Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


Ma, Di

CPSS'17 ~ A Functional Co-Design towards Safe and Secure Vehicle Platooning

CPS-SPC'16 ~ Risk Assessment for Cooperative Automated Driving


Ma, Duohe

ASIA CCS'17 ~ POSTER: Quantitative Security Assessment Method based on Entropy for Moving Target Defense


Ma, Hui

APKC'17 ~ Access Control Encryption Based on LWE


Ma, Yunsheng

SDN-NFVSec'17 ~ CareNet: Building a Secure Software-defined Infrastructure for Home-based Healthcare


MacGahan, Thomas

SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language

SACMAT'17 ~ Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures


Madan, Kushagra

CCS'16 ~ Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets


Maena, Pieter

ASIA CCS'17 ~ Short Paper - SCM: Secure Code Memory Architecture


Maggs, Bruce M.

CCS'16 ~ Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem


Magrino, Tom

CCS'16 ~ Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency


Mahfouz, Ahmed

ASIA CCS'17 ~ POSTER: A Behavioral Biometric Authentication Framework on Smartphones


Mahjoub, A. Ridha

MIST'16 ~ A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems


Mahmoud, Tarek M.

ASIA CCS'17 ~ POSTER: A Behavioral Biometric Authentication Framework on Smartphones


Maier, Alwin

CCS'16 ~ Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms


Mainka, Christian

ASIA CCS'17 ~ SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor


Maiti, Rajib Ranjan

IoTPTS'17 ~ IoTScanner: Detecting Privacy Threats in IoT Neighborhoods


Maji, Hemanta K.

CCS'16 ~ On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols


Malchow, Jan-Ole

CCS'16 ~ POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties


Maleki, Hoda

MTD'16 ~ Markov Modeling of Moving Target Defense Games


Malisa, Luka

ASIA CCS'17 ~ CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks

CODASPY'17 ~ Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception


Malkin, Tal

CCS'16 ~ Garbling Gadgets for Boolean and Arithmetic Circuits


Malluhi, Qutaibah M.

ASIA CCS'17 ~ A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size and Fast Decryption


Malozemoff, Alex J.

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs

CCS'16 ~ Attribute-based Key Exchange with General Policies


Malyshev, Artem

SPSM'16 ~ Picasso: Lightweight Device Class Fingerprinting for Web Clients


Mancini, Federico

IWSPA'17 ~ An Internal/Insider Threat Score for Data Loss Prevention and Detection


Mancini, Luigi V.

SafeConfig'16 ~ AHEAD: A New Architecture for Active Defense


Mangard, Stefan

TIS'16 ~ Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order

WiSec'17 ~ Exploiting Data-Usage Statistics for Website Fingerprinting Attacks on Android

CCS'16 ~ Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR

ASIA CCS'17 ~ Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives


Maniatakos, Michail

CPS-SPC'16 ~ A Case Study on Implementing False Data Injection Attacks Against Nonlinear State Estimation

CPSS'17 ~ Secure 3D Printing: Reconstructing and Validating Solid Geometries using Toolpath Reverse Engineering


Mannan, Mohammad

CCS'16 ~ Hypnoguard: Protecting Secrets across Sleep-wake Cycles

CCS'16 ~ Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016)

SPSM'16 ~ SPSM 2016 Chairs' Welcome


Manoharan, Praveen

CCS'16 ~ Membership Privacy in MicroRNA-based Studies

WPES'17 ~ On Profile Linkability despite Anonymity in Social Media Systems


Manz, David O.

CCS'16 ~ SafeConfig'16 - Testing and Evaluation for Active and Resilient Cyber Systems

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel: Verification of Active and Resilient Systems: Practical or Utopian?


Mao, Yunlong

CCS'16 ~ Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks


Mao, Z. Morley

CCS'16 ~ The Misuse of Android Unix Domain Sockets and Security Implications


Mardziel, Piotr

CCS'16 ~ Build It, Break It, Fix It: Contesting Secure Development


Marforio, Claudio

SPSM'16 ~ Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking


Markantonakis, Konstantinos

CPSS'17 ~ Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay


Marksteiner, Stefan

SafeConfig'16 ~ An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks

SACMAT'17 ~ Poster: Design of an Anomaly-based Threat Detection & Explication System


Martín, Ignacio

CCS'16 ~ POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach


Martinelli, Fabio

ASIA CCS'17 ~ BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware

ASIA CCS'17 ~ How Discover a Malware using Model Checking


Martinez del Rincon, Jesus

CODASPY'17 ~ Deep Android Malware Detection


Martinovic, Ivan

CCS'16 ~ DEMO: Starving Permission-Hungry Android Apps Using SecuRank

ASIA CCS'17 ~ Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics

CPS-SPC'16 ~ Exposing Transmitters in Mobile Multi-Agent Games

WPES'17 ~ Generating Secret Keys from Biometric Body Impedance Measurements

SPSM'16 ~ SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis

CPS-SPC'16 ~ Secure Location Verification with a Mobile Receiver

ASIA CCS'17 ~ To Update or Not to Update: Insights from a Two-Year Study of Android App Evolution

CCS'16 ~ Using Reflexive Eye Movements for Fast Challenge-Response Authentication


Maruseac, Mihai

CODASPY'17 ~ Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement


Mashima, Daisuke

CPS-SPC'16 ~ SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions


Maskiewicz, Jacob

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Masti, Ramya Jayaram

SPSM'16 ~ Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking


Mathew, Jomol

SDN-NFVSec'17 ~ CareNet: Building a Secure Software-defined Infrastructure for Home-based Healthcare


Matrawy, Ashraf

ASIA CCS'17 ~ Accurate Manipulation of Delay-based Internet Geolocation


Matsumoto, Tsutomu

TrustED'16 ~ Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs


Matte, Célestin

WiSec'17 ~ Defeating MAC Address Randomization Through Timing Attacks

WiSec'17 ~ DEMO: Panoptiphone: How Unique is Your Wi-Fi Device?


Matzutt, Roman

CCS'16 ~ POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store


Maurice, Clémentine

CCS'16 ~ Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

CCS'16 ~ Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR


Mayer, Peter

CCS'16 ~ POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes


Mazer, Joseph

IWSPA'17 ~ MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks


Mazurczyk, Wojciech

CCS'16 ~ POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns


Mazurek, Michelle L.

CCS'16 ~ Build It, Break It, Fix It: Contesting Secure Development

CCS'16 ~ How I Learned to be Secure: A Census-Representative Survey of Security Advice Sources and Behavior


McDaniel, Patrick

MIST'16 ~ Cyber Deception: Virtual Networks to Defend Insider Reconnaissance

IWSPA'17 ~ Feature Cultivation in Privileged Information-augmented Detection

ASIA CCS'17 ~ Practical Black-Box Attacks against Machine Learning

ABAC'17 ~ Tracing the Arc of Smartphone Application Security

IWSPA'17 ~ Tracing the Arc of Smartphone Application Security

SDN-NFVSec'17 ~ Tracing the Arc of Smartphone Application Security


McGrew, David

AISec'16 ~ Identifying Encrypted Malware Traffic with Contextual Flow Data


McLaughlin, Niall

CODASPY'17 ~ Deep Android Malware Detection


McMahan, H. Brendan

CCS'16 ~ Deep Learning with Differential Privacy


McMillion, Brendan

SPRO'16 ~ Attacking White-Box AES Constructions


McNamara, Andrew

WPES'17 ~ Predicting Mobile App Privacy Preferences with Psychographics


McPherson, Richard

CCS'16 ~ Breaking Web Applications Built On Top of Encrypted Data


Meddahi, Ahmed

SDN-NFVSec'17 ~ A First Step Towards Security Extension for NFV Orchestrator


Medwed, Marcel

TrustED'16 ~ IoT Security Challenges and Ways Forward


Mehnaz, Shagufta

SACMAT'17 ~ A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics

CODASPY'17 ~ Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses

CODASPY'17 ~ Seamless and Secure Bluetooth LE Connection Migration


Meiklejohn, Sarah

CCS'16 ~ Transparency Overlays and Applications


Mell, Peter

MIST'16 ~ Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems


Memmi, Gerard

CCS'16 ~ POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation


Meneely, Andrew

SPRO'16 ~ Beyond the Attack Surface: Assessing Security Risk with Random Walks on Call Graphs


Meng, Yan

CCS'16 ~ When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals


Meng, Ziyuan

PLAS'16 ~ Short Paper: Bounding Information Leakage Using Implication Graph


Mercaldo, Francesco

ASIA CCS'17 ~ BRIDEMAID: An Hybrid Tool for Accurate Detection of Android Malware

ASIA CCS'17 ~ How Discover a Malware using Model Checking


Metzger, Stefan

CCS'16 ~ POSTER: VUDEC - A Framework for Vulnerability Management in Decentralized Communication Networks


Metzke, Jan

CODASPY'17 ~ Privacy-Preserving HMM Forward Computation


Meyer, Ulrike

CODASPY'17 ~ Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering


Midi, Daniele

ASIA CCS'17 ~ Memory Safety for Embedded Devices with nesCheck


Miers, Ian

CCS'16 ~ A Protocol for Privately Reporting Ad Impressions at Scale


Miettinen, Markus

WiSec'17 ~ Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments


Migdal, Denis

CCS'16 ~ DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking


Mikovic, Jelena

SDN-NFVSec'17 ~ Enabling SDN Experimentation in Network Testbeds


Miller, Andrew

CCS'16 ~ The Honey Badger of BFT Protocols


Miller, Brad

CCS'16 ~ PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-of-Registration


Miller, Paul

CODASPY'17 ~ Deep Android Malware Detection


Minier, Marine

IWSPA'17 ~ Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors


Mironov, Ilya

CCS'16 ~ Deep Learning with Differential Privacy

CCS'16 ~ Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE


Mirsky, Yisroel

AISec'16 ~ SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research


Mirzaei, Omid

ASIA CCS'17 ~ TriFlow: Triaging Android Applications using Speculative Information Flows


Mishra, Prabhat

CCS'16 ~ MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection


Mislove, Alan

CCS'16 ~ Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem


Mitrokotsa, Aikaterini

AISec'16 ~ Chairs' Introduction and Welcome to AISec 2016


Mitrokotsa, Katerina

CCS'16 ~ 9th International Workshop on Artificial Intelligence and Security: AISec 2016


Mitseva, Asya

CCS'16 ~ POSTER: Fingerprinting Tor Hidden Services


Mittal, Prateek

CCS'16 ~ SmartWalk: Enhancing Social Network Security via Adaptive Random Walks


Mladenov, Vladislav

ASIA CCS'17 ~ SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web Editor


Moatti, Yosef

MIST'16 ~ WatchIT: Who Watches Your IT Guy?


Mohamed, Manar

WiSec'17 ~ Slogger: Smashing Motion-based Touchstroke Logging with Transparent System Noise


Mohammad Etemad, Mohammad

CCSW'16 ~ Generic Efficient Dynamic Proofs of Retrievability


Mohammadi, Esfandiar

CCS'16 ~ Computational Soundness for Dalvik Bytecode

ASIA CCS'17 ~ CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks


Molva, Refik

CCSW'16 ~ Message-Locked Proofs of Retrievability with Secure Deduplication


Mondal, Sutapa

CCS'16 ~ POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat


Moon, Jong Cheol

SDN-NFVSec'17 ~ Ultimate Forwarding Resilience in OpenFlow Networks


Moore, Tyler

WISCS'16 ~ Measuring the Impact of Sharing Abuse Data with Web Hosting Providers


Moradi, Amir

TIS'16 ~ Moments-Correlating DPA

TIS'16 ~ ParTI - Towards Combined Hardware Countermeasures against Side-Channeland Fault-Injection Attacks


Mori, Tatsuya

CCS'16 ~ Poster: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs


Moriai, Shiho

ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality


Mostafa, Shaikh

SACMAT'17 ~ NTApps: A Network Traffic Analyzer of Android Applications


Mu, Dongliang

CCS'16 ~ CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump


Mühlberg, Jan Tobias

CCS'16 ~ POSTER: Identifying Dynamic Data Structures in Malware


Mukherjee, Arjun

ASIA CCS'17 ~ Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation


Mukherjee, Subhojeet

ABAC'17 ~ Attribute Based Access Control for Healthcare Resources


Multari, Nicholas J.

CCS'16 ~ SafeConfig'16 - Testing and Evaluation for Active and Resilient Cyber Systems

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel: Verification of Active and Resilient Systems: Practical or Utopian?


Mun Choon, Chan

SDN-NFVSec'17 ~ Enabling SDN Experimentation in Network Testbeds


Munaiah, Nuthan

SPRO'16 ~ Beyond the Attack Surface: Assessing Security Risk with Random Walks on Call Graphs


Muralidharan, Akshaya

SDN-NFVSec'17 ~ Dynamic Defense Provision via Network Functions Virtualization


Murguia, Carlos

ASIA CCS'17 ~ Model-based Attack Detection Scheme for Smart Water Distribution Networks


Murray, Toby

PLAS'16 ~ PLAS 2016 Chairs' Welcome

CCS'16 ~ PLAS'16 - ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security


Mussmann, Andrea

WISCS'16 ~ Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice


Muttik, Igor

WiSec'17 ~ More Semantics More Robust: Improving Android Malware Classifiers


Myers, Andrew C.

CCS'16 ~ CCS 2016 Program Chairs' Welcome

CCS'16 ~ Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)