 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
Gaboardi,
Marco
CCS'16 ~ Advanced Probabilistic Couplings
for Differential Privacy
CCS'16
~ Differentially Private Bayesian Programming
Gaebel,
Ethan
TrustED'16 ~ Looks Good To Me: Authentication
for Augmented Reality
Gajrani,
Jyoti
ASIA CCS'17 ~ POSTER: Detection of Information
Leaks via Reflection in Android Apps
Galindo,
David
CCS'16 ~ BeleniosRF: A Non-interactive
Receipt-Free Electronic Voting Scheme
|
| |
Gambs,
Sébastien
WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud
Resistant Distance-Bounding Protocol
ASIA
CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous
Distance-bounding Protocol
Gamil,
Homer
CPSS'17 ~ Secure 3D Printing: Reconstructing
and Validating Solid Geometries using Toolpath Reverse Engineering
Gańán,
Carlos
ASIA CCS'17 ~ The Role of Hosting Providers
in Fighting Command and Control Infrastructure of Financial Malware
Ganesh,
Guruprasad
ASIA CCS'17 ~ PrivWatcher: Non-bypassable
Monitoring and Protection of Process Credentials from Memory Corruption
Attacks
|
| |
Gao,
Zhimin
BCC'17 ~ Enabling the Sharing Economy:
Privacy Respecting Contract based on Public Blockchain
BCC'17
~ Unraveling Blockchain-based Crypto-currency System Supporting
Oblivious Transactions: A Formalized Approach
Garay,
Juan A.
BCC'17 ~ Basic Properties of the Blockchain
Gardiyawasam
Pussewalage, Harsha S.
SACMAT'17 ~ A Distributed Multi-Authority
Attribute Based Encryption Scheme for Secure Sharing of Personal Health
Records
Garlan,
David
IWSPA'17 ~ Model-based Cluster Analysis
for Identifying Suspicious Activity Sequences in Software
Garman,
Christina
CCS'16 ~ A Systematic Analysis of the Juniper
Dual EC Incident
|
| |
Garrido-Pelaz,
Roberto
WISCS'16 ~ Shall We Collaborate? A Model
to Analyse the Benefits of Information Sharing
Gascon,
Hugo
CODASPY'17 ~ Mining Attributed Graphs for
Threat Intelligence
Gates,
Chris
CODASPY'17 ~ Large-Scale Identification
of Malicious Singleton Files
Gaur,
Manoj Singh
ASIA CCS'17 ~ POSTER: Detection of Information
Leaks via Reflection in Android Apps
ASIA
CCS'17 ~ POSTER: Detecting Inter-App Information Leakage Paths
Gautam,
Mayank
SACMAT'17 ~ Poster: Constrained Policy
Mining in Attribute Based Access Control
Gauthier,
François
PLAS'16 ~ JSPChecker: Static Detection
of Context-Sensitive Cross-Site Scripting Flaws in Legacy Web Applications
|
| |
Gavrila,
Serban
ABAC'17 ~ Imposing Fine-grain Next Generation
Access Control over Database Queries
MIST'16
~ Restricting Insider Access Through Efficient Implementation
of Multi-Policy Access Control Systems
Ge,
Huangyi
CCS'16 ~ On the Security and Usability
of Segment-based Visual Cryptographic Authentication Protocols
Gearhart,
Andrew S.
SPRO'16 ~ ROP Gadget Prevalence and Survival
under Compiler-based Binary Diversification Schemes
Gebel,
Gerry
ABAC'17 ~ A Systematic Approach to Implementing
ABAC
Geddes,
John
WPES'17 ~ ABRA CADABRA: Magically Increasing
Network Utilization in Tor by Avoiding Bottlenecks
Gehrmann,
Christian
CCSW'16 ~ Executing Boolean Queries on
an Encrypted Bitmap Index
|
| |
Geihs,
Matthias
ASIA CCS'17 ~ MoPS: A Modular Protection
Scheme for Long-Term Storage
ASIA
CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term
Integrity, Authenticity, and Confidentiality
Genkin,
Daniel
CCS'16 ~ ECDSA Key Extraction from Mobile
Devices via Nonintrusive Physical Side Channels
George,
Franklin
ASIA CCS'17 ~ Secure Integration of Web
Content and Applications on Commodity Mobile Operating Systems
Géraud,
Rémi
ASIA CCS'17 ~ The Case for System Command
Encryption
Gérault,
David
WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud
Resistant Distance-Bounding Protocol
ASIA
CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous
Distance-bounding Protocol
Gervais,
Arthur
CCS'16 ~ On the Security and Performance
of Proof of Work Blockchains
Ghaeini,
Hamid Reza
CPS-SPC'16 ~ HAMIDS: Hierarchical Monitoring
Intrusion Detection System for Industrial Control Systems
|
| |
Ghali,
Cesar
WPES'17 ~ (The Futility of) Data Privacy
in Content-Centric Networking
Ghassemi,
Mohsen
AISec'16 ~ Differentially Private Online
Active Learning with Applications to Anomaly Detection
Ghinita,
Gabriel
CODASPY'17 ~ CODASPY'17 Conference/General
Chairs' Welcome Message
CODASPY'17
~ Differentially-Private Big Data Analytics for High-Speed Research
Network Traffic Measurement
Ghosh,
Esha
CCS'16 ~ Hash First, Argue Later: Adaptive
Verifiable Computations on Outsourced Data
Giacinto,
Giorgio
SPSM'16 ~ Detecting Misuse of Google Cloud
Messaging in Android Badware
CODASPY'17
~ DroidSieve: Fast and Accurate Classification of Obfuscated
Android Malware
Gilbert,
Seth
CCS'16 ~ A Secure Sharding Protocol for
Open Blockchains
|
| |
Gilboa,
Niv
CCS'16 ~ Function Secret Sharing: Improvements
and Extensions
Gillani,
Fida
MTD'16 ~ Formal Approach for Resilient
Reachability based onEnd-System Route Agility
Giraldo,
Jairo
CCS'16 ~ Limiting the Impact of Stealthy
Attacks on Industrial Control Systems
Giuffrida,
Cristiano
CCS'16 ~ Drammer: Deterministic Rowhammer
Attacks on Mobile Platforms
CCS'16
~ TypeSan: Practical Type Confusion Detection
Gjomemo,
Rigel
CCS'16 ~ Chainsaw: Chained Automated Workflow-based
Exploit Generation
Gjřsteen,
Kristian
ASIA CCS'17 ~ Side Channels in Deduplication:
Trade-offs between Leakage and Efficiency
|
| |
Glazier,
Thomas J.
IWSPA'17 ~ Model-based Cluster Analysis
for Identifying Suspicious Activity Sequences in Software
Gligor,
Virgil
ASIA CCS'17 ~ The Case for In-Network Replay
Suppression
Glykantzis,
Vasileios
CCS'16 ~ On the Security and Performance
of Proof of Work Blockchains
Gnawali,
Omprakash
ASIA CCS'17 ~ Scaling and Effectiveness
of Email Masquerade Attacks: Exploiting Natural Language Generation
Goga,
Oana
WPES'17 ~ On Profile Linkability despite
Anonymity in Social Media Systems
Goldberg,
Ian
WPES'17 ~ Elxa: Scalable Privacy-Preserving
Plagiarism Detection
CCS'16
~ Slitheen: Perfectly Imitated Decoy Routing through Traffic
Replacement
|
| |
Goldsmith,
Michael
MIST'16 ~ A Tripwire Grammar for Insider
Threat Detection
Golla,
Maximilian
CCS'16 ~ On the Security of Cracking-Resistant
Password Vaults
Gollamudi,
Anitha
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
Gollmann,
Dieter
CPSS'17 ~ Cyber-Physical System Discovery
- Reverse Engineering Physical Processes
Gonthier,
Georges
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
González-Manzano,
Lorena
WISCS'16 ~ Shall We Collaborate? A Model
to Analyse the Benefits of Information Sharing
|
| |
Goodfellow,
Ian
CCS'16 ~ Deep Learning with Differential
Privacy
ASIA
CCS'17 ~ Practical Black-Box Attacks against Machine Learning
Gordon,
Andrew D. (Andy)
WiSec'17 ~ More Semantics More Robust:
Improving Android Malware Classifiers
CCS'16
~ Differentially Private Bayesian Programming
Gorke,
Christian A.
SCC'17 ~ Cloud Storage File Recoverability
Goubin,
Louis
SPRO'16 ~ Defeating MBA-based Obfuscation
Gouglidis,
Antonios
ABAC'17 ~ Verification of Resilience Policies
that Assist Attribute Based Access Control
Grassi,
Lorenzo
CCS'16 ~ MPC-Friendly Symmetric Key Primitives
|
| |
Grau,
Markus
WiSec'17 ~ DEMO: Far Away and Yet Nearby
- A Framework for Practical Distance Fraud on Proximity Services for
Mobile Devices
Green,
Benjamin
CPS-SPC'16 ~ Achieving ICS Resilience and
Security through Granular Data Flow Management
CPS-SPC'16
~ SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion
Detection
Green,
Matthew
CCS'16 ~ A Protocol for Privately Reporting
Ad Impressions at Scale
CCS'16
~ A Systematic Analysis of the Juniper Dual EC Incident
Grégoire,
Benjamin
CCS'16 ~ Advanced Probabilistic Couplings
for Differential Privacy
CCS'16
~ Strong Non-Interference and Type-Directed Higher-Order Masking
Griesmayr,
Simone
WiSec'17 ~ Exploiting Data-Usage Statistics
for Website Fingerprinting Attacks on Android
Grining,
Krzysztof
ASIA CCS'17 ~ Towards Extending Noiseless
Privacy - Dependent Data and More Practical Approach
|
| |
Grobauer,
Bernd
CODASPY'17 ~ Mining Attributed Graphs for
Threat Intelligence
Gross,
Hannes
TIS'16 ~ Domain-Oriented Masking: Compact
Masked Hardware Implementations with Arbitrary Protection Order
Grossman,
Dan
CCS'16 ~ AUDACIOUS: User-Driven Access
Control with Unmodified Operating Systems
Grubbs,
Paul
CCS'16 ~ Breaking Web Applications Built
On Top of Encrypted Data
Gruss,
Daniel
CCS'16 ~ Drammer: Deterministic Rowhammer
Attacks on Mobile Platforms
CCS'16
~ Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
Gu,
Guofei
SDN-NFVSec'17 ~ SDN-NFV Sec'17 Conference/General
Chairs' Welcome Message
|
| |
Gu,
Qianchen
ASIA CCS'17 ~ Understanding Human-Chosen
PINs: Characteristics, Distribution and Security
Gu,
Xiaohui
CODASPY'17 ~ A Study of Security Vulnerabilities
on Docker Hub
Gu,
Yufei
CODASPY'17 ~ PT-CFI: Transparent Backward-Edge
Control Flow Violation Detection Using Intel Processor Trace
Guajardo,
Jorge
CCS'16 ~ MEMS Gyroscopes as Physical Unclonable
Functions
Guarda,
Paolo
SACMAT'17 ~ Security Analysis and Legal
Compliance Checking for the Design of Privacy-friendly Information Systems
Guarnizo,
Juan
CPSS'17 ~ SIPHON: Towards Scalable High-Interaction
Physical Honeypots
|
| |
Gueron,
Shay
CODASPY'17 ~ Fault Attacks on Encrypted
General Purpose Compute Platforms
Guillaume,
René
TrustED'16 ~ On the Energy Cost of Channel
Based Key Agreement
Güldenring,
Benjamin
CCS'16 ~ POSTER: Re-Thinking Risks and
Rewards for Trusted Third Parties
Gulmezoglu,
Berk
ASIA CCS'17 ~ Cache-Based Application Detection
in the Cloud Using Machine Learning
Gulyás,
Gábor György
WPES'17 ~ An Efficient and Robust Social
Network De-anonymization Attack
Gummadi,
Krishna P.
WPES'17 ~ On Profile Linkability despite
Anonymity in Social Media Systems
|
| |
Gunathilaka,
Prageeth
CPS-SPC'16 ~ SoftGrid: A Software-based
Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions
Güneysu,
Tim
TrustED'16 ~ On the Energy Cost of Channel
Based Key Agreement
TIS'16
~ ParTI - Towards Combined Hardware Countermeasures against Side-Channeland
Fault-Injection Attacks
CCS'16
~ Sixth International Workshop on Trustworthy Embedded Devices
(TrustED 2016)
TrustED'16
~ TrustED 2016 Chairs' Welcome
Gunter,
Carl A.
CCS'16 ~ Draco: A System for Uniform and
Fine-grained Access Control for Web Code on Android
Gunter,
Carl A.
CCS'16 ~ Leave Your Phone at the Door:Side
Channels that Reveal Factory Floor Secrets
Guo,
Fuchun
ASIA CCS'17 ~ An Efficient KP-ABE with
Short Ciphertexts in Prime OrderGroups under Standard Assumption
Guo,
Pinyao
MTD'16 ~ Demo: A Symbolic N-Variant System
Guo,
Yu
ASIA CCS'17 ~ EncKV: An Encrypted Key-value
Store with Rich Queries
|
| |
Gupta,
Maanak
SACMAT'17 ~ Multi-Layer Authorization Framework
for a Representative Hadoop Ecosystem Deployment
SACMAT'17
~ POSTER: Access Control Model for the Hadoop Ecosystem
Gupta,
Payas
SPSM'16 ~ Exploiting Phone Numbers and
Cross-Application Features in Targeted Mobile Attacks
Gupta,
Srishti
SPSM'16 ~ Exploiting Phone Numbers and
Cross-Application Features in Targeted Mobile Attacks
Gurulian,
Iakovos
CPSS'17 ~ Evaluation of Apple iDevice Sensors
as a Potential Relay Attack Countermeasure for Apple Pay
Gutin,
Gregory
SACMAT'17 ~ On the Satisfiability of Workflows
with Release Points
CODASPY'17
~ The Authorization Policy Existence Problem
Guttadoro,
Daniele
WISCS'16 ~ Managing Data Sharing in OpenStack
Swift with Over-Encryption
|
| |
Guzmán,
Antonio
CCS'16 ~ POSTER: Insights of Antivirus
Relationships when Detecting Android Malware: A Data Analytics Approach
Ha,
Hyeonmin
ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity
Protection Mechanisms in Android Financial Apps
Hahn,
Changhee
CCS'16 ~ POSTER: Towards Privacy-Preserving
Biometric Identification in Cloud Computing
Hahn,
Florian
CCSW'16 ~ Poly-Logarithmic Range Queries
on Encrypted Data with Small Leakage
Haider,
Syed Kamran
SACMAT'17 ~ Leveraging Hardware Isolation
for Process Level Access Control & Authentication
Hajny,
Jan
WPES'17 ~ Scalable Revocation Scheme for
Anonymous Credentials Based on n-times Unlinkable Proofs
|
| |
Haken,
Gareth
CPSS'17 ~ Evaluation of Apple iDevice Sensors
as a Potential Relay Attack Countermeasure for Apple Pay
Halappanavar,
Mahantesh
MTD'16 ~ Formal Approach for Resilient
Reachability based onEnd-System Route Agility
Halevi,
Shai
CCS'16 ~ CCS 2016 Program Chairs' Welcome
Haller,
Istvan
CCS'16 ~ TypeSan: Practical Type Confusion
Detection
Halpin,
Harry
WPES'17 ~ UnlimitID: Privacy-Preserving
Federated Identity Management using Algebraic MACs
Hamilton,
Chris
CODASPY'17 ~ Detecting Patching of Executables
without System Calls
|
| |
Hamlet,
Jason R.
MTD'16 ~ Dependency Graph Analysis and
Moving Target Defense Selection
Han,
Jinsong
CCS'16 ~ Instant and Robust Authentication
and Key Agreement among Mobile Devices
Han,
Wonkyu
SACMAT'17 ~ Poster: On the Safety and Efficiency
of Virtual Firewall Elasticity Control
Han,
Xiao
CCS'16 ~ PhishEye: Live Monitoring of Sandboxed
Phishing Kits
Hannon,
Christopher
SDN-NFVSec'17 ~ Ultimate Forwarding Resilience
in OpenFlow Networks
Hansen,
Torben Brandt
CCS'16 ~ A Surfeit of SSH Cipher Suites
|
| |
Hanzlik,
Lucjan
APKC'17 ~ Two-Move and Setup-Free Blind
Signatures with Perfect Blindness
Hao,
Shuai
CCS'16 ~ All Your DNS Records Point to
Us: Understanding the Security Threats of Dangling DNS Records
Hao,
Shuang
ASIA CCS'17 ~ Gossip: Automatically Identifying
Malicious Domains from Mailing List Discussions
CCS'16
~ Lurking Malice in the Cloud: Understanding and Detecting Cloud
Repository as a Malicious Service
CCS'16
~ PREDATOR: Proactive Recognition and Elimination of Domain Abuse
at Time-of-Registration
Harang,
Richard
IWSPA'17 ~ Identifying Key Cyber-Physical
Terrain
Harkous,
Hamza
CODASPY'17 ~ "If You Can't Beat them Join
them": A Usability Approach to Interdependent Privacy in Cloud Apps
Hassanshahi,
Behnaz
ASIA CCS'17 ~ Android Database Attacks
Revisited
|
| |
Hassen,
Mehadi
CODASPY'17 ~ Scalable Function Call Graph-based
Malware Classification
Hayashi,
Takuya
SCC'17 ~ Efficient Key-Rotatable and Security-Updatable
Homomorphic Encryption
ASIA
CCS'17 ~ Group Signatures with Time-bound Keys Revisited: A New
Model and an Efficient Construction
ASIA
CCS'17 ~ Mis-operation Resistant Searchable Homomorphic Encryption
Hayes,
Jamie
WPES'17 ~ TASP: Towards Anonymity Sets
that Persist
He,
Daojing
ASIA CCS'17 ~ Toward Detecting Collusive
Ranking Manipulation Attackers in Mobile App Markets
He,
Jingnan
APKC'17 ~ KDM and Selective Opening Secure
IBE Based on the LWE Problem
He,
Ruan
SDN-NFVSec'17 ~ A First Step Towards Security
Extension for NFV Orchestrator
|
| |
He,
Ying
WiSec'17 ~ Poster: Design Ideas for Privacy-aware
User Interfaces for Mobile Devices
Heaps,
John
SACMAT'17 ~ Verifiable Assume-Guarantee
Privacy Specifications for Actor Component Architectures
Hellman,
Martin E.
CCS'16 ~ Cybersecurity, Nuclear Security,
Alan Turing, and Illogical Logic
Henderson,
Andrew
ASIA CCS'17 ~ Extracting Conditional Formulas
for Cross-Platform Bug Search
Hengartner,
Urs
WiSec'17 ~ Shatter: Using Threshold Cryptography
to Protect Single Users with Multiple Devices
Heninger,
Nadia
CCS'16 ~ A Systematic Analysis of the Juniper
Dual EC Incident
|
| |
Henze,
Martin
WPES'17 ~ CPPL: Compact Privacy Policy
Language
CCS'16
~ POSTER: Fingerprinting Tor Hidden Services
CCS'16
~ POSTER: I Don't Want That Content! On the Risks of Exploiting
Bitcoin's Blockchain as a Content Store
CODASPY'17
~ Privacy-Preserving HMM Forward Computation
Herbreteau,
Frederic
ASIA CCS'17 ~ POSTER: Detecting Inter-App
Information Leakage Paths
Hernández,
José Alberto
CCS'16 ~ POSTER: Insights of Antivirus
Relationships when Detecting Android Malware: A Data Analytics Approach
Herold,
Nadine
WISCS'16 ~ Collaborative Incident Handling
Based on the Blackboard-Pattern
Herrmann,
Dominik
AISec'16 ~ Tracked Without a Trace: Linking
Sessions of Users by Unsupervised Learning of Patterns in Their DNS
Traffic
Herzberg,
Amir
CPS-SPC'16 ~ Exposing Transmitters in Mobile
Multi-Agent Games
CCSW'16
~ Stratum Filtering: Cloud-based Detection of Attack Sources
|
| |
Hibshi,
Hanan
WISCS'16 ~ Privacy Risk in Cybersecurity
Data Sharing
Hicks,
Michael
CCS'16 ~ Build It, Break It, Fix It: Contesting
Secure Development
Hiller,
Jens
WPES'17 ~ CPPL: Compact Privacy Policy
Language
Hiller,
Matthias
TrustED'16 ~ Online Reliability Testing
for PUF Key Derivation
Hoang,
Viet Tung
CCS'16 ~ Message-Recovery Attacks on Feistel-Based
Format Preserving Encryption
Hobor,
Aquinas
CCS'16 ~ Making Smart Contracts Smarter
|
| |
Hoepman,
Jaap-Henk
WPES'17 ~ Vote to Link: Recovering from
Misbehaving Anonymous Users
Hof,
Hans-Joachim
WiSec'17 ~ Poster: Security Design Patterns
With Good Usability
Hoffman,
Kevin
CCS'16 ~ Enforcing Least Privilege Memory
Views for Multithreaded Applications
Hohlfeld,
Oliver
CCS'16 ~ POSTER: I Don't Want That Content!
On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
Hojjati,
Avesta
CCS'16 ~ Leave Your Phone at the Door:Side
Channels that Reveal Factory Floor Secrets
Hollick,
Matthias
SPSM'16 ~ Analyzing TETRA Location Privacy
and Network Availability
WiSec'17
~ DEMO: Demonstrating Practical Known-Plaintext Attacks against
Physical Layer Security in Wireless MIMO Systems
WiSec'17
~ DEMO: Far Away and Yet Nearby - A Framework for Practical Distance
Fraud on Proximity Services for Mobile Devices
WiSec'17
~ DEMO: Using NexMon, the C-based WiFi Firmware Modification
Framework
WiSec'17
~ Foreword
WiSec'17
~ Profiling the Strength of Physical-Layer Security: A Study
in Orthogonal Blinding
WiSec'17
~ Trust the Wire, They Always Told Me! On Practical Non-Destructive
Wire-Tap Attacks Against Ethernet
|
| |
Holzinger,
Philipp
CCS'16 ~ An In-Depth Study of More Than
Ten Years of Java Exploitation
Hommel,
Wolfgang
CCS'16 ~ POSTER: VUDEC - A Framework for
Vulnerability Management in Decentralized Communication Networks
Hopper,
Nicholas
WPES'17 ~ ABRA CADABRA: Magically Increasing
Network Utilization in Tor by Avoiding Bottlenecks
Hou,
Y. Thomas
TrustED'16 ~ Looks Good To Me: Authentication
for Augmented Reality
WiSec'17
~ Profiling the Strength of Physical-Layer Security: A Study
in Orthogonal Blinding
Houmansadr,
Amir
CCS'16 ~ GAME OF DECOYS: Optimal Decoy
Routing Through Game Theory
CCS'16
~ Practical Censorship Evasion Leveraging Content Delivery Networks
Hsu,
Justin
CCS'16 ~ Advanced Probabilistic Couplings
for Differential Privacy
CCS'16
~ Differentially Private Bayesian Programming
|
| |
Hsu,
Terry Ching-Hsiang
CCS'16 ~ Enforcing Least Privilege Memory
Views for Multithreaded Applications
Hu,
Hong
CCS'16 ~ "The Web/Local" Boundary Is Fuzzy:
A Security Study of Chrome's Process-based Sandboxing
Hu,
Hongxin
SDN-NFVSec'17 ~ Dynamic Defense Provision
via Network Functions Virtualization
IWSPA'17
~ MCDefender: Toward Effective Cyberbullying Defense in Mobile
Online Social Networks
SACMAT'17
~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity
Control
SDN-NFVSec'17
~ SDN-NFV Sec'17 Conference/General Chairs' Welcome Message
SDN-NFVSec'17
~ Towards Effective Virtualization of Intrusion Detection Systems
SACMAT'17
~ Towards PII-based Multiparty Access Control for Photo Sharing
in Online Social Networks
Hu,
Vincent C.
ABAC'17 ~ Verification of Resilience Policies
that Assist Attribute Based Access Control
Hu,
Xuexian
CCS'16 ~ Practical Anonymous Password Authentication
and TLS with Anonymous Client Authentication
Hu,
Yih-Chun
CCS'16 ~ MiddlePolice: Toward Enforcing
Destination-Defined Policies in the Middle of the Internet
ASIA
CCS'17 ~ The Case for In-Network Replay Suppression
|
| |
Hu,
Yu
CCS'16 ~ POSTER: Attack on Non-Linear Physical
Unclonable Function
Hu,
Ziwei
MIST'16 ~ Ports Distribution Management
for Privacy Protection inside Local Domain Name System
Huang,
Cheng
ASIA CCS'17 ~ Gossip: Automatically Identifying
Malicious Domains from Mailing List Discussions
Huang,
Dijiang
SDN-NFVSec'17 ~ Dynamic Game based Security
framework in SDN-enabled Cloud Networking Environments
MTD'16
~ SDN based Scalable MTD Solution in Cloud Network
Huang,
He
ASIA CCS'17 ~ BinSequence: Fast, Accurate
and Scalable Binary Code Reuse Detection
Huang,
Jialin
WiSec'17 ~ Poster: Friend or Foe? Context
Authentication for Trust Domain Separation in IoT Environments
|
| |
Huang,
Jie
CCS'16 ~ POSTER: The ART of App Compartmentalization
Huang,
Xinyi
CPSS'17 ~ A Cross-Layer Key Establishment
Model for Wireless Devices in Cyber-Physical Systems
CCS'16
~ Targeted Online Password Guessing: An Underestimated Threat
ASIA
CCS'17 ~ Understanding Human-Chosen PINs: Characteristics, Distribution
and Security
Huang,
Yuanwen
CCS'16 ~ MERS: Statistical Test Generation
for Side-Channel Analysis based Trojan Detection
Hubaux,
Jean-Pierre
WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant
Protocol for Local-Area Anonymous Communication
CCS'16
~ Privacy and Security in the Genomic Era
WiSec'17
~ The Ultimate Frontier for Privacy and Security: Medicine
Huh,
Jun Ho
ASIA CCS'17 ~ Boosting the Guessing Attack
Performance on Android Lock Patterns with Smudge Attacks
CCS'16
~ POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack
Humbert,
Mathias
CCS'16 ~ Membership Privacy in MicroRNA-based
Studies
|
| |
Hur,
Junbeom
CCS'16 ~ POSTER: Towards Privacy-Preserving
Biometric Identification in Cloud Computing
Hussain,
Syed Rafiul
CODASPY'17 ~ Seamless and Secure Bluetooth
LE Connection Migration
Hutchison,
David
CPS-SPC'16 ~ Achieving ICS Resilience and
Security through Granular Data Flow Management
ABAC'17
~ Verification of Resilience Policies that Assist Attribute Based
Access Control
Huth,
Christopher
CCS'16 ~ MEMS Gyroscopes as Physical Unclonable
Functions
TrustED'16
~ On the Energy Cost of Channel Based Key Agreement
Hutter,
Michael
TIS'16 ~ Threshold Implementations in Industry:
A Case Study on SHA-256
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |