| 2016 | (Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus. Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue |
| 2016 | Anonymous Identification for Ad Hoc Group. Xingye Lu, Man Ho Au |
| 2016 | Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. Kai He, Jian Weng, Jia-Nan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng |
| 2016 | Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security. Peng Xu, Jingnan Li, Wei Wang, Hai Jin |
| 2016 | Anonymous Role-Based Access Control on E-Health Records. Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu |
| 2016 | Attacks and Defence on Android Free Floating Windows. Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, Dengguo Feng |
| 2016 | Attestation Transparency: Building secure Internet services for legacy clients. Jethro G. Beekman, John L. Manferdelli, David A. Wagner |
| 2016 | Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces. Andrei Costin, Apostolis Zarras, Aurélien Francillon |
| 2016 | Bilateral-secure Signature by Key Evolving. Tao Xiang, Xiaoguo Li, Fei Chen, Yi Mu |
| 2016 | Binary Analysis for Autonomous Hacking: Invited Abstract. Giovanni Vigna |
| 2016 | Building an Encrypted, Distributed, and Searchable Key-value Store. Xingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin |
| 2016 | CDRep: Automatic Repair of Cryptographic Misuses in Android Applications. Siqi Ma, David Lo, Teng Li, Robert H. Deng |
| 2016 | CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks. Yu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, Vyas Sekar |
| 2016 | Checking Intent-based Communication in Android with Intent Space Analysis. Yiming Jing, Gail-Joon Ahn, Adam Doupé, Jeong Hyun Yi |
| 2016 | Client-CASH: Protecting Master Passwords against Offline Attacks. Jeremiah Blocki, Anirudh Sridhar |
| 2016 | Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou |
| 2016 | Cross Processor Cache Attacks. Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar |
| 2016 | Data Exfiltration in the Face of CSP. Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld |
| 2016 | Dealerless Corporate Key Generation for Identity-Based Encryption Schemes. Zhen Liu, Duncan S. Wong, Jack Poon |
| 2016 | Device-Enhanced Password Protocols with Optimal Online-Offline Protection. Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena |
| 2016 | Discovering Malicious Domains through Passive DNS Data Graph Analysis. Issa Khalil, Ting Yu, Bei Guan |
| 2016 | Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment Plant. Sridhar Adepu, Aditya Mathur |
| 2016 | DroidDisintegrator: Intra-Application Information Flow Control in Android Apps. Eran Tromer, Roei Schuster |
| 2016 | Efficient Authenticated Multi-Pattern Matching. Zhe Zhou, Tao Zhang, Sherman S. M. Chow, Yupeng Zhang, Kehuan Zhang |
| 2016 | Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption. Shifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen |
| 2016 | Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu |
| 2016 | Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract. Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin |
| 2016 | Efficient Secure Outsourcing of Large-scale Quadratic Programs. Sergio Salinas, Changqing Luo, Weixian Liao, Pan Li |
| 2016 | Efficient Techniques for Publicly Verifiable Delegation of Computation. Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva |
| 2016 | Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data. Ngoc Hieu Tran, HweeHwa Pang, Robert H. Deng |
| 2016 | Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control. Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng, Kui Ren |
| 2016 | Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher. Changhai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, Victor E. DeBrunner |
| 2016 | FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization. Gabriele Costa, Paolo Gasti, Alessio Merlo, Shunt-Hsi Yu |
| 2016 | FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System. Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin |
| 2016 | Fault Attacks on Efficient Pairing Implementations. Pierre-Alain Fouque, Chen Qian |
| 2016 | Forgery-Resistant Touch-based Authentication on Mobile Devices. Neil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank |
| 2016 | Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN. Chen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, Bo Liu |
| 2016 | Gait-Based Wi-Fi Signatures for Privacy-Preserving. Yan Li, Ting Zhu |
| 2016 | Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds. Peng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, Deqing Zou |
| 2016 | Generic Construction of Publicly Verifiable Predicate Encryption. Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Junbin Fang, Jin Li, Yabin Jin, Jiajun Huang |
| 2016 | Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern Web. Yogesh Mundada, Nick Feamster, Balachander Krishnamurthy |
| 2016 | Hardening OpenStack Cloud Platforms against Compute Node Compromises. Wai-Kit Sze, Abhinav Srivastava, R. Sekar |
| 2016 | Homomorphic Linear Authentication Schemes from (ε)-Authentication Codes. Shuai Han, Shengli Liu, Fangguo Zhang, Kefei Chen |
| 2016 | Identifying and Utilizing Dependencies Across Cloud Security Services. Ahmed Taha, Patrick Metzler, Rubén Trapero, Jesus Luna, Neeraj Suri |
| 2016 | Inside Attack Filtering for Robust Sensor Localization. Jongho Won, Elisa Bertino |
| 2016 | Juggling the Gadgets: Binary-level Code Randomization using Instruction Displacement. Hyungjoon Koo, Michalis Polychronakis |
| 2016 | Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis. Zeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, Yuan Zhao |
| 2016 | MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing. Phani Vadrevu, Roberto Perdisci |
| 2016 | MobiPot: Understanding Mobile Telephony Threats with Honeycards. Marco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, Mustaque Ahamad |
| 2016 | Model-based Security Testing: An Empirical Study on OAuth 2.0 Implementations. Ronghai Yang, Guanchen Li, Wing Cheong Lau, Kehuan Zhang, Pili Hu |
| 2016 | Mystique: Evolving Android Malware for Auditing Anti-Malware Tools. Guozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu, Jie Zhang, Tieming Chen |
| 2016 | NFPS: Adding Undetectable Secure Deletion to Flash Translation Layer. Shijie Jia, Luning Xia, Bo Chen, Peng Liu |
| 2016 | No-Execute-After-Read: Preventing Code Disclosure in Commodity Software. Jan Werner, George Baltas, Rob Dallara, Nathan Otterness, Kevin Z. Snow, Fabian Monrose, Michalis Polychronakis |
| 2016 | Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. Jing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu |
| 2016 | ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis. Qian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony, Heng Yin |
| 2016 | Password-Controlled Encryption with Accountable Break-Glass Access. Tao Zhang, Sherman S. M. Chow, Jinyuan Sun |
| 2016 | Practical "Signatures with Efficient Protocols" from Simple Assumptions. Benoît Libert, Fabrice Mouhartem, Thomas Peters, Moti Yung |
| 2016 | Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao |
| 2016 | Preventing Page Faults from Telling Your Secrets. Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena |
| 2016 | Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure. Chong Guan, Kun Sun, Zhan Wang, Wen Tao Zhu |
| 2016 | Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS). Qinghan Xue, Mooi Choo Chuah, Yingying Chen |
| 2016 | Privacy and Utility of Inference Control Mechanisms for Social Computing Applications. Seyed Hossein Ahmadinejad, Philip W. L. Fong, Reihaneh Safavi-Naini |
| 2016 | Privacy-Preserving Spectral Analysis of Large Graphs in Public Clouds. Sagar Sharma, James Powers, Keke Chen |
| 2016 | Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016 Xiaofeng Chen, Xiaofeng Wang, Xinyi Huang |
| 2016 | Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding. Binanda Sengupta, Sushmita Ruj |
| 2016 | R-Droid: Leveraging Android App Analysis with Static Slice Optimization. Michael Backes, Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer |
| 2016 | ROPMEMU: A Framework for the Analysis of Complex Code-Reuse Attacks. Mariano Graziano, Davide Balzarotti, Alain Zidouemba |
| 2016 | RamCrypt: Kernel-based Address Space Encryption for User-mode Processes. Johannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes |
| 2016 | Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining. Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci |
| 2016 | Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow |
| 2016 | SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud. Qian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, Kui Ren |
| 2016 | Secure Dynamic SSE via Access Indistinguishable Storage. Tianhao Wang, Yunlei Zhao |
| 2016 | SkypeLine: Robust Hidden Data Transmission for VoIP. Katharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper |
| 2016 | Smart Locks: Lessons for Securing Commodity Internet of Things Devices. Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, David A. Wagner |
| 2016 | Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms. Anindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo He |
| 2016 | Statistical Detection of Online Drifting Twitter Spam: Invited Paper. Shigang Liu, Jun Zhang, Yang Xiang |
| 2016 | StemJail: Dynamic Role Compartmentalization. Mickaël Salaün, Marion Daubignard, Hervé Debar |
| 2016 | StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware. Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu |
| 2016 | The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes. Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang |
| 2016 | UC-secure Two-Server Password-Based Authentication Protocol and Its Applications. Lin Zhang, Zhenfeng Zhang, Xuexian Hu |
| 2016 | Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition. Ian D. Markwood, Yao Liu |
| 2016 | Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability. Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu |
| 2016 | Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens |
| 2016 | Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected. Issa Khalil, Zuochao Dou, Abdallah Khreishah |
| 2016 | revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps. Zheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen |