Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

Compilation Author Index


Qian, Chen

CCS'16 ~ Instant and Robust Authentication and Key Agreement among Mobile Devices


Qian, Zhiyun

CCS'16 ~ Android ION Hazard: The Curse of Customizable Memory Management System

CCS'16 ~ The Misuse of Android Unix Domain Sockets and Security Implications


Qin, Zhan

CCS'16 ~ Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy


Quan, Wei

MIST'16 ~ Ports Distribution Management for Privacy Protection inside Local Domain Name System


Quax, Peter

WiSec'17 ~ POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability


Quay-de la Vallee, Hannah

SPSM'16 ~ On a (Per)Mission: Building Privacy Into the App Marketplace


Rabadi, Dima

ASIA CCS'17 ~ Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid Voltage


Rabin, Tal

CCS'16 ~ Attribute-based Key Exchange with General Policies


Rabitti, Alvise

CCS'16 ~ Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild


Raghunathan, Ananth

CCS'16 ~ Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE


Rahman, M. Ashiqur

SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource Allocation using Network Function Virtualization


Rajagopalan, S. Raj

CODASPY'17 ~ The Human Capital Model for Security Research: New Insights into Technology Transition


Rakotomanga, Mary-Andréa

CODASPY'17 ~ Decompression Quines and Anti-Viruses


Ramakrishnan, Naren

AISec'16 ~ Causality-based Sensemaking of Network Traffic for Android Application Security


Ramamurthy, Byrav

SDN-NFVSec'17 ~ ScienceSDS: A Novel Software Defined Security Framework for Large-scale Data-intensive Science


Ramokapane, Kopo M.

CCSW'16 ~ Assured Deletion in the Cloud: Requirements, Challenges and Future Directions


Randmets, Jaak

CCS'16 ~ Alternative Implementations of Secure Real Numbers


Rane, Shantanu

CODASPY'17 ~ Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks


Rangaswami, Raju

CCS'16 ~ ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices


Ranise, Silvio

CODASPY'17 ~ Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications

SACMAT'17 ~ Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems


Rao, Vanishree

CODASPY'17 ~ Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks


Rashid, Awais

CCSW'16 ~ Assured Deletion in the Cloud: Requirements, Challenges and Future Directions

CPS-SPC'16 ~ SENAMI: Selective Non-Invasive Active Monitoring for ICS Intrusion Detection


Rashid, Tabish

MIST'16 ~ A New Take on Detecting Insider Threats: Exploring the Use of Hidden Markov Models


Rashidi, Bahman

SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource Allocation using Network Function Virtualization


Rasmussen, Kasper B.

ASIA CCS'17 ~ Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics

WPES'17 ~ Generating Secret Keys from Biometric Body Impedance Measurements

CCS'16 ~ Using Reflexive Eye Movements for Fast Challenge-Response Authentication


Rastogi, Aseem

PLAS'16 ~ Formal Verification of Smart Contracts: Short Paper


Rattanavipanon, Norrathep

ASIA CCS'17 ~ Lightweight Swarm Attestation: A Tale of Two LISA-s


Rauf, Usman

MTD'16 ~ Formal Approach for Resilient Reachability based onEnd-System Route Agility


Rawiel, Robin

CCS'16 ~ POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store


Ray, Indrajit

ABAC'17 ~ Attribute Based Access Control for Healthcare Resources


Ray, Indrakshi

ABAC'17 ~ Attribute Based Access Control for Healthcare Resources


Raychev, Veselin

CCS'16 ~ Statistical Deobfuscation of Android Applications


Raykova, Mariana

CCS'16 ~ 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs


Raza, Shahid

IoTPTS'17 ~ Intrusion Detection in the RPL-connected 6LoWPAN Networks


Razavi, Kaveh

CCS'16 ~ Drammer: Deterministic Rowhammer Attacks on Mobile Platforms


Reaves, Bradley

WiSec'17 ~ Detecting SMS Spam in the Age of Legitimate Bulk Messaging


Rechberger, Christian

CCS'16 ~ MPC-Friendly Symmetric Key Primitives


Reddy, A. L. Narasimha

CPSS'17 ~ Towards Improving Data Validity of Cyber-Physical Systems through Path Redundancy


Redmiles, Elissa M.

CCS'16 ~ How I Learned to be Secure: A Census-Representative Survey of Security Advice Sources and Behavior


Reed, Andrew

CODASPY'17 ~ Identifying HTTPS-Protected Netflix Videos in Real-Time


Rein, Andre

ASIA CCS'17 ~ DRIVE: Dynamic Runtime Integrity Verification and Evaluation


Reischuk, Raphael M.

CCS'16 ~ DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How Hard Can It Be to Build a Secure Internet?


Reiter, Michael K.

CCS'16 ~ 8th ACM Cloud Computing Security Workshop

CCS'16 ~ A Software Approach to Defeating Side Channels in Last-Level Caches

CCS'16 ~ Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition

ASIA CCS'17 ~ Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu

CCSW'16 ~ Foreword


Ren, Kui

CCS'16 ~ Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy

CCS'16 ~ My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers


Renault, Guenaël

SPRO'16 ~ Binary Permutation Polynomial Inversion and Application to Obfuscation Techniques


Reparaz, Oscar

TIS'16 ~ Masking AES with d+1 Shares in Hardware


Rescorla, Eric

CCS'16 ~ A Systematic Analysis of the Juniper Dual EC Incident


Rhee, Junghwan

CCS'16 ~ High Fidelity Data Reduction for Big Data Security Dependency Analyses


Richard III, Golden G.

WiSec'17 ~ Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers


Rieck, Konrad

ASIA CCS'17 ~ Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks

CODASPY'17 ~ Mining Attributed Graphs for Threat Intelligence

CCS'16 ~ Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms


Riis Nielson, Hanne

PLAS'16 ~ Future-dependent Flow Policies with Prophetic Variables


Rijmen, Vincent

TIS'16 ~ Masking AES with d+1 Shares in Hardware

CCS'16 ~ Theory of Implementation Security Workshop (TIs 2016)

TIS'16 ~ Theory of Implementation Security Workshop 2016: TIS 2016


Riley, Ryan

ASIA CCS'17 ~ On the Detection of Kernel-Level Rootkits Using Hardware Performance Counters


Ringer, Talia

CCS'16 ~ AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems


Rist, Lukas

CODASPY'17 ~ Mining Attributed Graphs for Threat Intelligence


Ristenpart, Thomas

CCS'16 ~ Breaking Web Applications Built On Top of Encrypted Data

ASIA CCS'17 ~ Using Program Analysis to Synthesize Sensor Spoofing Attacks


Ritzdorf, Hubert

CCSW'16 ~ On Information Leakage in Deduplicated Storage Systems

CCS'16 ~ On the Security and Performance of Proof of Work Blockchains

SCC'17 ~ Reconciling Security and Functional Requirements in Multi-tenant Clouds


Robert, Jean-Marc

WiSec'17 ~ A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol

ASIA CCS'17 ~ A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol


Roberts, Joshua

ABAC'17 ~ Imposing Fine-grain Next Generation Access Control over Database Queries


Roblin, Raphaël

SPRO'16 ~ Binary Permutation Polynomial Inversion and Application to Obfuscation Techniques


Robyns, Pieter

WiSec'17 ~ POSTER: Assessing the Impact of 802.11 Vulnerabilities using Wicability


Rocchetto, Marco

ASIA CCS'17 ~ Towards Formal Security Analysis of Industrial Control Systems


Rocha, Francisco

CPS-SPC'16 ~ Towards Safe and Secure Autonomous and Cooperative Vehicle Ecosystems


Roche, Daniel S.

CCS'16 ~ POPE: Partial Order Preserving Encoding


Rodriguez, Armando

SACMAT'17 ~ Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language


Rodriguez, Rodney

SACMAT'17 ~ NTApps: A Network Traffic Analyzer of Android Applications


Roeschlin, Marc

WPES'17 ~ Generating Secret Keys from Biometric Body Impedance Measurements

CCS'16 ~ Using Reflexive Eye Movements for Fast Challenge-Response Authentication


Roesner, Franziska

CCS'16 ~ AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems


Rokach, Lior

AISec'16 ~ SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research


Roli, Fabio

AISec'16 ~ Secure Kernel Machines against Evasion Attacks


Romano, Giovanni

WPES'17 ~ Automatic Assessment of Website Compliance to the European Cookie Law with CooLCheck


Ronzani, Daniel

ASIA CCS'17 ~ CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks


Roop, Partha S.

ASIA CCS'17 ~ POSTER: Detecting Inter-App Information Leakage Paths


Rosa, Marco

WISCS'16 ~ Managing Data Sharing in OpenStack Swift with Over-Encryption

CCS'16 ~ Mix&Slice: Efficient Access Revocation in the Cloud


Rossow, Christian

CCS'16 ~ Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks

CCS'16 ~ POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications


Rosulek, Mike

CCS'16 ~ Efficient Batched Oblivious PRF with Applications to Private Set Intersection

CCS'16 ~ Garbling Gadgets for Boolean and Arithmetic Circuits


Rotaru, Dragos

CCS'16 ~ MPC-Friendly Symmetric Key Primitives


Roth, Volker

CCS'16 ~ POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties

CCS'16 ~ POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems


Roundy, Kevin

CODASPY'17 ~ Large-Scale Identification of Malicious Singleton Files


Rousseau, Franck

WiSec'17 ~ Defeating MAC Address Randomization Through Timing Attacks


Roussev, Vassil

WiSec'17 ~ Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers


Roychoudhury, Abhik

CCS'16 ~ Coverage-based Greybox Fuzzing as Markov Chain


Ruan, Na

CCS'16 ~ When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals


Ruef, Andrew

CCS'16 ~ Build It, Break It, Fix It: Contesting Secure Development


Ruj, Sushmita

BCC'17 ~ BCC'17 Chairs' Welcome


Rupprecht, Thomas

CCS'16 ~ POSTER: Identifying Dynamic Data Structures in Malware


Rusinowitch, Michael

WPES'17 ~ Detecting Communities under Differential Privacy


Russo, Alejandro

PLAS'16 ~ On Formalizing Information-Flow Control Libraries


Russu, Paolo

AISec'16 ~ Secure Kernel Machines against Evasion Attacks


Rüth, Jan

CODASPY'17 ~ Privacy-Preserving HMM Forward Computation


Ruths, Justin

CCS'16 ~ Limiting the Impact of Stealthy Attacks on Industrial Control Systems

ASIA CCS'17 ~ Model-based Attack Detection Scheme for Smart Water Distribution Networks


Ryder, Barbara G.

CODASPY'17 ~ Prioritized Analysis of Inter-App Communication Risks


 

(Return to Top to Navigate the SIGSAC 2016-17 Compilation Author Index)