 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
Qian,
Chen
CCS'16 ~ Instant and Robust Authentication
and Key Agreement among Mobile Devices
Qian,
Zhiyun
CCS'16 ~ Android ION Hazard: The Curse
of Customizable Memory Management System
CCS'16
~ The Misuse of Android Unix Domain Sockets and Security Implications
Qin,
Zhan
CCS'16 ~ Heavy Hitter Estimation over Set-Valued
Data with Local Differential Privacy
Quan,
Wei
MIST'16 ~ Ports Distribution Management
for Privacy Protection inside Local Domain Name System
|
| |
Quax,
Peter
WiSec'17 ~ POSTER: Assessing the Impact
of 802.11 Vulnerabilities using Wicability
Quay-de
la Vallee, Hannah
SPSM'16 ~ On a (Per)Mission: Building Privacy
Into the App Marketplace
Rabadi,
Dima
ASIA CCS'17 ~ Taming Asymmetric Network
Delays for Clock Synchronization Using Power Grid Voltage
Rabin,
Tal
CCS'16 ~ Attribute-based Key Exchange with
General Policies
|
| |
Rabitti,
Alvise
CCS'16 ~ Content Security Problems? Evaluating
the Effectiveness of Content Security Policy in the Wild
Raghunathan,
Ananth
CCS'16 ~ Frodo: Take off the Ring! Practical,
Quantum-Secure Key Exchange from LWE
Rahman,
M. Ashiqur
SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource
Allocation using Network Function Virtualization
Rajagopalan,
S. Raj
CODASPY'17 ~ The Human Capital Model for
Security Research: New Insights into Technology Transition
Rakotomanga,
Mary-Andréa
CODASPY'17 ~ Decompression Quines and Anti-Viruses
|
| |
Ramakrishnan,
Naren
AISec'16 ~ Causality-based Sensemaking
of Network Traffic for Android Application Security
Ramamurthy,
Byrav
SDN-NFVSec'17 ~ ScienceSDS: A Novel Software
Defined Security Framework for Large-scale Data-intensive Science
Ramokapane,
Kopo M.
CCSW'16 ~ Assured Deletion in the Cloud:
Requirements, Challenges and Future Directions
Randmets,
Jaak
CCS'16 ~ Alternative Implementations of
Secure Real Numbers
Rane,
Shantanu
CODASPY'17 ~ Achieving Differential Privacy
in Secure Multiparty Data Aggregation Protocols on Star Networks
Rangaswami,
Raju
CCS'16 ~ ProvUSB: Block-level Provenance-Based
Data Protection for USB Storage Devices
|
| |
Ranise,
Silvio
CODASPY'17 ~ Aegis: Automatic Enforcement
of Security Policies in Workflow-driven Web Applications
SACMAT'17
~ Security Analysis and Legal Compliance Checking for the Design
of Privacy-friendly Information Systems
Rao,
Vanishree
CODASPY'17 ~ Achieving Differential Privacy
in Secure Multiparty Data Aggregation Protocols on Star Networks
Rashid,
Awais
CCSW'16 ~ Assured Deletion in the Cloud:
Requirements, Challenges and Future Directions
CPS-SPC'16
~ SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion
Detection
Rashid,
Tabish
MIST'16 ~ A New Take on Detecting Insider
Threats: Exploring the Use of Hidden Markov Models
Rashidi,
Bahman
SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource
Allocation using Network Function Virtualization
Rasmussen,
Kasper B.
ASIA CCS'17 ~ Evaluating Behavioral Biometrics
for Continuous Authentication: Challenges and Metrics
WPES'17
~ Generating Secret Keys from Biometric Body Impedance Measurements
CCS'16
~ Using Reflexive Eye Movements for Fast Challenge-Response Authentication
|
| |
Rastogi,
Aseem
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
Rattanavipanon,
Norrathep
ASIA CCS'17 ~ Lightweight Swarm Attestation:
A Tale of Two LISA-s
Rauf,
Usman
MTD'16 ~ Formal Approach for Resilient
Reachability based onEnd-System Route Agility
Rawiel,
Robin
CCS'16 ~ POSTER: I Don't Want That Content!
On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
Ray,
Indrajit
ABAC'17 ~ Attribute Based Access Control
for Healthcare Resources
Ray,
Indrakshi
ABAC'17 ~ Attribute Based Access Control
for Healthcare Resources
|
| |
Raychev,
Veselin
CCS'16 ~ Statistical Deobfuscation of Android
Applications
Raykova,
Mariana
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
Raza,
Shahid
IoTPTS'17 ~ Intrusion Detection in the
RPL-connected 6LoWPAN Networks
Razavi,
Kaveh
CCS'16 ~ Drammer: Deterministic Rowhammer
Attacks on Mobile Platforms
Reaves,
Bradley
WiSec'17 ~ Detecting SMS Spam in the Age
of Legitimate Bulk Messaging
Rechberger,
Christian
CCS'16 ~ MPC-Friendly Symmetric Key Primitives
|
| |
Reddy,
A. L. Narasimha
CPSS'17 ~ Towards Improving Data Validity
of Cyber-Physical Systems through Path Redundancy
Redmiles,
Elissa M.
CCS'16 ~ How I Learned to be Secure: A
Census-Representative Survey of Security Advice Sources and Behavior
Reed,
Andrew
CODASPY'17 ~ Identifying HTTPS-Protected
Netflix Videos in Real-Time
Rein,
Andre
ASIA CCS'17 ~ DRIVE: Dynamic Runtime Integrity
Verification and Evaluation
Reischuk,
Raphael M.
CCS'16 ~ DEMO: Easy Deployment of a Secure
Internet Architecture for the 21st Century: How Hard Can It Be to Build
a Secure Internet?
Reiter,
Michael K.
CCS'16 ~ 8th ACM Cloud Computing Security
Workshop
CCS'16
~ A Software Approach to Defeating Side Channels in Last-Level
Caches
CCS'16
~ Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art
Face Recognition
ASIA
CCS'17 ~ Detecting Privileged Side-Channel Attacks in Shielded
Execution with Déjà Vu
CCSW'16
~ Foreword
|
| |
Ren,
Kui
CCS'16 ~ Heavy Hitter Estimation over Set-Valued
Data with Local Differential Privacy
CCS'16
~ My Smartphone Knows What You Print: Exploring Smartphone-based
Side-channel Attacks Against 3D Printers
Renault,
Guenaël
SPRO'16 ~ Binary Permutation Polynomial
Inversion and Application to Obfuscation Techniques
Reparaz,
Oscar
TIS'16 ~ Masking AES with d+1 Shares
in Hardware
Rescorla,
Eric
CCS'16 ~ A Systematic Analysis of the Juniper
Dual EC Incident
Rhee,
Junghwan
CCS'16 ~ High Fidelity Data Reduction for
Big Data Security Dependency Analyses
Richard
III, Golden G.
WiSec'17 ~ Don't Touch that Column: Portable,
Fine-Grained Access Control for Android's Native Content Providers
|
| |
Rieck,
Konrad
ASIA CCS'17 ~ Automatically Inferring Malware
Signatures for Anti-Virus Assisted Attacks
CODASPY'17
~ Mining Attributed Graphs for Threat Intelligence
CCS'16
~ Twice the Bits, Twice the Trouble: Vulnerabilities Induced
by Migrating to 64-Bit Platforms
Riis
Nielson, Hanne
PLAS'16 ~ Future-dependent Flow Policies
with Prophetic Variables
Rijmen,
Vincent
TIS'16 ~ Masking AES with d+1 Shares
in Hardware
CCS'16
~ Theory of Implementation Security Workshop (TIs 2016)
TIS'16
~ Theory of Implementation Security Workshop 2016: TIS 2016
Riley,
Ryan
ASIA CCS'17 ~ On the Detection of Kernel-Level
Rootkits Using Hardware Performance Counters
Ringer,
Talia
CCS'16 ~ AUDACIOUS: User-Driven Access
Control with Unmodified Operating Systems
Rist,
Lukas
CODASPY'17 ~ Mining Attributed Graphs for
Threat Intelligence
|
| |
Ristenpart,
Thomas
CCS'16 ~ Breaking Web Applications Built
On Top of Encrypted Data
ASIA
CCS'17 ~ Using Program Analysis to Synthesize Sensor Spoofing
Attacks
Ritzdorf,
Hubert
CCSW'16 ~ On Information Leakage in Deduplicated
Storage Systems
CCS'16
~ On the Security and Performance of Proof of Work Blockchains
SCC'17
~ Reconciling Security and Functional Requirements in Multi-tenant
Clouds
Robert,
Jean-Marc
WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud
Resistant Distance-Bounding Protocol
ASIA
CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous
Distance-bounding Protocol
Roberts,
Joshua
ABAC'17 ~ Imposing Fine-grain Next Generation
Access Control over Database Queries
Roblin,
Raphaël
SPRO'16 ~ Binary Permutation Polynomial
Inversion and Application to Obfuscation Techniques
Robyns,
Pieter
WiSec'17 ~ POSTER: Assessing the Impact
of 802.11 Vulnerabilities using Wicability
|
| |
Rocchetto,
Marco
ASIA CCS'17 ~ Towards Formal Security Analysis
of Industrial Control Systems
Rocha,
Francisco
CPS-SPC'16 ~ Towards Safe and Secure Autonomous
and Cooperative Vehicle Ecosystems
Roche,
Daniel S.
CCS'16 ~ POPE: Partial Order Preserving
Encoding
Rodriguez,
Armando
SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant
Release of Medical Records Using the History Aware Programming Language
Rodriguez,
Rodney
SACMAT'17 ~ NTApps: A Network Traffic Analyzer
of Android Applications
Roeschlin,
Marc
WPES'17 ~ Generating Secret Keys from Biometric
Body Impedance Measurements
CCS'16
~ Using Reflexive Eye Movements for Fast Challenge-Response Authentication
|
| |
Roesner,
Franziska
CCS'16 ~ AUDACIOUS: User-Driven Access
Control with Unmodified Operating Systems
Rokach,
Lior
AISec'16 ~ SherLock vs Moriarty: A Smartphone
Dataset for Cybersecurity Research
Roli,
Fabio
AISec'16 ~ Secure Kernel Machines against
Evasion Attacks
Romano,
Giovanni
WPES'17 ~ Automatic Assessment of Website
Compliance to the European Cookie Law with CooLCheck
Ronzani,
Daniel
ASIA CCS'17 ~ CoverUp: Privacy Through
"Forced" Participation in Anonymous Communication Networks
Roop,
Partha S.
ASIA CCS'17 ~ POSTER: Detecting Inter-App
Information Leakage Paths
|
| |
Rosa,
Marco
WISCS'16 ~ Managing Data Sharing in OpenStack
Swift with Over-Encryption
CCS'16
~ Mix&Slice: Efficient Access Revocation in the Cloud
Rossow,
Christian
CCS'16 ~ Identifying the Scan and Attack
Infrastructures Behind Amplification DDoS Attacks
CCS'16
~ POSTER: Mapping the Landscape of Large-Scale Vulnerability
Notifications
Rosulek,
Mike
CCS'16 ~ Efficient Batched Oblivious PRF
with Applications to Private Set Intersection
CCS'16
~ Garbling Gadgets for Boolean and Arithmetic Circuits
Rotaru,
Dragos
CCS'16 ~ MPC-Friendly Symmetric Key Primitives
Roth,
Volker
CCS'16 ~ POSTER: Re-Thinking Risks and
Rewards for Trusted Third Parties
CCS'16
~ POSTER: Towards Highly Interactive Honeypots for Industrial
Control Systems
Roundy,
Kevin
CODASPY'17 ~ Large-Scale Identification
of Malicious Singleton Files
|
| |
Rousseau,
Franck
WiSec'17 ~ Defeating MAC Address Randomization
Through Timing Attacks
Roussev,
Vassil
WiSec'17 ~ Don't Touch that Column: Portable,
Fine-Grained Access Control for Android's Native Content Providers
Roychoudhury,
Abhik
CCS'16 ~ Coverage-based Greybox Fuzzing
as Markov Chain
Ruan,
Na
CCS'16 ~ When CSI Meets Public WiFi: Inferring
Your Mobile Phone Password via WiFi Signals
Ruef,
Andrew
CCS'16 ~ Build It, Break It, Fix It: Contesting
Secure Development
Ruj,
Sushmita
BCC'17 ~ BCC'17 Chairs' Welcome
|
| |
Rupprecht,
Thomas
CCS'16 ~ POSTER: Identifying Dynamic Data
Structures in Malware
Rusinowitch,
Michael
WPES'17 ~ Detecting Communities under Differential
Privacy
Russo,
Alejandro
PLAS'16 ~ On Formalizing Information-Flow
Control Libraries
Russu,
Paolo
AISec'16 ~ Secure Kernel Machines against
Evasion Attacks
Rüth,
Jan
CODASPY'17 ~ Privacy-Preserving HMM Forward
Computation
Ruths,
Justin
CCS'16 ~ Limiting the Impact of Stealthy
Attacks on Industrial Control Systems
ASIA
CCS'17 ~ Model-based Attack Detection Scheme for Smart Water
Distribution Networks
|
| |
Ryder,
Barbara G.
CODASPY'17 ~ Prioritized Analysis of Inter-App
Communication Risks
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |