources Optimization
Ben-Efraim,
Aner
CCS'16 ~ Optimizing Semi-Honest Secure
Multiparty Computation for the Internet
Benitez,
Sergio
PLAS'16 ~ Short Paper: Rusty Types for
Solid Safety
Benslimane,
Djamal
ASIA CCS'17 ~ POSTER: Enabling End-Users
to Protect their Privacy
Benson,
James
SACMAT'17 ~ Multi-Layer Authorization Framework
for a Representative Hadoop Ecosystem Deployment
Benton,
Kevin
SafeConfig'16 ~ Firewalling Scenic Routes:
Preventing Data Exfiltration via Political and Geographic Routing Policies
|
| |
Bentov,
Iddo
CCS'16 ~ Amortizing Secure Computation
with Penalties
Berg,
Mark
ABAC'17 ~ A Systematic Approach to Implementing
ABAC
Bergé,
Pierre
CODASPY'17 ~ The Authorization Policy Existence
Problem
Berrang,
Pascal
CCS'16 ~ Membership Privacy in MicroRNA-based
Studies
WPES'17
~ On Profile Linkability despite Anonymity in Social Media Systems
Berrima,
Mouhebeddine
CCSW'16 ~ Co-location Resistant Strategy
with Full Resources Optimization
Bertino,
Elisa
SACMAT'17 ~ A Secure Sum Protocol and Its
Application to Privacy-preserving Multi-party Analytics
SACMAT'17
~ Distributed Intelligence - Trends in the Management of Complex
Systems
CODASPY'17
~ Ghostbuster: A Fine-grained Approach for Anomaly Detection
in File System Accesses
ASIA
CCS'17 ~ Memory Safety for Embedded Devices with nesChec
MIST'16
~ MIST'16 Workshop Chairs' Welcome Message
SACMAT'17
~ SACMAT 2017 Conference General and Program Chairs' Welcome
Message
CODASPY'17
~ Seamless and Secure Bluetooth LE Connection Migration
|
| |
Bestavros,
Azer
CCS'16 ~ DEMO: Integrating MPC in Big Data
Workflows
MTD'16
~ Markov Modeling of Moving Target Defense Games
Beunardeau,
Marc
ASIA CCS'17 ~ The Case for System Command
Encryption
Beuscher,
Benedict
CCS'16 ~ On the Security of Cracking-Resistant
Password Vaults
Beyah,
Raheem
CCS'16 ~ Acing the IOC Game: Toward Automatic
Discovery and Analysis of Open-Source Cyber Threat Intelligence
CCS'16
~ Lurking Malice in the Cloud: Understanding and Detecting Cloud
Repository as a Malicious Service
Bhagavatula,
Sruti
CCS'16 ~ Accessorize to a Crime: Real and
Stealthy Attacks on State-of-the-Art Face Recognition
Bhairav,
Suhas
IoTPTS'17 ~ Let the Cat Out of the Bag:
A Holistic Approach Towards Security Analysis of the Internet of Things
|
| |
Bhandari,
Shweta
ASIA CCS'17 ~ POSTER: Detecting Inter-App
Information Leakage Paths
Bhargava,
Bharat
MTD'16 ~ Mayflies: A Moving Target
Defense Framework for Distributed Systems
Bhargavan,
Karthikeyan
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
CCS'16
~ On the Practical (In-)Security of 64-bit Block Ciphers: Collision
Attacks on HTTP over TLS and OpenVPN
Bhatia,
Jaspreet
WISCS'16 ~ Privacy Risk in Cybersecurity
Data Sharing
Bhatt,
Smriti
ABAC'17 ~ ABAC with Group Attributes and
Attribute Hierarchies Utilizing the Policy Machine
Bhattacharjee,
Shameek
CODASPY'17 ~ Statistical Security Incident
Forensics against Data Falsification in Smart Grid Advanced Metering
Infrastructure
|
| |
Bhunia,
Suman Sankar
CPSS'17 ~ SIPHON: Towards Scalable High-Interaction
Physical Honeypots
Bhunia,
Swarup
CCS'16 ~ MERS: Statistical Test Generation
for Side-Channel Analysis based Trojan Detection
Bi,
Rongrong
SCC'17 ~ A Privacy-Preserving and Vessel
Authentication Scheme Using Automatic Identification System
Bichsel,
Benjamin
CCS'16 ~ Statistical Deobfuscation of Android
Applications
Bielova,
Nataliia
PLAS'16 ~ Short Paper: Dynamic Leakage
- A Need for a New Quantitative Information Flow Measure
Biggio,
Battista
SPSM'16 ~ Detecting Misuse of Google Cloud
Messaging in Android Badware
AISec'16
~ Secure Kernel Machines against Evasion Attacks
|
| |
Bilgin,
Begul
CCS'16 ~ Theory of Implementation Security
Workshop (TIs 2016)
TIS'16
~ Masking AES with d+1 Shares in Hardware
TIS'16
~ Theory of Implementation Security Workshop 2016: TIS 2016
Bindschaedler,
Vincent
CODASPY'17 ~ Achieving Differential Privacy
in Secure Multiparty Data Aggregation Protocols on Star Networks
Birnbach,
Simon
CPS-SPC'16 ~ Exposing Transmitters in Mobile
Multi-Agent Games
Biswas,
Prosunjit
ABAC'17 ~ Attribute Transformation for
Attribute-Based Access Control
Blass,
Erik-Oliver
WISCS'16 ~ Foreword
CCS'16
~ WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative
Security
Blue,
Logan
WiSec'17 ~ Detecting SMS Spam in the Age
of Legitimate Bulk Messaging
|
| |
Bobba,
Rakesh B.
CPS-SPC'16 ~ 2016 CPS-SPC Chairs' Welcome
CCS'16
~ Second Workshop on Cyber-Physical Systems Security and PrivaCy
(CPS-SPC'16)
Bocovich,
Cecylia
CCS'16 ~ Slitheen: Perfectly Imitated Decoy
Routing through Traffic Replacement
Bodden,
Eric
CCS'16 ~ An In-Depth Study of More Than
Ten Years of Java Exploitation
Bohli,
Jens-Matthias
ASIA CCS'17 ~ Sharing Proofs of Retrievability
across Tenants
Böhme,
Marcel
CCS'16 ~ Coverage-based Greybox Fuzzing
as Markov Chain
Böhme,
Rainer
WISCS'16 ~ Back to the Roots: Information
Sharing Economics and What We Can Learn for Security
|
| |
Boneh,
Dan
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
Bonné,
Bram
WiSec'17 ~ POSTER: Assessing the Impact
of 802.11 Vulnerabilities using Wicability
Boreli,
Roksana
WiSec'17 ~ Smart-Phones Attacking Smart-Homes
Borgaonkar,
Ravishankar
SPSM'16 ~ White Rabbit in Mobile: Effect
of Unsecured Clock Source in Smartphones
Bos,
Herbert
CCS'16 ~ Drammer: Deterministic Rowhammer
Attacks on Mobile Platforms
CCS'16
~ POSTER: Identifying Dynamic Data Structures in Malware
CCS'16
~ TypeSan: Practical Type Confusion Detection
Bos,
Joppe
CCS'16 ~ Frodo: Take off the Ring! Practical,
Quantum-Secure Key Exchange from LWE
|
| |
Bossert,
Martin
TrustED'16 ~ Online Reliability Testing
for PUF Key Derivation
Bost,
Raphael
CCS'16 ~ ????? - Forward Secure Searchable
Encryption
Bosu,
Amiangshu
ASIA CCS'17 ~ Collusive Data Leak and More:
Large-scale Threat Analysis of Inter-app Communications
Boyd,
Colin
ASIA CCS'17 ~ Side Channels in Deduplication:
Trade-offs between Leakage and Efficiency
Boyle,
Elette
CCS'16 ~ Function Secret Sharing: Improvements
and Extensions
Braun,
Johannes
ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage
System Providing Long-Term Integrity, Authenticity, and Confidentiality
|
| |
Breaux,
Travis D.
WISCS'16 ~ Privacy Risk in Cybersecurity
Data Sharing
Breu,
Ruth
WISCS'16 ~ Data Quality Challenges and
Future Research Directions in Threat Intelligence Sharing Practice
Brito,
Alejandro
CODASPY'17 ~ Achieving Differential Privacy
in Secure Multiparty Data Aggregation Protocols on Star Networks
Brossard,
David
ABAC'17 ~ A Systematic Approach to Implementing
ABAC
Brown,
Fraser
PLAS'16 ~ Short Paper: Superhacks: Exploring
and Preventing Vulnerabilities in Browser Binding Code
Brumley,
Billy Bob
CCS'16 ~ "Make Sure DSA Signing Exponentiations
Really are Constant-Time"
|
| |
Büchler,
Matthias
SPSM'16 ~ CRIOS: Toward Large-Scale iOS
Application Analysis
Buchmann,
Johannes
ASIA CCS'17 ~ MoPS: A Modular Protection
Scheme for Long-Term Storage
ASIA
CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term
Integrity, Authenticity, and Confidentiality
Bugiel,
Sven
CCS'16 ~ POSTER: The ART of App Compartmentalization
CCS'16
~ Reliable Third-Party Library Detection in Android and its Security
Applications
Bugliesi,
Michele
CCS'16 ~ Content Security Problems? Evaluating
the Effectiveness of Content Security Policy in the Wild
Buhren,
Robert
CODASPY'17 ~ Fault Attacks on Encrypted
General Purpose Compute Platforms
Bui,
Thang
SACMAT'17 ~ Mining Relationship-Based Access
Control Policies
|
| |
Bullough,
Benjamin L.
IWSPA'17 ~ Predicting Exploitation of Disclosed
Software Vulnerabilities Using Open-source Data
Bultel,
Xavier
WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud
Resistant Distance-Bounding Protocol
ASIA
CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous
Distance-bounding Protocol
Burkard,
Cody
IWSPA'17 ~ Analysis of Causative Attacks
against SVMs Learning from Data Streams
Bursztein,
Elie
SPSM'16 ~ Picasso: Lightweight Device Class
Fingerprinting for Web Clients
Busby,
Jeremy S.
ABAC'17 ~ Verification of Resilience Policies
that Assist Attribute Based Access Control
Butler,
Kevin R. B.
WiSec'17 ~ Detecting SMS Spam in the Age
of Legitimate Bulk Messaging
CCS'16
~ ProvUSB: Block-level Provenance-Based Data Protection for USB
Storage Devices
|
| |
Cai,
Haipeng
CODASPY'17 ~ Prioritized Analysis of Inter-App
Communication Risks
Caine,
Kelly
SACMAT'17 ~ Towards PII-based Multiparty
Access Control for Photo Sharing in Online Social Networks
Calo,
Seraphin B.
SACMAT'17 ~ Distributed Intelligence -
Trends in the Management of Complex Systems
Calzavara,
Stefano
CCS'16 ~ Content Security Problems? Evaluating
the Effectiveness of Content Security Policy in the Wild
Cámara,
Javier
IWSPA'17 ~ Model-based Cluster Analysis
for Identifying Suspicious Activity Sequences in Software
Camenisch,
Jan
WPES'17 ~ Scalable Revocation Scheme for
Anonymous Credentials Based on n-times Unlinkable Proofs
|
| |
Camp,
L. Jean
SafeConfig'16 ~ Firewalling Scenic Routes:
Preventing Data Exfiltration via Political and Geographic Routing Policies
Canard,
Sébastien
ASIA CCS'17 ~ BlindIDS: Market-Compliant
and Privacy-Friendly Intrusion Detection System over Encrypted Traffic
Candell,
Richard
CCS'16 ~ Limiting the Impact of Stealthy
Attacks on Industrial Control Systems
Canet,
Margaux
CODASPY'17 ~ Decompression Quines and Anti-Viruses
Cangialosi,
Frank
CCS'16 ~ Measurement and Analysis of Private
Key Sharing in the HTTPS Ecosystem
Cao,
Yinzhi
CCS'16 ~ CSPAutoGen: Black-box Enforcement
of Content Security Policy upon Real-world Websites
|
| |
Cao,
Yu
SDN-NFVSec'17 ~ CareNet: Building a Secure
Software-defined Infrastructure for Home-based Healthcare
Čapkun,
Srdjan
ASIA CCS'17 ~ CoverUp: Privacy Through
"Forced" Participation in Anonymous Communication Networks
CODASPY'17
~ Detecting Mobile Application Spoofing Attacks by Leveraging
User Visual Similarity Perception
SPSM'16
~ Hardened Setup of Personalized Security Indicators to Counter
Phishing Attacks in Mobile Banking
CCSW'16
~ On Information Leakage in Deduplicated Storage Systems
CCS'16
~ On the Security and Performance of Proof of Work Blockchains
Capobianco,
Frank
SACMAT'17 ~ On Risk in Access Control Enforcement
Cardenas,
Alvaro A.
CPS-SPC'16 ~ 2016 CPS-SPC Chairs' Welcome
CCS'16
~ Limiting the Impact of Stealthy Attacks on Industrial Control
Systems
CCS'16
~ Second Workshop on Cyber-Physical Systems Security and PrivaCy
(CPS-SPC'16)
Carle,
Georg
WISCS'16 ~ Collaborative Incident Handling
Based on the Blackboard-Pattern
Carlsten,
Miles
CCS'16 ~ On the Instability of Bitcoin
without the Block Reward
|
| |
Carmer,
Brent
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
Carminati,
Barbara
CODASPY'17 ~ SAMPAC: Socially-Aware collaborative
Multi-Party Access Control
Carpent,
Xavier
ASIA CCS'17 ~ Heterogeneous Rainbow Table
Widths Provide Faster Cryptanalyses
ASIA
CCS'17 ~ Lightweight Swarm Attestation: A Tale of Two LISA-s
Carpineto,
Caudio
WPES'17 ~ Automatic Assessment of Website
Compliance to the European Cookie Law with CooLCheck
Carr,
Scott A.
ASIA CCS'17 ~ DataShield: Configurable
Data Confidentiality and Integrity
Casas,
Pedro
CCS'16 ~ POSTER: (Semi)-Supervised Machine
Learning Approaches for Network Security in High-Dimensional Network
Data
|
| |
Cash,
David
CCS'16 ~ What Else is Revealed by Order-Revealing
Encryption?
Cavallaro,
Lorenzo
CODASPY'17 ~ DroidSieve: Fast and Accurate
Classification of Obfuscated Android Malware
AISec'16
~ Prescience: Probabilistic Guidance on the Retraining Conundrum
for Malware Detection
Ceccato,
Mariano
SPRO'16 ~ Reactive Attestation: Automatic
Detection and Reaction to Software Tampering Attacks
SPRO'16
~ The ASPIRE Framework for Software Protection
Cecchetti,
Ethan
CCS'16 ~ Town Crier: An Authenticated Data
Feed for Smart Contracts
Celik,
Z. Berkay
IWSPA'17 ~ Feature Cultivation in Privileged
Information-augmented Detection
ASIA
CCS'17 ~ Practical Black-Box Attacks against Machine Learning
Cervesato,
Iliano
ASIA CCS'17 ~ On the Detection of Kernel-Level
Rootkits Using Hardware Performance Counters
|
| |
Cha,
Seunghun
ASIA CCS'17 ~ Boosting the Guessing Attack
Performance on Android Lock Patterns with Smudge Attacks
CCS'16
~ POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack
Chadha,
Ritu
MIST'16 ~ Cyber Deception: Virtual Networks
to Defend Insider Reconnaissance
Chaidos,
Pyrros
CCS'16 ~ BeleniosRF: A Non-interactive
Receipt-Free Electronic Voting Scheme
Chakraborti,
Anrin
CCS'16 ~ POSTER: ConcurORAM: High-Throughput
Parallel Multi-Client ORAM
CCS'16
~ POSTER: DataLair - A Storage Block Device with Plausible Deniability
Chan,
Dominic
WiSec'17 ~ Smart-Phones Attacking Smart-Homes
Chan,
Philip K.
CODASPY'17 ~ Scalable Function Call Graph-based
Malware Classification
|
| |
Chandaliya,
Pritesh
SDN-NFVSec'17 ~ Dynamic Defense Provision
via Network Functions Virtualization
Chang,
Ee-Chien
ASIA CCS'17 ~ Proofs of Data Residency:
Checking whether Your Cloud Files Have Been Relocated
Chase,
Melissa
CCS'16 ~ Transparency Overlays and Applications
Chatterjee,
Samrat
MTD'16 ~ Formal Approach for Resilient
Reachability based onEnd-System Route Agility
Chaudhuri,
Avik
PLAS'16 ~ Flow: Abstract Interpretation
of JavaScript for Type Checking and Beyond: (Invited Talk)
Checkoway,
Stephen
CCS'16 ~ A Systematic Analysis of the Juniper
Dual EC Incident
|
| |
Chen,
Binbin
CPS-SPC'16 ~ SoftGrid: A Software-based
Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions
Chen,
Bo
MTD'16 ~ Demo: A Symbolic N-Variant System
Chen,
Chen
CCS'16 ~ POSTER: DataLair - A Storage Block
Device with Plausible Deniability
CCS'16
~ POSTER: KXRay: Introspecting the Kernel for Rootkit Timing
Footprints
SDN-NFVSec'17
~ Ultimate Forwarding Resilience in OpenFlow Networks
Chen,
Gong
ASIA CCS'17 ~ DroidPill: Pwn Your Daily-Use
Apps
Chen,
Hao
ASIA CCS'17 ~ Toward Detecting Collusive
Ranking Manipulation Attackers in Mobile App Markets
Chen,
Jianjun
CCS'16 ~ Host of Troubles: Multiple Host
Ambiguities in HTTP Implementations
|
| |
Chen,
Lin
BCC'17 ~ Enabling the Sharing Economy:
Privacy Respecting Contract based on Public Blockchain
BCC'17
~ Unraveling Blockchain-based Crypto-currency System Supporting
Oblivious Transactions: A Formalized Approach
Chen,
Ping
CCS'16 ~ CREDAL: Towards Locating a Memory
Corruption Vulnerability with Your Core Dump
MTD'16
~ Demo: A Symbolic N-Variant System
Chen,
Quan
ASIA CCS'17 ~ PrivWatcher: Non-bypassable
Monitoring and Protection of Process Credentials from Memory Corruption
Attacks
Chen,
Sanchuan
ASIA CCS'17 ~ Detecting Privileged Side-Channel
Attacks in Shielded Execution with Déjà Vu
Chen,
Sen
CCS'16 ~ POSTER: Accuracy vs. Time Cost:
Detecting Android Malware through Pareto Ensemble Pruning
Chen,
Shuo
CCS'16 ~ "The Web/Local" Boundary Is Fuzzy:
A Security Study of Chrome's Process-based Sandboxing
|
| |
Chen,
Songqing
MTD'16 ~ Towards Cost-Effective Moving
Target Defense Against DDoS and Covert Channel Attacks
Chen,
Wei
WiSec'17 ~ More Semantics More Robust:
Improving Android Malware Classifiers
Chen,
Xi
CCS'16 ~ POSTER: Identifying Dynamic Data
Structures in Malware
Chen,
Xun
ASIA CCS'17 ~ SPOKE: Scalable Knowledge
Collection and Attack Surface Analysis of Access Control Policy for
Security Enhanced Android
Chen,
Yan
CCS'16 ~ CSPAutoGen: Black-box Enforcement
of Content Security Policy upon Real-world Websites
Chen,
Yaohui
ASIA CCS'17 ~ Secure Integration of Web
Content and Applications on Commodity Mobile Operating Systems
|
| |
Chen,
Yimin
CCS'16 ~ DPSense: Differentially Private
Crowdsourced Spectrum Sensing
CCS'16
~ iLock: Immediate and Automatic Locking of Mobile Devices against
Data Theft
Chen,
Yingying
CCS'16 ~ VoiceLive: A Phoneme Localization
based Liveness Detection for Voice Authentication on Smartphones
Chen,
Yue
ASIA CCS'17 ~ Pinpointing Vulnerabilities
Cheng,
