CCS A*

197 papers

YearTitle / Authors
2016"Make Sure DSA Signing Exponentiations Really are Constant-Time".
Cesar Pereida García, Billy Bob Brumley, Yuval Yarom
2016"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang
201615th Workshop on Privacy in the Electronic Society (WPES 2016).
Sabrina De Capitani di Vimercati
20162nd International Workshop on Software Protection: SPRO 2016.
Brecht Wyseur, Bjorn De Sutter
20165Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova
20169th International Workshop on Artificial Intelligence and Security: AISec 2016.
David Mandell Freeman, Katerina Mitrokotsa, Arunesh Sinha
2016A Comprehensive Formal Security Analysis of OAuth 2.0.
Daniel Fett, Ralf Küsters, Guido Schmitz
2016A Protocol for Privately Reporting Ad Impressions at Scale.
Matthew Green, Watson Ladd, Ian Miers
2016A Secure Sharding Protocol For Open Blockchains.
Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena
2016A Software Approach to Defeating Side Channels in Last-Level Caches.
Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang
2016A Surfeit of SSH Cipher Suites.
Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson
2016A Systematic Analysis of the Juniper Dual EC Incident.
Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham
2016A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3).
Hugo Krawczyk
2016AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems.
Talia Ringer, Dan Grossman, Franziska Roesner
2016Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition.
Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter
2016Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
Xiaojing Liao, Kan Yuan, Xiaofeng Wang, Zhou Li, Luyi Xing, Raheem A. Beyah
2016Advanced Probabilistic Couplings for Differential Privacy.
Gilles Barthe, Noémie Fong, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub
2016Adversarial Data Mining: Big Data Meets Cyber Security.
Murat Kantarcioglu, Bowei Xi
2016All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records.
Daiping Liu, Shuai Hao, Haining Wang
2016Alternative Implementations of Secure Real Numbers.
Vassil S. Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson
2016Amortizing Secure Computation with Penalties.
Ranjit Kumaresan, Iddo Bentov
2016An Empirical Study of Mnemonic Sentence-based Password Generation Strategies.
Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor
2016An In-Depth Study of More Than Ten Years of Java Exploitation.
Philipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden
2016Android ION Hazard: the Curse of Customizable Memory Management System.
Hang Zhang, Dongdong She, Zhiyun Qian
2016Attacking OpenSSL Implementation of ECDSA with a Few Signatures.
Shuqin Fan, Wenbo Wang, Qingfeng Cheng
2016Attribute-based Key Exchange with General Policies.
Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin
2016BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme.
Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo
2016Breaking Kernel Address Space Layout Randomization with Intel TSX.
Yeongjin Jang, Sangho Lee, Taesoo Kim
2016Breaking Web Applications Built On Top of Encrypted Data.
Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov
2016Build It, Break It, Fix It: Contesting Secure Development.
Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel
2016C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik
2016CCSW'16: 8th ACM Cloud Computing Security Workshop.
Elli Androulaki, Michael K. Reiter
2016CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu
2016CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy.
Lukas Weichselbaum, Michele Spagnuolo, Sebastian Lekies, Artur Janc
2016CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites.
Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou
2016Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback.
Kai Wang, Yuqing Zhang, Peng Liu
2016Chainsaw: Chained Automated Workflow-based Exploit Generation.
Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan
2016Computational Soundness for Dalvik Bytecode.
Michael Backes, Robert Künnemann, Esfandiar Mohammadi
2016Condensed Cryptographic Currencies Crash Course (C5).
Aljosha Judmayer, Edgar R. Weippl
2016Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild.
Stefano Calzavara, Alvise Rabitti, Michele Bugliesi
2016Coverage-based Greybox Fuzzing as Markov Chain.
Marcel Böhme, Van-Thuan Pham, Abhik Roychoudhury
2016Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations.
Dmitry Evtyushkin, Dmitry V. Ponomarev
2016Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic.
Martin E. Hellman
2016DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet?
Ercan Ucan, Raphael M. Reischuk, Adrian Perrig
2016DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation.
Toshinori Araki, Assaf Barak, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara
2016DEMO: Integrating MPC in Big Data Workflows.
Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros
2016DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking.
Denis Migdal, Christian Johansen, Audun Jøsang
2016DEMO: Starving Permission-Hungry Android Apps Using SecuRank.
Vincent F. Taylor, Ivan Martinovic
2016DPSense: Differentially Private Crowdsourced Spectrum Sensing.
Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, Yanchao Zhang
2016Deep Learning with Differential Privacy.
Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang
2016Differential Privacy as a Mutual Information Constraint.
Paul Cuff, Lanqing Yu
2016Differentially Private Bayesian Programming.
Gilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub
2016Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android.
Güliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter
2016Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida
2016ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom
2016Efficient Batched Oblivious PRF with Applications to Private Set Intersection.
Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu
2016Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments.
Jonas Schneider, Nils Fleischhacker, Dominique Schröder, Michael Backes
2016Enforcing Least Privilege Memory Views for Multithreaded Applications.
Terry Ching-Hsiang Hsu, Kevin J. Hoffman, Patrick Eugster, Mathias Payer
2016EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation.
Yilin Shen, Hongxia Jin
2016Error Handling of In-vehicle Networks Makes Them Vulnerable.
Kyong-Tak Cho, Kang G. Shin
2016FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature.
Ziyun Zhu, Tudor Dumitras
2016Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.
Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila
2016Function Secret Sharing: Improvements and Extensions.
Elette Boyle, Niv Gilboa, Yuval Ishai
2016GAME OF DECOYS: Optimal Decoy Routing Through Game Theory.
Milad Nasr, Amir Houmansadr
2016Garbling Gadgets for Boolean and Arithmetic Circuits.
Marshall Ball, Tal Malkin, Mike Rosulek
2016Generic Attacks on Secure Outsourced Databases.
Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill
2016Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.
Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno
2016Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren
2016High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang
2016High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority.
Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara
2016Host of Troubles: Multiple Host Ambiguities in HTTP Implementations.
Jianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson
2016How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior.
Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek
2016Hypnoguard: Protecting Secrets across Sleep-wake Cycles.
Lianying Zhao, Mohammad Mannan
2016Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks.
Johannes Krupp, Michael Backes, Christian Rossow
2016Identity-Concealed Authenticated Encryption and Key Exchange.
Yunlei Zhao
2016Improvements to Secure Computation with Penalties.
Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan
2016Instant and Robust Authentication and Key Agreement among Mobile Devices.
Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao
2016Introduction to Credit Networks: Security, Privacy, and Applications.
Aniket Kate
2016Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets.
Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne Southall Winslett, Carl A. Gunter, William P. King
2016Limiting the Impact of Stealthy Attacks on Industrial Control Systems.
David I. Urbina, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Richard Candell, Henrik Sandberg
2016Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, Xiaofeng Wang, Shuang Hao, Raheem A. Beyah
2016MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer.
Marcel Keller, Emmanuela Orsini, Peter Scholl
2016MEMS Gyroscopes as Physical Unclonable Functions.
Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel
2016MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection.
Yuanwen Huang, Swarup Bhunia, Prabhat Mishra
2016MIST 2016: 8th International Workshop on Managing Insider Security Threats.
Ilsun You, Elisa Bertino
2016MPC-Friendly Symmetric Key Primitives.
Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart
2016MTD 2016: Third ACM Workshop on Moving Target Defense.
Peng Liu, Cliff Wang
2016Making Smart Contracts Smarter.
Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor
2016Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem.
Frank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson
2016Membership Privacy in MicroRNA-based Studies.
Michael Backes, Pascal Berrang, Mathias Humbert, Praveen Manoharan
2016Message-Recovery Attacks on Feistel-Based Format Preserving Encryption.
Mihir Bellare, Viet Tung Hoang, Stefano Tessaro
2016MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet.
Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey
2016Mix&Slice: Efficient Access Revocation in the Cloud.
Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati
2016My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers.
Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, Wenyao Xu
2016New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks.
Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, Songwu Lu
2016On Code Execution Tracking via Power Side-Channel.
Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu
2016On the Instability of Bitcoin Without the Block Reward.
Miles Carlsten, Harry A. Kalodner, S. Matthew Weinberg, Arvind Narayanan
2016On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN.
Karthikeyan Bhargavan, Gaëtan Leurent
2016On the Provable Security of (EC)DSA Signatures.
Manuel Fersch, Eike Kiltz, Bertram Poettering
2016On the Security and Performance of Proof of Work Blockchains.
Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun
2016On the Security and Scalability of Bitcoin's Blockchain.
Ghassan Karame
2016On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li
2016On the Security of Cracking-Resistant Password Vaults.
Maximilian Golla, Benedict Beuscher, Markus Dürmuth
2016Online Tracking: A 1-million-site Measurement and Analysis.
Steven Englehardt, Arvind Narayanan
2016Optimizing Semi-Honest Secure Multiparty Computation for the Internet.
Aner Ben-Efraim, Yehuda Lindell, Eran Omri
2016Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds.
Kevin Lewi, David J. Wu
2016Over-The-Top Bypass: Study of a Recent Telephony Fraud.
Merve Sahin, Aurélien Francillon
2016PIPSEA: A Practical IPsec Gateway on Embedded APUs.
Jung-Ho Park, Wookeun Jung, Gangwon Jo, Ilkoo Lee, Jaejin Lee
2016PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security.
Toby C. Murray, Deian Stefan
2016POPE: Partial Order Preserving Encoding.
Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich
2016POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data.
Pedro Casas, Alessandro D'Alconzo, Giuseppe Settanni, Pierdomenico Fiadino, Florian Skopik
2016POSTER: A Behavioural Authentication System for Mobile Users.
Md. Morshedul Islam, Reihaneh Safavi-Naini
2016POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation.
Katarzyna Kapusta, Gérard Memmi, Hassan Noura
2016POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning.
Lingling Fan, Minhui Xue, Sen Chen, Lihua Xu, Haojin Zhu
2016POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns.
Steffen Wendzel, Wojciech Mazurczyk
2016POSTER: Attack on Non-Linear Physical Unclonable Function.
Jing Ye, Yu Hu, Xiaowei Li
2016POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM.
Anrin Chakraborti, Radu Sion
2016POSTER: DataLair: A Storage Block Device with Plausible Deniability.
Anrin Chakraborti, Chen Chen, Radu Sion
2016POSTER: DroidShield: Protecting User Applications from Normal World Access.
Darius Suciu, Radu Sion
2016POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions.
Chia-Mu Yu
2016POSTER: Fingerprinting Tor Hidden Services.
Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel
2016POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store.
Roman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan Henrik Ziegeldorf, Klaus Wehrle
2016POSTER: Identifying Dynamic Data Structures in Malware.
Thomas Rupprecht, Xi Chen, David H. White, Jan Tobias Mühlberg, Herbert Bos, Gerald Lüttgen
2016POSTER: Improved Markov Strength Meters for Passwords.
Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha
2016POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach.
Ignacio Martín, José Alberto Hernández, Sergio de los Santos, Antonio Guzmán
2016POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints.
Chen Chen, Darius Suciu, Radu Sion
2016POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat.
Manish Shukla, Sutapa Mondal, Sachin Lodha
2016POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications.
Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes
2016POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity.
Omid Asudeh, Matthew Wright
2016POSTER: Privacy Enhanced Secure Location Verification.
Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini
2016POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications.
Yongzhi Wang, Yulong Shen
2016POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties.
Jan-Ole Malchow, Benjamin Güldenring, Volker Roth
2016POSTER: Security Enhanced Administrative Role Based Access Control Models.
P. V. Rajkumar, Ravi S. Sandhu
2016POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity.
Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada
2016POSTER: The ART of App Compartmentalization.
Michael Backes, Sven Bugiel, Jie Huang, Oliver Schranz
2016POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs.
Bo Sun, Akinori Fujino, Tatsuya Mori
2016POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes.
Peter Mayer, Stephan Neumann, Melanie Volkamer
2016POSTER: Towards Exposing Internet of Things: A Roadmap.
Vinay Sachidananda, Jinghui Toh, Shachar Siboni, Asaf Shabtai, Yuval Elovici
2016POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems.
Stephan Lau, Johannes Klick, Stephan Arndt, Volker Roth
2016POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing.
Changhee Hahn, Junbeom Hur
2016POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks.
Michael Steinke, Stefan Metzger, Wolfgang Hommel
2016POSTER: Weighing in eHealth Security.
Martin Krämer, David Aspinall, Maria Wolters
2016POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack.
Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim
2016PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration.
Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster
2016PhishEye: Live Monitoring of Sandboxed Phishing Kits.
Xiao Han, Nizar Kheir, Davide Balzarotti
2016Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication.
Zhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang
2016Practical Censorship Evasion Leveraging Content Delivery Networks.
Hadi Zolfaghari, Amir Houmansadr
2016Practical Detection of Entropy Loss in Pseudo-Random Number Generators.
Felix Dörre, Vladimir Klebanov
2016Practical Non-Malleable Codes from l-more Extractable Hash Functions.
Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis
2016Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard
2016Privacy and Security in the Genomic Era.
Erman Ayday, Jean-Pierre Hubaux
2016Private Circuits III: Hardware Trojan-Resilience via Testing Amplification.
Stefan Dziembowski, Sebastian Faust, François-Xavier Standaert
2016Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016
Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi
2016Program Anomaly Detection: Methodology and Practices.
Xiaokui Shu, Danfeng Yao
2016Protecting Insecure Communications with Topology-aware Network Tunnels.
Georgios Kontaxis, Angelos D. Keromytis
2016ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices.
Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler, Raju Rangaswami
2016Reliable Third-Party Library Detection in Android and its Security Applications.
Michael Backes, Sven Bugiel, Erik Derr
2016Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices.
Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang
2016SANA: Secure and Scalable Aggregate Network Attestation.
Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter
2016SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning.
George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias
2016Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency.
Isaac C. Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse
2016SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems.
Nicholas J. Multari, Anoop Singhal, David O. Manz
2016Safely Measuring Tor.
Rob Jansen, Aaron Johnson
2016SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Luke Deshotels, Razvan Deaconescu, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi
2016Scalable Graph-based Bug Search for Firmware Images.
Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, Heng Yin
2016Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16).
Alvaro A. Cárdenas, Rakesh B. Bobba
2016Secure Stable Matching at Scale.
Jack Doerner, David Evans, Abhi Shelat
2016Security on Wheels: Security and Privacy for Vehicular Communication Systems.
Panos Papadimitratos
2016Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016).
Long Lu, Mohammad Mannan
2016Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016).
Xinxin Fan, Tim Güneysu
2016Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement.
Cecylia Bocovich, Ian Goldberg
2016SmartWalk: Enhancing Social Network Security via Adaptive Random Walks.
Yushan Liu, Shouling Ji, Prateek Mittal
2016Statistical Deobfuscation of Android Applications.
Benjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin T. Vechev
2016Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks.
Yunlong Mao, Yuan Zhang, Sheng Zhong
2016Strong Non-Interference and Type-Directed Higher-Order Masking.
Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini
2016Systematic Fuzzing and Testing of TLS Libraries.
Juraj Somorovsky
2016TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Mingshen Sun, Tao Wei, John C. S. Lui
2016Targeted Online Password Guessing: An Underestimated Threat.
Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang
2016The Honey Badger of BFT Protocols.
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song
2016The Misuse of Android Unix Domain Sockets and Security Implications.
Yuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun Qian, Zhuoqing Morley Mao
2016The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.
Ari Juels, Ahmed E. Kosba, Elaine Shi
2016The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption.
David Pouliot, Charles V. Wright
2016The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio.
Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena
2016Theory of Implementation Security Workshop (TIs 2016).
Begül Bilgin, Svetla Nikova, Vincent Rijmen
2016Town Crier: An Authenticated Data Feed for Smart Contracts.
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi
2016Transparency Overlays and Applications.
Melissa Chase, Sarah Meiklejohn
2016Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms.
Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck
2016TypeSan: Practical Type Confusion Detection.
István Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe
2016UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages.
Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee
2016Using Reflexive Eye Movements for Fast Challenge-Response Authentication.
Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic
2016VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones.
Linghan Zhang, Sheng Tan, Jie Yang, Yingying Chen
2016WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security.
Florian Kerschbaum, Erik-Oliver Blass, Tomas Sander
2016What Else is Revealed by Order-Revealing Encryption?
F. Betül Durak, Thomas M. DuBuisson, David Cash
2016When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan
2016iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft.
Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, Yanchao Zhang
2016Λολ: Functional Lattice Cryptography.
Eric Crockett, Chris Peikert
2016∑oφoς: Forward Secure Searchable Encryption.
Raphael Bost