 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
Naccache,
David
ASIA CCS'17 ~ The Case for System Command
Encryption
Nadig
Anantha, Deepak
SDN-NFVSec'17 ~ ScienceSDS: A Novel Software
Defined Security Framework for Large-scale Data-intensive Science
Naehrig,
Michael
CCS'16 ~ Frodo: Take off the Ring! Practical,
Quantum-Secure Key Exchange from LWE
Naghmouchi,
M. Yassine
MIST'16 ~ A New Risk Assessment Framework
Using Graph Theory for Complex ICT Systems
|
| |
Nandi,
Chandrakana
PLAS'16 ~ Automatic Trigger Generation
for Rule-based Smart Homes
Narayanan,
Arvind
CCS'16 ~ On the Instability of Bitcoin
without the Block Reward
CCS'16
~ Online Tracking: A 1-million-site Measurement and Analysis
Narayanan,
Viswesh
CCS'16 ~ A Secure Sharding Protocol for
Open Blockchains
Nardone,
Vittoria
ASIA CCS'17 ~ How Discover a Malware using
Model Checking
|
| |
Narouei,
Masoud
SACMAT'17 ~ Towards a Top-down Policy Engineering
Framework for Attribute-based Access Control
Nasr,
Aďcha Katajina
CCSW'16 ~ Co-location Resistant Strategy
with Full Resources Optimization
Nasr,
Milad
CCS'16 ~ GAME OF DECOYS: Optimal Decoy
Routing Through Game Theory
Naveed,
Muhammad
CCS'16 ~ Breaking Web Applications Built
On Top of Encrypted Data
Nepal,
Surya
ASIA CCS'17 ~ An Efficient KP-ABE with
Short Ciphertexts in Prime OrderGroups under Standard Assumption
|
| |
Neugschwandtner,
Matthias
SCC'17 ~ Reconciling Security and Functional
Requirements in Multi-tenant Clouds
Neuman,
Clifford
CPS-SPC'16 ~ Evaluating Resilience of Gas
Pipeline Systems Under Cyber-Physical Attacks: A Function-Based Methodology
Neumann,
Stephan
CCS'16 ~ POSTER: Towards Collaboratively
Supporting Decision Makers in Choosing Suitable Authentication Schemes
Neven,
Gregory
WiSec'17 ~ POSTER: Toward a Secure and
Scalable Attestation
CCS'16
~ SANA: Secure and Scalable Aggregate Network Attestation
Nguyen,
Hiep H.
WPES'17 ~ Detecting Communities under Differential
Privacy
Nguyen,
Thi Ngoc Tho
CCS'16 ~ Leave Your Phone at the Door:Side
Channels that Reveal Factory Floor Secrets
|
| |
Nguyen,
Thien Duc
WiSec'17 ~ Poster: Friend or Foe? Context
Authentication for Trust Domain Separation in IoT Environments
Niakanlahiji,
Amirreza
MTD'16 ~ Multi-dimensional Host Identity
Anonymization for Defeating Skilled Attackers
Nicolay,
Jens
PLAS'16 ~ Static Detection of User-specified
Security Vulnerabilities in Client-side JavaScript
Niculaescu,
Oana-Georgiana
CODASPY'17 ~ Differentially-Private Big
Data Analytics for High-Speed Research Network Traffic Measurement
Nielsen,
Rodney
SACMAT'17 ~ Towards a Top-down Policy Engineering
Framework for Attribute-based Access Control
Nielson,
Flemming
PLAS'16 ~ Future-dependent Flow Policies
with Prophetic Variables
|
| |
Nikolaenko,
Valeria
CCS'16 ~ Frodo: Take off the Ring! Practical,
Quantum-Secure Key Exchange from LWE
Nikov,
Ventzislav
TIS'16 ~ Masking AES with d+1 Shares
in Hardware
Nikova,
Svetla
TIS'16 ~ Masking AES with d+1 Shares
in Hardware
CCS'16
~ Theory of Implementation Security Workshop (TIs 2016)
TIS'16
~ Theory of Implementation Security Workshop 2016: TIS 2016
Ning,
Peng
ASIA CCS'17 ~ PrivWatcher: Non-bypassable
Monitoring and Protection of Process Credentials from Memory Corruption
Attacks
ASIA
CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface
Analysis of Access Control Policy for Security Enhanced Android
Nirjon,
Shahriar
CODASPY'17 ~ Seamless and Secure Bluetooth
LE Connection Migration
Nishide,
Takashi
APKC'17 ~ One-time Programs with Cloud
Storage and Its Application to Electronic Money
|
| |
Nissim,
Kobbi
CCS'16 ~ Generic Attacks on Secure Outsourced
Databases
Niu,
Jianwei
SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant
Release of Medical Records Using the History Aware Programming Language
SACMAT'17
~ Verifiable Assume-Guarantee Privacy Specifications for Actor
Component Architectures
Noack,
David
ASIA CCS'17 ~ Secure Wallet-Assisted Offline
Bitcoin Payments with Double-Spender Revocation
Nof,
Ariel
CCS'16 ~ Demo: High-Throughput Secure Three-Party
Computation of Kerberos Ticket Generation
CCS'16
~ High-Throughput Semi-Honest Secure Three-Party Computation
with an Honest Majority
Noh,
Juhwan
WiSec'17 ~ Dissecting Customized Protocols:
Automatic Analysis for Customized Protocols based on IEEE 802.15.4
Nordahl,
Christian
CCSW'16 ~ Executing Boolean Queries on
an Encrypted Bitmap Index
|
| |
Nordbotten,
Nils A.
IWSPA'17 ~ An Internal/Insider Threat Score
for Data Loss Prevention and Detection
Nordholz,
Jan
CODASPY'17 ~ Fault Attacks on Encrypted
General Purpose Compute Platforms
Noroozian,
Arman
ASIA CCS'17 ~ The Role of Hosting Providers
in Fighting Command and Control Infrastructure of Financial Malware
Noubir,
Guevara
WiSec'17 ~ Fingerprinting Wi-Fi Devices
Using Software Defined Radios
WiSec'17
~ Interleaving Jamming in Wi-Fi Networks
Noura,
Hassan
CCS'16 ~ POSTER: A Keyless Efficient Algorithm
for Data Protection by Means of Fragmentation
Nurse,
Jason R. C.
MIST'16 ~ A New Take on Detecting Insider
Threats: Exploring the Use of Hidden Markov Models
|
| |
Nuseibeh,
Bashar
CPSS'17 ~ On the Disappearing Boundary
Between Digital, Physical, and Social Spaces - Who, What, Where and
When?
ASIA
CCS'17 ~ POSTER: Enabling End-Users to Protect their Privacy
Nyman,
Thomas
CCS'16 ~ C-FLAT: Control-Flow Attestation
for Embedded Systems Software
Ochoa,
Martín
CPSS'17 ~ SIPHON: Towards Scalable High-Interaction
Physical Honeypots
Oehmen,
Christopher
MTD'16 ~ Formal Approach for Resilient
Reachability based onEnd-System Route Agility
SafeConfig'16
~ SafeConfig'16: Testing and Evaluation for Active & Resilient
Cyber Systems Panel: Verification of Active and Resilient Systems: Practical
or Utopian?
Ohara,
Kazuma
CCS'16 ~ Demo: High-Throughput Secure Three-Party
Computation of Kerberos Ticket Generation
CCS'16
~ High-Throughput Semi-Honest Secure Three-Party Computation
with an Honest Majority
Ohrimenko,
Olga
CCS'16 ~ Hash First, Argue Later: Adaptive
Verifiable Computations on Outsourced Data
|
| |
Okamoto,
Eiji
APKC'17 ~ One-time Programs with Cloud
Storage and Its Application to Electronic Money
Okhravi,
Hamed
MTD'16 ~ Have No PHEAR: Networks Without
Identifiers
Oleshchuk,
Vladimir A.
SACMAT'17 ~ A Distributed Multi-Authority
Attribute Based Encryption Scheme for Secure Sharing of Personal Health
Records
Olickel,
Hrishi
CCS'16 ~ Making Smart Contracts Smarter
Omar,
Hamza
SACMAT'17 ~ Leveraging Hardware Isolation
for Process Level Access Control & Authentication
Omri,
Eran
CCS'16 ~ Optimizing Semi-Honest Secure
Multiparty Computation for the Internet
|
| |
Önalan,
Aysun Gurur
TrustED'16 ~ Online Reliability Testing
for PUF Key Derivation
O'Neill,
Adam
CCS'16 ~ Generic Attacks on Secure Outsourced
Databases
Önen,
Melek
CCSW'16 ~ Message-Locked Proofs of Retrievability
with Secure Deduplication
SCC'17
~ Reconciling Security and Functional Requirements in Multi-tenant
Clouds
Onete,
Cristina
WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud
Resistant Distance-Bounding Protocol
ASIA
CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous
Distance-bounding Protocol
Ong,
Toan
ABAC'17 ~ Attribute Based Access Control
for Healthcare Resources
Onwuzurike,
Lucky
WiSec'17 ~ POSTER: Experimental Analysis
of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps
|
| |
Ordean,
Mihai
ASIA CCS'17 ~ An Attack Against Message
Authentication in the ERTMS Train to Trackside Communication Protocols
Orikogbo,
Damilola
SPSM'16 ~ CRIOS: Toward Large-Scale iOS
Application Analysis
Orlandi,
Claudio
SPSM'16 ~ On the CCA (in)Security of MTProto
Orsini,
Emmanuela
CCS'16 ~ MASCOT: Faster Malicious Arithmetic
Secure Computation with Oblivious Transfer
Oswald,
David
TrustED'16 ~ Side-Channel Attacks on Fingerprint
Matching Algorithms
TrustED'16
~ Wireless Attacks on Automotive Remote Keyless Entry Systems
Ott,
Jason
CCS'16 ~ The Misuse of Android Unix Domain
Sockets and Security Implications
|
| |
Ouadjaout,
Abdelraouf
CODASPY'17 ~ Sound and Static Analysis
of Session Fixation Vulnerabilities in PHP Web Applications
Oudejans,
Joris
BCC'17 ~ DecReg: A Framework for Preventing
Double-Financing using Blockchain Technology
P.V.,
Rajkumar
CCS'16 ~ POSTER: Security Enhanced Administrative
Role Based Access Control Models
Paar,
Christof
WiSec'17 ~ Constructive and Destructive
Aspects of Adaptive Wormholes for the 5G Tactile Internet
ASIA
CCS'17 ~ Hardware Trojans and Other Threats against Embedded
Systems
Pachmanov,
Lev
CCS'16 ~ ECDSA Key Extraction from Mobile
Devices via Nonintrusive Physical Side Channels
Paindavoine,
Marie
ASIA CCS'17 ~ BlindIDS: Market-Compliant
and Privacy-Friendly Intrusion Detection System over Encrypted Traffic
|
| |
Pais,
Alwyn R.
CPSS'17 ~ Detecting Phishing Websites using
Automation of Human Behavior
Pan,
Xiang
CCS'16 ~ CSPAutoGen: Black-box Enforcement
of Content Security Policy upon Real-world Websites
Panage,
Pranav
ASIA CCS'17 ~ DroidForensics: Accurate
Reconstruction of Android Attacks via Multi-layer Forensic Logging
Panchenko,
Andriy
CCS'16 ~ POSTER: Fingerprinting Tor Hidden
Services
Panico,
Agostino
SafeConfig'16 ~ AHEAD: A New Architecture
for Active Defense
Papadimitratos,
Panos
WiSec'17 ~ Foreword
CCS'16
~ Security on Wheels: Security and Privacy for Vehicular Communication
Systems
|
| |
Papernot,
Nicolas
ASIA CCS'17 ~ Practical Black-Box Attacks
against Machine Learning
Pappas,
Christos
ASIA CCS'17 ~ The Case for In-Network Replay
Suppression
Paraboschi,
Stefano
WISCS'16 ~ Managing Data Sharing in OpenStack
Swift with Over-Encryption
CCS'16
~ Mix&Slice: Efficient Access Revocation in the Cloud
Parde,
Natalie
SACMAT'17 ~ Towards a Top-down Policy Engineering
Framework for Attribute-based Access Control
Park,
Jaehong
CODASPY'17 ~ Classifying and Comparing
Attribute-Based and Relationship-Based Access Control
Park,
Jaewoo
CCS'16 ~ POSTER: WiPING: Wi-Fi signal-based
PIN Guessing attack
|
| |
Park,
Jungho
CCS'16 ~ PIPSEA: A Practical IPsec Gateway
on Embedded APUs
Park,
Shinjo
SPSM'16 ~ White Rabbit in Mobile: Effect
of Unsecured Clock Source in Smartphones
Park,
Younghee
SDN-NFVSec'17 ~ Dynamic Defense Provision
via Network Functions Virtualization
SDN-NFVSec'17
~ Towards Effective Virtualization of Intrusion Detection Systems
Parker,
James
CCS'16 ~ Build It, Break It, Fix It: Contesting
Secure Development
Parkin,
Simon
MIST'16 ~ Pragmatic Security: Modelling
IT Security Management Responsibilities for SME Archetypes
Parno,
Bryan
CCS'16 ~ Hash First, Argue Later: Adaptive
Verifiable Computations on Outsourced Data
|
| |
Pasarella,
Edelmira
SACMAT'17 ~ A Datalog Framework for Modeling
Relationship-based Access Control Policies
Pastewka,
Niklas
TrustED'16 ~ Side-Channel Attacks on Fingerprint
Matching Algorithms
Pastrana,
Sergio
WISCS'16 ~ Shall We Collaborate? A Model
to Analyse the Benefits of Information Sharing
Paterson,
Kenneth G.
CCS'16 ~ A Surfeit of SSH Cipher Suites
Pattaranantakul,
Montida
SDN-NFVSec'17 ~ A First Step Towards Security
Extension for NFV Orchestrator
Patwa,
Farhan
ABAC'17 ~ ABAC with Group Attributes and
Attribute Hierarchies Utilizing the Policy Machine
SACMAT'17
~ Multi-Layer Authorization Framework for a Representative Hadoop
Ecosystem Deployment
SACMAT'17
~ POSTER: Access Control Model for the Hadoop Ecosystem
|
| |
Paverd,
Andrew
CCS'16 ~ C-FLAT: Control-Flow Attestation
for Embedded Systems Software
ASIA
CCS'17 ~ The Circle Game: Scalable Private Membership Test Using
Trusted Hardware
Paxson,
Vern
CCS'16 ~ Host of Troubles: Multiple Host
Ambiguities in HTTP Implementations
CCS'16
~ PREDATOR: Proactive Recognition and Elimination of Domain Abuse
at Time-of-Registration
Payer,
Mathias
ASIA CCS'17 ~ Control-Flow Hijacking: Are
We Making Progress?
ASIA
CCS'17 ~ DataShield: Configurable Data Confidentiality and Integrity
CCS'16
~ Enforcing Least Privilege Memory Views for Multithreaded Applications
ASIA
CCS'17 ~ Memory Safety for Embedded Devices with nesCheck
CCS'16
~ TypeSan: Practical Type Confusion Detection
Peeters,
Roel
SACMAT'17 ~ Uncoupling Biometrics from
Templates for Secure and Privacy-Preserving Authentication
Peikert,
Chris
CCS'16 ~ ???: Functional Lattice Cryptography
Pejó,
Balázs
SCC'17 ~ To Cheat or Not to Cheat - A Game-Theoretic
Analysis of Outsourced Computation Verification
|
| |
Pellegrino,
Giancarlo
CCS'16 ~ POSTER: Mapping the Landscape
of Large-Scale Vulnerability Notifications
Peng,
Chunyi
CCS'16 ~ New Security Threats Caused by
IMS-based SMS Service in 4G LTE Networks
Peng,
Hui
CCS'16 ~ TypeSan: Practical Type Confusion
Detection
Pereida
García, Cesar
CCS'16 ~ "Make Sure DSA Signing Exponentiations
Really are Constant-Time"
Perrig,
Adrian
CCS'16 ~ DEMO: Easy Deployment of a Secure
Internet Architecture for the 21st Century: How Hard Can It Be to Build
a Secure Internet?
ASIA
CCS'17 ~ The Case for In-Network Replay Suppression
Perrot,
Nancy
MIST'16 ~ A New Risk Assessment Framework
Using Graph Theory for Complex ICT Systems
|
| |
Peter,
Andreas
WISCS'16 ~ Private Sharing of IOCs and
Sightings
Petracca,
Giuseppe
SACMAT'17 ~ On Risk in Access Control Enforcement
Petschick,
Matthias
SafeConfig'16 ~ A One-Year Perspective
on Exposed In-memory Key-Value Stores
Petullo,
W. Michael
MIST'16 ~ Studying Naďve Users and the
Insider Threat with SimpleFlow
Pevný,
Tomáš
AISec'16 ~ Discriminative Models for Multi-instance
Problems with Tree Structure
Pfeffer,
Jürgen
IWSPA'17 ~ Model-based Cluster Analysis
for Identifying Suspicious Activity Sequences in Software
|
| |
Pfeiffer,
Martin
SPSM'16 ~ Analyzing TETRA Location Privacy
and Network Availability
Pham,
Van-Thuan
CCS'16 ~ Coverage-based Greybox Fuzzing
as Markov Chain
Piessens,
Frank
ASIA CCS'17 ~ Discovering Logical Vulnerabilities
in the Wi-Fi Handshake Using Model-Based Testing
Pietersz,
Mario
WiSec'17 ~ Constructive and Destructive
Aspects of Adaptive Wormholes for the 5G Tactile Internet
Pietraszek,
Tadek
SPSM'16 ~ Picasso: Lightweight Device Class
Fingerprinting for Web Clients
Pinkas,
Benny
ASIA CCS'17 ~ The Circle Game: Scalable
Private Membership Test Using Trusted Hardware
|
| |
Pipman,
Itamar
CCS'16 ~ ECDSA Key Extraction from Mobile
Devices via Nonintrusive Physical Side Channels
Pisharody,
Sandeep
SDN-NFVSec'17 ~ Dynamic Game based Security
framework in SDN-enabled Cloud Networking Environments
MTD'16
~ SDN based Scalable MTD Solution in Cloud Network
Plappert,
Christian
CODASPY'17 ~ Secure Free-Floating Car Sharing
for Offline Cars
Poepper,
Christina
IoTPTS'17 ~ Foreword
ASIA
CCS'17 ~ POSTER: Traffic Analysis Attacks in Anonymity Networks
Poettering,
Bertram
CCS'16 ~ On the Provable Security of (EC)DSA
Signatures
Pointcheval,
David
ASIA CCS'17 ~ Functional Encryption with
Oblivious Helper
ASIA
CCS'17 ~ VTBPEKE: Verifier-based Two-Basis Password Exponential
Key Exchange
|
| |
Polakis,
Jason
WPES'17 ~ That's the Way the Cookie Crumbles:
Evaluating HTTPS Enforcing Mechanisms
Ponomarev,
Dmitry
CCS'16 ~ Covert Channels through Random
Number Generator: Mechanisms, Capacity Estimation and Mitigations
Ponta,
Serena Elisa
CODASPY'17 ~ Aegis: Automatic Enforcement
of Security Policies in Workflow-driven Web Applications
Pöpper,
Christina
ASIA CCS'17 ~ POSTER: Localization of Spoofing
Devices using a Large-scale Air Traffic Surveillance System
Porat,
Ehood
SACMAT'17 ~ Authorization Enforcement Detection
Pouliot,
David
CCS'16 ~ The Shadow Nemesis: Inference
Attacks on Efficiently Deployable, Efficiently Searchable Encryption
|
| |
Preibusch,
Sören
WPES'17 ~ Control versus Effort in Privacy
Warnings for Webforms
Preneel,
Bart
ASIA CCS'17 ~ Short Paper - SCM: Secure
Code Memory Architecture
Pretschner,
Alexander
CODASPY'17 ~ CODASPY'17 Conference/General
Chairs' Welcome Message
CODASPY'17
~ Detecting Patching of Executables without System Calls
SPRO'16
~ VOT4CS: A Virtualization Obfuscation Tool for C#
Probst,
Christian W.
MIST'16 ~ Towards Formal Analysis of Insider
Threats for Auctions
Proctor,
Robert W.
CCS'16 ~ An Empirical Study of Mnemonic
Sentence-based Password Generation Strategies
Purvine,
Emilie
SafeConfig'16 ~ A Graph-Based Impact Metric
for Mitigating Lateral Movement Cyber Attacks
|
| |
Purwanto,
Erick
ASIA CCS'17 ~ Proofs of Data Residency:
Checking whether Your Cloud Files Have Been Relocated
Pustogarov,
Ivan
ASIA CCS'17 ~ Using Program Analysis to
Synthesize Sensor Spoofing Attacks
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |