Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


Dacosta, Italo

WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication


Daemen, Joan

TIS'16 ~ On Non-uniformity in Threshold Sharings


D'Alconzo, Alessandro

CCS'16 ~ POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data


Damiani, Ernesto

CPSS'17 ~ ACM CPSS 2017 Chairs' Welcome

SCC'17 ~ Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud


Danezis, George

WPES'17 ~ TASP: Towards Anonymity Sets that Persist

WPES'17 ~ UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs


Dang, Hung

ASIA CCS'17 ~ Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated


d'Annoville, Jerome

SPRO'16 ~ The ASPIRE Framework for Software Protection


Darer, Alexander

WPES'17 ~ Poisoning the Well - Exploring the Great Firewall's Poisoned DNS Responses


Das, Avisha

IWSPA'17 ~ What's in a URL: Fast Feature Extraction and Malicious URL Detection


Das, Sajal K.

CODASPY'17 ~ Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure


Dash, Santanu Kumar

CODASPY'17 ~ DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

AISec'16 ~ Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection


Davi, Lucas

CCS'16 ~ C-FLAT: Control-Flow Attestation for Embedded Systems Software

CCS'16 ~ SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles


Davidson, Alex

WISCS'16 ~ A Model for Secure and Mutually Beneficial Software Vulnerability Sharing


Davidson, Drew

ASIA CCS'17 ~ Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems


Davies, Gareth T.

ASIA CCS'17 ~ Side Channels in Deduplication: Trade-offs between Leakage and Efficiency


De Capitani di Vimercati, Sabrina

CCS'16 ~ 15th Workshop on Privacy in the Electronic Society (WPES 2016)

WPES'17 ~ Foreword

WISCS'16 ~ Managing Data Sharing in OpenStack Swift with Over-Encryption

CCS'16 ~ Mix&Slice: Efficient Access Revocation in the Cloud


de Clercq, Ruan

ASIA CCS'17 ~ Short Paper - SCM: Secure Code Memory Architecture


De Cnudde, Thomas

TIS'16 ~ Masking AES with d+1 Shares in Hardware


De Cristofaro, Emiliano

WiSec'17 ~ POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps


de Fuentes, Jose M.

ASIA CCS'17 ~ TriFlow: Triaging Android Applications using Speculative Information Flows


De Gaspari, Fabio

SafeConfig'16 ~ AHEAD: A New Architecture for Active Defense


de Keulenaer, Ronald

ASIA CCS'17 ~ Short Paper - SCM: Secure Code Memory Architecture


de los Santos, Sergio

CCS'16 ~ POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach


De Roover, Coen

PLAS'16 ~ Static Detection of User-specified Security Vulnerabilities in Client-side JavaScript


de Ruiter, Joeri

ASIA CCS'17 ~ An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols


De Santis, Fabrizio

TIS'16 ~ Hiding Higher-Order Univariate Leakages by Shuffling Polynomial Masking Schemes: A More Efficient, Shuffled, and Higher-Order Masked AES S-box


De Sutter, Bjorn

CCS'16 ~ 2nd International Workshop on Software Protection: SPRO 2016

ASIA CCS'17 ~ Short Paper - SCM: Secure Code Memory Architecture

SPRO'16 ~ SPRO'16 Workshop Chairs' Welcome

SPRO'16 ~ The ASPIRE Framework for Software Protection


Deaconescu, Razvan

CCS'16 ~ SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles


Debbabi, Mourad

ASIA CCS'17 ~ BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection


Debray, Saumya

CODASPY'17 ~ Analysis of Exception-Based Control Transfers


Dedhia, Veer

MTD'16 ~ Have No PHEAR: Networks Without Identifiers


Degabriele, Jean Paul

CCS'16 ~ A Surfeit of SSH Cipher Suites


Delignat-Lavaud, Antoine

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper


Demetriou, Soteris

CCS'16 ~ Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android


Demirel, Denise

ASIA CCS'17 ~ MoPS: A Modular Protection Scheme for Long-Term Storage

ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality


Demontis, Ambra

AISec'16 ~ Secure Kernel Machines against Evasion Attacks


Deng, Juan

SACMAT'17 ~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control


Deng, Robert H.

ASIA CCS'17 ~ Short Paper - What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses


Deo, Amit

AISec'16 ~ Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection


Derhab, Abdelouahid

CODASPY'17 ~ Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications


Derr, Erik

CCS'16 ~ Reliable Third-Party Library Detection in Android and its Security Applications


Deshotels, Luke

CCS'16 ~ SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles


Desmedt, Yvo

MIST'16 ~ Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor


Dessouky, Ghada

WiSec'17 ~ POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs


Devadas, Srinivas

SACMAT'17 ~ Leveraging Hardware Isolation for Process Level Access Control & Authentication


Dhar, Aritra

ASIA CCS'17 ~ CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks


Diallo, Nour

BCC'17 ~ Enabling the Sharing Economy: Privacy Respecting Contract based on Public Blockchain

BCC'17 ~ Unraveling Blockchain-based Crypto-currency System Supporting Oblivious Transactions: A Formalized Approach


Diao, Wenrui

WiSec'17 ~ Evading Android Runtime Analysis Through Detecting Programmed Interactions


Dimitrov, Vassil

CCS'16 ~ Alternative Implementations of Secure Real Numbers


Diop, Aďda

ASIA CCS'17 ~ BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic


Dmitrienko, Alexandra

CODASPY'17 ~ Secure Free-Floating Car Sharing for Offline Cars

ASIA CCS'17 ~ Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation


Doerner, Jack

CCS'16 ~ Secure Stable Matching at Scale


Dominic, Derrick

CPS-SPC'16 ~ Risk Assessment for Cooperative Automated Driving


Dörre, Felix

CCS'16 ~ Practical Detection of Entropy Loss in Pseudo-Random Number Generators


dos Santos, Daniel Ricardo

CODASPY'17 ~ Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications


Doupé, Adam

CODASPY'17 ~ Deep Android Malware Detection

CODASPY'17 ~ Panel: Trustworthy Data Science


Dragut, Eduard

SDN-NFVSec'17 ~ Reflections on Data Integration for SDN


Driessen, Benedikt

WiSec'17 ~ Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet


Drijvers, Manu

WPES'17 ~ Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs


Duan, Haixin

CCS'16 ~ Host of Troubles: Multiple Host Ambiguities in HTTP Implementations

SPSM'16 ~ What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps


Duan, Qi

MTD'16 ~ Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers


DuBuisson, Thomas M.

CCS'16 ~ What Else is Revealed by Order-Revealing Encryption?


Ducas, Leo

CCS'16 ~ Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE


Dulaunoy, Alexandre

WISCS'16 ~ MISP - The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform


Dumitras, Tudor

CCS'16 ~ FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature


Duplys, Paul

TrustED'16 ~ On the Energy Cost of Channel Based Key Agreement


Dupont, Pierre-Alain

ASIA CCS'17 ~ Functional Encryption with Oblivious Helper


Dupressoir, François

CCS'16 ~ Strong Non-Interference and Type-Directed Higher-Order Masking


Durak, F. Betül

CCS'16 ~ What Else is Revealed by Order-Revealing Encryption?


Dürmuth, Markus

CCS'16 ~ On the Security of Cracking-Resistant Password Vaults

TrustED'16 ~ Side-Channel Attacks on Fingerprint Matching Algorithms


Dziembowski, Stefan

CCS'16 ~ Private Circuits III: Hardware Trojan-Resilience via Testing Amplification


Earl, Dylan

WiSec'17 ~ Smart-Phones Attacking Smart-Homes


Eberz, Simon

ASIA CCS'17 ~ Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics


Eeten, Michel van

ASIA CCS'17 ~ The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware


Egecioglu, Omer

CODASPY'17 ~ Towards Practical Privacy-Preserving Life Cycle Assessment Computations


Egele, Manuel

SPSM'16 ~ CRIOS: Toward Large-Scale iOS Application Analysis

ASIA CCS'17 ~ PAYBREAK: Defense Against Cryptographic Ransomware


Eisenbarth, Thomas

ASIA CCS'17 ~ Cache-Based Application Detection in the Cloud Using Machine Learning

ASIA CCS'17 ~ Hit by the Bus: QoS Degradation Attack on Android


Ekberg, Jan-Erik

CCS'16 ~ C-FLAT: Control-Flow Attestation for Embedded Systems Software

SPSM'16 ~ Hardware Isolation for Trusted Execution

ASIA CCS'17 ~ The Circle Game: Scalable Private Membership Test Using Trusted Hardware


El Aassal, Ayman

CODASPY'17 ~ Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation


El Abbadi, Amr

CODASPY'17 ~ Towards Practical Privacy-Preserving Life Cycle Assessment Computations


ElDefrawy, Karim

ASIA CCS'17 ~ Lightweight Swarm Attestation: A Tale of Two LISA-s


Elish, Karim O.

CODASPY'17 ~ Prioritized Analysis of Inter-App Communication Risks


Elkhiyaoui, Kaoutar

CCSW'16 ~ Message-Locked Proofs of Retrievability with Secure Deduplication


Elovici, Yuval

IoTPTS'17 ~ Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things

CCS'16 ~ POSTER: Towards Exposing Internet of Things: A Roadmap

AISec'16 ~ SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research

CPSS'17 ~ SIPHON: Towards Scalable High-Interaction Physical Honeypots


Elsabagh, Mohamed

CODASPY'17 ~ Detecting ROP with Statistical Learning of Program Characteristics

ASIA CCS'17 ~ Strict Virtual Call Integrity Checking for C++ Binaries


Elwell, Jesse

ASIA CCS'17 ~ On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters


Emura, Keita

ASIA CCS'17 ~ Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction

ASIA CCS'17 ~ Mis-operation Resistant Searchable Homomorphic Encryption


Enck, William

CODASPY'17 ~ A Study of Security Vulnerabilities on Docker Hub

ASIA CCS'17 ~ Foreword

WiSec'17 ~ Foreword

CCS'16 ~ SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles

ASIA CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android


Engel, Thomas

CCS'16 ~ POSTER: Fingerprinting Tor Hidden Services


Engelstad, Paal E.

IWSPA'17 ~ An Internal/Insider Threat Score for Data Loss Prevention and Detection


Englehardt, Steven

CCS'16 ~ Online Tracking: A 1-million-site Measurement and Analysis


Erbacher, Robert F.

MTD'16 ~ Demo: A Symbolic N-Variant System


Erkin, Zekeriya

BCC'17 ~ DecReg: A Framework for Preventing Double-Financing using Blockchain Technology


Ernst, Michael D.

PLAS'16 ~ Automatic Trigger Generation for Rule-based Smart Homes


Erola, Arnau

MIST'16 ~ A Tripwire Grammar for Insider Threat Detection


Erradi, Mohammed

CCSW'16 ~ Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments


Eshete, Birhanu

CCS'16 ~ Chainsaw: Chained Automated Workflow-based Exploit Generation


Esteves-Veríssimo, Paulo

CPS-SPC'16 ~ Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems


Eugster, Patrick

CCS'16 ~ Enforcing Least Privilege Memory Views for Multithreaded Applications


Eustice, Ryan M.

CPS-SPC'16 ~ Risk Assessment for Cooperative Automated Driving


Evancich, Nicholas

MTD'16 ~ Moving Target Defense - A Journey from Idea to Product


Evans, David

CCS'16 ~ Secure Stable Matching at Scale


Everts, Maarten H.

WISCS'16 ~ Private Sharing of IOCs and Sightings

WPES'17 ~ Vote to Link: Recovering from Misbehaving Anonymous Users


Evtyushkin, Dmitry

CCS'16 ~ Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations

ASIA CCS'17 ~ On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters


Eyrolles, Ninon

SPRO'16 ~ Binary Permutation Polynomial Inversion and Application to Obfuscation Techniques

SPRO'16 ~ Defeating MBA-based Obfuscation


Faisal, Mustafa

CCS'16 ~ Limiting the Impact of Stealthy Attacks on Industrial Control Systems


Falcarin, Paolo

SPRO'16 ~ The ASPIRE Framework for Software Protection


Fan, Lingling

CCS'16 ~ POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning


Fan, Shuqin

CCS'16 ~ Attacking OpenSSL Implementation of ECDSA with a Few Signatures


Fan, Xinxin

CCS'16 ~ Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016)

TrustED'16 ~ TrustED 2016 Chairs' Welcome


Fang, Yong

ASIA CCS'17 ~ Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions


Farina, Gian Pietro

CCS'16 ~ Differentially Private Bayesian Programming


Farley, Naomi

SACMAT'17 ~ A Framework for the Cryptographic Enforcement of Information Flow Policies


Farnan, Oliver

WPES'17 ~ Poisoning the Well - Exploring the Great Firewall's Poisoned DNS Responses


Faust, Sebastian

CCS'16 ~ Private Circuits III: Hardware Trojan-Resilience via Testing Amplification


Feamster, Nick

CCS'16 ~ PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-of-Registration


Fedorov, Sergey

BCC'17 ~ Towards Scalable and Private Industrial Blockchains


Feigenbaum, Joan

WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication

WPES'17 ~ Privacy-Preserving Lawful Contact Chaining: [Preliminary Report]


Feldmann, Anja

SafeConfig'16 ~ A One-Year Perspective on Exposed In-memory Key-Value Stores


Felsch, Dennis

ASIA CCS'17 ~ SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor


Feng, Qian

ASIA CCS'17 ~ Extracting Conditional Formulas for Cross-Platform Bug Search

CCS'16 ~ Scalable Graph-based Bug Search for Firmware Images


Fenn, Gregory

WISCS'16 ~ A Model for Secure and Mutually Beneficial Software Vulnerability Sharing


Ferraiolo, David

ABAC'17 ~ Imposing Fine-grain Next Generation Access Control over Database Queries


Ferrari, Elena

CODASPY'17 ~ SAMPAC: Socially-Aware collaborative Multi-Party Access Control


Fersch, Manuel

CCS'16 ~ On the Provable Security of (EC)DSA Signatures


Fett, Daniel

CCS'16 ~ A Comprehensive Formal Security Analysis of OAuth 2.0


Fiadino, Pierdomenico

CCS'16 ~ POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data


Fiebig, Tobias

SafeConfig'16 ~ A One-Year Perspective on Exposed In-memory Key-Value Stores


Fiedler, Roman

MIST'16 ~ Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools


Fielder, Andrew

MIST'16 ~ Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes


Filar, Bobby

AISec'16 ~ DeepDGA: Adversarially-Tuned Domain Generation and Detection


Fiore, Dario

CCS'16 ~ Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data


Fleck, Dan

CODASPY'17 ~ Detecting ROP with Statistical Learning of Program Characteristics

ASIA CCS'17 ~ Strict Virtual Call Integrity Checking for C++ Binaries


Fleischhacker, Nils

CCS'16 ~ Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments


Fogh, Anders

CCS'16 ~ Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR


Foltzer, Adam

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs


Fong, Noémie

CCS'16 ~ Advanced Probabilistic Couplings for Differential Privacy


Fong, Philip W. L.

SACMAT'17 ~ An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms


Ford, Bryan

WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication

WPES'17 ~ Privacy-Preserving Lawful Contact Chaining: [Preliminary Report]


Foresti, Sara

WISCS'16 ~ Managing Data Sharing in OpenStack Swift with Over-Encryption

CCS'16 ~ Mix&Slice: Efficient Access Revocation in the Cloud


Förg, Fabian

CODASPY'17 ~ Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering


Fouque, Pierre-Alain

CCS'16 ~ Strong Non-Interference and Type-Directed Higher-Order Masking


Fournet, Cédric

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper

CCS'16 ~ Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data

PLAS'16 ~ Verified Secure Implementations for the HTTPS Ecosystem: Invited Talk


Fragopoulou, Paraskevi

CODASPY'17 ~ SAMPAC: Socially-Aware collaborative Multi-Party Access Control


Franceschina, Luciano

CCSW'16 ~ Data Analytics: Understanding Human Behavior based on Mobile Network Data


Francillon, Aurélien

TrustED'16 ~ Analyzing Thousands of Firmware Images and a Few Physical Devices. What's Next?

CCS'16 ~ Over-The-Top Bypass: Study of a Recent Telephony Fraud


Fratantonio, Yanick

CCS'16 ~ Drammer: Deterministic Rowhammer Attacks on Mobile Platforms


Freeman, David Mandell

CCS'16 ~ 9th International Workshop on Artificial Intelligence and Security: AISec 2016

AISec'16 ~ Chairs' Introduction and Welcome to AISec 2016


Freeman, Kevin

ASIA CCS'17 ~ Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks


Freisleben, Bernd

CCSW'16 ~ Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments


Frey, Sylvain

CPS-SPC'16 ~ SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection


Fried, Joshua

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Friedberg, Liora

WISCS'16 ~ Privacy Risk in Cybersecurity Data Sharing


Froelicher, David

ASIA CCS'17 ~ Sharing Proofs of Retrievability across Tenants


Fu, Shaojing

SCC'17 ~ A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud


Fuchsbauer, Georg

CCS'16 ~ BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme


Fuhry, Benny

CCSW'16 ~ Encrypting Analytical Web Applications


Fujino, Akinori

CCS'16 ~ Poster: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs


Fujiwara, Mikio

ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality


Fumera, Giorgio

AISec'16 ~ Secure Kernel Machines against Evasion Attacks


Fung, Carol

SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource Allocation using Network Function Virtualization


Furukawa, Jun

CCS'16 ~ Demo: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation

CCS'16 ~ High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)