Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


Gaboardi, Marco

CCS'16 ~ Advanced Probabilistic Couplings for Differential Privacy

CCS'16 ~ Differentially Private Bayesian Programming


Gaebel, Ethan

TrustED'16 ~ Looks Good To Me: Authentication for Augmented Reality


Gajrani, Jyoti

ASIA CCS'17 ~ POSTER: Detection of Information Leaks via Reflection in Android Apps


Galindo, David

CCS'16 ~ BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme


Gambs, Sébastien

WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

ASIA CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol


Gamil, Homer

CPSS'17 ~ Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering


Gańán, Carlos

ASIA CCS'17 ~ The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware


Ganesh, Guruprasad

ASIA CCS'17 ~ PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks


Gao, Zhimin

BCC'17 ~ Enabling the Sharing Economy: Privacy Respecting Contract based on Public Blockchain

BCC'17 ~ Unraveling Blockchain-based Crypto-currency System Supporting Oblivious Transactions: A Formalized Approach


Garay, Juan A.

BCC'17 ~ Basic Properties of the Blockchain


Gardiyawasam Pussewalage, Harsha S.

SACMAT'17 ~ A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records


Garlan, David

IWSPA'17 ~ Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software


Garman, Christina

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Garrido-Pelaz, Roberto

WISCS'16 ~ Shall We Collaborate? A Model to Analyse the Benefits of Information Sharing


Gascon, Hugo

CODASPY'17 ~ Mining Attributed Graphs for Threat Intelligence


Gates, Chris

CODASPY'17 ~ Large-Scale Identification of Malicious Singleton Files


Gaur, Manoj Singh

ASIA CCS'17 ~ POSTER: Detection of Information Leaks via Reflection in Android Apps

ASIA CCS'17 ~ POSTER: Detecting Inter-App Information Leakage Paths


Gautam, Mayank

SACMAT'17 ~ Poster: Constrained Policy Mining in Attribute Based Access Control


Gauthier, François

PLAS'16 ~ JSPChecker: Static Detection of Context-Sensitive Cross-Site Scripting Flaws in Legacy Web Applications


Gavrila, Serban

ABAC'17 ~ Imposing Fine-grain Next Generation Access Control over Database Queries

MIST'16 ~ Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems


Ge, Huangyi

CCS'16 ~ On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols


Gearhart, Andrew S.

SPRO'16 ~ ROP Gadget Prevalence and Survival under Compiler-based Binary Diversification Schemes


Gebel, Gerry

ABAC'17 ~ A Systematic Approach to Implementing ABAC


Geddes, John

WPES'17 ~ ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks


Gehrmann, Christian

CCSW'16 ~ Executing Boolean Queries on an Encrypted Bitmap Index


Geihs, Matthias

ASIA CCS'17 ~ MoPS: A Modular Protection Scheme for Long-Term Storage

ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality


Genkin, Daniel

CCS'16 ~ ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels


George, Franklin

ASIA CCS'17 ~ Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems


Géraud, Rémi

ASIA CCS'17 ~ The Case for System Command Encryption


Gérault, David

WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

ASIA CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol


Gervais, Arthur

CCS'16 ~ On the Security and Performance of Proof of Work Blockchains


Ghaeini, Hamid Reza

CPS-SPC'16 ~ HAMIDS: Hierarchical Monitoring Intrusion Detection System for Industrial Control Systems


Ghali, Cesar

WPES'17 ~ (The Futility of) Data Privacy in Content-Centric Networking


Ghassemi, Mohsen

AISec'16 ~ Differentially Private Online Active Learning with Applications to Anomaly Detection


Ghinita, Gabriel

CODASPY'17 ~ CODASPY'17 Conference/General Chairs' Welcome Message

CODASPY'17 ~ Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement


Ghosh, Esha

CCS'16 ~ Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data


Giacinto, Giorgio

SPSM'16 ~ Detecting Misuse of Google Cloud Messaging in Android Badware

CODASPY'17 ~ DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware


Gilbert, Seth

CCS'16 ~ A Secure Sharding Protocol for Open Blockchains


Gilboa, Niv

CCS'16 ~ Function Secret Sharing: Improvements and Extensions


Gillani, Fida

MTD'16 ~ Formal Approach for Resilient Reachability based onEnd-System Route Agility


Giraldo, Jairo

CCS'16 ~ Limiting the Impact of Stealthy Attacks on Industrial Control Systems


Giuffrida, Cristiano

CCS'16 ~ Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

CCS'16 ~ TypeSan: Practical Type Confusion Detection


Gjomemo, Rigel

CCS'16 ~ Chainsaw: Chained Automated Workflow-based Exploit Generation


Gjřsteen, Kristian

ASIA CCS'17 ~ Side Channels in Deduplication: Trade-offs between Leakage and Efficiency


Glazier, Thomas J.

IWSPA'17 ~ Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software


Gligor, Virgil

ASIA CCS'17 ~ The Case for In-Network Replay Suppression


Glykantzis, Vasileios

CCS'16 ~ On the Security and Performance of Proof of Work Blockchains


Gnawali, Omprakash

ASIA CCS'17 ~ Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation


Goga, Oana

WPES'17 ~ On Profile Linkability despite Anonymity in Social Media Systems


Goldberg, Ian

WPES'17 ~ Elxa: Scalable Privacy-Preserving Plagiarism Detection

CCS'16 ~ Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement


Goldsmith, Michael

MIST'16 ~ A Tripwire Grammar for Insider Threat Detection


Golla, Maximilian

CCS'16 ~ On the Security of Cracking-Resistant Password Vaults


Gollamudi, Anitha

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper


Gollmann, Dieter

CPSS'17 ~ Cyber-Physical System Discovery - Reverse Engineering Physical Processes


Gonthier, Georges

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper


González-Manzano, Lorena

WISCS'16 ~ Shall We Collaborate? A Model to Analyse the Benefits of Information Sharing


Goodfellow, Ian

CCS'16 ~ Deep Learning with Differential Privacy

ASIA CCS'17 ~ Practical Black-Box Attacks against Machine Learning


Gordon, Andrew D. (Andy)

WiSec'17 ~ More Semantics More Robust: Improving Android Malware Classifiers

CCS'16 ~ Differentially Private Bayesian Programming


Gorke, Christian A.

SCC'17 ~ Cloud Storage File Recoverability


Goubin, Louis

SPRO'16 ~ Defeating MBA-based Obfuscation


Gouglidis, Antonios

ABAC'17 ~ Verification of Resilience Policies that Assist Attribute Based Access Control


Grassi, Lorenzo

CCS'16 ~ MPC-Friendly Symmetric Key Primitives


Grau, Markus

WiSec'17 ~ DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices


Green, Benjamin

CPS-SPC'16 ~ Achieving ICS Resilience and Security through Granular Data Flow Management

CPS-SPC'16 ~ SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection


Green, Matthew

CCS'16 ~ A Protocol for Privately Reporting Ad Impressions at Scale

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Grégoire, Benjamin

CCS'16 ~ Advanced Probabilistic Couplings for Differential Privacy

CCS'16 ~ Strong Non-Interference and Type-Directed Higher-Order Masking


Griesmayr, Simone

WiSec'17 ~ Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android


Grining, Krzysztof

ASIA CCS'17 ~ Towards Extending Noiseless Privacy - Dependent Data and More Practical Approach


Grobauer, Bernd

CODASPY'17 ~ Mining Attributed Graphs for Threat Intelligence


Gross, Hannes

TIS'16 ~ Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order


Grossman, Dan

CCS'16 ~ AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems


Grubbs, Paul

CCS'16 ~ Breaking Web Applications Built On Top of Encrypted Data


Gruss, Daniel

CCS'16 ~ Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

CCS'16 ~ Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR


Gu, Guofei

SDN-NFVSec'17 ~ SDN-NFV Sec'17 Conference/General Chairs' Welcome Message


Gu, Qianchen

ASIA CCS'17 ~ Understanding Human-Chosen PINs: Characteristics, Distribution and Security


Gu, Xiaohui

CODASPY'17 ~ A Study of Security Vulnerabilities on Docker Hub


Gu, Yufei

CODASPY'17 ~ PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace


Guajardo, Jorge

CCS'16 ~ MEMS Gyroscopes as Physical Unclonable Functions


Guarda, Paolo

SACMAT'17 ~ Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems


Guarnizo, Juan

CPSS'17 ~ SIPHON: Towards Scalable High-Interaction Physical Honeypots


Gueron, Shay

CODASPY'17 ~ Fault Attacks on Encrypted General Purpose Compute Platforms


Guillaume, René

TrustED'16 ~ On the Energy Cost of Channel Based Key Agreement


Güldenring, Benjamin

CCS'16 ~ POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties


Gulmezoglu, Berk

ASIA CCS'17 ~ Cache-Based Application Detection in the Cloud Using Machine Learning


Gulyás, Gábor György

WPES'17 ~ An Efficient and Robust Social Network De-anonymization Attack


Gummadi, Krishna P.

WPES'17 ~ On Profile Linkability despite Anonymity in Social Media Systems


Gunathilaka, Prageeth

CPS-SPC'16 ~ SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions


Güneysu, Tim

TrustED'16 ~ On the Energy Cost of Channel Based Key Agreement

TIS'16 ~ ParTI - Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks

CCS'16 ~ Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016)

TrustED'16 ~ TrustED 2016 Chairs' Welcome


Gunter, Carl A.

CCS'16 ~ Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android

Gunter, Carl A.

CCS'16 ~ Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets


Guo, Fuchun

ASIA CCS'17 ~ An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption


Guo, Pinyao

MTD'16 ~ Demo: A Symbolic N-Variant System


Guo, Yu

ASIA CCS'17 ~ EncKV: An Encrypted Key-value Store with Rich Queries


Gupta, Maanak

SACMAT'17 ~ Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment

SACMAT'17 ~ POSTER: Access Control Model for the Hadoop Ecosystem


Gupta, Payas

SPSM'16 ~ Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks


Gupta, Srishti

SPSM'16 ~ Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks


Gurulian, Iakovos

CPSS'17 ~ Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay


Gutin, Gregory

SACMAT'17 ~ On the Satisfiability of Workflows with Release Points

CODASPY'17 ~ The Authorization Policy Existence Problem


Guttadoro, Daniele

WISCS'16 ~ Managing Data Sharing in OpenStack Swift with Over-Encryption


Guzmán, Antonio

CCS'16 ~ POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach


Ha, Hyeonmin

ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps


Hahn, Changhee

CCS'16 ~ POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing


Hahn, Florian

CCSW'16 ~ Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage


Haider, Syed Kamran

SACMAT'17 ~ Leveraging Hardware Isolation for Process Level Access Control & Authentication


Hajny, Jan

WPES'17 ~ Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs


Haken, Gareth

CPSS'17 ~ Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay


Halappanavar, Mahantesh

MTD'16 ~ Formal Approach for Resilient Reachability based onEnd-System Route Agility


Halevi, Shai

CCS'16 ~ CCS 2016 Program Chairs' Welcome


Haller, Istvan

CCS'16 ~ TypeSan: Practical Type Confusion Detection


Halpin, Harry

WPES'17 ~ UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs


Hamilton, Chris

CODASPY'17 ~ Detecting Patching of Executables without System Calls


Hamlet, Jason R.

MTD'16 ~ Dependency Graph Analysis and Moving Target Defense Selection


Han, Jinsong

CCS'16 ~ Instant and Robust Authentication and Key Agreement among Mobile Devices


Han, Wonkyu

SACMAT'17 ~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control


Han, Xiao

CCS'16 ~ PhishEye: Live Monitoring of Sandboxed Phishing Kits


Hannon, Christopher

SDN-NFVSec'17 ~ Ultimate Forwarding Resilience in OpenFlow Networks


Hansen, Torben Brandt

CCS'16 ~ A Surfeit of SSH Cipher Suites


Hanzlik, Lucjan

APKC'17 ~ Two-Move and Setup-Free Blind Signatures with Perfect Blindness


Hao, Shuai

CCS'16 ~ All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records


Hao, Shuang

ASIA CCS'17 ~ Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions

CCS'16 ~ Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service

CCS'16 ~ PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-of-Registration


Harang, Richard

IWSPA'17 ~ Identifying Key Cyber-Physical Terrain


Harkous, Hamza

CODASPY'17 ~ "If You Can't Beat them Join them": A Usability Approach to Interdependent Privacy in Cloud Apps


Hassanshahi, Behnaz

ASIA CCS'17 ~ Android Database Attacks Revisited


Hassen, Mehadi

CODASPY'17 ~ Scalable Function Call Graph-based Malware Classification


Hayashi, Takuya

SCC'17 ~ Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption

ASIA CCS'17 ~ Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction

ASIA CCS'17 ~ Mis-operation Resistant Searchable Homomorphic Encryption


Hayes, Jamie

WPES'17 ~ TASP: Towards Anonymity Sets that Persist


He, Daojing

ASIA CCS'17 ~ Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App Markets


He, Jingnan

APKC'17 ~ KDM and Selective Opening Secure IBE Based on the LWE Problem


He, Ruan

SDN-NFVSec'17 ~ A First Step Towards Security Extension for NFV Orchestrator


He, Ying

WiSec'17 ~ Poster: Design Ideas for Privacy-aware User Interfaces for Mobile Devices


Heaps, John

SACMAT'17 ~ Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures


Hellman, Martin E.

CCS'16 ~ Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic


Henderson, Andrew

ASIA CCS'17 ~ Extracting Conditional Formulas for Cross-Platform Bug Search


Hengartner, Urs

WiSec'17 ~ Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices


Heninger, Nadia

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Henze, Martin

WPES'17 ~ CPPL: Compact Privacy Policy Language

CCS'16 ~ POSTER: Fingerprinting Tor Hidden Services

CCS'16 ~ POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store

CODASPY'17 ~ Privacy-Preserving HMM Forward Computation


Herbreteau, Frederic

ASIA CCS'17 ~ POSTER: Detecting Inter-App Information Leakage Paths


Hernández, José Alberto

CCS'16 ~ POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach


Herold, Nadine

WISCS'16 ~ Collaborative Incident Handling Based on the Blackboard-Pattern


Herrmann, Dominik

AISec'16 ~ Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic


Herzberg, Amir

CPS-SPC'16 ~ Exposing Transmitters in Mobile Multi-Agent Games

CCSW'16 ~ Stratum Filtering: Cloud-based Detection of Attack Sources


Hibshi, Hanan

WISCS'16 ~ Privacy Risk in Cybersecurity Data Sharing


Hicks, Michael

CCS'16 ~ Build It, Break It, Fix It: Contesting Secure Development


Hiller, Jens

WPES'17 ~ CPPL: Compact Privacy Policy Language


Hiller, Matthias

TrustED'16 ~ Online Reliability Testing for PUF Key Derivation


Hoang, Viet Tung

CCS'16 ~ Message-Recovery Attacks on Feistel-Based Format Preserving Encryption


Hobor, Aquinas

CCS'16 ~ Making Smart Contracts Smarter


Hoepman, Jaap-Henk

WPES'17 ~ Vote to Link: Recovering from Misbehaving Anonymous Users


Hof, Hans-Joachim

WiSec'17 ~ Poster: Security Design Patterns With Good Usability


Hoffman, Kevin

CCS'16 ~ Enforcing Least Privilege Memory Views for Multithreaded Applications


Hohlfeld, Oliver

CCS'16 ~ POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store


Hojjati, Avesta

CCS'16 ~ Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets


Hollick, Matthias

SPSM'16 ~ Analyzing TETRA Location Privacy and Network Availability

WiSec'17 ~ DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems

WiSec'17 ~ DEMO: Far Away and Yet Nearby - A Framework for Practical Distance Fraud on Proximity Services for Mobile Devices

WiSec'17 ~ DEMO: Using NexMon, the C-based WiFi Firmware Modification Framework

WiSec'17 ~ Foreword

WiSec'17 ~ Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding

WiSec'17 ~ Trust the Wire, They Always Told Me! On Practical Non-Destructive Wire-Tap Attacks Against Ethernet


Holzinger, Philipp

CCS'16 ~ An In-Depth Study of More Than Ten Years of Java Exploitation


Hommel, Wolfgang

CCS'16 ~ POSTER: VUDEC - A Framework for Vulnerability Management in Decentralized Communication Networks


Hopper, Nicholas

WPES'17 ~ ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks


Hou, Y. Thomas

TrustED'16 ~ Looks Good To Me: Authentication for Augmented Reality

WiSec'17 ~ Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding


Houmansadr, Amir

CCS'16 ~ GAME OF DECOYS: Optimal Decoy Routing Through Game Theory

CCS'16 ~ Practical Censorship Evasion Leveraging Content Delivery Networks


Hsu, Justin

CCS'16 ~ Advanced Probabilistic Couplings for Differential Privacy

CCS'16 ~ Differentially Private Bayesian Programming


Hsu, Terry Ching-Hsiang

CCS'16 ~ Enforcing Least Privilege Memory Views for Multithreaded Applications


Hu, Hong

CCS'16 ~ "The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing


Hu, Hongxin

SDN-NFVSec'17 ~ Dynamic Defense Provision via Network Functions Virtualization

IWSPA'17 ~ MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks

SACMAT'17 ~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control

SDN-NFVSec'17 ~ SDN-NFV Sec'17 Conference/General Chairs' Welcome Message

SDN-NFVSec'17 ~ Towards Effective Virtualization of Intrusion Detection Systems

SACMAT'17 ~ Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks


Hu, Vincent C.

ABAC'17 ~ Verification of Resilience Policies that Assist Attribute Based Access Control


Hu, Xuexian

CCS'16 ~ Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication


Hu, Yih-Chun

CCS'16 ~ MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet

ASIA CCS'17 ~ The Case for In-Network Replay Suppression


Hu, Yu

CCS'16 ~ POSTER: Attack on Non-Linear Physical Unclonable Function


Hu, Ziwei

MIST'16 ~ Ports Distribution Management for Privacy Protection inside Local Domain Name System


Huang, Cheng

ASIA CCS'17 ~ Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions


Huang, Dijiang

SDN-NFVSec'17 ~ Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments

MTD'16 ~ SDN based Scalable MTD Solution in Cloud Network


Huang, He

ASIA CCS'17 ~ BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection


Huang, Jialin

WiSec'17 ~ Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments


Huang, Jie

CCS'16 ~ POSTER: The ART of App Compartmentalization


Huang, Xinyi

CPSS'17 ~ A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems

CCS'16 ~ Targeted Online Password Guessing: An Underestimated Threat

ASIA CCS'17 ~ Understanding Human-Chosen PINs: Characteristics, Distribution and Security


Huang, Yuanwen

CCS'16 ~ MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection


Hubaux, Jean-Pierre

WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant Protocol for Local-Area Anonymous Communication

CCS'16 ~ Privacy and Security in the Genomic Era

WiSec'17 ~ The Ultimate Frontier for Privacy and Security: Medicine


Huh, Jun Ho

ASIA CCS'17 ~ Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks

CCS'16 ~ POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack


Humbert, Mathias

CCS'16 ~ Membership Privacy in MicroRNA-based Studies


Hur, Junbeom

CCS'16 ~ POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing


Hussain, Syed Rafiul

CODASPY'17 ~ Seamless and Secure Bluetooth LE Connection Migration


Hutchison, David

CPS-SPC'16 ~ Achieving ICS Resilience and Security through Granular Data Flow Management

ABAC'17 ~ Verification of Resilience Policies that Assist Attribute Based Access Control


Huth, Christopher

CCS'16 ~ MEMS Gyroscopes as Physical Unclonable Functions

TrustED'16 ~ On the Energy Cost of Channel Based Key Agreement


Hutter, Michael

TIS'16 ~ Threshold Implementations in Industry: A Case Study on SHA-256


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)