Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


Ibrahim, Ahmad

WiSec'17 ~ DARPA: Device Attestation Resilient to Physical Attacks

WiSec'17 ~ POSTER: Toward a Secure and Scalable Attestation

CCS'16 ~ SANA: Secure and Scalable Aggregate Network Attestation

SPRO'16 ~ StIns4CS: A State Inspection Tool for C#


Iklody, Andras

WISCS'16 ~ MISP - The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform


Ikuse, Tomonori

CCS'16 ~ POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity


Ilia, Panagiotis

CODASPY'17 ~ SAMPAC: Socially-Aware collaborative Multi-Party Access Control


Imine, Abdessamad

WPES'17 ~ Detecting Communities under Differential Privacy


Imre, Sándor

WPES'17 ~ An Efficient and Robust Social Network De-anonymization Attack


Inci, Mehmet Sinan

ASIA CCS'17 ~ Hit by the Bus: QoS Degradation Attack on Android


Invernizzi, Luca

ASIA CCS'17 ~ Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions


Ioannidis, Sotiris

CODASPY'17 ~ SAMPAC: Socially-Aware collaborative Multi-Party Access Control


Isaakidis, Marios

WPES'17 ~ UnlimitID: Privacy-Preserving Federated Identity Management using Algebraic MACs


Ishai, Yuval

CCS'16 ~ Function Secret Sharing: Improvements and Extensions


Ishida, Ai

ASIA CCS'17 ~ Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction


Islam, Md Morshedul

CCS'16 ~ POSTER: A Behavioural Authentication System for Mobile Users


Iwamura, Makoto

CCS'16 ~ POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity


Izmailov, Rauf

IWSPA'17 ~ Feature Cultivation in Privileged Information-augmented Detection


Jaeger, Trent

SafeConfig'16 ~ Configuring Software and Systems for Defense-in-Depth

SACMAT'17 ~ On Risk in Access Control Enforcement


Jafarian, Jafar Haadi

MTD'16 ~ Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers


Jajodia, Sushil

MTD'16 ~ A Moving Target Defense Approach to Disrupting Stealthy Botnets

SafeConfig'16 ~ AHEAD: A New Architecture for Active Defense


Jakaria, A.H.M.

SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource Allocation using Network Function Virtualization


Jakobsen, Jakob

SPSM'16 ~ On the CCA (in)Security of MTProto


Jana, Suman

CCS'16 ~ SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning


Janc, Artur

CCS'16 ~ CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy


Jandl-Scherf, Bernhard

SafeConfig'16 ~ An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks


Jang, Yeongjin

CCS'16 ~ Breaking Kernel Address Space Layout Randomization with Intel TSX


Janicke, Helge

SACMAT'17 ~ Poster: Design of an Anomaly-based Threat Detection & Explication System


Jansen, Kai

ASIA CCS'17 ~ POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System


Jansen, Rob

CCS'16 ~ Safely Measuring Tor


Janson, Christian

SCC'17 ~ Cloud Storage File Recoverability


Jardine, William

CPS-SPC'16 ~ SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection


Jee, Kangkook

CCS'16 ~ High Fidelity Data Reduction for Big Data Security Dependency Analyses


Jeon, Yuseok

CCS'16 ~ TypeSan: Practical Type Confusion Detection


Jha, Sadhana

SACMAT'17 ~ Poster: Constrained Policy Mining in Attribute Based Access Control


Jha, Sanjay

ASIA CCS'17 ~ WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks


Jha, Somesh

ASIA CCS'17 ~ Practical Black-Box Attacks against Machine Learning

ASIA CCS'17 ~ Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems


Ji, Shouling

CCS'16 ~ SmartWalk: Enhancing Social Network Security via Adaptive Random Walks


Jia, Dingding

APKC'17 ~ KDM and Selective Opening Secure IBE Based on the LWE Problem


Jia, Xiaohua

ASIA CCS'17 ~ EncKV: An Encrypted Key-value Store with Rich Queries


Jia, Yaoqi

CCS'16 ~ "The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing


Jia, Yunhan Jack

CCS'16 ~ The Misuse of Android Unix Domain Sockets and Security Implications


Jiang, Guofei

CCS'16 ~ High Fidelity Data Reduction for Big Data Security Dependency Analyses


Jiang, Jian

CCS'16 ~ Host of Troubles: Multiple Host Ambiguities in HTTP Implementations


Jiang, Wei

SACMAT'17 ~ Poster: A Location-Privacy Approach for Continuous Queries


Jiang, Zoe L.

SCC'17 ~ Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM


Jin, Dong

SDN-NFVSec'17 ~ Ultimate Forwarding Resilience in OpenFlow Networks


Jin, Hao

CCS'16 ~ MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet


Jin, Hongxia

CCS'16 ~ EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation

SACMAT'17 ~ Secure Pick Up: Implicit Authentication When You Start Using the Smartphone


Jin, Jiong

CPSS'17 ~ ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability


Jin, Xiaocong

CCS'16 ~ DPSense: Differentially Private Crowdsourced Spectrum Sensing

CCS'16 ~ iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft


Jing, Wenpan

APKC'17 ~ KDM and Selective Opening Secure IBE Based on the LWE Problem


Jo, Gangwon

CCS'16 ~ PIPSEA: A Practical IPsec Gateway on Embedded APUs


Johansen, Christian

CCS'16 ~ DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking


Johns, Martin

CCS'16 ~ POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications


Johnson, Aaron

CCS'16 ~ Safely Measuring Tor


Johnson, Claiborne

SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language

SACMAT'17 ~ Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures


Johnson, John R.

SafeConfig'16 ~ A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks


Johnson, Ryan

MIST'16 ~ Studying Naïve Users and the Insider Threat with SimpleFlow


Jonker, Willem

WISCS'16 ~ Private Sharing of IOCs and Sightings


Joon Ahn, Gail

CODASPY'17 ~ Deep Android Malware Detection


Jøsang, Audun

CCS'16 ~ DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking


Judmayer, Aljosha

CCS'16 ~ Condensed Cryptographic Currencies Crash Course (C5)


Juels, Ari

CCS'16 ~ The Ring of Gyges: Investigating the Future of Criminal Smart Contracts

CCS'16 ~ Town Crier: An Authenticated Data Feed for Smart Contracts


Jung, Jaeyeon

ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps


Jung, Wooken

CCS'16 ~ PIPSEA: A Practical IPsec Gateway on Embedded APUs


Kaafar, Mohamed Ali

ASIA CCS'17 ~ WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks


Kahn, Michael G.

ABAC'17 ~ Attribute Based Access Control for Healthcare Resources


Kalodner, Harry

CCS'16 ~ On the Instability of Bitcoin without the Block Reward


Kammüller, Florian

MIST'16 ~ Towards Formal Analysis of Insider Threats for Auctions


Kang, BooJoong

CODASPY'17 ~ Deep Android Malware Detection


Kannan, Pravein G.

SDN-NFVSec'17 ~ Enabling SDN Experimentation in Network Testbeds


Kanonov, Uri

SPSM'16 ~ Secure Containers in Android: The Samsung KNOX Case Study


Kantarcioglu, Murat

CCS'16 ~ Adversarial Data Mining: Big Data Meets Cyber Security

SCC'17 ~ SCC'17 Chairs' Welcome


Kantchelian, Alex

CCS'16 ~ PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-of-Registration


Kapusta, Katarzyna

CCS'16 ~ POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation


Karafili, Erisa

SACMAT'17 ~ Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis


Karame, Ghassan O.

CCSW'16 ~ On Information Leakage in Deduplicated Storage Systems

CCS'16 ~ On the Security and Performance of Proof of Work Blockchains

CCS'16 ~ On the Security and Scalability of Bitcoin's Blockchain

SCC'17 ~ Reconciling Security and Functional Requirements in Multi-tenant Clouds

ASIA CCS'17 ~ Sharing Proofs of Retrievability across Tenants

BCC'17 ~ Towards Scalable and Private Industrial Blockchains


Karande, Vishal

ASIA CCS'17 ~ SGX-Log: Securing System Logs with SGX


Kastner, Wolfgang

MIST'16 ~ Discovering Insider Threats from Log Data with High-Performance Bioinformatics Tools


Kate, Aniket

CCS'16 ~ Introduction to Credit Networks: Security, Privacy, and Applications


Katsikas, Sokratis K.

CPSS'17 ~ Cyber Security of the Autonomous Ship


Katwala, Gopi

ABAC'17 ~ Imposing Fine-grain Next Generation Access Control over Database Queries


Katz, Jonathan

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs


Katzenbeisser, Stefan

CCS'16 ~ CCS 2016 General Chair's Welcome

WPES'17 ~ Disguised Chromium Browser: Robust Browser, Flash and Canvas Fingerprinting Protection

WiSec'17 ~ Trust the Wire, They Always Told Me! On Practical Non-Destructive Wire-Tap Attacks Against Ethernet


Kaur, Jasleen

WiSec'17 ~ Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic?


Keidar, Idit

MIST'16 ~ WatchIT: Who Watches Your IT Guy?


Kellaris, Georgios

CCS'16 ~ Generic Attacks on Secure Outsourced Databases


Keller, Eric

SDN-NFVSec'17 ~ CommunityGuard: A Crowdsourced Home Cyber-Security System

SDN-NFVSec'17 ~ Trusted Click: Overcoming Security issues of NFV in the Cloud


Keller, Marcel

CCS'16 ~ MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer


Kelly, Daniel M.

SPRO'16 ~ ROP Gadget Prevalence and Survival under Compiler-based Binary Diversification Schemes


Keoh, Sye Loong

CPSS'17 ~ ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability


Kerber, Manfred

MIST'16 ~ Towards Formal Analysis of Insider Threats for Auctions


Kerik, Liisi

CCS'16 ~ Alternative Implementations of Secure Real Numbers


Keromytis, Angelos D.

CCS'16 ~ Protecting Insecure Communications with Topology-aware Network Tunnels

CCS'16 ~ SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning

WPES'17 ~ That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms


Kerschbaum, Florian

CCSW'16 ~ Encrypting Analytical Web Applications

WISCS'16 ~ Foreword

CCSW'16 ~ Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage

CCS'16 ~ WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security


Khalil, Issa

CCS'16 ~ Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy


Khan, Latifur

ASIA CCS'17 ~ SGX-Log: Securing System Logs with SGX


Khandaker, Mustakimur

ASIA CCS'17 ~ Pinpointing Vulnerabilities


Khanpour, Hamed

SACMAT'17 ~ Towards a Top-down Policy Engineering Framework for Attribute-based Access Control


Kheir, Nizar

MIST'16 ~ A Grey-Box Approach for Detecting Malicious User Interactions in Web Applications

MIST'16 ~ A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems

ASIA CCS'17 ~ BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic

CCS'16 ~ PhishEye: Live Monitoring of Sandboxed Phishing Kits


Khoumsi, Ahmed

CCSW'16 ~ Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments


Kiayias, Aggelos

CCS'16 ~ Practical Non-Malleable Codes from l-more Extractable Hash Functions

CCS'16 ~ SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning


Kiltz, Eike

CCS'16 ~ On the Provable Security of (EC)DSA Signatures


Kim, Hanjun

SACMAT'17 ~ FACT: Functionality-centric Access Control System for IoT Programming Frameworks


Kim, Hyoungshick

ASIA CCS'17 ~ Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks

CCS'16 ~ POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack


Kim, Jihun

SACMAT'17 ~ FACT: Functionality-centric Access Control System for IoT Programming Frameworks


Kim, Jong

SACMAT'17 ~ FACT: Functionality-centric Access Control System for IoT Programming Frameworks


Kim, Jongkil

ASIA CCS'17 ~ An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption


Kim, Suhyun

MIST'16 ~ Analysis on Manipulation of the MAC Address and Consequent Security Threats


Kim, Taehun

ASIA CCS'17 ~ Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial Apps


Kim, Taesoo

CCS'16 ~ Breaking Kernel Address Space Layout Randomization with Intel TSX

CCS'16 ~ UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages


Kim, Yongdae

WiSec'17 ~ Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4


Kinder, Johannes

CODASPY'17 ~ DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware


King, William P.

CCS'16 ~ Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets


Kinkelin, Holger

WISCS'16 ~ Collaborative Incident Handling Based on the Blackboard-Pattern


Kirchler, Matthias

AISec'16 ~ Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic


Kitamura, Takuya

APKC'17 ~ One-time Programs with Cloud Storage and Its Application to Electronic Money


Klapper, Patrick

WiSec'17 ~ Trust the Wire, They Always Told Me! On Practical Non-Destructive Wire-Tap Attacks Against Ethernet


Klebanov, Vladimir

CCS'16 ~ Practical Detection of Entropy Loss in Pseudo-Random Number Generators


Kleinmann, Amit

CPS-SPC'16 ~ Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis


Klick, Johannes

CCS'16 ~ POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems


Kloft, Marius

AISec'16 ~ Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic


Klonowski, Marek

ASIA CCS'17 ~ Towards Extending Noiseless Privacy - Dependent Data and More Practical Approach


Klose, Robin

SPSM'16 ~ Analyzing TETRA Location Privacy and Network Availability


Kluczniak, Kamil

APKC'17 ~ Two-Move and Setup-Free Blind Signatures with Perfect Blindness


Ko, Hajoon

CPSS'17 ~ ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability


Kobeissi, Nadim

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper


Koch, William

MTD'16 ~ Markov Modeling of Moving Target Defense Games

ASIA CCS'17 ~ PAYBREAK: Defense Against Cryptographic Ransomware


Kohls, Katharina Siobhan

ASIA CCS'17 ~ POSTER: Traffic Analysis Attacks in Anonymity Networks


Kohlweiss, Markulf

CCS'16 ~ Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data


Kolesnikov, Vladimir

CCS'16 ~ Attribute-based Key Exchange with General Policies

CCS'16 ~ Efficient Batched Oblivious PRF with Applications to Private Set Intersection


Koller, Ben

MTD'16 ~ Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks


Kollios, George

CCS'16 ~ Generic Attacks on Secure Outsourced Databases


Kolodenker, Eugene

ASIA CCS'17 ~ PAYBREAK: Defense Against Cryptographic Ransomware


Kongsgård, Kyrre W.

IWSPA'17 ~ An Internal/Insider Threat Score for Data Loss Prevention and Detection


Konstantinou, Charalambos

CPS-SPC'16 ~ A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation


Kontaxis, Georgios

CCS'16 ~ Protecting Insecure Communications with Topology-aware Network Tunnels


Korak, Thomas

TIS'16 ~ Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

WiSec'17 ~ Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android


Kosba, Ahmed

CCS'16 ~ The Ring of Gyges: Investigating the Future of Criminal Smart Contracts


Kostiainen, Kari

CODASPY'17 ~ Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception

SPSM'16 ~ Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking


Kowalski, Robin

IWSPA'17 ~ MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks


Krämer, Benjamin

SPRO'16 ~ VOT4CS: A Virtualization Obfuscation Tool for C#


Krämer, Martin

CCS'16 ~ POSTER: Weighing in eHealth Security: A Security and Privacy Study of Smart Scales


Kranch, Michael

CODASPY'17 ~ Identifying HTTPS-Protected Netflix Videos in Real-Time


Krawczyk, Hugo

CCS'16 ~ A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)

CCS'16 ~ Attribute-based Key Exchange with General Policies


Krips, Toomas

CCS'16 ~ Alternative Implementations of Secure Real Numbers


Krishnamurthi, Shriram

SPSM'16 ~ On a (Per)Mission: Building Privacy Into the App Marketplace


Krishnamurthy, Srikanth V.

MIST'16 ~ Cyber Deception: Virtual Networks to Defend Insider Reconnaissance


Krishnan, Ram

ABAC'17 ~ Attribute Transformation for Attribute-Based Access Control

ABAC'17 ~ Foreword


Krol, Kat

WPES'17 ~ Control versus Effort in Privacy Warnings for Webforms


Kross, Sean

CCS'16 ~ How I Learned to be Secure: A Census-Representative Survey of Security Advice Sources and Behavior


Krotofil, Marina

CPS-SPC'16 ~ Achieving ICS Resilience and Security through Granular Data Flow Management

CPSS'17 ~ Cyber-Physical System Discovery - Reverse Engineering Physical Processes


Kruegel, Christopher

CCS'16 ~ CCS 2016 Program Chairs' Welcome

ASIA CCS'17 ~ Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions


Krupp, Johannes

CCS'16 ~ Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks


Krzywiecki, Łukasz

SCC'17 ~ Security of Okamoto Identification Scheme - A Defense against Ephemeral Key Leakage and Setup


Kuczenski, Brandon

CODASPY'17 ~ Towards Practical Privacy-Preserving Life Cycle Assessment Computations


Kulatova, Natalia

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper


Kumar, Amrit

CODASPY'17 ~ Decompression Quines and Anti-Viruses


Kumar, Nikash

SDN-NFVSec'17 ~ Dynamic Defense Provision via Network Functions Virtualization


Kumaraguru, Ponnurangam

SPSM'16 ~ Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks


Kumaresan, Ranjit

CCS'16 ~ Amortizing Secure Computation with Penalties

CCS'16 ~ Efficient Batched Oblivious PRF with Applications to Private Set Intersection

CCS'16 ~ Improvements to Secure Computation with Penalties


Kunihiro, Noboru

ASIA CCS'17 ~ Mis-operation Resistant Searchable Homomorphic Encryption


Künnemann, Robert

CCS'16 ~ Computational Soundness for Dalvik Bytecode


Küpçü, Alptekin

CCSW'16 ~ Generic Efficient Dynamic Proofs of Retrievability


Kusano, Kosuke

ASIA CCS'17 ~ Privacy-preserving and Optimal Interval Release for Disease Susceptibility


Küsters, Ralf

CCS'16 ~ A Comprehensive Formal Security Analysis of OAuth 2.0


Kutylowski, Miroslaw

SCC'17 ~ Security of Okamoto Identification Scheme - A Defense against Ephemeral Key Leakage and Setup


Kwag, Sungsu

ASIA CCS'17 ~ Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge Attacks


Kwiotek, Jan-Pascal

SPSM'16 ~ Analyzing TETRA Location Privacy and Network Availability


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)