Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

 

 

 

 

(Return to Top)

 

 

 

 

 

 

 

 

(Return to Top)

CCS'17 Table of Contents

CCS 2016 General Chair's Welcome
Stefan Katzenbeisser (TU Darmstadt)

Edgar Weippl (SBA Research)

CCS 2016 Program Chairs' Welcome
Shai Halevi (IBM Research)

Christopher Kruegel (University of California, Santa Barbara)

Andrew Myers (Cornell University)

CCS 2016 Conference Organization

CCS 2016 Sponsors & Supporters

Keynote

Paper Session 5B: Physically Based Authentication

Paper Session 9D: Internet Security

Paper Session 1A: Blockchain I

Paper Session 5C: Web Security

Paper Session 10A: Specialized Crypto Tools

Paper Session 1B: Differential Privacy

Paper Session 5D: Security Bug Finding

Paper Session 10B: Attacks using a Little Leakage

Paper Session 1C: Android Security

Paper Session 6A: Phone Security using Formal Methods

Paper Session 10C: Measuring Security in the Wild

Paper Session 1D: Hardware Protection

Paper Session 6B: Attestation

Paper Session 10D: Network Security I

Paper Session 2A: Blockchain II

Paper Session 6C: Mine your Literature

Paper Session 11A: Key Exchange

Paper Session 2B: Differentially Private Systems I

Paper Session 6D: Security Studies

Paper Session 11B: Crypto Implementations

Paper Session 2C: Access Control

Paper Session 7A: Secure MPC III

Paper Session 11C: More Attacks

Paper Session 2D: Security and Persistence

Paper Session 7B: Side-Channel Attacks

Paper Session 11D: Network Security II

Paper Session 3A: Smart Contracts

Paper Session 7C: Acoustic Attacks

Paper Session 12A: Secure Protocols

Paper Session 3B: Differentially Private Systems II

Paper Session 7D: Protection Across Executions

Paper Session 12B: DSA/ECDSA

Paper Session 3C: Mobile Software Analysis

Paper Session 8A: Lattices and Obfuscation

Paper Session 12C: Even more Attacks

Paper Session 3D: Kernel Memory Security

Paper Session 8B: Attacks and Defenses

Paper Session 12D: Anonymous Communication

Paper Session 4A: Secure MPC I

Paper Session 8C: Phone Security

Posters

Paper Session 4B: Attacks on Ciphers

Paper Session 8D: Infrastructure Attacks

Demonstrations

Paper Session 4C: Big Data Meets Security

Paper Session 9A: Order-Revealing and Searchable Encryption

Tutorials

Paper Session 4D: Types and Memory Safety

Paper Session 9B: Authentication

Pre-Conference Workshops co-located with CCS 2016

Paper Session 5A: Secure MPC II

Paper Session 9C: Passwords

Post-Conference Workshops co-located with CCS 2016

(Return to Top)

Keynote

Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic (Page 1)
Martin E. Hellman (Stanford University)

(Return to Top)

Paper Session 1A: Blockchain I

On the Security and Performance of Proof of Work Blockchains (Page 3)
Arthur Gervais (ETH Zurich)

Ghassan O. Karame (NEC Laboratories)

Karl Wüst (ETH Zurich)

Vasileios Glykantzis (ETH Zurich)

Hubert Ritzdorf (ETH Zurich)

Srdjan Čapkun (ETH Zurich)

A Secure Sharding Protocol for Open Blockchains (Page 17)
Loi Luu (National University of Singapore)

Viswesh Narayanan (National University of Singapore)

Chaodong Zheng (National University of Singapore)

Kunal Baweja (National University of Singapore)

Seth Gilbert (National University of Singapore)

Prateek Saxena (National University of Singapore)

The Honey Badger of BFT Protocols (Page 31)
Andrew Miller (University of Illinois at Urbana-Champaign)

Yu Xia (Massachusetts Institute of Technology)

Kyle Croman (Cornell University)

Elaine Shi (Cornell University)

Dawn Song (University of California, Berkeley)

(Return to Top)

Paper Session 1B: Differential Privacy

Differential Privacy as a Mutual Information Constraint (Page 43)
Paul Cuff (Princeton University)

Lanqing Yu (Princeton University)

Advanced Probabilistic Couplings for Differential Privacy (Page 55)
Gilles Barthe (IMDEA Software Institute)

Noémie Fong (Ecole Normale Superieure)

Marco Gaboardi (University at Buffalo, SUNY)

Benjamin Grégoire (INRIA)

Justin Hsu (University of Pennsylvania)

Pierre-Yves Strub (IMDEA Software Institute)

Differentially Private Bayesian Programming (Page 68)
Gilles Barthe (IMDEA Software)

Gian Pietro Farina (University at Buffalo, SUNY)

Marco Gaboardi (University a Buffalo, SUNY)

Emilio Jesús Gallego Arias (CRI Mines-ParisTech)

Andy Gordon (Microsoft Research)

Justin Hsu (University of Pennsylvania)

Pierre-Yves Strub (IMDEA Software)

(Return to Top)

Paper Session 1C: Android Security

The Misuse of Android Unix Domain Sockets and Security Implications (Page 80)
Yuru Shao (University of Michigan)

Jason Ott (University of California, Riverside)

Yunhan Jack Jia (University of Michigan)

Zhiyun Qian (University of California, Riverside)

Z. Morley Mao (University of Michigan)

Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback (Page 92)
Kai Wang (University of Chinese Academy of Sciences)

Yuqing Zhang (University of Chinese Academy of Sciences)

Peng Liu (The Pennsylvania State University)

Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android (Page 104)
Guliz Seray Tuncay (University of Illinois at Urbana-Champaign)

Soteris Demetriou (University of Illinois at Urbana-Champaign)

Carl A. Gunter (University of Illinois at Urbana-Champaign)

(Return to Top)

Paper Session 1D: Hardware Protection

Strong Non-Interference and Type-Directed Higher-Order Masking (Page 116)
Gilles Barthe (IMDEA Software Institute)

Sonia Belaïd (Thales Communications & Security)

François Dupressoir (IMDEA Software Institute)

Pierre-Alain Fouque (Université de Rennes 1)

Benjamin Grégoire (Inria Sophia-Antipolis - Méditerranée)

Pierre-Yves Strub (IMDEA Software Institute)

Rébecca Zucchini (Inria Sophia-Antipolis - Méditerranée & École Normale Supérieure de Cachan)

MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection (Page 130)
Yuanwen Huang (University of Florida)

Swarup Bhunia (University of Florida)

Prabhat Mishra (University of Florida)

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification (Page 142)
Stefan Dziembowski (University of Warsaw)

Sebastian Faust (Ruhr-University Bochum)

François-Xavier Standaert (Universite catholique de Louvain)

(Return to Top)

Paper Session 2A: Blockchain II

On the Instability of Bitcoin without the Block Reward (Page 154)
Miles Carlsten (Princeton University)

Harry Kalodner (Princeton University)

S. Matthew Weinberg (Princeton University)

Arvind Narayanan (Princeton University)

Transparency Overlays and Applications (Page 168)
Melissa Chase (Microsoft Research)

Sarah Meiklejohn (University College London)

(Return to Top)

Paper Session 2B: Differentially Private Systems I

EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation (Page 180)
Yilin Shen (Samsung Research America)

Hongxia Jin (Samsung Research America)

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy (Page 192)
Zhan Qin (Hamad Bin Khalifa University & State University of New York at Buffalo)

Yin Yang (Hamad Bin Khalifa University)

Ting Yu (Hamad Bin Khalifa University)

Issa Khalil (Hamad Bin Khalifa University)

Xiaokui Xiao (Nanyang Technological University)

Kui Ren (State University of New York at Buffalo)

(Return to Top)

Paper Session 2C: Access Control

AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems (Page 204)
Talia Ringer (University of Washington)

Dan Grossman (University of Washington)

Franziska Roesner (University of Washington)

Mix&Slice: Efficient Access Revocation in the Cloud (Page 217)
Enrico Bacis (Università di Bergamo)

Sabrina De Capitani di Vimercati (Università degli Studi di Milano)

Sara Foresti (Università degli Studi di Milano)

Stefano Paraboschi (Università di Bergamo)

Marco Rosa (Università di Bergamo)

Pierangela Samarati (Università degli Studi di Milano)

(Return to Top)

Paper Session 2D: Security and Persistence

Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency (Page 229)
Isaac Sheff (Cornell University)

Tom Magrino (Cornell University)

Jed Liu (Cornell University)

Andrew C. Myers (Cornell University)

Robbert van Renesse (Cornell University)

ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices (Page 242)
Dave (Jing) Tian (University of Florida)

Adam Bates (University of Illinois at Urbana-Champaign)

Kevin R.B. Butler (University of Florida)

Raju Rangaswami (Florida International University)

(Return to Top)

Paper Session 3A: Smart Contracts

Making Smart Contracts Smarter (Page 254)
Loi Luu (National University of Singapore)

Duc-Hiep Chu (National University of Singapore)

Hrishi Olickel (Yale-NUS College)

Prateek Saxena (National University of Singapore)

Aquinas Hobor (Yale-NUS College & National University of Singapore)

Town Crier: An Authenticated Data Feed for Smart Contracts (Page 270)
Fan Zhang (Cornell University)

Ethan Cecchetti (Cornell University)

Kyle Croman (Cornell University)

Ari Juels (Cornell Tech, Jacobs Institute)

Elaine Shi (Cornell University)

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts (Page 283)
Ari Juels (Cornell Tech, Jacobs Institute)

Ahmed Kosba (University of Maryland)

Elaine Shi (Cornell University)

(Return to Top)

Paper Session 3B: Differentially Private Systems II

DPSense: Differentially Private Crowdsourced Spectrum Sensing (Page 296)
Xiaocong Jin (Arizona State University)

Rui Zhang (University of Delaware)

Yimin Chen (Arizona State University)

Tao Li (Arizona State University)

Yanchao Zhang (Arizona State University)

Deep Learning with Differential Privacy (Page 308)
Martín Abadi (Google)

Andy Chu (Google)

Ian Goodfellow (Open AI)

H. Brendan McMahan (Google)

Ilya Mironov (Google)

Kunal Talwar (Google)

Li Zhang (Google)

Membership Privacy in MicroRNA-based Studies (Page 319)
Michael Backes (Saarland University & MPI-SWS)

Pascal Berrang (Saarland University)

Mathias Humbert (Saarland University)

Praveen Manoharan (Saarland University)

(Return to Top)

Paper Session 3C: Mobile Software Analysis

TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime (Page 331)
Mingshen Sun (The Chinese University of Hong Kong)

Tao Wei (Baidu, Inc.)

John C. S. Lui (The Chinese University of Hong Kong)

Statistical Deobfuscation of Android Applications (Page 343)
Benjamin Bichsel (ETH Zurich)

Veselin Raychev (ETH Zurich)

Petar Tsankov (ETH Zurich)

Martin Vechev (ETH Zurich)

Reliable Third-Party Library Detection in Android and its Security Applications (Page 356)
Michael Backes (Saarland University & MPI-SWS)

Sven Bugiel (Saarland University)

Erik Derr (Saarland University)

(Return to Top)

Paper Session 3D: Kernel Memory Security

Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR (Page 368)
Daniel Gruss (Graz University of Technology)

Clémentine Maurice (Graz University of Technology)

Anders Fogh (G DATA Advanced Analytics)

Moritz Lipp (Graz University of Technology)

Stefan Mangard (Graz University of Technology)

Breaking Kernel Address Space Layout Randomization with Intel TSX (Page 380)
Yeongjin Jang (Georgia Institute of Technology)

Sangho Lee (Georgia Institute of Technology)

Taesoo Kim (Georgia Institute of Technology)

Enforcing Least Privilege Memory Views for Multithreaded Applications (Page 393)
Terry Ching-Hsiang Hsu (Purdue University)

Kevin Hoffman (eFolder Inc.)

Patrick Eugster (Purdue University & TU Darmstadt)

Mathias Payer (Purdue University)

(Return to Top)

Paper Session 4A: Secure MPC I

Improvements to Secure Computation with Penalties (Page 406)
Ranjit Kumaresan (Massachusetts Institute of Technology)

Vinod Vaikuntanathan (Massachusetts Institute of)

Prashant Nalini Vasudevan (Massachusetts Institute of Technology)

Amortizing Secure Computation with Penalties (Page 418)
Ranjit Kumaresan (Massachusetts Institute of Technology)

Iddo Bentov (Cornell University)

MPC-Friendly Symmetric Key Primitives (Page 430)
Lorenzo Grassi (Graz University of Technology)

Christian Rechberger (Graz University of Technology)

Dragos Rotaru (University of Bristol)

Peter Scholl (University of Bristol)

Nigel P. Smart (University of Bristol)

(Return to Top)

Paper Session 4B: Attacks on Ciphers

Message-Recovery Attacks on Feistel-Based Format Preserving Encryption (Page 444)
Mihir Bellare (University of California, San Diego)

Viet Tung Hoang (Florida State University)

Stefano Tessaro (University of California, Santa Barbara)

On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN (Page 456)
Karthikeyan Bhargavan (Inria)

Gaëtan Leurent (Inria)

A Systematic Analysis of the Juniper Dual EC Incident (Page 468)
Stephen Checkoway (University of Illinois at Chicago)

Jacob Maskiewicz (University of California, San Diego)

Christina Garman (Johns Hopkins University)

Joshua Fried (University of Pennsylvania)

Shaanan Cohney (University of Pennsylvania)

Matthew Green (Johns Hopkins University)

Nadia Heninger (University of Pennsylvania)

Ralf-Philipp Weinmann (Comsecuris)

Eric Rescorla (University of California, San Diego)

Hovav Shacham (University of California, San Diego)

(Return to Top)

Paper Session 4C: Big Data Meets Security

Scalable Graph-based Bug Search for Firmware Images (Page 480)
Qian Feng (Syracuse University)

Rundong Zhou (Syracuse University)

Chengcheng Xu (Syracuse University)

Yao Cheng (Syracuse University)

Brian Testa (Syracuse University & Air Force Research Lab)

Heng Yin (Syracuse University & University of California, Riverside)

SmartWalk: Enhancing Social Network Security via Adaptive Random Walks (Page 492)
Yushan Liu (Princeton University)

Shouling Ji (Zhejiang University & Georgia Tech)

Prateek Mittal (Princeton University)

High Fidelity Data Reduction for Big Data Security Dependency Analyses (Page 504)
Zhang Xu (NofutzNetworks Inc.)

Zhenyu Wu (NEC Labs America, Inc.)

Zhichun Li (NEC Laboratories America Inc.)

Kangkook Jee (NEC Laboratories America Inc.)

Junghwan Rhee (NEC Laboratories America Inc.)

Xusheng Xiao (NEC Laboratories America Inc.)

Fengyuan Xu (Nanjing University)

Haining Wang (University of Delaware)

Guofei Jiang (NEC Laboratories America Inc.)

(Return to Top)

Paper Session 4D: Types and Memory Safety

TypeSan: Practical Type Confusion Detection (Page 517)
Istvan Haller (Vrije Universiteit Amsterdam)

Yuseok Jeon (Purdue University)

Hui Peng (Purdue University)

Mathias Payer (Purdue University)

Cristiano Giuffrida (Vrije Universiteit Amsterdam)

Herbert Bos (Vrije Universiteit Amsterdam)

Erik van der Kouwe (Vrije Universiteit Amsterdam)

CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump (Page 529)
Jun Xu (The Pennsylvania State University)

Dongliang Mu (Nanjing University & The Pennsylvania State University)

Ping Chen (The Pennsylvania State University)

Xinyu Xing (The Pennsylvania State University)

Pei Wang (The Pennsylvania State University)

Peng Liu (The Pennsylvania State University)

Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms (Page 541)
Christian Wressnegger (TU Braunschweig)

Fabian Yamaguchi (TU Braunschweig)

Alwin Maier (TU Braunschweig)

Konrad Rieck (TU Braunschweig)

(Return to Top)

Paper Session 5A: Secure MPC II

Alternative Implementations of Secure Real Numbers (Page 553)
Vassil Dimitrov (University of Calgary)

Liisi Kerik (Cybernetica)

Toomas Krips (STACC)

Jaak Randmets (Cybernetica)

Jan Willemson (Cybernetica & STACC)

Garbling Gadgets for Boolean and Arithmetic Circuits (Page 565)
Marshall Ball (Columbia University)

Tal Malkin (Columbia University)

Mike Rosulek (Oregon State University)

Optimizing Semi-Honest Secure Multiparty Computation for the Internet (Page 578)
Aner Ben-Efraim (Ben-Gurion University)

Yehuda Lindell (Bar-Ilan University)

Eran Omri (Ariel University)

(Return to Top)

Paper Session 5B: Physically Based Authentication

MEMS Gyroscopes as Physical Unclonable Functions (Page 591)
Oliver Willers (Robert Bosch GmbH)

Christopher Huth (Robert Bosch GmbH)

Jorge Guajardo (Robert Bosch LLC)

Helmut Seidel (Saarland University)

On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols (Page 603)
Tianhao Wang (Purdue University)

Huangyi Ge (Purdue University)

Omar Chowdhury (Purdue University)

Hemanta K. Maji (Purdue University)

Ninghui Li (Purdue University)

Instant and Robust Authentication and Key Agreement among Mobile Devices (Page 616)
Wei Xi (Xi'an Jiaotong University)

Chen Qian (University of California Santa Cruz)

Jinsong Han (Xi'an Jiaotong University)

Kun Zhao (Xi'an Jiaotong University)

Sheng Zhong (Nanjing University)

Xiang-Yang Li (University of Science and Technology of China)

Jizhong Zhao (Xi'an Jiaotong University)

(Return to Top)

Paper Session 5C: Web Security

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem (Page 628)
Frank Cangialosi (University of Maryland)

Taejoong Chung (Northeastern University)

David Choffnes (Northeastern University)

Dave Levin (University of Maryland)

Bruce M. Maggs (Duke University & Akamai Technologies)

Alan Mislove (Northeastern University)

Christo Wilson (Northeastern University)

Chainsaw: Chained Automated Workflow-based Exploit Generation (Page 641)
Abeer Alhuzali (University of Illinois at Chicago)

Birhanu Eshete (University of Illinois at Chicago)

Rigel Gjomemo (University of Illinois at Chicago)

V.N. Venkatakrishnan (University of Illinois at Chicago)

CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites (Page 653)
Xiang Pan (Northwestern University)

Yinzhi Cao (Lehigh University)

Shuangping Liu (Northwestern University)

Yu Zhou (Northwestern University)

Yan Chen (Zhejiang University & Northwestern University)

Tingzhe Zhou (Lehigh University)

(Return to Top)

Paper Session 5D: Security Bug Finding

How I Learned to be Secure: A Census-Representative Survey of Security Advice Sources and Behavior (Page 666)
Elissa M. Redmiles (University of Maryland)

Sean Kross (Johns Hopkins University)

Michelle L. Mazurek (University of Maryland)

Practical Detection of Entropy Loss in Pseudo-Random Number Generators (Page 678)
Felix Dörre (Karlsruhe Institute of Technology)

Vladimir Klebanov (Karlsruhe Institute of Technology)

Build It, Break It, Fix It: Contesting Secure Development (Page 690)
Andrew Ruef (University of Maryland)

Michael Hicks (University of Maryland)

James Parker (University of Maryland)

Dave Levin (University of Maryland)

Michelle L. Mazurek (University of Maryland)

Piotr Mardziel (Carnegie Mellon University)

(Return to Top)

Paper Session 6A: Phone Security using Formal Methods

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles (Page 704)
Luke Deshotels (North Carolina State University)

Razvan Deaconescu (University Politehnica of Bucharest)

Mihai Chiroiu (University Politehnica of Bucharest)

Lucas Davi (Technische Universitat Darmstadt)

William Enck (North Carolina State University)

Ahmad-Reza Sadeghi (Technische Universitat Darmstadt)

Computational Soundness for Dalvik Bytecode (Page 717)
Michael Backes (Saarland University & MPI-SWS)

Robert Künnemann (Saarland University & MPI-SWS)

Esfandiar Mohammadi (ETH Zurich)

(Return to Top)

Paper Session 6B: Attestation

SANA: Secure and Scalable Aggregate Network Attestation (Page 731)
Moreno Ambrosin (University of Padua)

Mauro Conti (University of Padua)

Ahmad Ibrahim (Technische Universität Darmstadt)

Gregory Neven (IBM Research - Zurich)

Ahmad-Reza Sadeghi (Technische Universität Darmstadt)

Matthias Schunter (Intel Labs - Darmstadt)

C-FLAT: Control-Flow Attestation for Embedded Systems Software (Page 743)
Tigist Abera (Technische Universität Darmstadt)

N. Asokan (Aalto University)

Lucas Davi (Technische Universität Darmstadt)

Jan-Erik Ekberg (Trustonic)

Thomas Nyman (Aalto University & Trustonic)

Andrew Paverd (Aalto University)

Ahmad-Reza Sadeghi (Technische Universität Darmstadt)

Gene Tsudik (University of California, Irvine)

(Return to Top)

Paper Session 6C: Mine your Literature

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence (Page 755)
Xiaojing Liao (Georgia Institute of Technology)

Kan Yuan (Indiana University Bloomington)

XiaoFeng Wang (Indiana University Bloomington)

Zhou Li (ACM Member)

Luyi Xing (Indiana University Bloomington)

Raheem Beyah (Georgia Institute of Technology)

FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature (Page 767)
Ziyun Zhu (University of Maryland, College Park)

Tudor Dumitras (University of Maryland, College Park)

(Return to Top)

Paper Session 6D: Security Studies

An In-Depth Study of More Than Ten Years of Java Exploitation (Page 779)
Philipp Holzinger (Fraunhofer SIT)

Stefan Triller (Fraunhofer SIT)

Alexandre Bartel (Technische Universität Darmstadt)

Eric Bodden (Paderborn University & Fraunhofer IEM)

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing (Page 791)
Yaoqi Jia (National University of Singapore)

Zheng Leong Chua (National University of Singapore)

Hong Hu (National University of Singapore)

Shuo Chen (Microsoft Research)

Prateek Saxena (National University of Singapore)

Zhenkai Liang (National University of Singapore)

(Return to Top)

Paper Session 7A: Secure MPC III

High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority (Page 805)
Toshinori Araki (NEC Corporation)

Jun Furukawa (NEC Corporation)

Yehuda Lindell (Bar-Ilan University)

Ariel Nof (Bar-Ilan University)

Kazuma Ohara (NEC Corporation)

Efficient Batched Oblivious PRF with Applications to Private Set Intersection (Page 818)
Vladimir Kolesnikov (Bell Labs)

Ranjit Kumaresan (Massachusetts Institute of Technology)

Mike Rosulek (Oregon State University)

Ni Trieu (Oregon State University)

MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer (Page 830)
Marcel Keller (University of Bristol)

Emmanuela Orsini (University of Bristol)

Peter Scholl (University of Bristol)

(Return to Top)

Paper Session 7B: Side-Channel Attacks

Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations (Page 843)
Dmitry Evtyushkin (SUNY Binghamton)

Dmitry Ponomarev (SUNY Binghamton)

Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices (Page 858)
Xiaokuan Zhang (The Ohio State University)

Yuan Xiao (The Ohio State University)

Yinqian Zhang (The Ohio State University)

A Software Approach to Defeating Side Channels in Last-Level Caches (Page 871)
Ziqiao Zhou (University of North Carolina)

Michael K. Reiter (University of North Carolina)

Yinqian Zhang (The Ohio State University)

(Return to Top)

Paper Session 7C: Acoustic Attacks

Leave Your Phone at the Door:Side Channels that Reveal Factory Floor Secrets (Page 883)
Avesta Hojjati (University of Illinois at Urbana-Champaign)

Anku Adhikari (University of Illinois at Urbana-Champaign & Advanced Digital Sciences Center)

Katarina Struckmann (University of Illinois at Urbana-Champaign)

Edward Chou (University of Illinois at Urbana-Champaign)

Thi Ngoc Tho Nguyen (Advanced Digital Sciences Center)

Kushagra Madan (University of Illinois at Urbana-Champaign)

Marianne S. Winslett (University of Illinois at Urbana-Champaign & Advanced Digital Sciences Center)

Carl A. Gunter (University of Illinois at Urbana-Champaign)

William P. King (University of Illinois at Urbana-Champaign)

My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers (Page 895)
Chen Song (University at Buffalo, SUNY)

Feng Lin (University at Buffalo, SUNY)

Zhongjie Ba (University at Buffalo, SUNY)

Kui Ren (University at Buffalo, SUNY)

Chi Zhou (University at Buffalo, SUNY)

Wenyao Xu (University at Buffalo, SUNY)

The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio (Page 908)
Babins Shrestha (University of Alabama at Birmingham)

Maliheh Shirvanian (University of Alabama at Birmingham)

Prakash Shrestha (University of Alabama at Birmingham)

Nitesh Saxena (University of Alabama at Birmingham)

(Return to Top)

Paper Session 7D: Protection Across Executions

UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages (Page 920)
Kangjie Lu (Georgia Institute of Technology)

Chengyu Song (Georgia Institute of Technology)

Taesoo Kim (Georgia Institute of Technology)

Wenke Lee (Georgia Institute of Technology)

iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft (Page 933)
Tao Li (Arizona State University)

Yimin Chen (Arizona State University)

Jingchao Sun (Arizona State University)

Xiaocong Jin (Arizona State University)

Yanchao Zhang (Arizona State University)

Hypnoguard: Protecting Secrets across Sleep-wake Cycles (Page 945)
Lianying Zhao (Concordia University)

Mohammad Mannan (Concordia University)

(Return to Top)

Paper Session 8A: Lattices and Obfuscation

5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs (Page 981)
Kevin Lewi (Stanford University)

Alex J. Malozemoff (Galois)

Daniel Apon (University of Maryland)

Brent Carmer (Oregon State University)

Adam Foltzer (Galois)

Daniel Wagner (Galois)

David W. Archer (Galois)

Dan Boneh (Stanford University)

Jonathan Katz (University of Maryland)

Mariana Raykova (Yale University)

Λολ: Functional Lattice Cryptography (Page 993)
Eric Crockett (University of Michigan)

Chris Peikert (University of Michigan)

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE (Page 1006)
Joppe Bos (NXP Semiconductors)

Craig Costello (Microsoft Research)

Leo Ducas (CWI)

Ilya Mironov (Google, Inc.)

Michael Naehrig (Microsoft Research)

Valeria Nikolaenko (Stanford University)

Ananth Raghunathan (Google, Inc.)

Douglas Stebila (McMaster University)

(Return to Top)

Paper Session 8B: Attacks and Defenses

On Code Execution Tracking via Power Side-Channel (Page 1019)
Yannan Liu (The Chinese University of Hong Kong)

Lingxiao Wei (The Chinese University of Hong Kong)

Zhe Zhou (The Chinese University of Hong Kong)

Kehuan Zhang (The Chinese University of Hong Kong)

Wenyuan Xu (Zhejiang University)

Qiang Xu (The Chinese University of Hong Kong)

Coverage-based Greybox Fuzzing as Markov Chain (Page 1032)
Marcel Böhme (National University of Singapore)

Van-Thuan Pham (National University of Singapore)

Abhik Roychoudhury (National University of Singapore)

Error Handling of In-vehicle Networks Makes Them Vulnerable (Page 1044)
Kyong-Tak Cho (The University of Michigan)

Kang G. Shin (The University of Michigan)

(Return to Top)

Paper Session 8C: Phone Security

Using Reflexive Eye Movements for Fast Challenge-Response Authentication (Page 1056)
Ivo Sluganovic (University of Oxford)

Marc Roeschlin (University of Oxford)

Kasper B. Rasmussen (University of Oxford)

Ivan Martinovic (University of Oxford)

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals (Page 1068)
Mengyuan Li (Shanghai Jiao Tong University)

Yan Meng (Shanghai Jiao Tong University)

Junyi Liu (Shanghai Jiao Tong University)

Haojin Zhu (Shanghai Jiao Tong University)

Xiaohui Liang (University of Massachusetts at Boston)

Yao Liu (University of South Florida)

Na Ruan (Shanghai Jiao Tong University)

VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones (Page 1080)
Linghan Zhang (Florida State University)

Sheng Tan (Florida State University)

Jie Yang (Florida State University)

Yingying Chen (Stevens Institute of Technology)

(Return to Top)

Paper Session 8D: Infrastructure Attacks

Limiting the Impact of Stealthy Attacks on Industrial Control Systems (Page 1092)
David I. Urbina (University of Texas at Dallas)

Jairo Giraldo (University of Texas at Dallas)

Alvaro A. Cardenas (University of Texas at Dallas)

Nils Ole Tippenhauer (Singapore University of Technology and Design)

Junia Valente (University of Texas at Dallas)

Mustafa Faisal (University of Texas at Dallas)

Justin Ruths (University of Texas at Dallas)

Richard Candell (National Institute of Standards and Technology)

Henrik Sandberg (KTH Royal Institute of Technology)

Over-The-Top Bypass: Study of a Recent Telephony Fraud (Page 1106)
Merve Sahin (Eurecom & Monaco Digital Security Agency)

Aurélien Francillon (Eurecom)

New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks (Page 1118)
Guan-Hua Tu (Michigan State University)

Chi-Yu Li (National Chiao Tung University)

Chunyi Peng (Ohio State University)

Yuanjie Li (University of California, Los Angeles)

Songwu Lu (University of California, Los Angeles)

(Return to Top)

Paper Session 9A: Order-Revealing and Searchable Encryption

POPE: Partial Order Preserving Encoding (Page 1131)
Daniel S. Roche (United States Naval Academy)

Daniel Apon (University of Maryland)

Seung Geol Choi (United States Naval Academy)

Arkady Yerukhimovich (MIT Lincoln Laboratory)

Εοφος - Forward Secure Searchable Encryption (Page 1143)
Raphael Bost (Université de Rennes 1)

What Else is Revealed by Order-Revealing Encryption? (Page 1155)
F. Betül Durak (Rutgers University)

Thomas M. DuBuisson (Galois, Inc.)

David Cash (Rutgers University)

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds (Page 1167)
Kevin Lewi (Stanford University)

David J. Wu (Stanford University)

(Return to Top)

Paper Session 9B: Authentication

Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication (Page 1179)
Zhenfeng Zhang (Chinese Academy of Sciences)

Kang Yang (Chinese Academy of Sciences)

Xuexian Hu (Chinese Academy of Sciences)

Yuchen Wang (Chinese Academy of Sciences)

Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments (Page 1192)
Jonas Schneider (Saarland University)

Nils Fleischhacker (Saarland University)

Dominique Schröder (Friedrich-Alexander-University)

Michael Backes (Saarland University)

A Comprehensive Formal Security Analysis of OAuth 2.0 (Page 1204)
Daniel Fett (University of Trier)

Ralf Küsters (University of Trier)

Guido Schmitz (University of Trier)

(Return to Top)

Paper Session 9C: Passwords

An Empirical Study of Mnemonic Sentence-based Password Generation Strategies (Page 1216)
Weining Yang (Purdue University)

Ninghui Li (Purdue University)

Omar Chowdhury (Purdue University)

Aiping Xiong (Purdue University)

Robert W. Proctor (Purdue University)

On the Security of Cracking-Resistant Password Vaults (Page 1230)
Maximilian Golla (Ruhr-University Bochum)

Benedict Beuscher (Ruhr-University Bochum)

Markus Dürmuth (Ruhr-University Bochum)

Targeted Online Password Guessing: An Underestimated Threat (Page 1242)
Ding Wang (Peking University)

Zijian Zhang (Peking University)

Ping Wang (Peking University)

Jeff Yan (Lancaster University)

Xinyi Huang (Fujian Normal University)

(Return to Top)

Paper Session 9D: Internet Security

PIPSEA: A Practical IPsec Gateway on Embedded APUs (Page 1255)
Jungho Park (Seoul National University & ManyCoreSoft Co., Ltd.)

Wooken Jung (Seoul National University)

Gangwon Jo (Seoul National University & ManyCoreSoft Co., Ltd.)

Ilkoo Lee (Seoul National University)

Jaejin Lee (Seoul National University)

MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet (Page 1268)
Zhuotao Liu (University of Illinois at Urbana-Champaign)

Hao Jin (Nanjing University)

Yih-Chun Hu (University of Illinois at Urbana-Champaign)

Michael Bailey (University of Illinois at Urbana-Champaign)

Protecting Insecure Communications with Topology-aware Network Tunnels (Page 1280)
Georgios Kontaxis (Columbia University)

Angelos D. Keromytis (Columbia University)

(Return to Top)

Paper Session 10A: Specialized Crypto Tools

Function Secret Sharing: Improvements and Extensions (Page 1292)
Elette Boyle (IDC Herzliya)

Niv Gilboa (Ben Gurion University)

Yuval Ishai (Technion and University of California, Los Angeles)

Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data (Page 1304)
Dario Fiore (IMDEA Software Institute)

Cédric Fournet (Microsoft Research)

Esha Ghosh (Brown University)

Markulf Kohlweiss (Microsoft Research)

Olga Ohrimenko (Microsoft Research)

Bryan Parno (Microsoft Research)

Practical Non-Malleable Codes from l-more Extractable Hash Functions (Page 1317)
Aggelos Kiayias (University of Edinburgh)

Feng-Hao Liu (Florida Atlantic University)

Yiannis Tselekounis (University of Edinburgh)

(Return to Top)

Paper Session 10B: Attacks using a Little Leakage

Generic Attacks on Secure Outsourced Databases (Page 1329)
Georgios Kellaris (Boston University & Harvard University)

George Kollios (Boston University)

Kobbi Nissim (Ben-Gurion University & Harvard University)

Adam O'Neill (Georgetown University)

The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption (Page 1341)
David Pouliot (Portland State University)

Charles V. Wright (Portland State University)

Breaking Web Applications Built On Top of Encrypted Data (Page 1353)
Paul Grubbs (Cornell University)

Richard McPherson (University of Texas at Austin)

Muhammad Naveed (University of Southern California)

Thomas Ristenpart (Cornell Tech)

Vitaly Shmatikov (Cornell Tech)

(Return to Top)

Paper Session 10C: Measuring Security in the Wild

Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild (Page 1365)
Stefano Calzavara (Università Ca' Foscari)

Alvise Rabitti (Università Ca' Foscari)

Michele Bugliesi (Università Ca' Foscari)

CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy (Page 1376)
Lukas Weichselbaum (Google, Inc.)

Michele Spagnuolo (Google, Inc.)

Sebastian Lekies (Google, Inc.)

Artur Janc (Google, Inc.)

Online Tracking: A 1-million-site Measurement and Analysis (Page 1388)
Steven Englehardt (Princeton University)

Arvind Narayanan (Princeton University)

(Return to Top)

Paper Session 10D: Network Security I

PhishEye: Live Monitoring of Sandboxed Phishing Kits (Page 1402)
Xiao Han (Orange Labs & Eurecom)

Nizar Kheir (Orange Labs)

Davide Balzarotti (Eurecom)

All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records (Page 1414)
Daiping Liu (University of Delaware)

Shuai Hao (College of William and Mary)

Haining Wang (University of Delaware)

Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks (Page 1426)
Johannes Krupp (Saarland University)

Michael Backes (Saarland University & MPI-SWS)

Christian Rossow (Saarland University)

(Return to Top)

Paper Session 11A: Key Exchange

A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3) (Page 1438)
Hugo Krawczyk (IBM Research)

Attribute-based Key Exchange with General Policies (Page 1451)
Vladimir Kolesnikov (Bell Labs)

Hugo Krawczyk (IBM Research)

Yehuda Lindell (Bar-Ilan University)

Alex Malozemoff (Galois)

Tal Rabin (IBM Research)

Identity-Concealed Authenticated Encryption and Key Exchange (Page 1464)
Yunlei Zhao (Fudan University)

(Return to Top)

Paper Session 11B: Crypto Implementations

A Surfeit of SSH Cipher Suites (Page 1480)
Martin R. Albrecht (Royal Holloway, University of London)

Jean Paul Degabriele (Royal Holloway, University of London)

Torben Brandt Hansen (Royal Holloway, University of London)

Kenneth G. Paterson (Royal Holloway, University of London)

Systematic Fuzzing and Testing of TLS Libraries (Page 1492)
Juraj Somorovsky (Ruhr University Bochum)

Attacking OpenSSL Implementation of ECDSA with a Few Signatures (Page 1505)
Shuqin Fan (State Key Laboratory of Cryptology)

Wenbo Wang (Luoyang University of Foreign Languages)

Qingfeng Cheng (Xidian University)

(Return to Top)

Paper Session 11C: More Attacks

Host of Troubles: Multiple Host Ambiguities in HTTP Implementations (Page 1516)
Jianjun Chen (Tsinghua University & Tsingua National Laboratory for Information Science and Technology)

Jian Jiang (University of California, Berkeley)

Haixin Duan (Tsinghua University & Tsingua National Laboratory for Information Science and Technology)

Nicholas Weaver (University of California, Berkeley & ICSI)

Tao Wan (Huawei Canada)

Vern Paxson (University of California, Berkeley & ICSI)

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition (Page 1528)
Mahmood Sharif (Carnegie Mellon University)

Sruti Bhagavatula (Carnegie Mellon University)

Lujo Bauer (Carnegie Mellon University)

Michael K. Reiter (University of North Carolina)

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service (Page 1541)
Xiaojing Liao (Georgia Institute of Technology)

Sumayah Alrwais (Indiana University Bloomington)

Kan Yuan (Indiana University Bloomington)

Luyi Xing (Indiana University Bloomington)

XiaoFeng Wang (Indiana University Bloomington)

Shuang Hao (University of California Santa Barbara)

Raheem Beyah (Georgia Institute of Technology)

(Return to Top)

Paper Session 11D: Network Security II

Safely Measuring Tor (Page 1553)
Rob Jansen (US Naval Research Laboratory)

Aaron Johnson (US Naval Research Laboratory)

PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-of-Registration (Page 1568)
Shuang Hao (University of California, Santa Barbara)

Alex Kantchelian (University of California, Berkeley)

Brad Miller (Google, Inc.)

Vern Paxson (University of California, Berkeley & International Computer Science Institute)

Nick Feamster (Princeton University)

Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks (Page 1580)
Yunlong Mao (Nanjing University)

Yuan Zhang (Nanjing University)

Sheng Zhong (Nanjing University)

(Return to Top)

Paper Session 12A: Secure Protocols

A Protocol for Privately Reporting Ad Impressions at Scale (Page 1591)
Matthew Green (Johns Hopkins University)

Watson Ladd (University of California, Berkeley)

Ian Miers (Johns Hopkins University)

Secure Stable Matching at Scale (Page 1602)
Jack Doerner (University of Virginia)

David Evans (University of Virginia)

abhi shelat (Northeastern University)

BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme (Page 1614)
Pyrros Chaidos (University College London)

Véronique Cortier (LORIA, CNRS & INRIA & Université de Lorraine)

Georg Fuchsbauer (Inria, ENS, CNRS, PSL Research University)

David Galindo (University of Birmingham)

(Return to Top)

Paper Session 12B: DSA/ECDSA

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels (Page 1626)
Daniel Genkin (Technion and Tel Aviv University)

Lev Pachmanov (Tel Aviv University)

Itamar Pipman (Tel Aviv University)

Eran Tromer (Tel Aviv University)

Yuval Yarom (The University of Adelaide & Data61, CSIRO)

"Make Sure DSA Signing Exponentiations Really are Constant-Time" (Page 1639)
Cesar Pereida García (Aalto University)

Billy Bob Brumley (Tampere University of Technology)

Yuval Yarom (The University of Adelaide & Data61)

On the Provable Security of (EC)DSA Signatures (Page 1651)
Manuel Fersch (Ruhr University Bochum)

Eike Kiltz (Ruhr University Bochum)

Bertram Poettering (Ruhr University Bochum)

(Return to Top)

Paper Session 12C: Even more Attacks

Android ION Hazard: The Curse of Customizable Memory Management System (Page 1663)
Hang Zhang (University of California, Riverside)

Dongdong She (University of California, Riverside)

Zhiyun Qian (University of California, Riverside)

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms (Page 1675)
Victor van der Veen (Vrije Universiteit Amsterdam)

Yanick Fratantonio (University of California, Santa Barbara)

Martina Lindorfer (University of California, Santa Barbara)

Daniel Gruss (Graz University of Technology)

Clémentine Maurice (Graz University of Technology)

Giovanni Vigna (University of California, Santa Barbara)

Herbert Bos (Vrije Universiteit Amsterdam)

Kaveh Razavi (Vrije Universiteit Amsterdam)

Cristiano Giuffrida (Vrije Universiteit Amsterdam)

SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning (Page 1690)
George Argyros (Columbia University)

Ioannis Stais (University of Athens)

Suman Jana (Columbia University)

Angelos D. Keromytis (Columbia University)

Aggelos Kiayias (University of Edinburgh)

(Return to Top)

Paper Session 12D: Anonymous Communication

Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement (Page 1702)
Cecylia Bocovich (University of Waterloo)

Ian Goldberg (University of Waterloo)

Practical Censorship Evasion Leveraging Content Delivery Networks (Page 1715)
Hadi Zolfaghari (University of Massachusetts, Amherst)

Amir Houmansadr (University of Massachusetts, Amherst)

GAME OF DECOYS: Optimal Decoy Routing Through Game Theory (Page 1727)
Milad Nasr (University of Massachusetts, Amherst)

Amir Houmansadr (University of Massachusetts, Amherst)

(Return to Top)

Posters

POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns (Page 1739)
Steffen Wendzel (Worms University of Applied Sciences)

Wojciech Mazurczyk (Warsaw University of Technology)

POSTER: A Behavioural Authentication System for Mobile Users (Page 1742)
Md Morshedul Islam (University of Calgary)

Reihaneh Safavi-Naini (University of Calgary)

POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation (Page 1745)
Katarzyna Kapusta (Telecom ParisTech Universite Paris-Saclay)

Gerard Memmi (Telecom ParisTech Universite Paris-Saclay)

Hassan Noura (Telecom ParisTech Universite Paris-Saclay)

POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning (Page 1748)
Lingling Fan (East China Normal University)

Minhui Xue (East China Normal University & NYU Shanghai)

Sen Chen (East China Normal University)

Lihua Xu (East China Normal University)

Haojin Zhu (Shanghai Jiao Tong University)

(Return to Top)

POSTER: Attack on Non-Linear Physical Unclonable Function (Page 1751)
Jing Ye (Chinese Academy of Sciences)

Yu Hu (Chinese Academy of Sciences)

Xiaowei Li (Chinese Academy of Sciences)

POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM (Page 1754)
Anrin Chakraborti (Stony Brook University)

Radu Sion (Stony Brook University)

POSTER: DataLair - A Storage Block Device with Plausible Deniability (Page 1757)
Anrin Chakraborti (Stony Brook University)

Chen Chen (Stony Brook University)

Radu Sion (Stony Brook University)

POSTER: DroidShield: Protecting User Applications from Normal World Access (Page 1760)
Darius Suciu (Stony Brook University)

Radu Sion (Stony Brook University)

POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions (Page 1763)
Chia-Mu Yu (National Chung Hsing University)

(Return to Top)

POSTER: Fingerprinting Tor Hidden Services (Page 1766)
Asya Mitseva (University of Luxembourg)

Andriy Panchenko (University of Luxembourg)

Fabian Lanze (Huf Secure Mobile GmbH)

Martin Henze (RWTH Aachen University)

Klaus Wehrle (RWTH Aachen University)

Thomas Engel (University of Luxembourg)

POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store (Page 1769)
Roman Matzutt (RWTH Aachen University)

Oliver Hohlfeld (RWTH Aachen University)

Martin Henze (RWTH Aachen University)

Robin Rawiel (RWTH Aachen University)

Jan Henrik Ziegeldorf (RWTH Aachen University)

Klaus Wehrle (RWTH Aachen University)

POSTER: Identifying Dynamic Data Structures in Malware (Page 1772)
Thomas Rupprecht (University of Bamberg)

Xi Chen (Vrije Universiteit Amsterdam)

David H. White (University of Bamberg)

Jan Tobias Mühlberg (KU Leuven)

Herbert Bos (Vrije Universiteit Amsterdam)

Gerald Lüttgen (University of Bamberg)

POSTER: Improved Markov Strength Meters for Passwords (Page 1775)
Harshal Tupsamudre (TCS Research)

Vijayanand Banahatti (TCS Research)

Sachin Lodha (TCS Research)

(Return to Top)

POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach (Page 1778)
Ignacio Martín (Universidad Carlos III)

José Alberto Hernández (Universidad Carlos II)

Sergio de los Santos (Telefónica Digital Identity & Privacy)

Antonio Guzmán (Telefónica Digital Identity & Privacy)

POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints (Page 1781)
Chen Chen (Stony Brook University)

Darius Suciu (Stony Brook University)

Radu Sion (Stony Brook University)

POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat (Page 1784)
Manish Shukla (TCS Research)

Sutapa Mondal (TCS Research)

Sachin Lodha (TCS Research)

POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications (Page 1787)
Ben Stock (Saarland University)

Giancarlo Pellegrino (Saarland University)

Christian Rossow (Saarland University)

Martin Johns (SAP SE)

Michael Backes (Saarland University & MPI-SWS)

POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity (Page 1790)
Omid Asudeh (University of Texas at Arlington)

Mathew Wright (Rochester Institute of Technology)

(Return to Top)

POSTER: Privacy Enhanced Secure Location Verification (Page 1793)
Md Mamunur Rashid Akand (University of Calgary)

Reihaneh Safavi-Naini (University of Calgary)

POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties (Page 1796)
Jan-Ole Malchow (Freie Universität Berlin)

Benjamin Güldenring (Freie Universität Berlin)

Volker Roth (Freie Universität Berlin)

POSTER: RIA - An Audition-based Method to Protect the Runtime Integrity of MapReduce Applications (Page 1799)
Yongzhi Wang (Xidian University)

Yulong Shen (Xidian University)

POSTER: Security Enhanced Administrative Role Based Access Control Models (Page 1802)
Rajkumar P.V. (Texas Southern University)

Ravi Sandhu (University of Texas San Antonio)

POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data (Page 1805)
Pedro Casas (AIT Austrian Institute of Technology)

Alessandro D'Alconzo (AIT Austrian Institute of Technology)

Giuseppe Settanni (AIT Austrian Institute of Technology)

Pierdomenico Fiadino (Eurecat Technology Centre of Catalonia)

Florian Skopik (AIT Austrian Institute of Technology)

(Return to Top)

POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity (Page 1808)
Toshinori Usui (NTT Secure Platform Laboratories)

Tomonori Ikuse (NTT Security (Japan) KK)

Makoto Iwamura (NTT Secure Platform Laboratories)

Takeshi Yada (NTT Secure Platform Laboratories)

POSTER: The ART of App Compartmentalization (Page 1811)
Michael Backes (Saarland University & MPI-SWS)

Sven Bugiel (Saarland University)

Jie Huang (Saarland University)

Oliver Schranz (Saarland University)

Poster: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs (Page 1814)
Bo Sun (Waseda University)

Akinori Fujino (Waseda University)

Tatsuya Mori (Waseda University)

POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes (Page 1817)
Peter Mayer (Technische Universität Darmstadt)

Stephan Neumann (Technische Universität Darmstadt)

Melanie Volkamer (Technische Universität Darmstadt)

POSTER: Towards Exposing Internet of Things: A Roadmap (Page 1820)
Vinay Sachidananda (Singapore University of Technology and Design)

Jinghui Toh (Singapore University of Technology and Design)

Shachar Siboni (Ben-Gurion University of the Negev)

Asaf Shabtai (Ben-Gurion University of the Negev)

Yuval Elovici (Singapore University of Technology and Design)

(Return to Top)

POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems (Page 1823)
Stephan Lau (Freie Universität Berlin)

Johannes Klick (Freie Universität Berlin)

Stephan Arndt (Freie Universität Berlin)

Volker Roth (Freie Universität Berlin)

POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing (Page 1826)
Changhee Hahn (Korea University)

Junbeom Hur (Korea University)

POSTER: VUDEC - A Framework for Vulnerability Management in Decentralized Communication Networks (Page 1829)
Michael Steinke (Universität der Bundeswehr München)

Stefan Metzger (Leibniz Supercomputing Center)

Wolfgang Hommel (Universität der Bundeswehr München)

POSTER: Weighing in eHealth Security: A Security and Privacy Study of Smart Scales (Page 1832)
Martin Krämer (University of Edinburgh)

David Aspinall (University of Edinburgh)

Maria Wolters (University of Edinburgh)

POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack (Page 1835)
Seunghun Cha (Sungkyunkwan University)

Jaewoo Park (Sungkyunkwan University)

Geumhwan Cho (Sungkyunkwan University)

Jun Ho Huh (Honeywell ACS Labs)

Hyoungshick Kim (Sungkyunkwan University)

(Return to Top)

Demonstrations

DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How Hard Can It Be to Build a Secure Internet? (Page 1838)
Ercan Ucan (ETH Zurich)

Raphael M. Reischuk (ETH Zurich)

Adrian Perrig (ETH Zurich)

Demo: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation (Page 1841)
Toshinori Araki (NEC Corporation)

Assaf Barak (Bar-Ilan University)

Jun Furukawa (NEC Corporation)

Yehuda Lindell (Bar-Ilan University)

Ariel Nof (Bar-Ilan University)

Kazuma Ohara (NEC Corporation)

DEMO: Integrating MPC in Big Data Workflows (Page 1844)
Nikolaj Volgushev (Boston University)

Malte Schwarzkopf (Massachusetts Institute of Technology)

Andrei Lapets (Boston University)

Mayank Varia (Boston University)

Azer Bestavros (Boston University)

DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking (Page 1847)
Denis Migdal (Ecole Nationale Supérieure d'Ingénieurs de Caen)

Christian Johansen (University of Oslo)

Audun Jøsang (University of Oslo)

DEMO: Starving Permission-Hungry Android Apps Using SecuRank (Page 1850)
Vincent F. Taylor (University of Oxford)

Ivan Martinovic (University of Oxford)

(Return to Top)

Tutorials

Program Anomaly Detection: Methodology and Practices (Page 1853)
Xiaokui Shu (IBM Research)

Danfeng Yao (Virginia Tech)

Security on Wheels: Security and Privacy for Vehicular Communication Systems (Page 1855)
Panos Papadimitratos (KTH Royal Institute of Technology)

Condensed Cryptographic Currencies Crash Course (C5) (Page 1857)
Aljosha Judmayer (SBA Research)

Edgar Weippl (SBA Research)

Introduction to Credit Networks: Security, Privacy, and Applications (Page 1859)
Aniket Kate (Purdue University)

On the Security and Scalability of Bitcoin's Blockchain (Page 1861)
Ghassan Karame (NEC Laboratories Europe)

Privacy and Security in the Genomic Era (Page 1863)
Erman Ayday (Bilkent University)

Jean-Pierre Hubaux (École Polytechnique Fédérale de Lausanne)

Adversarial Data Mining: Big Data Meets Cyber Security (Page 1866)
Murat Kantarcioglu (University of Texas at Dallas)

Bowei Xi (Purdue University)

(Return to Top)

Pre-Conference Workshops co-located with CCS 2016

MTD 2016: Third ACM Workshop on Moving Target Defense (Page 1868)
Peng Liu (Penn State University)

Cliff Wang (U.S. Army Research Office)

PLAS'16 - ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security (Page 1870)
Toby Murray (University of Melbourne & Data61)

Deian Stefan (University of California, San Diego & Intrinsic)

SafeConfig'16 - Testing and Evaluation for Active and Resilient Cyber Systems (Page 1871)
Nicholas J. Multari (Pacific Northwest National Lab)

Anoop Singhal (National Institute of Standards and Technology)

David O. Manz (Pacific Northwest National Lab)

Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016) (Page 1873)
Long Lu (Stony Brook University)

Mohammad Mannan (Concordia University)

Theory of Implementation Security Workshop (TIs 2016) (Page 1875)
Begul Bilgin (KU Leuven)

Svetla Nikova (KU Leuven)

Vincent Rijmen (KU Leuven)

WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security (Page 1877)
Florian Kerschbaum (SAP)

Erik-Oliver Blass (Airbus Group Innovations)

Tomas Sander (Hewlett Packard Labs)

15th Workshop on Privacy in the Electronic Society (WPES 2016) (Page 1879)
Sabrina De Capitani di Vimercati (Universita' degli Studi di Milano)

(Return to Top)

Post-Conference Workshops co-located with CCS 2016

9th International Workshop on Artificial Intelligence and Security: AISec 2016 (Page 1881)
David Mandell Freeman (LinkedIn Corporation)

Katerina Mitrokotsa (Chalmers University of Technology)

Arunesh Sinha (University of Michigan)

8th ACM Cloud Computing Security Workshop (Page 1882)
Elli Androulaki (IBM Research)

Michael K. Reiter (University of North Carolina at Chapel Hill)

Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16) (Page 1884)
Alvaro A. Cárdenas (University of Texas, Dallas)

Rakesh B. Bobba (Oregon State University)

2nd International Workshop on Software Protection: SPRO 2016 (Page 1886)
Brecht Wyseur (Nagravision S.A.)

Bjorn De Sutter (Ghent University)

Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016) (Page 1888)
Xinxin Fan (Robert Bosch LLC)

Tim Güneysu (University of Bremen & DFKI)