Computational Soundness for Dalvik Bytecode
|
|
Strong Non-Interference and Type-Directed Higher-Order Masking
|
|
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
|
Daniel Genkin
|
Using Reflexive Eye Movements for Fast Challenge-Response Authentication
|
|
Practical Detection of Entropy Loss in Pseudo-Random Number Generators
|
|
POSTER: Fingerprinting Tor Hidden Services
|
|
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies
|
|
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications
|
Ben Stock
|
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols
|
|
MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection
|
|
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory
|
|
PIPSEA: A Practical IPsec Gateway on Embedded APUs
|
|
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
|
|
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
|
Shuang Hao
|
Making Smart Contracts Smarter
|
|
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers
|
|
Efficient Batched Oblivious PRF with Applications to Private Set Intersection
|
|
Attribute-based Key Exchange with General Policies
|
|
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning
|
George Argyros
|
MPC-Friendly Symmetric Key Primitives
|
|
Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild
|
Stefano Calzavara
|
MEMS Gyroscopes as Physical Unclonable Functions
|
|
Introduction to Credit Networks: Security, Privacy, and Applications
|
|
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016)
|
Long Lu
|
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages
|
Kangjie Lu
|
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security
|
|
Systematic Fuzzing and Testing of TLS Libraries
|
Juraj Somorovsky
|
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
|
Xiaojing Liao
|
POSTER: Identifying Dynamic Data Structures in Malware
|
|
Membership Privacy in MicroRNA-based Studies
|
|
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback
|
|
Attacking OpenSSL Implementation of ECDSA with a Few Signatures
|
|
A Software Approach to Defeating Side Channels in Last-Level Caches
|
|
Android ION Hazard: the Curse of Customizable Memory Management System
|
|
Online Tracking: A 1-million-site Measurement and Analysis
|
|
Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16)
|
|
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption
|
|
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
|
|
PhishEye: Live Monitoring of Sandboxed Phishing Kits
|
|
CCSW'16: 8th ACM Cloud Computing Security Workshop
|
|
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
|
Luke Deshotels
|
Mix&Slice: Efficient Access Revocation in the Cloud
|
|
POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data
|
|
MIST 2016: 8th International Workshop on Managing Insider Security Threats
|
|
Differential Privacy as a Mutual Information Constraint
|
|
MTD 2016: Third ACM Workshop on Moving Target Defense
|
Peng Liu
|
Town Crier: An Authenticated Data Feed for Smart Contracts
|
|
Error Handling of In-vehicle Networks Makes Them Vulnerable
|
|
POSTER: Weighing in eHealth Security
|
|
DEMO: Starving Permission-Hungry Android Apps Using SecuRank
|
|
POSTER: DataLair: A Storage Block Device with Plausible Deniability
|
|
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
|
|
Theory of Implementation Security Workshop (TIs 2016)
|
|
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016)
|
|
On the Security of Cracking-Resistant Password Vaults
|
|
Enforcing Least Privilege Memory Views for Multithreaded Applications
|
|
POSTER: Security Enhanced Administrative Role Based Access Control Models
|
|
POPE: Partial Order Preserving Encoding
|
|
What Else is Revealed by Order-Revealing Encryption?
|
|
The Honey Badger of BFT Protocols
|
|
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
|
Yaoqi Jia
|
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications
|
|
DEMO: Integrating MPC in Big Data Workflows
|
|
Reliable Third-Party Library Detection in Android and its Security Applications
|
|
Transparency Overlays and Applications
|
|
On the Security and Scalability of Bitcoin's Blockchain
|
|
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
|
|
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency
|
|
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
|
|
POSTER: Improved Markov Strength Meters for Passwords
|
|
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
|
Victor van der Veen
|
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks
|
|
Alternative Implementations of Secure Real Numbers
|
|
POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks
|
|
POSTER: DroidShield: Protecting User Applications from Normal World Access
|
|
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices
|
|
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
|
|
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime
|
Mingshen Sun
|
Scalable Graph-based Bug Search for Firmware Images
|
|
SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems
|
|
CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy
|
Lukas Weichselbaum
|
Privacy and Security in the Genomic Era
|
|
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
|
|
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records
|
Daiping Liu
|
POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat
|
|
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
|
|
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices
|
Xiaokuan Zhang
|
DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation
|
|
On the Security and Performance of Proof of Work Blockchains
|
|
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns
|
Steffen Wendzel
|
POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs
|
|
A Protocol for Privately Reporting Ad Impressions at Scale
|
Matthew Green
|
SmartWalk: Enhancing Social Network Security via Adaptive Random Walks
|
|
Λολ: Functional Lattice Cryptography
|
|
POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity
|
|
POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM
|
|
Breaking Kernel Address Space Layout Randomization with Intel TSX
|
Yeongjin Jang
|
Hypnoguard: Protecting Secrets across Sleep-wake Cycles
|
|
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets
|
|
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet
|
|
Instant and Robust Authentication and Key Agreement among Mobile Devices
|
|
Safely Measuring Tor
|
|
POSTER: Attack on Non-Linear Physical Unclonable Function
|
|
15th Workshop on Privacy in the Electronic Society (WPES 2016)
|
|
Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms
|
|
EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation
|
|
POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity
|
|
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
|
|
Identity-Concealed Authenticated Encryption and Key Exchange
|
|
POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems
|
Stephan Lau
|
9th International Workshop on Artificial Intelligence and Security: AISec 2016
|
|
On the Provable Security of (EC)DSA Signatures
|
|
Practical Non-Malleable Codes from l-more Extractable Hash Functions
|
Aggelos Kiayias
|
Targeted Online Password Guessing: An Underestimated Threat
|
|
DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking
|
|
DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet?
|
|
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
|
|
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
|
|
A Secure Sharding Protocol For Open Blockchains
|
|
Coverage-based Greybox Fuzzing as Markov Chain
|
|
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior
|
|
A Comprehensive Formal Security Analysis of OAuth 2.0
|
|
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication
|
|
A Surfeit of SSH Cipher Suites
|
|
Garbling Gadgets for Boolean and Arithmetic Circuits
|
|
POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing
|
|
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation
|
|
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
|
Daniel Gruss
|
Improvements to Secure Computation with Penalties
|
|
A Systematic Analysis of the Juniper Dual EC Incident
|
Stephen Checkoway
|
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning
|
|
An In-Depth Study of More Than Ten Years of Java Exploitation
|
|
Over-The-Top Bypass: Study of a Recent Telephony Fraud
|
|
The Misuse of Android Unix Domain Sockets and Security Implications
|
|
Security on Wheels: Security and Privacy for Vehicular Communication Systems
|
|
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
|
|
Function Secret Sharing: Improvements and Extensions
|
|
POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties
|
Jan-Ole Malchow
|
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme
|
|
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks
|
|
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio
|
|
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
|
Karthikeyan Bhargavan
|
Amortizing Secure Computation with Penalties
|
|
SANA: Secure and Scalable Aggregate Network Attestation
|
|
POSTER: Privacy Enhanced Secure Location Verification
|
|
Advanced Probabilistic Couplings for Differential Privacy
|
|
Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic
|
|
Chainsaw: Chained Automated Workflow-based Exploit Generation
|
|
On the Instability of Bitcoin Without the Block Reward
|
|
Build It, Break It, Fix It: Contesting Secure Development
|
Andrew Ruef
|
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks
|
|
POSTER: Towards Exposing Internet of Things: A Roadmap
|
|
PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security
|
|
∑oφo?: Forward Secure Searchable Encryption
|
|
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
|
|
Program Anomaly Detection: Methodology and Practices
|
|
POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints
|
|
Differentially Private Bayesian Programming
|
|
Adversarial Data Mining: Big Data Meets Cyber Security
|
|
FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature
|
|
POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions
|
|
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service
|
Xiaojing Liao
|
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
|
|
Practical Censorship Evasion Leveraging Content Delivery Networks
|
|
C-FLAT: Control-Flow Attestation for Embedded Systems Software
|
|
POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach
|
|
Secure Stable Matching at Scale
|
|
VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones
|
|
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android
|
|
DPSense: Differentially Private Crowdsourced Spectrum Sensing
|
|
POSTER: The ART of App Compartmentalization
|
|
On Code Execution Tracking via Power Side-Channel
|
|
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations
|
Jianjun Chen
|
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
|
|
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy
|
|
Breaking Web Applications Built On Top of Encrypted Data
|
|
Protecting Insecure Communications with Topology-aware Network Tunnels
|
|
Condensed Cryptographic Currencies Crash Course (C5)
|
|
The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption
|
|
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
|
|
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations
|
|
Statistical Deobfuscation of Android Applications
|
|
"Make Sure DSA Signing Exponentiations Really are Constant-Time"
|
Cesar Pereida García
|
POSTER: A Behavioural Authentication System for Mobile Users
|
|
TypeSan: Practical Type Confusion Detection
|
|
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
|
|
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack
|
|
Deep Learning with Differential Privacy
|
|
2nd International Workshop on Software Protection: SPRO 2016
|
|
AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems
|
|
High Fidelity Data Reduction for Big Data Security Dependency Analyses
|
|
iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft
|
|
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments
|
|
Generic Attacks on Secure Outsourced Databases
|
|
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites
|
|
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem
|
|