Qingfeng
CCS'16 ~ Attacking OpenSSL Implementation
of ECDSA with a Few Signatures
Cheng,
Yao
CCS'16 ~ Scalable Graph-based Bug Search
for Firmware Images
ASIA
CCS'17 ~ Short Paper - What You See is Not What You Get: Leakage-Resilient
Password Entry Schemes for Smart Glasses
Cheng,
Yueqiang
ASIA CCS'17 ~ SPOKE: Scalable Knowledge
Collection and Attack Surface Analysis of Access Control Policy for
Security Enhanced Android
|
| |
Chhawri,
Sumeet
CPS-SPC'16 ~ Risk Assessment for Cooperative
Automated Driving
Chiroiu,
Mihai
CCS'16 ~ SandScout: Automatic Detection
of Flaws in iOS Sandbox Profiles
Cho,
Beumjin
SACMAT'17 ~ FACT: Functionality-centric
Access Control System for IoT Programming Frameworks
Cho,
Geumhwan
CCS'16 ~ POSTER: WiPING: Wi-Fi signal-based
PIN Guessing attack
Cho,
Kyong-Tak
CCS'16 ~ Error Handling of In-vehicle Networks
Makes Them Vulnerable
Choffnes,
David
CCS'16 ~ Measurement and Analysis of Private
Key Sharing in the HTTPS Ecosystem
|
| |
Choi,
Jaeyeong
WiSec'17 ~ Dissecting Customized Protocols:
Automatic Analysis for Customized Protocols based on IEEE 802.15.4
Choi,
Jiwon
SACMAT'17 ~ FACT: Functionality-centric
Access Control System for IoT Programming Frameworks
Choi,
Kibum
WiSec'17 ~ Dissecting Customized Protocols:
Automatic Analysis for Customized Protocols based on IEEE 802.15.4
Choi,
Seoyoon
ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity
Protection Mechanisms in Android Financial Apps
Choi,
Seung Geol
CCS'16 ~ POPE: Partial Order Preserving
Encoding
Chothia,
Tom
ASIA CCS'17 ~ An Attack Against Message
Authentication in the ERTMS Train to Trackside Communication Protocols
|
| |
Chou,
Edward
CCS'16 ~ Leave Your Phone at the Door:Side
Channels that Reveal Factory Floor Secrets
Chow,
Richard
IoTPTS'17 ~ Foreword
Chow,
Sherman S. M.
ASIA CCS'17 ~ Updatable Block-Level Message-Locked
Encryption
Chowdhary,
Ankur
SDN-NFVSec'17 ~ Dynamic Game based Security
framework in SDN-enabled Cloud Networking Environments
MTD'16
~ SDN based Scalable MTD Solution in Cloud Network
Chowdhury,
Chandan
SACMAT'17 ~ A Flexible Authorization Architecture
for Systems of Interoperable Medical Devices
Chowdhury,
Omar
CCS'16 ~ An Empirical Study of Mnemonic
Sentence-based Password Generation Strategies
CCS'16
~ On the Security and Usability of Segment-based Visual Cryptographic
Authentication Protocols
|
| |
Chu,
Andy
CCS'16 ~ Deep Learning with Differential
Privacy
Chu,
Duc-Hiep
CCS'16 ~ Making Smart Contracts Smarter
Chua,
Kee Chaing
IoTPTS'17 ~ Secure Data Provenance for
the Internet of Things
Chua,
Zheng Leong
CCS'16 ~ "The Web/Local" Boundary Is Fuzzy:
A Security Study of Chrome's Process-based Sandboxing
Chum,
Chi Sing
CODASPY'17 ~ A New Bloom Filter Structure
for Searchable Encryption Schemes
Chun,
Byung-Gon
ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity
Protection Mechanisms in Android Financial Apps
|
| |
Chung,
Taejoong
CCS'16 ~ Measurement and Analysis of Private
Key Sharing in the HTTPS Ecosystem
Cid,
Carlos
WISCS'16 ~ A Model for Secure and Mutually
Beneficial Software Vulnerability Sharing
SCC'17
~ Cloud Storage File Recoverability
Cimato,
Stelvio
SCC'17 ~ Efficient Implementation of a
Proxy-based Protocol for Data Sharing on the Cloud
Classen,
Jiska
SPSM'16 ~ Analyzing TETRA Location Privacy
and Network Availability
Coffman,
Joel
SPRO'16 ~ ROP Gadget Prevalence and Survival
under Compiler-based Binary Diversification Schemes
Cohney,
Shaanan
CCS'16 ~ A Systematic Analysis of the Juniper
Dual EC Incident
|
| |
Compagna,
Luca
CODASPY'17 ~ Aegis: Automatic Enforcement
of Security Policies in Workflow-driven Web Applications
Compagno,
Alberto
ASIA CCS'17 ~ Don't Skype & Type! Acoustic
Eavesdropping in Voice-Over-IP
Conduff,
Quincy
SACMAT'17 ~ Poster: A Location-Privacy
Approach for Continuous Queries
Connolly,
Aisling
ASIA CCS'17 ~ The Case for System Command
Encryption
Conti,
Mauro
ASIA CCS'17 ~ Don't Skype & Type! Acoustic
Eavesdropping in Voice-Over-IP
ASIA
CCS'17 ~ POSTER: Detection of Information Leaks via Reflection
in Android Apps
WiSec'17
~ POSTER: Toward a Secure and Scalable Attestation
CCS'16
~ SANA: Secure and Scalable Aggregate Network Attestation
Coppens,
Bart
SPRO'16 ~ Reactive Attestation: Automatic
Detection and Reaction to Software Tampering Attacks
|
| |
Cortier,
Véronique
CCS'16 ~ BeleniosRF: A Non-interactive
Receipt-Free Electronic Voting Scheme
Costello,
Craig
CCS'16 ~ Frodo: Take off the Ring! Practical,
Quantum-Secure Key Exchange from LWE
Costin,
Andrei
TrustED'16 ~ Security of CCTV and Video
Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations
Coughlin,
Michael
SDN-NFVSec'17 ~ Trusted Click: Overcoming
Security issues of NFV in the Cloud
Cowles,
Robert
SafeConfig'16 ~ SafeConfig'16: Testing
and Evaluation for Active & Resilient Cyber Systems Panel: Verification
of Active and Resilient Systems: Practical or Utopian?
Crampton,
Jason
SACMAT'17 ~ A Framework for the Cryptographic
Enforcement of Information Flow Policies
SACMAT'17
~ Attribute Expressions, Policy Tables and Attribute-Based Access
Control
CODASPY'17
~ Canonical Completeness in Lattice-Based Languages for Attribute-Based
Access Control
SACMAT'17
~ On the Satisfiability of Workflows with Release Points
CODASPY'17
~ The Authorization Policy Existence Problem
|
| |
Creese,
Sadie
MIST'16 ~ A Tripwire Grammar for Insider
Threat Detection
Crockett,
Eric
CCS'16 ~ ???: Functional Lattice Cryptography
Croft,
Jason
SDN-NFVSec'17 ~ Reflections on Data Integration
for SDN
Croman,
Kyle
CCS'16 ~ The Honey Badger of BFT Protocols
CCS'16
~ Town Crier: An Authenticated Data Feed for Smart Contracts
Cuellar,
Jorge
SafeConfig'16 ~ SafeConfig'16: Testing
and Evaluation for Active & Resilient Cyber Systems Panel: Verification
of Active and Resilient Systems: Practical or Utopian?
Cuff,
Paul
CCS'16 ~ Differential Privacy as a Mutual
Information Constraint
|
| |
Cunche,
Mathieu
WiSec'17 ~ Defeating MAC Address Randomization
Through Timing Attacks
WiSec'17
~ DEMO: Panoptiphone: How Unique is Your Wi-Fi Device?
IWSPA'17
~ Non-interactive (t, n)-Incidence Counting from Differentially
Private Indicator Vectors
Cybenko,
George
MTD'16 ~ A Moving Target Defense Approach
to Disrupting Stealthy Botnets
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |