 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
La
Porta, Thomas
MIST'16 ~ Cyber Deception: Virtual Networks
to Defend Insider Reconnaissance
Ladd,
Watson
CCS'16 ~ A Protocol for Privately Reporting
Ad Impressions at Scale
Lafourcade,
Pascal
WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud
Resistant Distance-Bounding Protocol
ASIA
CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous
Distance-bounding Protocol
Lagesse,
Brent
IWSPA'17 ~ Analysis of Causative Attacks
against SVMs Learning from Data Streams
|
| |
Lain,
Daniele
ASIA CCS'17 ~ Don't Skype & Type! Acoustic
Eavesdropping in Voice-Over-IP
Lamb,
Christopher C.
MTD'16 ~ Dependency Graph Analysis and
Moving Target Defense Selection
Lamba,
Hemank
IWSPA'17 ~ Model-based Cluster Analysis
for Identifying Suspicious Activity Sequences in Software
Lamotte,
Wim
WiSec'17 ~ POSTER: Assessing the Impact
of 802.11 Vulnerabilities using Wicability
|
| |
Lanze,
Fabian
CCS'16 ~ POSTER: Fingerprinting Tor Hidden
Services
Lapets,
Andrei
CCS'16 ~ DEMO: Integrating MPC in Big Data
Workflows
Lass,
Jessie
MIST'16 ~ Studying Naïve Users and the
Insider Threat with SimpleFlow
Lau,
Stephan
CCS'16 ~ POSTER: Towards Highly Interactive
Honeypots for Industrial Control Systems
Lauradoux,
Cédric
CODASPY'17 ~ Decompression Quines and Anti-Viruses
|
| |
Laxmi,
Vijay
ASIA CCS'17 ~ POSTER: Detecting Inter-App
Information Leakage Paths
ASIA
CCS'17 ~ POSTER: Detection of Information Leaks via Reflection
in Android Apps
Lebedev,
Ilia
SACMAT'17 ~ Leveraging Hardware Isolation
for Process Level Access Control & Authentication
Lee,
Cheol Won
SDN-NFVSec'17 ~ Ultimate Forwarding Resilience
in OpenFlow Networks
Lee,
Ilkoo
CCS'16 ~ PIPSEA: A Practical IPsec Gateway
on Embedded APUs
Lee,
Jaejin
CCS'16 ~ PIPSEA: A Practical IPsec Gateway
on Embedded APUs
Lee,
Kyu Hyung
ASIA CCS'17 ~ DroidForensics: Accurate
Reconstruction of Android Attacks via Multi-layer Forensic Logging
|
| |
Lee,
Kyungroul
MIST'16 ~ Analysis on Manipulation of the
MAC Address and Consequent Security Threats
Lee,
Ruby B.
ASIA CCS'17 ~ DoS Attacks on Your Memory
in Cloud
SACMAT'17
~ Secure Pick Up: Implicit Authentication When You Start Using
the Smartphone
Lee,
Sanghak
SACMAT'17 ~ FACT: Functionality-centric
Access Control System for IoT Programming Frameworks
Lee,
Sangho
CCS'16 ~ Breaking Kernel Address Space
Layout Randomization with Intel TSX
SACMAT'17
~ FACT: Functionality-centric Access Control System for IoT Programming
Frameworks
Lee,
Taeho
ASIA CCS'17 ~ The Case for In-Network Replay
Suppression
Lee,
Wei-Han
SACMAT'17 ~ Secure Pick Up: Implicit Authentication
When You Start Using the Smartphone
|
| |
Lee,
Wenke
CCS'16 ~ UniSan: Proactive Kernel Memory
Initialization to Eliminate Data Leakages
Lei,
Cheng
ASIA CCS'17 ~ POSTER: Quantitative Security
Assessment Method based on Entropy for Moving Target Defense
Lekies,
Sebastian
CCS'16 ~ CSP Is Dead, Long Live CSP! On
the Insecurity of Whitelists and the Future of Content Security Policy
Lemke-Rust,
Kerstin
TIS'16 ~ Practical Results of ECC Side
Channel Countermeasures on an ARM Cortex M3 Processor
Lenders,
Vincent
ASIA CCS'17 ~ Evaluating Behavioral Biometrics
for Continuous Authentication: Challenges and Metrics
ASIA
CCS'17 ~ POSTER: Localization of Spoofing Devices using a Large-scale
Air Traffic Surveillance System
WiSec'17
~ Secure Motion Verification using the Doppler Effect
Lernbeiß,
Harald
SafeConfig'16 ~ An Iterative and Toolchain-Based
Approach to Automate Scanning and Mapping Computer Networks
|
| |
Leu,
Patrick
WiSec'17 ~ Secure Motion Verification using
the Doppler Effect
Leurent,
Gaëtan
CCS'16 ~ On the Practical (In-)Security
of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
Levin,
Dave
CCS'16 ~ Build It, Break It, Fix It: Contesting
Secure Development
Levin,
Dave
CCS'16 ~ Measurement and Analysis of Private
Key Sharing in the HTTPS Ecosystem
Lewi,
Kevin
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
CCS'16
~ Order-Revealing Encryption: New Constructions, Applications,
and Lower Bounds
Li,
Bao
APKC'17 ~ KDM and Selective Opening Secure
IBE Based on the LWE Problem
Li,
Baochun
ASIA CCS'17 ~ EncKV: An Encrypted Key-value
Store with Rich Queries
|
| |
Li,
Bo
CODASPY'17 ~ Large-Scale Identification
of Malicious Singleton Files
Li,
Chi-Yu
CCS'16 ~ New Security Threats Caused by
IMS-based SMS Service in 4G LTE Networks
Li,
Fei
MTD'16 ~ Towards Cost-Effective Moving
Target Defense Against DDoS and Covert Channel Attacks
Li,
Hongda
SACMAT'17 ~ Poster: On the Safety and Efficiency
of Virtual Firewall Elasticity Control
Li,
Hongda
SDN-NFVSec'17 ~ Towards Effective Virtualization
of Intrusion Detection Systems
Li,
Jason
MTD'16 ~ Moving Target Defense - A Journey
from Idea to Product
Li,
Jiajie
SACMAT'17 ~ Mining Relationship-Based Access
Control Policies
|
| |
Li,
Jin
SCC'17 ~ Secure Dot Product of Outsourced
Encrypted Vectors and its Application to SVM
Li,
Li
ASIA CCS'17 ~ POSTER: Detection of Information
Leaks via Reflection in Android Apps
Li,
Meng
SCC'17 ~ A Privacy-Preserving and Vessel
Authentication Scheme Using Automatic Identification System
ASIA
CCS'17 ~ POSTER: Quantitative Security Assessment Method based
on Entropy for Moving Target Defense
Li,
Mengyuan
CCS'16 ~ When CSI Meets Public WiFi: Inferring
Your Mobile Phone Password via WiFi Signals
Li,
Ninghui
CCS'16 ~ An Empirical Study of Mnemonic
Sentence-based Password Generation Strategies
CCS'16
~ On the Security and Usability of Segment-based Visual Cryptographic
Authentication Protocols
ASIA
CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface
Analysis of Access Control Policy for Security Enhanced Android
Li,
Peilong
SDN-NFVSec'17 ~ CareNet: Building a Secure
Software-defined Infrastructure for Home-based Healthcare
|
| |
Li,
Tao
CCS'16 ~ DPSense: Differentially Private
Crowdsourced Spectrum Sensing
CCS'16
~ iLock: Immediate and Automatic Locking of Mobile Devices against
Data Theft
Li,
Wenting
BCC'17 ~ Towards Scalable and Private Industrial
Blockchains
Li,
Xiang-Yang
CCS'16 ~ Instant and Robust Authentication
and Key Agreement among Mobile Devices
Li,
Xiaowei
CCS'16 ~ POSTER: Attack on Non-Linear Physical
Unclonable Function
Li,
Ximeng
PLAS'16 ~ Future-dependent Flow Policies
with Prophetic Variables
Li,
Yan
ASIA CCS'17 ~ Short Paper - What You See
is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart
Glasses
|
| |
Li,
Yandong
SCC'17 ~ A Privacy-Preserving and Vessel
Authentication Scheme Using Automatic Identification System
Li,
Yifang
SACMAT'17 ~ Towards PII-based Multiparty
Access Control for Photo Sharing in Online Social Networks
Li,
Yingjiu
ASIA CCS'17 ~ Short Paper - What You See
is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart
Glasses
Li,
Yuanjie
CCS'16 ~ New Security Threats Caused by
IMS-based SMS Service in 4G LTE Networks
Li,
Yue
CODASPY'17 ~ Ripple: Reflection Analysis
for Android Apps in Incomplete Information Environments
Li,
Zhichun
CCS'16 ~ High Fidelity Data Reduction for
Big Data Security Dependency Analyses
|
| |
Li,
Zhou
CCS'16 ~ Acing the IOC Game: Toward Automatic
Discovery and Analysis of Open-Source Cyber Threat Intelligence
CODASPY'17
~ All Your VMs are Disconnected: Attacking Hardware Virtualized
Network
WiSec'17
~ Evading Android Runtime Analysis Through Detecting Programmed
Interactions
SPSM'16
~ What You See Isn't Always What You Get: A Measurement Study
of Usage Fraud on Android Apps
Liang,
Xiaohui
CCS'16 ~ When CSI Meets Public WiFi: Inferring
Your Mobile Phone Password via WiFi Signals
Liang,
Zhenkai
CCS'16 ~ "The Web/Local" Boundary Is Fuzzy:
A Security Study of Chrome's Process-based Sandboxing
Liao,
Xiaojing
CCS'16 ~ Acing the IOC Game: Toward Automatic
Discovery and Analysis of Open-Source Cyber Threat Intelligence
CCS'16
~ Lurking Malice in the Cloud: Understanding and Detecting Cloud
Repository as a Malicious Service
Lima,
Antonio
CPS-SPC'16 ~ Towards Safe and Secure Autonomous
and Cooperative Vehicle Ecosystems
Lin,
Dan
SACMAT'17 ~ Poster: A Location-Privacy
Approach for Continuous Queries
|
| |
Lin,
Feng
CCS'16 ~ My Smartphone Knows What You Print:
Exploring Smartphone-based Side-channel Attacks Against 3D Printers
Lin,
Zhiqiang
CODASPY'17 ~ PT-CFI: Transparent Backward-Edge
Control Flow Violation Detection Using Intel Processor Trace
ASIA
CCS'17 ~ SGX-Log: Securing System Logs with SGX
Lin,
Zhiyuan
CODASPY'17 ~ Graph Automorphism-Based,
Semantics-Preserving Security for the Resource Description Framework
(RDF)
Lindell,
Yehuda
CCS'16 ~ Attribute-based Key Exchange with
General Policies
CCS'16
~ Demo: High-Throughput Secure Three-Party Computation of Kerberos
Ticket Generation
CCS'16
~ High-Throughput Semi-Honest Secure Three-Party Computation
with an Honest Majority
CCS'16
~ Optimizing Semi-Honest Secure Multiparty Computation for the
Internet
Lindemann,
Jens
AISec'16 ~ Tracked Without a Trace: Linking
Sessions of Users by Unsupervised Learning of Patterns in Their DNS
Traffic
Lindorfer,
Martina
CCS'16 ~ Drammer: Deterministic Rowhammer
Attacks on Mobile Platforms
|
| |
Lindström,
Malin
CCSW'16 ~ Executing Boolean Queries on
an Encrypted Bitmap Index
Lioy,
Antonio
MIST'16 ~ Online and Offline Security Policy
Assessment
Lipp,
Moritz
CCS'16 ~ Prefetch Side-Channel Attacks:
Bypassing SMAP and Kernel ASLR
Liu,
Daiping
CCS'16 ~ All Your DNS Records Point to
Us: Understanding the Security Threats of Dangling DNS Records
Liu,
Fang
ASIA CCS'17 ~ Collusive Data Leak and More:
Large-scale Threat Analysis of Inter-app Communications
CODASPY'17
~ Prioritized Analysis of Inter-App Communication Risks
Liu,
Feng-Hao
CCS'16 ~ Practical Non-Malleable Codes
from l-more Extractable Hash Functions
|
| |
Liu,
Jed
CCS'16 ~ Safe Serializable Secure Scheduling:
Transactions and the Trade-Off Between Security and Consistency
Liu,
Jiafa
CPSS'17 ~ A Functional Co-Design towards
Safe and Secure Vehicle Platooning
Liu,
Jian
ASIA CCS'17 ~ The Circle Game: Scalable
Private Membership Test Using Trusted Hardware
Liu,
Jiayong
ASIA CCS'17 ~ Gossip: Automatically Identifying
Malicious Domains from Mailing List Discussions
Liu,
Junyi
CCS'16 ~ When CSI Meets Public WiFi: Inferring
Your Mobile Phone Password via WiFi Signals
Liu,
Peng
CCS'16 ~ Call Me Back! Attacks on System
Server and System Apps in Android through Synchronous Callback
CCS'16
~ CREDAL: Towards Locating a Memory Corruption Vulnerability
with Your Core Dump
MTD'16
~ Demo: A Symbolic N-Variant System
MTD'16
~ MTD 2016 Chairs' Welcome
CCS'16
~ MTD 2016: Third ACM Workshop on Moving Target Defense
|
| |
Liu,
Shuangping
CCS'16 ~ CSPAutoGen: Black-box Enforcement
of Content Security Policy upon Real-world Websites
