Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


La Porta, Thomas

MIST'16 ~ Cyber Deception: Virtual Networks to Defend Insider Reconnaissance


Ladd, Watson

CCS'16 ~ A Protocol for Privately Reporting Ad Impressions at Scale


Lafourcade, Pascal

WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

ASIA CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol


Lagesse, Brent

IWSPA'17 ~ Analysis of Causative Attacks against SVMs Learning from Data Streams


Lain, Daniele

ASIA CCS'17 ~ Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP


Lamb, Christopher C.

MTD'16 ~ Dependency Graph Analysis and Moving Target Defense Selection


Lamba, Hemank

IWSPA'17 ~ Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software


Lamotte, Wim

WiSec'17 ~ POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability


Lanze, Fabian

CCS'16 ~ POSTER: Fingerprinting Tor Hidden Services


Lapets, Andrei

CCS'16 ~ DEMO: Integrating MPC in Big Data Workflows


Lass, Jessie

MIST'16 ~ Studying Naïve Users and the Insider Threat with SimpleFlow


Lau, Stephan

CCS'16 ~ POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems


Lauradoux, Cédric

CODASPY'17 ~ Decompression Quines and Anti-Viruses


Laxmi, Vijay

ASIA CCS'17 ~ POSTER: Detecting Inter-App Information Leakage Paths

ASIA CCS'17 ~ POSTER: Detection of Information Leaks via Reflection in Android Apps


Lebedev, Ilia

SACMAT'17 ~ Leveraging Hardware Isolation for Process Level Access Control & Authentication


Lee, Cheol Won

SDN-NFVSec'17 ~ Ultimate Forwarding Resilience in OpenFlow Networks


Lee, Ilkoo

CCS'16 ~ PIPSEA: A Practical IPsec Gateway on Embedded APUs


Lee, Jaejin

CCS'16 ~ PIPSEA: A Practical IPsec Gateway on Embedded APUs


Lee, Kyu Hyung

ASIA CCS'17 ~ DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging


Lee, Kyungroul

MIST'16 ~ Analysis on Manipulation of the MAC Address and Consequent Security Threats


Lee, Ruby B.

ASIA CCS'17 ~ DoS Attacks on Your Memory in Cloud

SACMAT'17 ~ Secure Pick Up: Implicit Authentication When You Start Using the Smartphone


Lee, Sanghak

SACMAT'17 ~ FACT: Functionality-centric Access Control System for IoT Programming Frameworks


Lee, Sangho

CCS'16 ~ Breaking Kernel Address Space Layout Randomization with Intel TSX

SACMAT'17 ~ FACT: Functionality-centric Access Control System for IoT Programming Frameworks


Lee, Taeho

ASIA CCS'17 ~ The Case for In-Network Replay Suppression


Lee, Wei-Han

SACMAT'17 ~ Secure Pick Up: Implicit Authentication When You Start Using the Smartphone


Lee, Wenke

CCS'16 ~ UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages


Lei, Cheng

ASIA CCS'17 ~ POSTER: Quantitative Security Assessment Method based on Entropy for Moving Target Defense


Lekies, Sebastian

CCS'16 ~ CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy


Lemke-Rust, Kerstin

TIS'16 ~ Practical Results of ECC Side Channel Countermeasures on an ARM Cortex M3 Processor


Lenders, Vincent

ASIA CCS'17 ~ Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics

ASIA CCS'17 ~ POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System

WiSec'17 ~ Secure Motion Verification using the Doppler Effect


Lernbeiß, Harald

SafeConfig'16 ~ An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks


Leu, Patrick

WiSec'17 ~ Secure Motion Verification using the Doppler Effect


Leurent, Gaëtan

CCS'16 ~ On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN


Levin, Dave

CCS'16 ~ Build It, Break It, Fix It: Contesting Secure Development

Levin, Dave

CCS'16 ~ Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem


Lewi, Kevin

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs

CCS'16 ~ Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds


Li, Bao

APKC'17 ~ KDM and Selective Opening Secure IBE Based on the LWE Problem


Li, Baochun

ASIA CCS'17 ~ EncKV: An Encrypted Key-value Store with Rich Queries


Li, Bo

CODASPY'17 ~ Large-Scale Identification of Malicious Singleton Files


Li, Chi-Yu

CCS'16 ~ New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks


Li, Fei

MTD'16 ~ Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks


Li, Hongda

SACMAT'17 ~ Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control

Li, Hongda

SDN-NFVSec'17 ~ Towards Effective Virtualization of Intrusion Detection Systems


Li, Jason

MTD'16 ~ Moving Target Defense - A Journey from Idea to Product


Li, Jiajie

SACMAT'17 ~ Mining Relationship-Based Access Control Policies


Li, Jin

SCC'17 ~ Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM


Li, Li

ASIA CCS'17 ~ POSTER: Detection of Information Leaks via Reflection in Android Apps


Li, Meng

SCC'17 ~ A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System

ASIA CCS'17 ~ POSTER: Quantitative Security Assessment Method based on Entropy for Moving Target Defense


Li, Mengyuan

CCS'16 ~ When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals


Li, Ninghui

CCS'16 ~ An Empirical Study of Mnemonic Sentence-based Password Generation Strategies

CCS'16 ~ On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols

ASIA CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android


Li, Peilong

SDN-NFVSec'17 ~ CareNet: Building a Secure Software-defined Infrastructure for Home-based Healthcare


Li, Tao

CCS'16 ~ DPSense: Differentially Private Crowdsourced Spectrum Sensing

CCS'16 ~ iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft


Li, Wenting

BCC'17 ~ Towards Scalable and Private Industrial Blockchains


Li, Xiang-Yang

CCS'16 ~ Instant and Robust Authentication and Key Agreement among Mobile Devices


Li, Xiaowei

CCS'16 ~ POSTER: Attack on Non-Linear Physical Unclonable Function


Li, Ximeng

PLAS'16 ~ Future-dependent Flow Policies with Prophetic Variables


Li, Yan

ASIA CCS'17 ~ Short Paper - What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses


Li, Yandong

SCC'17 ~ A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System


Li, Yifang

SACMAT'17 ~ Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks


Li, Yingjiu

ASIA CCS'17 ~ Short Paper - What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses


Li, Yuanjie

CCS'16 ~ New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks


Li, Yue

CODASPY'17 ~ Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments


Li, Zhichun

CCS'16 ~ High Fidelity Data Reduction for Big Data Security Dependency Analyses


Li, Zhou

CCS'16 ~ Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

CODASPY'17 ~ All Your VMs are Disconnected: Attacking Hardware Virtualized Network

WiSec'17 ~ Evading Android Runtime Analysis Through Detecting Programmed Interactions

SPSM'16 ~ What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps


Liang, Xiaohui

CCS'16 ~ When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals


Liang, Zhenkai

CCS'16 ~ "The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing


Liao, Xiaojing

CCS'16 ~ Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

CCS'16 ~ Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service


Lima, Antonio

CPS-SPC'16 ~ Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems


Lin, Dan

SACMAT'17 ~ Poster: A Location-Privacy Approach for Continuous Queries


Lin, Feng

CCS'16 ~ My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers


Lin, Zhiqiang

CODASPY'17 ~ PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace

ASIA CCS'17 ~ SGX-Log: Securing System Logs with SGX


Lin, Zhiyuan

CODASPY'17 ~ Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF)


Lindell, Yehuda

CCS'16 ~ Attribute-based Key Exchange with General Policies

CCS'16 ~ Demo: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation

CCS'16 ~ High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority

CCS'16 ~ Optimizing Semi-Honest Secure Multiparty Computation for the Internet


Lindemann, Jens

AISec'16 ~ Tracked Without a Trace: Linking Sessions of Users by Unsupervised Learning of Patterns in Their DNS Traffic


Lindorfer, Martina

CCS'16 ~ Drammer: Deterministic Rowhammer Attacks on Mobile Platforms


Lindström, Malin

CCSW'16 ~ Executing Boolean Queries on an Encrypted Bitmap Index


Lioy, Antonio

MIST'16 ~ Online and Offline Security Policy Assessment


Lipp, Moritz

CCS'16 ~ Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR


Liu, Daiping

CCS'16 ~ All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records


Liu, Fang

ASIA CCS'17 ~ Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications

CODASPY'17 ~ Prioritized Analysis of Inter-App Communication Risks


Liu, Feng-Hao

CCS'16 ~ Practical Non-Malleable Codes from l-more Extractable Hash Functions


Liu, Jed

CCS'16 ~ Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency


Liu, Jiafa

CPSS'17 ~ A Functional Co-Design towards Safe and Secure Vehicle Platooning


Liu, Jian

ASIA CCS'17 ~ The Circle Game: Scalable Private Membership Test Using Trusted Hardware


Liu, Jiayong

ASIA CCS'17 ~ Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions


Liu, Junyi

CCS'16 ~ When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals


Liu, Peng

CCS'16 ~ Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback

CCS'16 ~ CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump

MTD'16 ~ Demo: A Symbolic N-Variant System

MTD'16 ~ MTD 2016 Chairs' Welcome

CCS'16 ~ MTD 2016: Third ACM Workshop on Moving Target Defense


Liu, Shuangping

CCS'16 ~ CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites


Liu, Wei

SPSM'16 ~ What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps


Liu, Xiangyu

WiSec'17 ~ Evading Android Runtime Analysis Through Detecting Programmed Interactions


Liu, Xiaochen

SACMAT'17 ~ Secure Pick Up: Implicit Authentication When You Start Using the Smartphone


Liu, Xiaoning

SCC'17 ~ Enabling Privacy-assured Mobile Advertisement Targeting and Dissemination


Liu, Yannan

CCS'16 ~ On Code Execution Tracking via Power Side-Channel


Liu, Yao

CCS'16 ~ When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals


Liu, Yushan

CCS'16 ~ SmartWalk: Enhancing Social Network Security via Adaptive Random Walks


Liu, Zhuotao

CCS'16 ~ MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet


Lo, Chaomei

SafeConfig'16 ~ A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks


Lo Re, Davide

WPES'17 ~ Automatic Assessment of Website Compliance to the European Cookie Law with CooLCheck


Lobo, Jorge

SACMAT'17 ~ A Datalog Framework for Modeling Relationship-based Access Control Policies


Loch, Adrian

WiSec'17 ~ DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems


Lodha, Sachin

CCS'16 ~ POSTER: Improved Markov Strength Meters for Passwords

CCS'16 ~ POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat

ASIA CCS'17 ~ Short Paper - Pass-O: A Proposal to Improve the Security of Pattern Unlock Scheme


Lokam, Satya

BCC'17 ~ BCC'17 Chairs' Welcome


Lou, Wenjing

TrustED'16 ~ Looks Good To Me: Authentication for Augmented Reality

WiSec'17 ~ Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding


Lu, Jiqiang

ASIA CCS'17 ~ Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms


Lu, Kangjie

CCS'16 ~ UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages


Lu, Long

ASIA CCS'17 ~ Foreword

ASIA CCS'17 ~ Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems

CCS'16 ~ Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016)

SPSM'16 ~ SPSM 2016 Chairs' Welcome


Lu, Songwu

CCS'16 ~ New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks


Lu, Xianhui

APKC'17 ~ KDM and Selective Opening Secure IBE Based on the LWE Problem


Lu, Yang

BCC'17 ~ Enabling the Sharing Economy: Privacy Respecting Contract based on Public Blockchain

BCC'17 ~ Unraveling Blockchain-based Crypto-currency System Supporting Oblivious Transactions: A Formalized Approach


Lucaci, Ciprian

SPRO'16 ~ VOT4CS: A Virtualization Obfuscation Tool for C#


Lueks, Wouter

WPES'17 ~ Vote to Link: Recovering from Misbehaving Anonymous Users


Luh, Robert

SACMAT'17 ~ Poster: Design of an Anomaly-based Threat Detection & Explication System


Lui, John C. S.

CCS'16 ~ TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime


Luo, Feng

IWSPA'17 ~ MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks


Luo, Yan

SDN-NFVSec'17 ~ CareNet: Building a Secure Software-defined Infrastructure for Home-based Healthcare


Lupu, Emil C.

SACMAT'17 ~ Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis


Lüttgen, Gerald

CCS'16 ~ POSTER: Identifying Dynamic Data Structures in Malware


Luu, Loi

CCS'16 ~ A Secure Sharding Protocol for Open Blockchains

CCS'16 ~ Making Smart Contracts Smarter


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)