CCS A*

207 papers

YearTitle / Authors
201710th International Workshop on Artificial Intelligence and Security (AISec 2017).
Battista Biggio, David Freeman, Brad Miller, Arunesh Sinha
201716th Workshop on Privacy in the Electronic Society (WPES 2017).
Adam J. Lee
20175Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits.
Brent Carmer, Alex J. Malozemoff, Mariana Raykova
2017A Comprehensive Symbolic Analysis of TLS 1.3.
Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe
2017A Fast and Verified Software Stack for Secure Function Evaluation.
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
2017A Formal Foundation for Secure Remote Execution of Enclaves.
Pramod Subramanyan, Rohit Sinha, Ilia A. Lebedev, Srinivas Devadas, Sanjit A. Seshia
2017A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority.
Yehuda Lindell, Ariel Nof
2017A Large-Scale Empirical Study of Security Patches.
Frank Li, Vern Paxson
2017A Stitch in Time: Supporting Android Developers in WritingSecure Code.
Duc Cuong Nguyen, Dominik Wermke, Yasemin Acar, Michael Backes, Charles Weir, Sascha Fahl
2017A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components.
Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis
2017A Type System for Privacy Properties.
Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei
2017ASHES 2017: Workshop on Attacks and Solutions in Hardware Security.
Chip-Hong Chang, Marten van Dijk, Farinaz Koushanfar, Ulrich Rührmair, Mark Tehranipoor
2017AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services.
Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin
2017Algorithm Substitution Attacks from a Steganographic Perspective.
Sebastian Berndt, Maciej Liskiewicz
2017Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions.
Miguel Ambrona, Gilles Barthe, Romain Gay, Hoeteck Wee
2017Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation.
Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017Automated Crowdturfing Attacks and Defenses in Online Review Systems.
Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao
2017BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection.
Gunnar Hartung, Max Hoffmann, Matthias Nagel, Andy Rupp
2017Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms.
Simon Oya, Carmela Troncoso, Fernando Pérez-González
2017Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin.
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Y. Vasserman, Yongdae Kim
2017Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.
Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
2017Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation.
Shay Gueron, Yehuda Lindell
2017Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions.
Mihir Bellare, Joseph Jaeger, Julia Len
2017Bolt: Anonymous Payment Channels for Decentralized Currencies.
Matthew Green, Ian Miers
2017CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through.
Maliheh Shirvanian, Nitesh Saxena
2017CCS 2017: Women in Cyber Security (CyberW) Workshop.
Danfeng (Daphne) Yao, Elisa Bertino
2017CCS'17 Tutorial Abstract / SGX Security and Privacy.
Taesoo Kim, Zhiqiang Lin, Chia-Che Tsai
2017CCSW'17: 2017 ACM Cloud Computing Security.
Ghassan O. Karame, Angelos Stavrou
2017CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy.
Rakesh B. Bobba, Awais Rashid
2017Cache Side Channels: State of the Art and Research Opportunities.
Yinqian Zhang
2017Capturing Malware Propagations with Code Injections and Code-Reuse Attacks.
David Korczynski, Heng Yin
2017Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.
Doowon Kim, Bum Jun Kwon, Tudor Dumitras
2017Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs.
Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang
2017Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study.
Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, Zhuoqing Morley Mao
2017Cliptography: Post-Snowden Cryptography.
Qiang Tang, Moti Yung
2017Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets.
Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß, Eduardo A. Vela Nava, Martin Johns
2017Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record Linkage.
Xi He, Ashwin Machanavajjhala, Cheryl J. Flynn, Divesh Srivastava
2017Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis.
Milad Nasr, Amir Houmansadr, Arya Mazumdar
2017Concurrency and Privacy with Payment-Channel Networks.
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi
2017Cryptographically Secure Information Flow Control on Key-Value Stores.
Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong
2017DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer.
Shijie Jia, Luning Xia, Bo Chen, Peng Liu
2017DEMO: Akatosh: Automated Cyber Incident Verification and Impact Analysis.
Jared M. Smith, Elliot Greenlee, Aaron E. Ferber
2017DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna
2017DUPLO: Unifying Cut-and-Choose for Garbled Circuits.
Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
2017Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Kurt Thomas, Frank Li, Ali Zand, Jacob Barrett, Juri Ranieri, Luca Invernizzi, Yarik Markov, Oxana Comanescu, Vijay Eranti, Angelika Moscicki, Daniel Margolis, Vern Paxson, Elie Bursztein
2017Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs.
Giancarlo Pellegrino, Martin Johns, Simon Koch, Michael Backes, Christian Rossow
2017Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.
Briland Hitaj, Giuseppe Ateniese, Fernando Pérez-Cruz
2017DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning.
Min Du, Feifei Li, Guineng Zheng, Vivek Srikumar
2017Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction.
Mihir Bellare, Wei Dai
2017Designing New Operating Primitives to Improve Fuzzing Performance.
Wen Xu, Sanidhya Kashyap, Changwoo Min, Taesoo Kim
2017Detecting Structurally Anomalous Logins Within Enterprise Networks.
Hossein Siadati, Nasir D. Memon
2017Deterministic Browser.
Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu
2017Deterministic, Stash-Free Write-Only ORAM.
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
2017Directed Greybox Fuzzing.
Marcel Böhme, Van-Thuan Pham, Manh-Dung Nguyen, Abhik Roychoudhury
2017Distributed Measurement with Private Set-Union Cardinality.
Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr
2017DolphinAttack: Inaudible Voice Commands.
Guoming Zhang, Chen Yan, Xiaoyu Ji, Tianchen Zhang, Taimin Zhang, Wenyuan Xu
2017Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains.
Daiping Liu, Zhou Li, Kun Du, Haining Wang, Baojun Liu, Hai-Xin Duan
2017Economic Factors of Vulnerability Trade and Exploitation.
Luca Allodi
2017Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract.
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada
2017Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case.
Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala
2017Evading Classifiers by Morphing in the Dark.
Hung Dang, Yue Huang, Ee-Chien Chang
2017Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers.
Mohammad A. Islam, Shaolei Ren, Adam Wierman
2017FAME: Fast Attribute-based Message Encryption.
Shashank Agrawal, Melissa Chase
2017FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation.
Taesoo Kim, Dinghao Wu
2017Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards.
Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers
2017Fast Private Set Intersection from Homomorphic Encryption.
Hao Chen, Kim Laine, Peter Rindal
2017Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting.
Zain Shamsi, Daren B. H. Cline, Dmitri Loguinov
2017FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution.
Grant Hernandez, Farhaan Fowze, Dave (Jing) Tian, Tuba Yavuz, Kevin R. B. Butler
2017FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.
Jian Huang, Jun Xu, Xinyu Xing, Peng Liu, Moinuddin K. Qureshi
2017Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates.
Kee Sung Kim, Minkyu Kim, Dongsoo Lee, Je Hong Park, Woo-Hwan Kim
2017Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives.
Raphaël Bost, Brice Minaud, Olga Ohrimenko
2017FreeGuard: A Faster Secure Heap Allocator.
Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu
2017Full Accounting for Verifiable Outsourcing.
Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies
2017Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, Kui Ren
2017Generic Semantic Security against a Kleptographic Adversary.
Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou
2017Global-Scale Secure Multiparty Computation.
Xiao Wang, Samuel Ranellucci, Jonathan Katz
2017HACL*: A Verified Modern Cryptographic Library.
Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
2017Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication.
Linghan Zhang, Sheng Tan, Jie Yang
2017Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.
Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczynski, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten
2017HexType: Efficient Detection of Type Confusion Errors for C++.
Yuseok Jeon, Priyam Biswas, Scott A. Carr, Byoungyoung Lee, Mathias Payer
2017Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse.
Panagiotis Kintis, Najmeh Miramirkhani, Charles Lever, Yizheng Chen, Rosa Romero Gómez, Nikolaos Pitropakis, Nick Nikiforakis, Manos Antonakakis
2017Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers.
Meng Luo, Oleksii Starov, Nima Honarmand, Nick Nikiforakis
2017Homomorphic Secret Sharing: Optimizations and Applications.
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orrù
2017How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services.
Rebekah Overdorf, Marc Juárez, Gunes Acar, Rachel Greenstadt, Claudia Díaz
2017IMF: Inferred Model-based Fuzzer.
HyungSeok Han, Sang Kil Cha
2017IRON: Functional Encryption using Intel SGX.
Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov
2017Identifying Open-Source License Violation and 1-day Security Risk at Large Scale.
Ruian Duan, Ashish Bijlani, Meng Xu, Taesoo Kim, Wenke Lee
2017Identity Related Threats, Vulnerabilities and Risk Mitigation in Online Social Networks: A Tutorial.
Leila Bahri
2017Identity-Based Format-Preserving Encryption.
Mihir Bellare, Viet Tung Hoang
2017Implementing BP-Obfuscation Using Graph-Induced Encoding.
Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz
2017IoT S&P 2017: First Workshop on Internet of Things Security and Privacy.
Theophilus Benson, Peng Liu, Srikanth Sundaresan, Yuqing Zhang
2017JITGuard: Hardening Just-in-time Compilers with SGX.
Tommaso Frassetto, David Gens, Christopher Liebchen, Ahmad-Reza Sadeghi
2017Jasmin: High-Assurance and High-Speed Cryptography.
José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub
2017Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android.
Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes
2017Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2.
Mathy Vanhoef, Frank Piessens
2017Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, Xiaofeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter
2017Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat.
Sarah Pearman, Jeremy Thomas, Pardis Emami Naeini, Hana Habib, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Alain Forget
2017Ligero: Lightweight Sublinear Arguments Without a Trusted Setup.
Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam
2017MIST 2017: 9th International Workshop on Managing Insider Security Threats.
Ilsun You, Elisa Bertino
2017MTD 2017: Fourth ACM Workshop on Moving Target Defense (MTD).
Hamed Okhravi, Xinming Ou
2017Machine Learning Models that Remember Too Much.
Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov
2017MagNet: A Two-Pronged Defense against Adversarial Examples.
Dongyu Meng, Hao Chen
2017Malicious-Secure Private Set Intersection via Dual Execution.
Peter Rindal, Mike Rosulek
2017Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, Xiaofeng Wang, Wei Zou
2017May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
Daniel Genkin, Luke Valenta, Yuval Yarom
2017Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security.
Peter Snyder, Cynthia Bagier Taylor, Chris Kanich
2017Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection.
Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song
2017New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs.
Gottfried Herold, Max Hoffmann, Michael Klooß, Carla Ràfols, Andy Rupp
2017No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial.
Yong Li, Sven Schäge
2017Nonmalleable Information Flow Control.
Ethan Cecchetti, Andrew C. Myers, Owen Arden
2017Object Flow Integrity.
Wenhao Wang, Xiaoyang Xu, Kevin W. Hamlen
2017Oblivious Neural Network Predictions via MiniONN Transformations.
Jian Liu, Mika Juuti, Yao Lu, N. Asokan
2017On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs.
Shahin Tajik, Heiko Lohrke, Jean-Pierre Seifert, Christian Boit
2017PLAS 2017: ACM SIGSAC Workshop on Programming Languages and Analysis for Security.
Nataliia Bielova, Marco Gaboardi
2017POISED: Spotting Twitter Spam Off the Beaten Paths.
Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, José M. Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna
2017POSTER: A Comprehensive Study of Forged Certificates in the Wild.
Mingxin Cui, Zigang Cao, Gang Xiong, Junzheng Shi
2017POSTER: A PU Learning based System for Potential Malicious URL Detection.
Ya-Lin Zhang, Longfei Li, Jun Zhou, Xiaolong Li, Yujiang Liu, Yuanchao Zhang, Zhi-Hua Zhou
2017POSTER: A Unified Framework of Differentially Private Synthetic Data Release with Generative Adversarial Network.
Pei-Hsuan Lu, Chia-Mu Yu
2017POSTER: AFL-based Fuzzing for Java with Kelinci.
Rody Kersten, Kasper Søe Luckow, Corina S. Pasareanu
2017POSTER: Actively Detecting Implicit Fraudulent Transactions.
Shaosheng Cao, Xinxing Yang, Jun Zhou, Xiaolong Li, Yuan (Alan) Qi, Kai Xiao
2017POSTER: An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNs.
Zixi Cai, Zigang Cao, Gang Xiong, Zhen Li, Wei Xia
2017POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP Security.
Qianqian Xing, Baosheng Wang, Xiaofeng Wang
2017POSTER: Covert Channel Based on the Sequential Analysis in Android Systems.
Jun-Won Ho, Kyungrok Won, Jee Sun Kim
2017POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE).
Ahmet Okutan, Gordon Werner, Katie McConky, Shanchieh Jay Yang
2017POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics.
Long Cheng, Ke Tian, Danfeng (Daphne) Yao
2017POSTER: Evaluating Reflective Deception as a Malware Mitigation Strategy.
Thomas Shaw, James Arrowood, Michael Kvasnicka, Shay Taylor, Kyle Cook, John Hale
2017POSTER: Finding Vulnerabilities in P4 Programs with Assertion-based Verification.
Lucas Freire, Miguel C. Neves, Alberto E. Schaeffer Filho, Marinho P. Barcellos
2017POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality.
Anne Kohlbrenner, Frederico Araujo, Teryl Taylor, Marc Ph. Stoecklin
2017POSTER: Improving Anonymity of Services Deployed Over Tor by Changing Guard Selection.
Abhishek Singh
2017POSTER: Inaudible Voice Commands.
Liwei Song, Prateek Mittal
2017POSTER: Intrusion Detection System for In-vehicle Networks using Sensor Correlation and Integration.
Huaxin Li, Li Zhao, Marcio Juliato, Shabbir Ahmed, Manoj R. Sastry, Lily L. Yang
2017POSTER: Is Active Electromagnetic Side-channel Attack Practical?
Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi
2017POSTER: Neural Network-based Graph Embedding for Malicious Accounts Detection.
Ziqi Liu, Chaochao Chen, Jun Zhou, Xiaolong Li, Feng Xu, Tao Chen, Le Song
2017POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles.
Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray
2017POSTER: Practical Fraud Transaction Prediction.
Longfei Li, Jun Zhou, Xiaolong Li, Tao Chen
2017POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare.
Diptendu Mohan Kar, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray
2017POSTER: Probing Tor Hidden Service with Dockers.
Jonghyeon Park, Youngseok Lee
2017POSTER: Rethinking Fingerprint Identification on Smartphones.
Seungyeon Kim, Hoyeon Lee, Taekyoung Kwon
2017POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave.
Yu Ding, Ran Duan, Long Li, Yueqiang Cheng, Yulong Zhang, Tanghui Chen, Tao Wei, Huibo Wang
2017POSTER: Semi-supervised Classification for Dynamic Android Malware Detection.
Li Chen, Mingwei Zhang, Chih-Yuan Yang, Ravi Sahita
2017POSTER: TOUCHFLOOD: A Novel Class of Attacks against Capacitive Touchscreens.
Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori
2017POSTER: TouchTrack: How Unique are your Touch Gestures?
Rahat Masood, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kâafar
2017POSTER: Towards Precise and Automated Verification of Security Protocols in Coq.
Hernan M. Palombo, Hao Zheng, Jay Ligatti
2017POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Guanjun Lin, Jun Zhang, Wei Luo, Lei Pan, Yang Xiang
2017POSTER: Watch Out Your Smart Watch When Paired.
Youngjoo Lee, WonSeok Yang, Taekyoung Kwon
2017POSTER: Who was Behind the Camera? - Towards Some New Forensics.
Jeff Yan, Aurélien Bourquard
2017POSTER: Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation States.
Jordan Holland, Max Schuchard
2017POSTER: X-Ray Your DNS.
Amit Klein, Vladimir Kravtsov, Alon Perlmuter, Haya Schulmann, Michael Waidner
2017PeGaSus: Data-Adaptive Differentially Private Stream Processing.
Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau
2017Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries.
Ruiyu Zhu, Yan Huang, Darion Cassel
2017Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.
Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha
2017Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data.
Muhammad Ejaz Ahmed, Hyoungshick Kim
2017Practical Attacks Against Graph-based Clustering.
Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou
2017Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions.
Joël Alwen, Jeremiah Blocki, Benjamin Harsha
2017Practical Multi-party Private Set Intersection from Symmetric-Key Techniques.
Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu
2017Practical Quantum-Safe Voting from Lattices.
Rafaël del Pino, Vadim Lyubashevsky, Gregory Neven, Gregor Seiler
2017Practical Secure Aggregation for Privacy-Preserving Machine Learning.
Kallista A. Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, Karn Seth
2017Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain.
Jan Camenisch, Manu Drijvers, Maria Dubovitskaya
2017Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic.
Jia Chen, Yu Feng, Isil Dillig
2017Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping.
Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li
2017Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017
Bhavani Thuraisingham, David Evans, Tal Malkin, Dongyan Xu
2017Provably-Secure Logic Locking: From Theory To Practice.
Muhammad Yasin, Abhrajit Sengupta, Mohammed Thari Nabeel, Mohammed Ashraf, Jeyavijayan Rajendran, Ozgur Sinanoglu
2017PtrSplit: Supporting General Pointers in Automatic Program Partitioning.
Shen Liu, Gang Tan, Trent Jaeger
2017Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research.
Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren
2017Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR.
Syed Mahbub Hafiz, Ryan Henry
2017RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.
Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, Wenke Lee
2017Revive: Rebalancing Off-Blockchain Payment Networks.
Rami Khalil, Arthur Gervais
2017Rewriting History: Changing the Archived Web from the Present.
Ada Lerner, Tadayoshi Kohno, Franziska Roesner
2017Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.
Yan Shoshitaishvili, Michael Weissbacher, Lukas Dresel, Christopher Salls, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna
2017RiskTeller: Predicting the Risk of Cyber Incidents.
Leyla Bilge, Yufei Han, Matteo Dell'Amico
2017S
Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen
2017SGX-BigMatrix: A Practical Encrypted Data Analytic Framework With Trusted Processors.
Fahad Shaon, Murat Kantarcioglu, Zhiqiang Lin, Latifur Khan
2017STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves.
Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang
2017SafeConfig'17: Applying the Scientific Method to Active Cyber Defense Research.
Nicholas J. Multari, Anoop Singhal, Erin Miller
2017Scaling ORAM for Secure Computation.
Jack Doerner, Abhi Shelat
2017Security and Machine Learning.
David A. Wagner
2017SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Wei You, Peiyuan Zong, Kai Chen, Xiaofeng Wang, Xiaojing Liao, Pan Bian, Bin Liang
2017Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers.
Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi
2017SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities.
Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, Suman Jana
2017Solidus: Confidential Distributed Ledger Transactions via PVORM.
Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi
2017Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property.
Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic Forte, Mark Tehranipoor
2017Synthesis of Probabilistic Privacy Enforcement.
Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin T. Vechev
2017T/Key: Second-Factor Authentication From Secure Hash Chains.
Dmitry Kogan, Nathan Manohar, Dan Boneh
2017Tail Attacks on Web Applications.
Huasong Shan, Qingyang Wang, Calton Pu
2017The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android.
Jie Huang, Oliver Schranz, Sven Bugiel, Michael Backes
2017The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later.
Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida
2017The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli.
Matús Nemec, Marek Sýs, Petr Svenda, Dusan Klinec, Vashek Matyas
2017The TypTop System: Personalized Typo-Tolerant Password Checking.
Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart
2017The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks.
Milad Nasr, Hadi Zolfaghari, Amir Houmansadr
2017The Wolf of Name Street: Hijacking Domains Through Their Nameservers.
Thomas Vissers, Timothy Barron, Tom van Goethem, Wouter Joosen, Nick Nikiforakis
2017TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
Nico Döttling, Satrajit Ghosh, Jesper Buus Nielsen, Tobias Nilges, Roberto Trifiletti
2017To BLISS-B or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures.
Peter Pessl, Leon Groot Bruinderink, Yuval Yarom
2017Tutorial: Private Information Retrieval.
Ryan Henry
2017Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews.
Tongxin Li, Xueqiang Wang, Mingming Zha, Kai Chen, Xiaofeng Wang, Luyi Xing, Xiaolong Bai, Nan Zhang, Xinhui Han
2017Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs.
Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen
2017Verified Correctness and Security of mbedTLS HMAC-DRBG.
Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel
2017Verifying Security Policies in Multi-agent Workflows with Loops.
Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu
2017VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.
Jian Liu, Chen Wang, Yingying Chen, Nitesh Saxena
2017Viden: Attacker Identification on In-Vehicle Networks.
Kyong-Tak Cho, Kang G. Shin
2017Vulnerable Implicit Service: A Revisit.
Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng
2017Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations.
Yi Han, Sriharsha Etigowni, Hua Liu, Saman A. Zonouz, Athina P. Petropulu
2017Web Tracking Technologies and Protection Mechanisms.
Nataliia Bielova
2017Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors.
Mustafa Emre Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz
2017Why Do Developers Get Password Storage Wrong?: A Qualitative Usability Study.
Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith
2017Workshop on Multimedia Privacy and Security.
Roger Hallman, Kurt Rohloff, Victor Chang
2017Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services.
Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo
2017walk2friends: Inferring Social Links from Mobility Profiles.
Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang