default search action
23rd CCS 2016: Vienna, Austria
- Edgar R. Weippl, Stefan Katzenbeisser, Christopher Kruegel, Andrew C. Myers, Shai Halevi:
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. ACM 2016, ISBN 978-1-4503-4139-4
Keynote
- Martin E. Hellman:
Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic. 1-2
Paper Session 1A: Blockchain I
- Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:
On the Security and Performance of Proof of Work Blockchains. 3-16 - Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena:
A Secure Sharding Protocol For Open Blockchains. 17-30 - Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song:
The Honey Badger of BFT Protocols. 31-42
Paper Session 1B: Differential Privacy
- Paul Cuff, Lanqing Yu:
Differential Privacy as a Mutual Information Constraint. 43-54 - Gilles Barthe, Noémie Fong, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub:
Advanced Probabilistic Couplings for Differential Privacy. 55-67 - Gilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub:
Differentially Private Bayesian Programming. 68-79
Paper Session 1C: Android Security
- Yuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun Qian, Zhuoqing Morley Mao:
The Misuse of Android Unix Domain Sockets and Security Implications. 80-91 - Kai Wang, Yuqing Zhang, Peng Liu:
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback. 92-103 - Güliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter:
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. 104-115
Paper Session 1D: Hardware Protection
- Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini:
Strong Non-Interference and Type-Directed Higher-Order Masking. 116-129 - Yuanwen Huang, Swarup Bhunia, Prabhat Mishra:
MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection. 130-141 - Stefan Dziembowski, Sebastian Faust, François-Xavier Standaert:
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification. 142-153
Paper Session 2A: Blockchain II
- Miles Carlsten, Harry A. Kalodner, S. Matthew Weinberg, Arvind Narayanan:
On the Instability of Bitcoin Without the Block Reward. 154-167 - Melissa Chase, Sarah Meiklejohn:
Transparency Overlays and Applications. 168-179
Paper Session 2B: Differentially Private Systems I
- Yilin Shen, Hongxia Jin:
EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation. 180-191 - Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren:
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy. 192-203
Paper Session 2C: Access Control
- Talia Ringer, Dan Grossman, Franziska Roesner:
AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems. 204-216 - Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati:
Mix&Slice: Efficient Access Revocation in the Cloud. 217-228
Paper Session 2D: Security and Persistence
- Isaac C. Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse:
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency. 229-241 - Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler, Raju Rangaswami:
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices. 242-253
Paper Session 3A: Smart Contracts
- Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor:
Making Smart Contracts Smarter. 254-269 - Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi:
Town Crier: An Authenticated Data Feed for Smart Contracts. 270-282 - Ari Juels, Ahmed E. Kosba, Elaine Shi:
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. 283-295
Paper Session 3B: Differentially Private Systems II
- Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, Yanchao Zhang:
DPSense: Differentially Private Crowdsourced Spectrum Sensing. 296-307 - Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang:
Deep Learning with Differential Privacy. 308-318 - Michael Backes, Pascal Berrang, Mathias Humbert, Praveen Manoharan:
Membership Privacy in MicroRNA-based Studies. 319-330
Paper Session 3C: Mobile Software Analysis
- Mingshen Sun, Tao Wei, John C. S. Lui:
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime. 331-342 - Benjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin T. Vechev:
Statistical Deobfuscation of Android Applications. 343-355 - Michael Backes, Sven Bugiel, Erik Derr:
Reliable Third-Party Library Detection in Android and its Security Applications. 356-367
Paper Session 3D: Kernel Memory Security
- Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard:
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. 368-379 - Yeongjin Jang, Sangho Lee, Taesoo Kim:
Breaking Kernel Address Space Layout Randomization with Intel TSX. 380-392 - Terry Ching-Hsiang Hsu, Kevin J. Hoffman, Patrick Eugster, Mathias Payer:
Enforcing Least Privilege Memory Views for Multithreaded Applications. 393-405
Paper Session 4A: Secure MPC I
- Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Improvements to Secure Computation with Penalties. 406-417 - Ranjit Kumaresan, Iddo Bentov:
Amortizing Secure Computation with Penalties. 418-429 - Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart:
MPC-Friendly Symmetric Key Primitives. 430-443
Paper Session 4B: Attacks on Ciphers
- Mihir Bellare, Viet Tung Hoang, Stefano Tessaro:
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption. 444-455 - Karthikeyan Bhargavan, Gaëtan Leurent:
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN. 456-467 - Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
A Systematic Analysis of the Juniper Dual EC Incident. 468-479
Paper Session 4C: Big Data Meets Security
- Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, Heng Yin:
Scalable Graph-based Bug Search for Firmware Images. 480-491 - Yushan Liu, Shouling Ji, Prateek Mittal:
SmartWalk: Enhancing Social Network Security via Adaptive Random Walks. 492-503 - Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang:
High Fidelity Data Reduction for Big Data Security Dependency Analyses. 504-516
Paper Session 4D: Types and Memory Safety
- István Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe:
TypeSan: Practical Type Confusion Detection. 517-528 - Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu:
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump. 529-540 - Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck:
Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms. 541-552
Paper Session 5A: Secure MPC II
- Vassil S. Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson:
Alternative Implementations of Secure Real Numbers. 553-564 - Marshall Ball, Tal Malkin, Mike Rosulek:
Garbling Gadgets for Boolean and Arithmetic Circuits. 565-577 - Aner Ben-Efraim, Yehuda Lindell, Eran Omri:
Optimizing Semi-Honest Secure Multiparty Computation for the Internet. 578-590
Paper Session 5B: Physically Based Authentication
- Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel:
MEMS Gyroscopes as Physical Unclonable Functions. 591-602 - Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li:
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols. 603-615 - Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao:
Instant and Robust Authentication and Key Agreement among Mobile Devices. 616-627
Paper Session 5C: Web Security
- Frank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson:
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem. 628-640 - Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan:
Chainsaw: Chained Automated Workflow-based Exploit Generation. 641-652 - Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou:
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites. 653-665
Paper Session 5D: Security Bug Finding
- Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek:
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior. 666-677 - Felix Dörre, Vladimir Klebanov:
Practical Detection of Entropy Loss in Pseudo-Random Number Generators. 678-689 - Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel:
Build It, Break It, Fix It: Contesting Secure Development. 690-703
Paper Session 6A: Phone Security using Formal Methods
- Luke Deshotels, Razvan Deaconescu, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi:
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles. 704-716 - Michael Backes, Robert Künnemann, Esfandiar Mohammadi:
Computational Soundness for Dalvik Bytecode. 717-730
Paper Session 6B: Attestation
- Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter:
SANA: Secure and Scalable Aggregate Network Attestation. 731-742 - Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-Flow Attestation for Embedded Systems Software. 743-754
Paper Session 6C: Mine your Literature
- Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li, Luyi Xing, Raheem A. Beyah:
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence. 755-766 - Ziyun Zhu, Tudor Dumitras:
FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature. 767-778
Paper Session 6D: Security Studies
- Philipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden:
An In-Depth Study of More Than Ten Years of Java Exploitation. 779-790 - Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang:
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing. 791-804
Paper Session 7A: Secure MPC III
- Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara:
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. 805-817 - Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu:
Efficient Batched Oblivious PRF with Applications to Private Set Intersection. 818-829 - Marcel Keller, Emmanuela Orsini, Peter Scholl:
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer. 830-842
Paper Session 7B: Side-Channel Attacks
- Dmitry Evtyushkin, Dmitry V. Ponomarev:
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations. 843-857 - Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang:
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices. 858-870 - Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A Software Approach to Defeating Side Channels in Last-Level Caches. 871-882
Paper Session 7C: Acoustic Attacks
- Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne Southall Winslett, Carl A. Gunter, William P. King:
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. 883-894 - Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, Wenyao Xu:
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers. 895-907 - Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena:
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio. 908-919
Paper Session 7D: Protection Across Executions
- Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee:
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. 920-932 - Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, Yanchao Zhang:
iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft. 933-944 - Lianying Zhao, Mohammad Mannan:
Hypnoguard: Protecting Secrets across Sleep-wake Cycles. 945-957
Paper Session 8A: Lattices and Obfuscation
- Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova:
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. 981-992 - Eric Crockett, Chris Peikert:
Λολ: Functional Lattice Cryptography. 993-1005 - Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE. 1006-1018
Paper Session 8B: Attacks and Defenses
- Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu:
On Code Execution Tracking via Power Side-Channel. 1019-1031 - Marcel Böhme, Van-Thuan Pham, Abhik Roychoudhury:
Coverage-based Greybox Fuzzing as Markov Chain. 1032-1043 - Kyong-Tak Cho, Kang G. Shin:
Error Handling of In-vehicle Networks Makes Them Vulnerable. 1044-1055
Paper Session 8C: Phone Security
- Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic:
Using Reflexive Eye Movements for Fast Challenge-Response Authentication. 1056-1067 - Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan:
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. 1068-1079 - Linghan Zhang, Sheng Tan, Jie Yang, Yingying Chen:
VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones. 1080-1091
Paper Session 8D: Infrastructure Attacks
- David I. Urbina, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Richard Candell, Henrik Sandberg:
Limiting the Impact of Stealthy Attacks on Industrial Control Systems. 1092-1105 - Merve Sahin, Aurélien Francillon:
Over-The-Top Bypass: Study of a Recent Telephony Fraud. 1106-1117 - Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, Songwu Lu:
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks. 1118-1130
Paper Session 9A: Order-Revealing and Searchable Encryption
- Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich:
POPE: Partial Order Preserving Encoding. 1131-1142 - Raphael Bost:
∑oφoς: Forward Secure Searchable Encryption. 1143-1154 - F. Betül Durak, Thomas M. DuBuisson, David Cash:
What Else is Revealed by Order-Revealing Encryption? 1155-1166 - Kevin Lewi, David J. Wu:
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds. 1167-1178
Paper Session 9B: Authentication
- Zhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang:
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication. 1179-1191 - Jonas Schneider, Nils Fleischhacker, Dominique Schröder, Michael Backes:
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments. 1192-1203 - Daniel Fett, Ralf Küsters, Guido Schmitz:
A Comprehensive Formal Security Analysis of OAuth 2.0. 1204-1215
Paper Session 9C: Passwords
- Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor:
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies. 1216-1229 - Maximilian Golla, Benedict Beuscher, Markus Dürmuth:
On the Security of Cracking-Resistant Password Vaults. 1230-1241 - Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang:
Targeted Online Password Guessing: An Underestimated Threat. 1242-1254
Paper Session 9D: Internet Security
- Jung-Ho Park, Wookeun Jung, Gangwon Jo, Ilkoo Lee, Jaejin Lee:
PIPSEA: A Practical IPsec Gateway on Embedded APUs. 1255-1267 - Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael D. Bailey:
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet. 1268-1279 - Georgios Kontaxis, Angelos D. Keromytis:
Protecting Insecure Communications with Topology-aware Network Tunnels. 1280-1291
Paper Session 10A: Specialized Crypto Tools
- Elette Boyle, Niv Gilboa, Yuval Ishai:
Function Secret Sharing: Improvements and Extensions. 1292-1303 - Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno:
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. 1304-1316 - Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Practical Non-Malleable Codes from l-more Extractable Hash Functions. 1317-1328
Paper Session 11B: Attacks using a Little Leakage
- Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill:
Generic Attacks on Secure Outsourced Databases. 1329-1340 - David Pouliot, Charles V. Wright:
The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption. 1341-1352 - Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov:
Breaking Web Applications Built On Top of Encrypted Data. 1353-1364
Paper Session 10C: Measuring Security in the Wild
- Stefano Calzavara, Alvise Rabitti, Michele Bugliesi:
Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild. 1365-1375 - Lukas Weichselbaum, Michele Spagnuolo, Sebastian Lekies, Artur Janc:
CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy. 1376-1387 - Steven Englehardt, Arvind Narayanan:
Online Tracking: A 1-million-site Measurement and Analysis. 1388-1401
Paper Session 10D: Network Security I
- Xiao Han, Nizar Kheir, Davide Balzarotti:
PhishEye: Live Monitoring of Sandboxed Phishing Kits. 1402-1413 - Daiping Liu, Shuai Hao, Haining Wang:
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records. 1414-1425 - Johannes Krupp, Michael Backes, Christian Rossow:
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks. 1426-1437
Paper Session 11A: Key Exchange
- Hugo Krawczyk:
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3). 1438-1450 - Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:
Attribute-based Key Exchange with General Policies. 1451-1463 - Yunlei Zhao:
Identity-Concealed Authenticated Encryption and Key Exchange. 1464-1479
Paper Session 10B: Crypto Implementations
- Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson:
A Surfeit of SSH Cipher Suites. 1480-1491 - Juraj Somorovsky:
Systematic Fuzzing and Testing of TLS Libraries. 1492-1504 - Shuqin Fan, Wenbo Wang, Qingfeng Cheng:
Attacking OpenSSL Implementation of ECDSA with a Few Signatures. 1505-1515
Paper Session 11C: More Attacks
- Jianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson:
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. 1516-1527 - Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. 1528-1540 - Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem A. Beyah:
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service. 1541-1552
Paper Session 11D: Network Security II
- Rob Jansen, Aaron Johnson:
Safely Measuring Tor. 1553-1567 - Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster:
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. 1568-1579 - Yunlong Mao, Yuan Zhang, Sheng Zhong:
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks. 1580-1590
Paper Session 12A: Secure Protocols
- Matthew Green, Watson Ladd, Ian Miers:
A Protocol for Privately Reporting Ad Impressions at Scale. 1591-1601 - Jack Doerner, David Evans, Abhi Shelat:
Secure Stable Matching at Scale. 1602-1613 - Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo:
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme. 1614-1625
Paper Session 12B: DSA/ECDSA
- Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. 1626-1638 - Cesar Pereida García, Billy Bob Brumley, Yuval Yarom:
"Make Sure DSA Signing Exponentiations Really are Constant-Time". 1639-1650 - Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the Provable Security of (EC)DSA Signatures. 1651-1662
Paper Session 12C: Even more Attacks
- Hang Zhang, Dongdong She, Zhiyun Qian:
Android ION Hazard: the Curse of Customizable Memory Management System. 1663-1674 - Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida:
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. 1675-1689 - George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias:
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning. 1690-1701
Paper Session 12D: Censorship Resistance
- Cecylia Bocovich, Ian Goldberg:
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement. 1702-1714 - Hadi Zolfaghari, Amir Houmansadr:
Practical Censorship Evasion Leveraging Content Delivery Networks. 1715-1726 - Milad Nasr, Amir Houmansadr:
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory. 1727-1738
Posters
- Steffen Wendzel, Wojciech Mazurczyk:
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns. 1739-1741 - Md. Morshedul Islam, Reihaneh Safavi-Naini:
POSTER: A Behavioural Authentication System for Mobile Users. 1742-1744 - Katarzyna Kapusta, Gérard Memmi, Hassan Noura:
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation. 1745-1747 - Lingling Fan, Minhui Xue, Sen Chen, Lihua Xu, Haojin Zhu:
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning. 1748-1750 - Jing Ye, Yu Hu, Xiaowei Li:
POSTER: Attack on Non-Linear Physical Unclonable Function. 1751-1753 - Anrin Chakraborti, Radu Sion:
POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM. 1754-1756 - Anrin Chakraborti, Chen Chen, Radu Sion:
POSTER: DataLair: A Storage Block Device with Plausible Deniability. 1757-1759 - Darius Suciu, Radu Sion:
POSTER: DroidShield: Protecting User Applications from Normal World Access. 1760-1762 - Chia-Mu Yu:
POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions. 1763-1765 - Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel:
POSTER: Fingerprinting Tor Hidden Services. 1766-1768 - Roman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan Henrik Ziegeldorf, Klaus Wehrle:
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. 1769-1771 - Thomas Rupprecht, Xi Chen, David H. White, Jan Tobias Mühlberg, Herbert Bos, Gerald Lüttgen:
POSTER: Identifying Dynamic Data Structures in Malware. 1772-1774 - Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha:
POSTER: Improved Markov Strength Meters for Passwords. 1775-1777 - Ignacio Martín, José Alberto Hernández, Sergio de los Santos, Antonio Guzmán:
POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach. 1778-1780 - Chen Chen, Darius Suciu, Radu Sion:
POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints. 1781-1783 - Manish Shukla, Sutapa Mondal, Sachin Lodha:
POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat. 1784-1786 - Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes:
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications. 1787-1789 - Omid Asudeh, Matthew Wright:
POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity. 1790-1792 - Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini:
POSTER: Privacy Enhanced Secure Location Verification. 1793-1795 - Jan-Ole Malchow, Benjamin Güldenring, Volker Roth:
POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties. 1796-1798 - Yongzhi Wang, Yulong Shen:
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications. 1799-1801 - P. V. Rajkumar, Ravi S. Sandhu:
POSTER: Security Enhanced Administrative Role Based Access Control Models. 1802-1804 - Pedro Casas, Alessandro D'Alconzo, Giuseppe Settanni, Pierdomenico Fiadino, Florian Skopik:
POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data. 1805-1807 - Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada:
POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity. 1808-1810 - Michael Backes, Sven Bugiel, Jie Huang, Oliver Schranz:
POSTER: The ART of App Compartmentalization. 1811-1813 - Bo Sun, Akinori Fujino, Tatsuya Mori:
POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs. 1814-1816 - Peter Mayer, Stephan Neumann, Melanie Volkamer:
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes. 1817-1819 - Vinay Sachidananda, Jinghui Toh, Shachar Siboni, Asaf Shabtai, Yuval Elovici:
POSTER: Towards Exposing Internet of Things: A Roadmap. 1820-1822 - Stephan Lau, Johannes Klick, Stephan Arndt, Volker Roth:
POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems. 1823-1825 - Changhee Hahn, Junbeom Hur:
POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing. 1826-1828 - Michael Steinke, Stefan Metzger, Wolfgang Hommel:
POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks. 1829-1831 - Martin Krämer, David Aspinall, Maria Wolters:
POSTER: Weighing in eHealth Security. 1832-1834 - Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim:
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack. 1835-1837
Demonstrations
- Ercan Ucan, Raphael M. Reischuk, Adrian Perrig:
DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet? 1838-1840 - Toshinori Araki, Assaf Barak, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara:
DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation. 1841-1843 - Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros:
DEMO: Integrating MPC in Big Data Workflows. 1844-1846 - Denis Migdal, Christian Johansen, Audun Jøsang:
DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking. 1847-1849 - Vincent F. Taylor, Ivan Martinovic:
DEMO: Starving Permission-Hungry Android Apps Using SecuRank. 1850-1852
Tutorials
- Xiaokui Shu, Danfeng Yao:
Program Anomaly Detection: Methodology and Practices. 1853-1854 - Panos Papadimitratos:
Security on Wheels: Security and Privacy for Vehicular Communication Systems. 1855-1856 - Aljosha Judmayer, Edgar R. Weippl:
Condensed Cryptographic Currencies Crash Course (C5). 1857-1858 - Aniket Kate:
Introduction to Credit Networks: Security, Privacy, and Applications. 1859-1860 - Ghassan Karame:
On the Security and Scalability of Bitcoin's Blockchain. 1861-1862 - Erman Ayday, Jean-Pierre Hubaux:
Privacy and Security in the Genomic Era. 1863-1865 - Murat Kantarcioglu, Bowei Xi:
Adversarial Data Mining: Big Data Meets Cyber Security. 1866-1867
Pre-Conference Workshops co-located with CCS 2016
- Peng Liu, Cliff Wang:
MTD 2016: Third ACM Workshop on Moving Target Defense. 1868-1869 - Toby C. Murray, Deian Stefan:
PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security. 1870 - Nicholas J. Multari, Anoop Singhal, David O. Manz:
SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems. 1871-1872 - Long Lu, Mohammad Mannan:
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016). 1873-1874 - Begül Bilgin, Svetla Nikova, Vincent Rijmen:
Theory of Implementation Security Workshop (TIs 2016). 1875-1876 - Florian Kerschbaum, Erik-Oliver Blass, Tomas Sander:
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security. 1877-1878 - Sabrina De Capitani di Vimercati:
15th Workshop on Privacy in the Electronic Society (WPES 2016). 1879-1880
Post-Conference Workshops co-located with CCS 2016
- David Mandell Freeman, Katerina Mitrokotsa, Arunesh Sinha:
9th International Workshop on Artificial Intelligence and Security: AISec 2016. 1881 - Elli Androulaki, Michael K. Reiter:
CCSW'16: 8th ACM Cloud Computing Security Workshop. 1882-1883 - Alvaro A. Cárdenas, Rakesh B. Bobba:
Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16). 1884-1885 - Brecht Wyseur, Bjorn De Sutter:
2nd International Workshop on Software Protection: SPRO 2016. 1886-1887 - Xinxin Fan, Tim Güneysu:
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016). 1888-1890 - Ilsun You, Elisa Bertino:
MIST 2016: 8th International Workshop on Managing Insider Security Threats. 1890-1891
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.