| 2016 | "Make Sure DSA Signing Exponentiations Really are Constant-Time". Cesar Pereida García, Billy Bob Brumley, Yuval Yarom |
| 2016 | "The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing. Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang |
| 2016 | 15th Workshop on Privacy in the Electronic Society (WPES 2016). Sabrina De Capitani di Vimercati |
| 2016 | 2nd International Workshop on Software Protection: SPRO 2016. Brecht Wyseur, Bjorn De Sutter |
| 2016 | 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova |
| 2016 | 9th International Workshop on Artificial Intelligence and Security: AISec 2016. David Mandell Freeman, Katerina Mitrokotsa, Arunesh Sinha |
| 2016 | A Comprehensive Formal Security Analysis of OAuth 2.0. Daniel Fett, Ralf Küsters, Guido Schmitz |
| 2016 | A Protocol for Privately Reporting Ad Impressions at Scale. Matthew Green, Watson Ladd, Ian Miers |
| 2016 | A Secure Sharding Protocol For Open Blockchains. Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena |
| 2016 | A Software Approach to Defeating Side Channels in Last-Level Caches. Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang |
| 2016 | A Surfeit of SSH Cipher Suites. Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson |
| 2016 | A Systematic Analysis of the Juniper Dual EC Incident. Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham |
| 2016 | A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3). Hugo Krawczyk |
| 2016 | AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems. Talia Ringer, Dan Grossman, Franziska Roesner |
| 2016 | Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter |
| 2016 | Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence. Xiaojing Liao, Kan Yuan, Xiaofeng Wang, Zhou Li, Luyi Xing, Raheem A. Beyah |
| 2016 | Advanced Probabilistic Couplings for Differential Privacy. Gilles Barthe, Noémie Fong, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub |
| 2016 | Adversarial Data Mining: Big Data Meets Cyber Security. Murat Kantarcioglu, Bowei Xi |
| 2016 | All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records. Daiping Liu, Shuai Hao, Haining Wang |
| 2016 | Alternative Implementations of Secure Real Numbers. Vassil S. Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson |
| 2016 | Amortizing Secure Computation with Penalties. Ranjit Kumaresan, Iddo Bentov |
| 2016 | An Empirical Study of Mnemonic Sentence-based Password Generation Strategies. Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor |
| 2016 | An In-Depth Study of More Than Ten Years of Java Exploitation. Philipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden |
| 2016 | Android ION Hazard: the Curse of Customizable Memory Management System. Hang Zhang, Dongdong She, Zhiyun Qian |
| 2016 | Attacking OpenSSL Implementation of ECDSA with a Few Signatures. Shuqin Fan, Wenbo Wang, Qingfeng Cheng |
| 2016 | Attribute-based Key Exchange with General Policies. Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin |
| 2016 | BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme. Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo |
| 2016 | Breaking Kernel Address Space Layout Randomization with Intel TSX. Yeongjin Jang, Sangho Lee, Taesoo Kim |
| 2016 | Breaking Web Applications Built On Top of Encrypted Data. Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov |
| 2016 | Build It, Break It, Fix It: Contesting Secure Development. Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel |
| 2016 | C-FLAT: Control-Flow Attestation for Embedded Systems Software. Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik |
| 2016 | CCSW'16: 8th ACM Cloud Computing Security Workshop. Elli Androulaki, Michael K. Reiter |
| 2016 | CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu |
| 2016 | CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy. Lukas Weichselbaum, Michele Spagnuolo, Sebastian Lekies, Artur Janc |
| 2016 | CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites. Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou |
| 2016 | Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback. Kai Wang, Yuqing Zhang, Peng Liu |
| 2016 | Chainsaw: Chained Automated Workflow-based Exploit Generation. Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan |
| 2016 | Computational Soundness for Dalvik Bytecode. Michael Backes, Robert Künnemann, Esfandiar Mohammadi |
| 2016 | Condensed Cryptographic Currencies Crash Course (C5). Aljosha Judmayer, Edgar R. Weippl |
| 2016 | Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild. Stefano Calzavara, Alvise Rabitti, Michele Bugliesi |
| 2016 | Coverage-based Greybox Fuzzing as Markov Chain. Marcel Böhme, Van-Thuan Pham, Abhik Roychoudhury |
| 2016 | Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations. Dmitry Evtyushkin, Dmitry V. Ponomarev |
| 2016 | Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic. Martin E. Hellman |
| 2016 | DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet? Ercan Ucan, Raphael M. Reischuk, Adrian Perrig |
| 2016 | DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation. Toshinori Araki, Assaf Barak, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara |
| 2016 | DEMO: Integrating MPC in Big Data Workflows. Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros |
| 2016 | DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking. Denis Migdal, Christian Johansen, Audun Jøsang |
| 2016 | DEMO: Starving Permission-Hungry Android Apps Using SecuRank. Vincent F. Taylor, Ivan Martinovic |
| 2016 | DPSense: Differentially Private Crowdsourced Spectrum Sensing. Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, Yanchao Zhang |
| 2016 | Deep Learning with Differential Privacy. Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang |
| 2016 | Differential Privacy as a Mutual Information Constraint. Paul Cuff, Lanqing Yu |
| 2016 | Differentially Private Bayesian Programming. Gilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub |
| 2016 | Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. Güliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter |
| 2016 | Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida |
| 2016 | ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom |
| 2016 | Efficient Batched Oblivious PRF with Applications to Private Set Intersection. Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu |
| 2016 | Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments. Jonas Schneider, Nils Fleischhacker, Dominique Schröder, Michael Backes |
| 2016 | Enforcing Least Privilege Memory Views for Multithreaded Applications. Terry Ching-Hsiang Hsu, Kevin J. Hoffman, Patrick Eugster, Mathias Payer |
| 2016 | EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation. Yilin Shen, Hongxia Jin |
| 2016 | Error Handling of In-vehicle Networks Makes Them Vulnerable. Kyong-Tak Cho, Kang G. Shin |
| 2016 | FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature. Ziyun Zhu, Tudor Dumitras |
| 2016 | Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE. Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila |
| 2016 | Function Secret Sharing: Improvements and Extensions. Elette Boyle, Niv Gilboa, Yuval Ishai |
| 2016 | GAME OF DECOYS: Optimal Decoy Routing Through Game Theory. Milad Nasr, Amir Houmansadr |
| 2016 | Garbling Gadgets for Boolean and Arithmetic Circuits. Marshall Ball, Tal Malkin, Mike Rosulek |
| 2016 | Generic Attacks on Secure Outsourced Databases. Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill |
| 2016 | Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno |
| 2016 | Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy. Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren |
| 2016 | High Fidelity Data Reduction for Big Data Security Dependency Analyses. Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang |
| 2016 | High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara |
| 2016 | Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Jianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson |
| 2016 | How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior. Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek |
| 2016 | Hypnoguard: Protecting Secrets across Sleep-wake Cycles. Lianying Zhao, Mohammad Mannan |
| 2016 | Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks. Johannes Krupp, Michael Backes, Christian Rossow |
| 2016 | Identity-Concealed Authenticated Encryption and Key Exchange. Yunlei Zhao |
| 2016 | Improvements to Secure Computation with Penalties. Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan |
| 2016 | Instant and Robust Authentication and Key Agreement among Mobile Devices. Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao |
| 2016 | Introduction to Credit Networks: Security, Privacy, and Applications. Aniket Kate |
| 2016 | Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne Southall Winslett, Carl A. Gunter, William P. King |
| 2016 | Limiting the Impact of Stealthy Attacks on Industrial Control Systems. David I. Urbina, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Richard Candell, Henrik Sandberg |
| 2016 | Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service. Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, Xiaofeng Wang, Shuang Hao, Raheem A. Beyah |
| 2016 | MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer. Marcel Keller, Emmanuela Orsini, Peter Scholl |
| 2016 | MEMS Gyroscopes as Physical Unclonable Functions. Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel |
| 2016 | MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection. Yuanwen Huang, Swarup Bhunia, Prabhat Mishra |
| 2016 | MIST 2016: 8th International Workshop on Managing Insider Security Threats. Ilsun You, Elisa Bertino |
| 2016 | MPC-Friendly Symmetric Key Primitives. Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart |
| 2016 | MTD 2016: Third ACM Workshop on Moving Target Defense. Peng Liu, Cliff Wang |
| 2016 | Making Smart Contracts Smarter. Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor |
| 2016 | Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem. Frank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson |
| 2016 | Membership Privacy in MicroRNA-based Studies. Michael Backes, Pascal Berrang, Mathias Humbert, Praveen Manoharan |
| 2016 | Message-Recovery Attacks on Feistel-Based Format Preserving Encryption. Mihir Bellare, Viet Tung Hoang, Stefano Tessaro |
| 2016 | MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet. Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey |
| 2016 | Mix&Slice: Efficient Access Revocation in the Cloud. Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati |
| 2016 | My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers. Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, Wenyao Xu |
| 2016 | New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks. Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, Songwu Lu |
| 2016 | On Code Execution Tracking via Power Side-Channel. Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu |
| 2016 | On the Instability of Bitcoin Without the Block Reward. Miles Carlsten, Harry A. Kalodner, S. Matthew Weinberg, Arvind Narayanan |
| 2016 | On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN. Karthikeyan Bhargavan, Gaëtan Leurent |
