Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


Naccache, David

ASIA CCS'17 ~ The Case for System Command Encryption


Nadig Anantha, Deepak

SDN-NFVSec'17 ~ ScienceSDS: A Novel Software Defined Security Framework for Large-scale Data-intensive Science


Naehrig, Michael

CCS'16 ~ Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE


Naghmouchi, M. Yassine

MIST'16 ~ A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems


Nandi, Chandrakana

PLAS'16 ~ Automatic Trigger Generation for Rule-based Smart Homes


Narayanan, Arvind

CCS'16 ~ On the Instability of Bitcoin without the Block Reward

CCS'16 ~ Online Tracking: A 1-million-site Measurement and Analysis


Narayanan, Viswesh

CCS'16 ~ A Secure Sharding Protocol for Open Blockchains


Nardone, Vittoria

ASIA CCS'17 ~ How Discover a Malware using Model Checking


Narouei, Masoud

SACMAT'17 ~ Towards a Top-down Policy Engineering Framework for Attribute-based Access Control


Nasr, Aďcha Katajina

CCSW'16 ~ Co-location Resistant Strategy with Full Resources Optimization


Nasr, Milad

CCS'16 ~ GAME OF DECOYS: Optimal Decoy Routing Through Game Theory


Naveed, Muhammad

CCS'16 ~ Breaking Web Applications Built On Top of Encrypted Data


Nepal, Surya

ASIA CCS'17 ~ An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption


Neugschwandtner, Matthias

SCC'17 ~ Reconciling Security and Functional Requirements in Multi-tenant Clouds


Neuman, Clifford

CPS-SPC'16 ~ Evaluating Resilience of Gas Pipeline Systems Under Cyber-Physical Attacks: A Function-Based Methodology


Neumann, Stephan

CCS'16 ~ POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes


Neven, Gregory

WiSec'17 ~ POSTER: Toward a Secure and Scalable Attestation

CCS'16 ~ SANA: Secure and Scalable Aggregate Network Attestation


Nguyen, Hiep H.

WPES'17 ~ Detecting Communities under Differential Privacy


Nguyen, Thi Ngoc Tho

CCS'16 ~ Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets


Nguyen, Thien Duc

WiSec'17 ~ Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments


Niakanlahiji, Amirreza

MTD'16 ~ Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers


Nicolay, Jens

PLAS'16 ~ Static Detection of User-specified Security Vulnerabilities in Client-side JavaScript


Niculaescu, Oana-Georgiana

CODASPY'17 ~ Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement


Nielsen, Rodney

SACMAT'17 ~ Towards a Top-down Policy Engineering Framework for Attribute-based Access Control


Nielson, Flemming

PLAS'16 ~ Future-dependent Flow Policies with Prophetic Variables


Nikolaenko, Valeria

CCS'16 ~ Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE


Nikov, Ventzislav

TIS'16 ~ Masking AES with d+1 Shares in Hardware


Nikova, Svetla

TIS'16 ~ Masking AES with d+1 Shares in Hardware

CCS'16 ~ Theory of Implementation Security Workshop (TIs 2016)

TIS'16 ~ Theory of Implementation Security Workshop 2016: TIS 2016


Ning, Peng

ASIA CCS'17 ~ PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks

ASIA CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android


Nirjon, Shahriar

CODASPY'17 ~ Seamless and Secure Bluetooth LE Connection Migration


Nishide, Takashi

APKC'17 ~ One-time Programs with Cloud Storage and Its Application to Electronic Money


Nissim, Kobbi

CCS'16 ~ Generic Attacks on Secure Outsourced Databases


Niu, Jianwei

SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language

SACMAT'17 ~ Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures


Noack, David

ASIA CCS'17 ~ Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation


Nof, Ariel

CCS'16 ~ Demo: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation

CCS'16 ~ High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority


Noh, Juhwan

WiSec'17 ~ Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4


Nordahl, Christian

CCSW'16 ~ Executing Boolean Queries on an Encrypted Bitmap Index


Nordbotten, Nils A.

IWSPA'17 ~ An Internal/Insider Threat Score for Data Loss Prevention and Detection


Nordholz, Jan

CODASPY'17 ~ Fault Attacks on Encrypted General Purpose Compute Platforms


Noroozian, Arman

ASIA CCS'17 ~ The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial Malware


Noubir, Guevara

WiSec'17 ~ Fingerprinting Wi-Fi Devices Using Software Defined Radios

WiSec'17 ~ Interleaving Jamming in Wi-Fi Networks


Noura, Hassan

CCS'16 ~ POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation


Nurse, Jason R. C.

MIST'16 ~ A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models


Nuseibeh, Bashar

CPSS'17 ~ On the Disappearing Boundary Between Digital, Physical, and Social Spaces - Who, What, Where and When?

ASIA CCS'17 ~ POSTER: Enabling End-Users to Protect their Privacy


Nyman, Thomas

CCS'16 ~ C-FLAT: Control-Flow Attestation for Embedded Systems Software


Ochoa, Martín

CPSS'17 ~ SIPHON: Towards Scalable High-Interaction Physical Honeypots


Oehmen, Christopher

MTD'16 ~ Formal Approach for Resilient Reachability based onEnd-System Route Agility

SafeConfig'16 ~ SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel: Verification of Active and Resilient Systems: Practical or Utopian?


Ohara, Kazuma

CCS'16 ~ Demo: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation

CCS'16 ~ High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority


Ohrimenko, Olga

CCS'16 ~ Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data


Okamoto, Eiji

APKC'17 ~ One-time Programs with Cloud Storage and Its Application to Electronic Money


Okhravi, Hamed

MTD'16 ~ Have No PHEAR: Networks Without Identifiers


Oleshchuk, Vladimir A.

SACMAT'17 ~ A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records


Olickel, Hrishi

CCS'16 ~ Making Smart Contracts Smarter


Omar, Hamza

SACMAT'17 ~ Leveraging Hardware Isolation for Process Level Access Control & Authentication


Omri, Eran

CCS'16 ~ Optimizing Semi-Honest Secure Multiparty Computation for the Internet


Önalan, Aysun Gurur

TrustED'16 ~ Online Reliability Testing for PUF Key Derivation


O'Neill, Adam

CCS'16 ~ Generic Attacks on Secure Outsourced Databases


Önen, Melek

CCSW'16 ~ Message-Locked Proofs of Retrievability with Secure Deduplication

SCC'17 ~ Reconciling Security and Functional Requirements in Multi-tenant Clouds


Onete, Cristina

WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

ASIA CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol


Ong, Toan

ABAC'17 ~ Attribute Based Access Control for Healthcare Resources


Onwuzurike, Lucky

WiSec'17 ~ POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps


Ordean, Mihai

ASIA CCS'17 ~ An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols


Orikogbo, Damilola

SPSM'16 ~ CRIOS: Toward Large-Scale iOS Application Analysis


Orlandi, Claudio

SPSM'16 ~ On the CCA (in)Security of MTProto


Orsini, Emmanuela

CCS'16 ~ MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer


Oswald, David

TrustED'16 ~ Side-Channel Attacks on Fingerprint Matching Algorithms

TrustED'16 ~ Wireless Attacks on Automotive Remote Keyless Entry Systems


Ott, Jason

CCS'16 ~ The Misuse of Android Unix Domain Sockets and Security Implications


Ouadjaout, Abdelraouf

CODASPY'17 ~ Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications


Oudejans, Joris

BCC'17 ~ DecReg: A Framework for Preventing Double-Financing using Blockchain Technology


P.V., Rajkumar

CCS'16 ~ POSTER: Security Enhanced Administrative Role Based Access Control Models


Paar, Christof

WiSec'17 ~ Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet

ASIA CCS'17 ~ Hardware Trojans and Other Threats against Embedded Systems


Pachmanov, Lev

CCS'16 ~ ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels


Paindavoine, Marie

ASIA CCS'17 ~ BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic


Pais, Alwyn R.

CPSS'17 ~ Detecting Phishing Websites using Automation of Human Behavior


Pan, Xiang

CCS'16 ~ CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites


Panage, Pranav

ASIA CCS'17 ~ DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging


Panchenko, Andriy

CCS'16 ~ POSTER: Fingerprinting Tor Hidden Services


Panico, Agostino

SafeConfig'16 ~ AHEAD: A New Architecture for Active Defense


Papadimitratos, Panos

WiSec'17 ~ Foreword

CCS'16 ~ Security on Wheels: Security and Privacy for Vehicular Communication Systems


Papernot, Nicolas

ASIA CCS'17 ~ Practical Black-Box Attacks against Machine Learning


Pappas, Christos

ASIA CCS'17 ~ The Case for In-Network Replay Suppression


Paraboschi, Stefano

WISCS'16 ~ Managing Data Sharing in OpenStack Swift with Over-Encryption

CCS'16 ~ Mix&Slice: Efficient Access Revocation in the Cloud


Parde, Natalie

SACMAT'17 ~ Towards a Top-down Policy Engineering Framework for Attribute-based Access Control


Park, Jaehong

CODASPY'17 ~ Classifying and Comparing Attribute-Based and Relationship-Based Access Control


Park, Jaewoo

CCS'16 ~ POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack


Park, Jungho

CCS'16 ~ PIPSEA: A Practical IPsec Gateway on Embedded APUs


Park, Shinjo

SPSM'16 ~ White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones


Park, Younghee

SDN-NFVSec'17 ~ Dynamic Defense Provision via Network Functions Virtualization

SDN-NFVSec'17 ~ Towards Effective Virtualization of Intrusion Detection Systems


Parker, James

CCS'16 ~ Build It, Break It, Fix It: Contesting Secure Development


Parkin, Simon

MIST'16 ~ Pragmatic Security: Modelling IT Security Management Responsibilities for SME Archetypes


Parno, Bryan

CCS'16 ~ Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data


Pasarella, Edelmira

SACMAT'17 ~ A Datalog Framework for Modeling Relationship-based Access Control Policies


Pastewka, Niklas

TrustED'16 ~ Side-Channel Attacks on Fingerprint Matching Algorithms


Pastrana, Sergio

WISCS'16 ~ Shall We Collaborate? A Model to Analyse the Benefits of Information Sharing


Paterson, Kenneth G.

CCS'16 ~ A Surfeit of SSH Cipher Suites


Pattaranantakul, Montida

SDN-NFVSec'17 ~ A First Step Towards Security Extension for NFV Orchestrator


Patwa, Farhan

ABAC'17 ~ ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine

SACMAT'17 ~ Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment

SACMAT'17 ~ POSTER: Access Control Model for the Hadoop Ecosystem


Paverd, Andrew

CCS'16 ~ C-FLAT: Control-Flow Attestation for Embedded Systems Software

ASIA CCS'17 ~ The Circle Game: Scalable Private Membership Test Using Trusted Hardware


Paxson, Vern

CCS'16 ~ Host of Troubles: Multiple Host Ambiguities in HTTP Implementations

CCS'16 ~ PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-of-Registration


Payer, Mathias

ASIA CCS'17 ~ Control-Flow Hijacking: Are We Making Progress?

ASIA CCS'17 ~ DataShield: Configurable Data Confidentiality and Integrity

CCS'16 ~ Enforcing Least Privilege Memory Views for Multithreaded Applications

ASIA CCS'17 ~ Memory Safety for Embedded Devices with nesCheck

CCS'16 ~ TypeSan: Practical Type Confusion Detection


Peeters, Roel

SACMAT'17 ~ Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication


Peikert, Chris

CCS'16 ~ ???: Functional Lattice Cryptography


Pejó, Balázs

SCC'17 ~ To Cheat or Not to Cheat - A Game-Theoretic Analysis of Outsourced Computation Verification


Pellegrino, Giancarlo

CCS'16 ~ POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications


Peng, Chunyi

CCS'16 ~ New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks


Peng, Hui

CCS'16 ~ TypeSan: Practical Type Confusion Detection


Pereida García, Cesar

CCS'16 ~ "Make Sure DSA Signing Exponentiations Really are Constant-Time"


Perrig, Adrian

CCS'16 ~ DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How Hard Can It Be to Build a Secure Internet?

ASIA CCS'17 ~ The Case for In-Network Replay Suppression


Perrot, Nancy

MIST'16 ~ A New Risk Assessment Framework Using Graph Theory for Complex ICT Systems


Peter, Andreas

WISCS'16 ~ Private Sharing of IOCs and Sightings


Petracca, Giuseppe

SACMAT'17 ~ On Risk in Access Control Enforcement


Petschick, Matthias

SafeConfig'16 ~ A One-Year Perspective on Exposed In-memory Key-Value Stores


Petullo, W. Michael

MIST'16 ~ Studying Naďve Users and the Insider Threat with SimpleFlow


Pevný, Tomáš

AISec'16 ~ Discriminative Models for Multi-instance Problems with Tree Structure


Pfeffer, Jürgen

IWSPA'17 ~ Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software


Pfeiffer, Martin

SPSM'16 ~ Analyzing TETRA Location Privacy and Network Availability


Pham, Van-Thuan

CCS'16 ~ Coverage-based Greybox Fuzzing as Markov Chain


Piessens, Frank

ASIA CCS'17 ~ Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing


Pietersz, Mario

WiSec'17 ~ Constructive and Destructive Aspects of Adaptive Wormholes for the 5G Tactile Internet


Pietraszek, Tadek

SPSM'16 ~ Picasso: Lightweight Device Class Fingerprinting for Web Clients


Pinkas, Benny

ASIA CCS'17 ~ The Circle Game: Scalable Private Membership Test Using Trusted Hardware


Pipman, Itamar

CCS'16 ~ ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels


Pisharody, Sandeep

SDN-NFVSec'17 ~ Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments

MTD'16 ~ SDN based Scalable MTD Solution in Cloud Network


Plappert, Christian

CODASPY'17 ~ Secure Free-Floating Car Sharing for Offline Cars


Poepper, Christina

IoTPTS'17 ~ Foreword

ASIA CCS'17 ~ POSTER: Traffic Analysis Attacks in Anonymity Networks


Poettering, Bertram

CCS'16 ~ On the Provable Security of (EC)DSA Signatures


Pointcheval, David

ASIA CCS'17 ~ Functional Encryption with Oblivious Helper

ASIA CCS'17 ~ VTBPEKE: Verifier-based Two-Basis Password Exponential Key Exchange


Polakis, Jason

WPES'17 ~ That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms


Ponomarev, Dmitry

CCS'16 ~ Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations


Ponta, Serena Elisa

CODASPY'17 ~ Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications


Pöpper, Christina

ASIA CCS'17 ~ POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System


Porat, Ehood

SACMAT'17 ~ Authorization Enforcement Detection


Pouliot, David

CCS'16 ~ The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption


Preibusch, Sören

WPES'17 ~ Control versus Effort in Privacy Warnings for Webforms


Preneel, Bart

ASIA CCS'17 ~ Short Paper - SCM: Secure Code Memory Architecture


Pretschner, Alexander

CODASPY'17 ~ CODASPY'17 Conference/General Chairs' Welcome Message

CODASPY'17 ~ Detecting Patching of Executables without System Calls

SPRO'16 ~ VOT4CS: A Virtualization Obfuscation Tool for C#


Probst, Christian W.

MIST'16 ~ Towards Formal Analysis of Insider Threats for Auctions


Proctor, Robert W.

CCS'16 ~ An Empirical Study of Mnemonic Sentence-based Password Generation Strategies


Purvine, Emilie

SafeConfig'16 ~ A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks


Purwanto, Erick

ASIA CCS'17 ~ Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated


Pustogarov, Ivan

ASIA CCS'17 ~ Using Program Analysis to Synthesize Sensor Spoofing Attacks


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)