ACM Annual Conference on Computer Security Applications, ACSAC 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

A multi-cloud based privacy-preserving data publishing scheme for the internet of things

Lei Yang, Abdulmalik Humayed, Fengjun Li

A multi-cloud based privacy-preserving data publishing scheme for the internet of things

Details
Discussion Comments: 0
Verification: Authors have not verified information

Life-experience passwords (LEPs)

Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic

Life-experience passwords (LEPs)

Details
Discussion Comments: 0
Verification: Authors have not verified information

An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices

Yang Shi, Wujing Wei, Zongjian He, Hongfei Fan

An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

ELAR: extremely lightweight auditing and repairing for cloud security

Tran Phuong Thao, Kazumasa Omote

ELAR: extremely lightweight auditing and repairing for cloud security

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reliably determining data leakage in the presence of strong attackers

Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel

Reliably determining data leakage in the presence of strong attackers

Details
Author Comments: The dataset we used for the results in 8.2 contained sensitive information, therefore we cannot share it. The code is not available anymore, however it was a script implementing the formula discussed in Section 7.3.
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface

Mark R. Beaumont, Jim McCarthy, Toby C. Murray

The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface

Details
Discussion Comments: 0
Verification: Authors have not verified information

ShieldFS: a self-healing, ransomware-aware filesystem

Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi

ShieldFS: a self-healing, ransomware-aware filesystem

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

RevProbe: detecting silent reverse proxies in malicious server infrastructures

Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero

RevProbe: detecting silent reverse proxies in malicious server infrastructures

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication

Hui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu

The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication

Details
Discussion Comments: 0
Verification: Authors have not verified information

HERCULE: attack story reconstruction via community discovery on correlated log graph

Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu

HERCULE: attack story reconstruction via community discovery on correlated log graph

Details
Discussion Comments: 0
Verification: Authors have not verified information

Catching predators at watering holes: finding and understanding strategically compromised websites

Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang, Zhou Li

Catching predators at watering holes: finding and understanding strategically compromised websites

Details
Discussion Comments: 0
Verification: Authors have not verified information

You can promote, but you can't hide: large-scale abused app detection in mobile app stores

Zhen Xie, Sencun Zhu, Qing Li, Wenjing Wang

You can promote, but you can't hide: large-scale abused app detection in mobile app stores

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them

Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel

On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them

Details
Discussion Comments: 0
Verification: Authors have not verified information

Code obfuscation against symbolic execution attacks

Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner

Code obfuscation against symbolic execution attacks

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Trace-free memory data structure forensics via past inference and future speculations

Pengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz

Trace-free memory data structure forensics via past inference and future speculations

Details
Discussion Comments: 0
Verification: Authors have not verified information

CPAC: securing critical infrastructure with cyber-physical access control

Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler

CPAC: securing critical infrastructure with cyber-physical access control

Details
Discussion Comments: 0
Verification: Authors have not verified information

Swords and shields: a study of mobile game hacks and existing defenses

Yuan Tian, Eric Y. Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague

Swords and shields: a study of mobile game hacks and existing defenses

Details
Discussion Comments: 0
Verification: Authors have not verified information

EvilCoder: automated bug insertion

Jannik Pewny, Thorsten Holz

EvilCoder: automated bug insertion

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios

Nicholas Chang-Fong, Aleksander Essex

The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios

Details
Discussion Comments: 0
Verification: Authors have not verified information

VulPecker: an automated vulnerability detection system based on code similarity analysis

Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu

VulPecker: an automated vulnerability detection system based on code similarity analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

VTPin: practical VTable hijacking protection for binaries

Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos

VTPin: practical VTable hijacking protection for binaries

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Multi-receiver GPS spoofing detection: error models and realization

Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper

Multi-receiver GPS spoofing detection: error models and realization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Timing-based reconnaissance and defense in software-defined networks

John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller

Timing-based reconnaissance and defense in software-defined networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Device fingerprinting for augmenting web authentication: classification and analysis of methods

Furkan Alaca, Paul C. van Oorschot

Device fingerprinting for augmenting web authentication: classification and analysis of methods

Details
Discussion Comments: 0
Verification: Authors have not verified information

FASE: functionality-aware security enforcement

Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara

FASE: functionality-aware security enforcement

Details
Discussion Comments: 0
Verification: Authors have not verified information

CASTLE: CA signing in a touch-less environment

Stephanos Matsumoto, Samuel Steffen, Adrian Perrig

CASTLE: CA signing in a touch-less environment

Details
Discussion Comments: 0
Verification: Authors have not verified information

Location-enhanced authentication using the IoT: because you cannot be in two places at once

Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis

Location-enhanced authentication using the IoT: because you cannot be in two places at once

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Intelligent, automated red team emulation

Andy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf

Intelligent, automated red team emulation

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Bootstrapping and maintaining trust in the cloud

Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd

Bootstrapping and maintaining trust in the cloud

Details
Discussion Comments: 0
Verification: Authors have not verified information

CoKey: fast token-based cooperative cryptography

Julian Horsch, Sascha Wessel, Claudia Eckert

CoKey: fast token-based cooperative cryptography

Details
Discussion Comments: 0
Verification: Authors have not verified information

Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics

Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena

Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics

Details
Discussion Comments: 0
Verification: Authors have not verified information

Adaptive encrypted traffic fingerprinting with bi-directional dependence

Khaled Al-Naami, Swarup Chandra, Ahmad M. Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani M. Thuraisingham

Adaptive encrypted traffic fingerprinting with bi-directional dependence

Details
Discussion Comments: 0
Verification: Authors have not verified information

Using image saliency and regions of interest to encourage stronger graphical passwords

Mohammad N. AlShehri, Heather Crawford

Using image saliency and regions of interest to encourage stronger graphical passwords

Details
Discussion Comments: 0
Verification: Authors have not verified information

Formal security analysis of smart embedded systems

Farid Molazem Tabrizi, Karthik Pattabiraman

Formal security analysis of smart embedded systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

A security analysis of automated chinese turing tests

Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan

A security analysis of automated chinese turing tests

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media

Bo Chen, Shijie Jia, Luning Xia, Peng Liu

Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media

Details
Discussion Comments: 0
Verification: Authors have not verified information

Gametrics: towards attack-resilient behavioral authentication with simple cognitive games

Manar Mohamed, Nitesh Saxena

Gametrics: towards attack-resilient behavioral authentication with simple cognitive games

Details
Discussion Comments: 0
Verification: Authors have not verified information

Amplifying side channels through performance degradation

Thomas Allan, Billy Bob Brumley, Katrina E. Falkner, Joop van de Pol, Yuval Yarom

Amplifying side channels through performance degradation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Auror: defending against poisoning attacks in collaborative deep learning systems

Shiqi Shen, Shruti Tople, Prateek Saxena

Auror: defending against poisoning attacks in collaborative deep learning systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Inferring browser activity and status through remote monitoring of storage usage

Hyungsub Kim, Sangho Lee, Jong Kim

Inferring browser activity and status through remote monitoring of storage usage

Details
Discussion Comments: 0
Verification: Authors have not verified information

Spicy: a unified deep packet inspection framework for safely dissecting all your data

Robin Sommer, Johanna Amann, Seth Hall

Spicy: a unified deep packet inspection framework for safely dissecting all your data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pileus: protecting user resources from vulnerable cloud services

Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger

Pileus: protecting user resources from vulnerable cloud services

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure

Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar

Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cypider: building community-based cyber-defense infrastructure for android malware detection

ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb

Cypider: building community-based cyber-defense infrastructure for android malware detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Decomposition of MAC address structure for granular device inference

Jeremy Martin, Erik C. Rye, Robert Beverly

Decomposition of MAC address structure for granular device inference

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical and secure dynamic searchable encryption via oblivious access on distributed data structure

Thang Hoang, Attila Altay Yavuz, Jorge Guajardo

Practical and secure dynamic searchable encryption via oblivious access on distributed data structure

Details
Discussion Comments: 0
Verification: Authors have not verified information

LMP: light-weighted memory protection with hardware assistance

Wei Huang, Zhen Huang, Dhaval Miyani, David Lie

LMP: light-weighted memory protection with hardware assistance

Details
Discussion Comments: 0
Verification: Authors have not verified information

Understanding and defending the binder attack surface in Android

Huan Feng, Kang G. Shin

Understanding and defending the binder attack surface in Android

Details
Discussion Comments: 0
Verification: Authors have not verified information