Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

 

 

(Return to Top)

SPSM'17 Table of Contents

SPSM 2016 Chairs' Welcome
Long Lu (Stony Brook University)

Mohammad Mannan (Concordia University)

SPSM 2016 Workshop Organization


Session: Keynote Address

Hardware Isolation for Trusted Execution (Page 1)
Jan-Erik Ekberg (Trustonic)

Session: Studies and Analyses

Secure Containers in Android: The Samsung KNOX Case Study (Page 3)
Uri Kanonov (Tel Aviv Univerity)

Avishai Wool (Tel Aviv Univerity)

White Rabbit in Mobile: Effect of Unsecured Clock Source in Smartphones (Page 13)
Shinjo Park (Technische Universität Berlin & Telekom Innovation Laboratories)

Altaf Shaik (Technische Universität Berlin & Telekom Innovation Laboratories)

Ravishankar Borgaonkar (Oxford University)

Jean-Pierre Seifert (Technische Universität Berlin & Telekom Innovation Laboratories)

What You See Isn't Always What You Get: A Measurement Study of Usage Fraud on Android Apps (Page 23)
Wei Liu (Tsinghua University & Tsinghua National Laboratory for Information Science and Technology)

Yueqian Zhang (Tsinghua University & Tsinghua National Laboratory for Information Science and Technology)

Zhou Li (ACM Member)

Haixin Duan (Tsinghua University & Tsinghua National Laboratory for Information Science and Technology)

CRIOS: Toward Large-Scale iOS Application Analysis (Page 33)
Damilola Orikogbo (Boston University)

Matthias Büchler (Boston University)

Manuel Egele (Boston University)

(Return to Top)

Session: Privacy

SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis (Page 43)
Vincent F. Taylor (University of Oxford)

Ivan Martinovic (University of Oxford)

Securing Recognizers for Rich Video Applications (Page 53)
Christopher Thompson (University of California, Berkeley)

David Wagner (University of California, Berkeley)

On a (Per)Mission: Building Privacy Into the App Marketplace (Page 63)
Hannah Quay-de la Vallee (Brown University)

Paige Selby (Brown University)

Shriram Krishnamurthi (Brown University)

Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks (Page 73)
Srishti Gupta (Indraprastha Institute of Information Technology, Delhi)

Payas Gupta (New York University, Abu Dhabi)

Mustaque Ahamad (Georgia Institute of Technology)

Ponnurangam Kumaraguru (Indraprastha Institute of Information Technology, Delhi)

(Return to Top)

Session: Attacks and Defenses

Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking (Page 83)
Claudio Marforio (ETH Zurich)

Ramya Jayaram Masti (ETH Zurich)

Claudio Soriente (Telefonica)

Kari Kostiainen (ETH Zurich)

Srdjan Capkun (ETH Zurich)

Picasso: Lightweight Device Class Fingerprinting for Web Clients (Page 93)
Elie Bursztein (Google, Inc.)

Artem Malyshev (Google, Inc.)

Tadek Pietraszek (Google, Inc.)

Kurt Thomas (Google, Inc.)

Detecting Misuse of Google Cloud Messaging in Android Badware (Page 103)
Mansour Ahmadi (University of Cagliari)

Battista Biggio (University of Cagliari)

Steven Arzt (Technische Universitat Darmstadt)

Davide Ariu (University of Cagliari)

Giorgio Giacinto (University of Cagliari)

On the CCA (in)Security of MTProto (Page 113)
Jakob Jakobsen (Aarhus University)

Claudio Orlandi (Aarhus University)

Analyzing TETRA Location Privacy and Network Availability (Page 117)
Martin Pfeiffer (TU Darmstadt)

Jan-Pascal Kwiotek (TU Darmstadt)

Jiska Classen (TU Darmstadt)

Robin Klose (TU Darmstadt)

Matthias Hollick (TU Darmstadt)