| 2016 | On the Provable Security of (EC)DSA Signatures. Manuel Fersch, Eike Kiltz, Bertram Poettering |
| 2016 | On the Security and Performance of Proof of Work Blockchains. Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun |
| 2016 | On the Security and Scalability of Bitcoin's Blockchain. Ghassan Karame |
| 2016 | On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols. Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li |
| 2016 | On the Security of Cracking-Resistant Password Vaults. Maximilian Golla, Benedict Beuscher, Markus Dürmuth |
| 2016 | Online Tracking: A 1-million-site Measurement and Analysis. Steven Englehardt, Arvind Narayanan |
| 2016 | Optimizing Semi-Honest Secure Multiparty Computation for the Internet. Aner Ben-Efraim, Yehuda Lindell, Eran Omri |
| 2016 | Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds. Kevin Lewi, David J. Wu |
| 2016 | Over-The-Top Bypass: Study of a Recent Telephony Fraud. Merve Sahin, Aurélien Francillon |
| 2016 | PIPSEA: A Practical IPsec Gateway on Embedded APUs. Jung-Ho Park, Wookeun Jung, Gangwon Jo, Ilkoo Lee, Jaejin Lee |
| 2016 | PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security. Toby C. Murray, Deian Stefan |
| 2016 | POPE: Partial Order Preserving Encoding. Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich |
| 2016 | POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data. Pedro Casas, Alessandro D'Alconzo, Giuseppe Settanni, Pierdomenico Fiadino, Florian Skopik |
| 2016 | POSTER: A Behavioural Authentication System for Mobile Users. Md. Morshedul Islam, Reihaneh Safavi-Naini |
| 2016 | POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation. Katarzyna Kapusta, Gérard Memmi, Hassan Noura |
| 2016 | POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning. Lingling Fan, Minhui Xue, Sen Chen, Lihua Xu, Haojin Zhu |
| 2016 | POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns. Steffen Wendzel, Wojciech Mazurczyk |
| 2016 | POSTER: Attack on Non-Linear Physical Unclonable Function. Jing Ye, Yu Hu, Xiaowei Li |
| 2016 | POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM. Anrin Chakraborti, Radu Sion |
| 2016 | POSTER: DataLair: A Storage Block Device with Plausible Deniability. Anrin Chakraborti, Chen Chen, Radu Sion |
| 2016 | POSTER: DroidShield: Protecting User Applications from Normal World Access. Darius Suciu, Radu Sion |
| 2016 | POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions. Chia-Mu Yu |
| 2016 | POSTER: Fingerprinting Tor Hidden Services. Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel |
| 2016 | POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. Roman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan Henrik Ziegeldorf, Klaus Wehrle |
| 2016 | POSTER: Identifying Dynamic Data Structures in Malware. Thomas Rupprecht, Xi Chen, David H. White, Jan Tobias Mühlberg, Herbert Bos, Gerald Lüttgen |
| 2016 | POSTER: Improved Markov Strength Meters for Passwords. Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha |
| 2016 | POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach. Ignacio Martín, José Alberto Hernández, Sergio de los Santos, Antonio Guzmán |
| 2016 | POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints. Chen Chen, Darius Suciu, Radu Sion |
| 2016 | POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat. Manish Shukla, Sutapa Mondal, Sachin Lodha |
| 2016 | POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications. Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes |
| 2016 | POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity. Omid Asudeh, Matthew Wright |
| 2016 | POSTER: Privacy Enhanced Secure Location Verification. Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini |
| 2016 | POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications. Yongzhi Wang, Yulong Shen |
| 2016 | POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties. Jan-Ole Malchow, Benjamin Güldenring, Volker Roth |
| 2016 | POSTER: Security Enhanced Administrative Role Based Access Control Models. P. V. Rajkumar, Ravi S. Sandhu |
| 2016 | POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity. Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada |
| 2016 | POSTER: The ART of App Compartmentalization. Michael Backes, Sven Bugiel, Jie Huang, Oliver Schranz |
| 2016 | POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs. Bo Sun, Akinori Fujino, Tatsuya Mori |
| 2016 | POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes. Peter Mayer, Stephan Neumann, Melanie Volkamer |
| 2016 | POSTER: Towards Exposing Internet of Things: A Roadmap. Vinay Sachidananda, Jinghui Toh, Shachar Siboni, Asaf Shabtai, Yuval Elovici |
| 2016 | POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems. Stephan Lau, Johannes Klick, Stephan Arndt, Volker Roth |
| 2016 | POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing. Changhee Hahn, Junbeom Hur |
| 2016 | POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks. Michael Steinke, Stefan Metzger, Wolfgang Hommel |
| 2016 | POSTER: Weighing in eHealth Security. Martin Krämer, David Aspinall, Maria Wolters |
| 2016 | POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack. Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim |
| 2016 | PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster |
| 2016 | PhishEye: Live Monitoring of Sandboxed Phishing Kits. Xiao Han, Nizar Kheir, Davide Balzarotti |
| 2016 | Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication. Zhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang |
| 2016 | Practical Censorship Evasion Leveraging Content Delivery Networks. Hadi Zolfaghari, Amir Houmansadr |
| 2016 | Practical Detection of Entropy Loss in Pseudo-Random Number Generators. Felix Dörre, Vladimir Klebanov |
| 2016 | Practical Non-Malleable Codes from l-more Extractable Hash Functions. Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis |
| 2016 | Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard |
| 2016 | Privacy and Security in the Genomic Era. Erman Ayday, Jean-Pierre Hubaux |
| 2016 | Private Circuits III: Hardware Trojan-Resilience via Testing Amplification. Stefan Dziembowski, Sebastian Faust, François-Xavier Standaert |
| 2016 | Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi |
| 2016 | Program Anomaly Detection: Methodology and Practices. Xiaokui Shu, Danfeng Yao |
| 2016 | Protecting Insecure Communications with Topology-aware Network Tunnels. Georgios Kontaxis, Angelos D. Keromytis |
| 2016 | ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices. Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler, Raju Rangaswami |
| 2016 | Reliable Third-Party Library Detection in Android and its Security Applications. Michael Backes, Sven Bugiel, Erik Derr |
| 2016 | Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices. Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang |
| 2016 | SANA: Secure and Scalable Aggregate Network Attestation. Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter |
| 2016 | SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning. George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias |
| 2016 | Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency. Isaac C. Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse |
| 2016 | SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems. Nicholas J. Multari, Anoop Singhal, David O. Manz |
| 2016 | Safely Measuring Tor. Rob Jansen, Aaron Johnson |
| 2016 | SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles. Luke Deshotels, Razvan Deaconescu, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi |
| 2016 | Scalable Graph-based Bug Search for Firmware Images. Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, Heng Yin |
| 2016 | Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16). Alvaro A. Cárdenas, Rakesh B. Bobba |
| 2016 | Secure Stable Matching at Scale. Jack Doerner, David Evans, Abhi Shelat |
| 2016 | Security on Wheels: Security and Privacy for Vehicular Communication Systems. Panos Papadimitratos |
| 2016 | Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016). Long Lu, Mohammad Mannan |
| 2016 | Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016). Xinxin Fan, Tim Güneysu |
| 2016 | Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement. Cecylia Bocovich, Ian Goldberg |
| 2016 | SmartWalk: Enhancing Social Network Security via Adaptive Random Walks. Yushan Liu, Shouling Ji, Prateek Mittal |
| 2016 | Statistical Deobfuscation of Android Applications. Benjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin T. Vechev |
| 2016 | Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks. Yunlong Mao, Yuan Zhang, Sheng Zhong |
| 2016 | Strong Non-Interference and Type-Directed Higher-Order Masking. Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini |
| 2016 | Systematic Fuzzing and Testing of TLS Libraries. Juraj Somorovsky |
| 2016 | TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime. Mingshen Sun, Tao Wei, John C. S. Lui |
| 2016 | Targeted Online Password Guessing: An Underestimated Threat. Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang |
| 2016 | The Honey Badger of BFT Protocols. Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song |
| 2016 | The Misuse of Android Unix Domain Sockets and Security Implications. Yuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun Qian, Zhuoqing Morley Mao |
| 2016 | The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. Ari Juels, Ahmed E. Kosba, Elaine Shi |
| 2016 | The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption. David Pouliot, Charles V. Wright |
| 2016 | The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio. Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena |
| 2016 | Theory of Implementation Security Workshop (TIs 2016). Begül Bilgin, Svetla Nikova, Vincent Rijmen |
| 2016 | Town Crier: An Authenticated Data Feed for Smart Contracts. Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi |
| 2016 | Transparency Overlays and Applications. Melissa Chase, Sarah Meiklejohn |
| 2016 | Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms. Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck |
| 2016 | TypeSan: Practical Type Confusion Detection. István Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe |
| 2016 | UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee |
| 2016 | Using Reflexive Eye Movements for Fast Challenge-Response Authentication. Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic |
| 2016 | VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones. Linghan Zhang, Sheng Tan, Jie Yang, Yingying Chen |
| 2016 | WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security. Florian Kerschbaum, Erik-Oliver Blass, Tomas Sander |
| 2016 | What Else is Revealed by Order-Revealing Encryption? F. Betül Durak, Thomas M. DuBuisson, David Cash |
| 2016 | When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan |
| 2016 | iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft. Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, Yanchao Zhang |
| 2016 | Λολ: Functional Lattice Cryptography. Eric Crockett, Chris Peikert |
| 2016 | ∑oφoς: Forward Secure Searchable Encryption. Raphael Bost |