Liu,
Wei
SPSM'16 ~ What You See Isn't Always What
You Get: A Measurement Study of Usage Fraud on Android Apps
Liu,
Xiangyu
WiSec'17 ~ Evading Android Runtime Analysis
Through Detecting Programmed Interactions
Liu,
Xiaochen
SACMAT'17 ~ Secure Pick Up: Implicit Authentication
When You Start Using the Smartphone
Liu,
Xiaoning
SCC'17 ~ Enabling Privacy-assured Mobile
Advertisement Targeting and Dissemination
Liu,
Yannan
CCS'16 ~ On Code Execution Tracking via
Power Side-Channel
|
| |
Liu,
Yao
CCS'16 ~ When CSI Meets Public WiFi: Inferring
Your Mobile Phone Password via WiFi Signals
Liu,
Yushan
CCS'16 ~ SmartWalk: Enhancing Social Network
Security via Adaptive Random Walks
Liu,
Zhuotao
CCS'16 ~ MiddlePolice: Toward Enforcing
Destination-Defined Policies in the Middle of the Internet
Lo,
Chaomei
SafeConfig'16 ~ A Graph-Based Impact Metric
for Mitigating Lateral Movement Cyber Attacks
Lo
Re, Davide
WPES'17 ~ Automatic Assessment of Website
Compliance to the European Cookie Law with CooLCheck
Lobo,
Jorge
SACMAT'17 ~ A Datalog Framework for Modeling
Relationship-based Access Control Policies
|
| |
Loch,
Adrian
WiSec'17 ~ DEMO: Demonstrating Practical
Known-Plaintext Attacks against Physical Layer Security in Wireless
MIMO Systems
Lodha,
Sachin
CCS'16 ~ POSTER: Improved Markov Strength
Meters for Passwords
CCS'16
~ POSTER: Locally Virtualized Environment for Mitigating Ransomware
Threat
ASIA
CCS'17 ~ Short Paper - Pass-O: A Proposal to Improve the Security
of Pattern Unlock Scheme
Lokam,
Satya
BCC'17 ~ BCC'17 Chairs' Welcome
Lou,
Wenjing
TrustED'16 ~ Looks Good To Me: Authentication
for Augmented Reality
WiSec'17
~ Profiling the Strength of Physical-Layer Security: A Study
in Orthogonal Blinding
Lu,
Jiqiang
ASIA CCS'17 ~ Almost Universal Forgery
Attacks on the COPA and Marble Authenticated Encryption Algorithms
Lu,
Kangjie
CCS'16 ~ UniSan: Proactive Kernel Memory
Initialization to Eliminate Data Leakages
|
| |
Lu,
Long
ASIA CCS'17 ~ Foreword
ASIA
CCS'17 ~ Secure Integration of Web Content and Applications on
Commodity Mobile Operating Systems
CCS'16
~ Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones
and Mobile Devices (SPSM 2016)
SPSM'16
~ SPSM 2016 Chairs' Welcome
Lu,
Songwu
CCS'16 ~ New Security Threats Caused by
IMS-based SMS Service in 4G LTE Networks
Lu,
Xianhui
APKC'17 ~ KDM and Selective Opening Secure
IBE Based on the LWE Problem
Lu,
Yang
BCC'17 ~ Enabling the Sharing Economy:
Privacy Respecting Contract based on Public Blockchain
BCC'17
~ Unraveling Blockchain-based Crypto-currency System Supporting
Oblivious Transactions: A Formalized Approach
Lucaci,
Ciprian
SPRO'16 ~ VOT4CS: A Virtualization Obfuscation
Tool for C#
Lueks,
Wouter
WPES'17 ~ Vote to Link: Recovering from
Misbehaving Anonymous Users
|
| |
Luh,
Robert
SACMAT'17 ~ Poster: Design of an Anomaly-based
Threat Detection & Explication System
Lui,
John C. S.
CCS'16 ~ TaintART: A Practical Multi-level
Information-Flow Tracking System for Android RunTime
Luo,
Feng
IWSPA'17 ~ MCDefender: Toward Effective
Cyberbullying Defense in Mobile Online Social Networks
Luo,
Yan
SDN-NFVSec'17 ~ CareNet: Building a Secure
Software-defined Infrastructure for Home-based Healthcare
Lupu,
Emil C.
SACMAT'17 ~ Enabling Data Sharing in Contextual
Environments: Policy Representation and Analysis
Lüttgen,
Gerald
CCS'16 ~ POSTER: Identifying Dynamic Data
Structures in Malware
|
| |
Luu,
Loi
CCS'16 ~ A Secure Sharding Protocol for
Open Blockchains
CCS'16
~ Making Smart Contracts Smarter
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |