 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
Ma,
Di
CPSS'17 ~ A Functional Co-Design towards
Safe and Secure Vehicle Platooning
CPS-SPC'16
~ Risk Assessment for Cooperative Automated Driving
Ma,
Duohe
ASIA CCS'17 ~ POSTER: Quantitative Security
Assessment Method based on Entropy for Moving Target Defense
Ma,
Hui
APKC'17 ~ Access Control Encryption Based
on LWE
Ma,
Yunsheng
SDN-NFVSec'17 ~ CareNet: Building a Secure
Software-defined Infrastructure for Home-based Healthcare
|
| |
MacGahan,
Thomas
SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant
Release of Medical Records Using the History Aware Programming Language
SACMAT'17
~ Verifiable Assume-Guarantee Privacy Specifications for Actor
Component Architectures
Madan,
Kushagra
CCS'16 ~ Leave Your Phone at the Door:Side
Channels that Reveal Factory Floor Secrets
Maena,
Pieter
ASIA CCS'17 ~ Short Paper - SCM: Secure
Code Memory Architecture
Maggs,
Bruce M.
CCS'16 ~ Measurement and Analysis of Private
Key Sharing in the HTTPS Ecosystem
|
| |
Magrino,
Tom
CCS'16 ~ Safe Serializable Secure Scheduling:
Transactions and the Trade-Off Between Security and Consistency
Mahfouz,
Ahmed
ASIA CCS'17 ~ POSTER: A Behavioral Biometric
Authentication Framework on Smartphones
Mahjoub,
A. Ridha
MIST'16 ~ A New Risk Assessment Framework
Using Graph Theory for Complex ICT Systems
Mahmoud,
Tarek M.
ASIA CCS'17 ~ POSTER: A Behavioral Biometric
Authentication Framework on Smartphones
Maier,
Alwin
CCS'16 ~ Twice the Bits, Twice the Trouble:
Vulnerabilities Induced by Migrating to 64-Bit Platforms
|
| |
Mainka,
Christian
ASIA CCS'17 ~ SECRET: On the Feasibility
of a Secure, Efficient, and Collaborative Real-Time Web Editor
Maiti,
Rajib Ranjan
IoTPTS'17 ~ IoTScanner: Detecting Privacy
Threats in IoT Neighborhoods
Maji,
Hemanta K.
CCS'16 ~ On the Security and Usability
of Segment-based Visual Cryptographic Authentication Protocols
Malchow,
Jan-Ole
CCS'16 ~ POSTER: Re-Thinking Risks and
Rewards for Trusted Third Parties
Maleki,
Hoda
MTD'16 ~ Markov Modeling of Moving Target
Defense Games
Malisa,
Luka
ASIA CCS'17 ~ CoverUp: Privacy Through
"Forced" Participation in Anonymous Communication Networks
CODASPY'17
~ Detecting Mobile Application Spoofing Attacks by Leveraging
User Visual Similarity Perception
|
| |
Malkin,
Tal
CCS'16 ~ Garbling Gadgets for Boolean and
Arithmetic Circuits
Malluhi,
Qutaibah M.
ASIA CCS'17 ~ A Ciphertext-Policy Attribute-based
Encryption Scheme With Optimized Ciphertext Size and Fast Decryption
Malozemoff,
Alex J.
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
CCS'16
~ Attribute-based Key Exchange with General Policies
Malyshev,
Artem
SPSM'16 ~ Picasso: Lightweight Device Class
Fingerprinting for Web Clients
Mancini,
Federico
IWSPA'17 ~ An Internal/Insider Threat Score
for Data Loss Prevention and Detection
Mancini,
Luigi V.
SafeConfig'16 ~ AHEAD: A New Architecture
for Active Defense
|
| |
Mangard,
Stefan
TIS'16 ~ Domain-Oriented Masking: Compact
Masked Hardware Implementations with Arbitrary Protection Order
WiSec'17
~ Exploiting Data-Usage Statistics for Website Fingerprinting
Attacks on Android
CCS'16
~ Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
ASIA
CCS'17 ~ Securing Memory Encryption and Authentication Against
Side-Channel Attacks Using Unprotected Primitives
Maniatakos,
Michail
CPS-SPC'16 ~ A Case Study on Implementing
False Data Injection Attacks Against Nonlinear State Estimation
CPSS'17
~ Secure 3D Printing: Reconstructing and Validating Solid Geometries
using Toolpath Reverse Engineering
Mannan,
Mohammad
CCS'16 ~ Hypnoguard: Protecting Secrets
across Sleep-wake Cycles
CCS'16
~ Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones
and Mobile Devices (SPSM 2016)
SPSM'16
~ SPSM 2016 Chairs' Welcome
Manoharan,
Praveen
CCS'16 ~ Membership Privacy in MicroRNA-based
Studies
WPES'17
~ On Profile Linkability despite Anonymity in Social Media Systems
Manz,
David O.
CCS'16 ~ SafeConfig'16 - Testing and Evaluation
for Active and Resilient Cyber Systems
SafeConfig'16
~ SafeConfig'16: Testing and Evaluation for Active & Resilient
Cyber Systems
SafeConfig'16
~ SafeConfig'16: Testing and Evaluation for Active & Resilient
Cyber Systems Panel: Verification of Active and Resilient Systems: Practical
or Utopian?
Mao,
Yunlong
CCS'16 ~ Stemming Downlink Leakage from
Training Sequences in Multi-User MIMO Networks
|
| |
Mao,
Z. Morley
CCS'16 ~ The Misuse of Android Unix Domain
Sockets and Security Implications
Mardziel,
Piotr
CCS'16 ~ Build It, Break It, Fix It: Contesting
Secure Development
Marforio,
Claudio
SPSM'16 ~ Hardened Setup of Personalized
Security Indicators to Counter Phishing Attacks in Mobile Banking
Markantonakis,
Konstantinos
CPSS'17 ~ Evaluation of Apple iDevice Sensors
as a Potential Relay Attack Countermeasure for Apple Pay
Marksteiner,
Stefan
SafeConfig'16 ~ An Iterative and Toolchain-Based
Approach to Automate Scanning and Mapping Computer Networks
SACMAT'17
~ Poster: Design of an Anomaly-based Threat Detection & Explication
System
Martín,
Ignacio
CCS'16 ~ POSTER: Insights of Antivirus
Relationships when Detecting Android Malware: A Data Analytics Approach
|
| |
Martinelli,
Fabio
ASIA CCS'17 ~ BRIDEMAID: An Hybrid Tool
for Accurate Detection of Android Malware
ASIA
CCS'17 ~ How Discover a Malware using Model Checking
Martinez
del Rincon, Jesus
CODASPY'17 ~ Deep Android Malware Detection
Martinovic,
Ivan
CCS'16 ~ DEMO: Starving Permission-Hungry
Android Apps Using SecuRank
ASIA
CCS'17 ~ Evaluating Behavioral Biometrics for Continuous Authentication:
Challenges and Metrics
CPS-SPC'16
~ Exposing Transmitters in Mobile Multi-Agent Games
WPES'17
~ Generating Secret Keys from Biometric Body Impedance Measurements
SPSM'16
~ SecuRank: Starving Permission-Hungry Apps Using Contextual
Permission Analysis
CPS-SPC'16
~ Secure Location Verification with a Mobile Receiver
ASIA
CCS'17 ~ To Update or Not to Update: Insights from a Two-Year
Study of Android App Evolution
CCS'16
~ Using Reflexive Eye Movements for Fast Challenge-Response Authentication
Maruseac,
Mihai
CODASPY'17 ~ Differentially-Private Big
Data Analytics for High-Speed Research Network Traffic Measurement
Mashima,
Daisuke
CPS-SPC'16 ~ SoftGrid: A Software-based
Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions
Maskiewicz,
Jacob
CCS'16 ~ A Systematic Analysis of the Juniper
Dual EC Incident
|
| |
Masti,
Ramya Jayaram
SPSM'16 ~ Hardened Setup of Personalized
Security Indicators to Counter Phishing Attacks in Mobile Banking
Mathew,
Jomol
SDN-NFVSec'17 ~ CareNet: Building a Secure
Software-defined Infrastructure for Home-based Healthcare
Matrawy,
Ashraf
ASIA CCS'17 ~ Accurate Manipulation of
Delay-based Internet Geolocation
Matsumoto,
Tsutomu
TrustED'16 ~ Evaluation of Latch-based
Physical Random Number Generator Implementation on 40 nm ASICs
Matte,
Célestin
WiSec'17 ~ Defeating MAC Address Randomization
Through Timing Attacks
WiSec'17
~ DEMO: Panoptiphone: How Unique is Your Wi-Fi Device?
Matzutt,
Roman
CCS'16 ~ POSTER: I Don't Want That Content!
On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
|
| |
Maurice,
Clémentine
CCS'16 ~ Drammer: Deterministic Rowhammer
Attacks on Mobile Platforms
CCS'16
~ Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
Mayer,
Peter
CCS'16 ~ POSTER: Towards Collaboratively
Supporting Decision Makers in Choosing Suitable Authentication Schemes
Mazer,
Joseph
IWSPA'17 ~ MCDefender: Toward Effective
Cyberbullying Defense in Mobile Online Social Networks
Mazurczyk,
Wojciech
CCS'16 ~ POSTER: An Educational Network
Protocol for Covert Channel Analysis Using Patterns
Mazurek,
Michelle L.
CCS'16 ~ Build It, Break It, Fix It: Contesting
Secure Development
CCS'16
~ How I Learned to be Secure: A Census-Representative Survey
of Security Advice Sources and Behavior
|
| |
McDaniel,
Patrick
MIST'16 ~ Cyber Deception: Virtual Networks
to Defend Insider Reconnaissance
IWSPA'17
~ Feature Cultivation in Privileged Information-augmented Detection
ASIA
CCS'17 ~ Practical Black-Box Attacks against Machine Learning
ABAC'17
~ Tracing the Arc of Smartphone Application Security
IWSPA'17
~ Tracing the Arc of Smartphone Application Security
SDN-NFVSec'17
~ Tracing the Arc of Smartphone Application Security
McGrew,
David
AISec'16 ~ Identifying Encrypted Malware
Traffic with Contextual Flow Data
McLaughlin,
Niall
CODASPY'17 ~ Deep Android Malware Detection
McMahan,
H. Brendan
CCS'16 ~ Deep Learning with Differential
Privacy
McMillion,
Brendan
SPRO'16 ~ Attacking White-Box AES Constructions
McNamara,
Andrew
WPES'17 ~ Predicting Mobile App Privacy
Preferences with Psychographics
|
| |
McPherson,
Richard
CCS'16 ~ Breaking Web Applications Built
On Top of Encrypted Data
Meddahi,
Ahmed
SDN-NFVSec'17 ~ A First Step Towards Security
Extension for NFV Orchestrator
Medwed,
Marcel
TrustED'16 ~ IoT Security Challenges and
Ways Forward
Mehnaz,
Shagufta
SACMAT'17 ~ A Secure Sum Protocol and Its
Application to Privacy-preserving Multi-party Analytics
CODASPY'17
~ Ghostbuster: A Fine-grained Approach for Anomaly Detection
in File System Accesses
CODASPY'17
~ Seamless and Secure Bluetooth LE Connection Migration
Meiklejohn,
Sarah
CCS'16 ~ Transparency Overlays and Applications
Mell,
Peter
MIST'16 ~ Restricting Insider Access Through
Efficient Implementation of Multi-Policy Access Control Systems
|
| |
Memmi,
Gerard
CCS'16 ~ POSTER: A Keyless Efficient Algorithm
for Data Protection by Means of Fragmentation
Meneely,
Andrew
SPRO'16 ~ Beyond the Attack Surface: Assessing
Security Risk with Random Walks on Call Graphs
Meng,
Yan
CCS'16 ~ When CSI Meets Public WiFi: Inferring
Your Mobile Phone Password via WiFi Signals
Meng,
Ziyuan
PLAS'16 ~ Short Paper: Bounding Information
Leakage Using Implication Graph
Mercaldo,
Francesco
ASIA CCS'17 ~ BRIDEMAID: An Hybrid Tool
for Accurate Detection of Android Malware
ASIA
CCS'17 ~ How Discover a Malware using Model Checking
Metzger,
Stefan
CCS'16 ~ POSTER: VUDEC - A Framework for
Vulnerability Management in Decentralized Communication Networks
|
| |
Metzke,
Jan
CODASPY'17 ~ Privacy-Preserving HMM Forward
Computation
Meyer,
Ulrike
CODASPY'17 ~ Efficient Commodity Matching
for Privacy-Preserving Two-Party Bartering
Midi,
Daniele
ASIA CCS'17 ~ Memory Safety for Embedded
Devices with nesCheck
Miers,
Ian
CCS'16 ~ A Protocol for Privately Reporting
Ad Impressions at Scale
Miettinen,
Markus
WiSec'17 ~ Poster: Friend or Foe? Context
Authentication for Trust Domain Separation in IoT Environments
Migdal,
Denis
CCS'16 ~ DEMO: OffPAD - Offline Personal
Authenticating Device with Applications in Hospitals and e-Banking
|
| |
Mikovic,
Jelena
SDN-NFVSec'17 ~ Enabling SDN Experimentation
in Network Testbeds
Miller,
Andrew
CCS'16 ~ The Honey Badger of BFT Protocols
Miller,
Brad
CCS'16 ~ PREDATOR: Proactive Recognition
and Elimination of Domain Abuse at Time-of-Registration
Miller,
Paul
CODASPY'17 ~ Deep Android Malware Detection
Minier,
Marine
IWSPA'17 ~ Non-interactive (t, n)-Incidence
Counting from Differentially Private Indicator Vectors
Mironov,
Ilya
CCS'16 ~ Deep Learning with Differential
Privacy
CCS'16
~ Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange
from LWE
|
| |
Mirsky,
Yisroel
AISec'16 ~ SherLock vs Moriarty: A Smartphone
Dataset for Cybersecurity Research
Mirzaei,
Omid
ASIA CCS'17 ~ TriFlow: Triaging Android
Applications using Speculative Information Flows
Mishra,
Prabhat
CCS'16 ~ MERS: Statistical Test Generation
for Side-Channel Analysis based Trojan Detection
Mislove,
Alan
CCS'16 ~ Measurement and Analysis of Private
Key Sharing in the HTTPS Ecosystem
Mitrokotsa,
Aikaterini
AISec'16 ~ Chairs' Introduction and Welcome
to AISec 2016
Mitrokotsa,
Katerina
CCS'16 ~ 9th International Workshop on
Artificial Intelligence and Security: AISec 2016
|
| |
Mitseva,
Asya
CCS'16 ~ POSTER: Fingerprinting Tor Hidden
Services
Mittal,
Prateek
CCS'16 ~ SmartWalk: Enhancing Social Network
Security via Adaptive Random Walks
Mladenov,
Vladislav
ASIA CCS'17 ~ SECRET: On the Feasibility
of a Secure, Efficient, and Collaborative Real-Time Web Editor
Moatti,
Yosef
MIST'16 ~ WatchIT: Who Watches Your IT
Guy?
Mohamed,
Manar
WiSec'17 ~ Slogger: Smashing Motion-based
Touchstroke Logging with Transparent System Noise
Mohammad
Etemad, Mohammad
CCSW'16 ~ Generic Efficient Dynamic Proofs
of Retrievability
|
| |
Mohammadi,
Esfandiar
CCS'16 ~ Computational Soundness for Dalvik
Bytecode
ASIA
CCS'17 ~ CoverUp: Privacy Through "Forced" Participation in Anonymous
Communication Networks
Molva,
Refik
CCSW'16 ~ Message-Locked Proofs of Retrievability
with Secure Deduplication
Mondal,
Sutapa
CCS'16 ~ POSTER: Locally Virtualized Environment
for Mitigating Ransomware Threat
Moon,
Jong Cheol
SDN-NFVSec'17 ~ Ultimate Forwarding Resilience
in OpenFlow Networks
Moore,
Tyler
WISCS'16 ~ Measuring the Impact of Sharing
Abuse Data with Web Hosting Providers
Moradi,
Amir
TIS'16 ~ Moments-Correlating DPA
TIS'16
~ ParTI - Towards Combined Hardware Countermeasures against Side-Channeland
Fault-Injection Attacks
|
| |
Mori,
Tatsuya
CCS'16 ~ Poster: Toward Automating the
Generation of Malware Analysis Reports Using the Sandbox Logs
Moriai,
Shiho
ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage
System Providing Long-Term Integrity, Authenticity, and Confidentiality
Mostafa,
Shaikh
SACMAT'17 ~ NTApps: A Network Traffic Analyzer
of Android Applications
Mu,
Dongliang
CCS'16 ~ CREDAL: Towards Locating a Memory
Corruption Vulnerability with Your Core Dump
Mühlberg,
Jan Tobias
CCS'16 ~ POSTER: Identifying Dynamic Data
Structures in Malware
Mukherjee,
Arjun
ASIA CCS'17 ~ Scaling and Effectiveness
of Email Masquerade Attacks: Exploiting Natural Language Generation
|
| |
Mukherjee,
Subhojeet
ABAC'17 ~ Attribute Based Access Control
for Healthcare Resources
Multari,
Nicholas J.
CCS'16 ~ SafeConfig'16 - Testing and Evaluation
for Active and Resilient Cyber Systems
SafeConfig'16
~ SafeConfig'16: Testing and Evaluation for Active & Resilient
Cyber Systems
SafeConfig'16
~ SafeConfig'16: Testing and Evaluation for Active & Resilient
Cyber Systems Panel: Verification of Active and Resilient Systems: Practical
or Utopian?
Mun
Choon, Chan
SDN-NFVSec'17 ~ Enabling SDN Experimentation
in Network Testbeds
Munaiah,
Nuthan
SPRO'16 ~ Beyond the Attack Surface: Assessing
Security Risk with Random Walks on Call Graphs
Muralidharan,
Akshaya
SDN-NFVSec'17 ~ Dynamic Defense Provision
via Network Functions Virtualization
Murguia,
Carlos
ASIA CCS'17 ~ Model-based Attack Detection
Scheme for Smart Water Distribution Networks
|
| |
Murray,
Toby
PLAS'16 ~ PLAS 2016 Chairs' Welcome
CCS'16
~ PLAS'16 - ACM SIGPLAN 11th Workshop on Programming Languages
and Analysis for Security
Mussmann,
Andrea
WISCS'16 ~ Data Quality Challenges and
Future Research Directions in Threat Intelligence Sharing Practice
Muttik,
Igor
WiSec'17 ~ More Semantics More Robust:
Improving Android Malware Classifiers
Myers,
Andrew C.
CCS'16 ~ CCS 2016 Program Chairs' Welcome
CCS'16
~ Safe Serializable Secure Scheduling: Transactions and the Trade-Off
Between Security and Consistency
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |