ACM Computer and Communications Security, CCS 2016


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity

Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada

POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts

Ari Juels, Ahmed E. Kosba, Elaine Shi

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts

Details
Discussion Comments: 0
Verification: Authors have not verified information

Protecting Insecure Communications with Topology-aware Network Tunnels

Georgios Kontaxis, Angelos D. Keromytis

Protecting Insecure Communications with Topology-aware Network Tunnels

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Comprehensive Formal Security Analysis of OAuth 2.0

Daniel Fett, Ralf Küsters, Guido Schmitz

A Comprehensive Formal Security Analysis of OAuth 2.0

Details
Discussion Comments: 0
Verification: Authors have not verified information

SmartWalk: Enhancing Social Network Security via Adaptive Random Walks

Yushan Liu, Shouling Ji, Prateek Mittal

SmartWalk: Enhancing Social Network Security via Adaptive Random Walks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Function Secret Sharing: Improvements and Extensions

Elette Boyle, Niv Gilboa, Yuval Ishai

Function Secret Sharing: Improvements and Extensions

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach

Ignacio Martín, José Alberto Hernández, Sergio de los Santos, Antonio Guzmán

POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Adversarial Data Mining: Big Data Meets Cyber Security

Murat Kantarcioglu, Bowei Xi

Adversarial Data Mining: Big Data Meets Cyber Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

Coverage-based Greybox Fuzzing as Markov Chain

Marcel Böhme, Van-Thuan Pham, Abhik Roychoudhury

Coverage-based Greybox Fuzzing as Markov Chain

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes

Peter Mayer, Stephan Neumann, Melanie Volkamer

POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes

Details
Discussion Comments: 0
Verification: Authors have not verified information

AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems

Talia Ringer, Dan Grossman, Franziska Roesner

AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Batched Oblivious PRF with Applications to Private Set Intersection

Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu

Efficient Batched Oblivious PRF with Applications to Private Set Intersection

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Protocol for Privately Reporting Ad Impressions at Scale

Matthew Green, Watson Ladd, Ian Miers

A Protocol for Privately Reporting Ad Impressions at Scale

Details
Discussion Comments: 0
Verification: Authors have not verified information

Program Anomaly Detection: Methodology and Practices

Xiaokui Shu, Danfeng Yao

Program Anomaly Detection: Methodology and Practices

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DPSense: Differentially Private Crowdsourced Spectrum Sensing

Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, Yanchao Zhang

DPSense: Differentially Private Crowdsourced Spectrum Sensing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Town Crier: An Authenticated Data Feed for Smart Contracts

Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi

Town Crier: An Authenticated Data Feed for Smart Contracts

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications

Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes

POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

15th Workshop on Privacy in the Electronic Society (WPES 2016)

Sabrina De Capitani di Vimercati

15th Workshop on Privacy in the Electronic Society (WPES 2016)

Details
Discussion Comments: 0
Verification: Author has not verified information

MEMS Gyroscopes as Physical Unclonable Functions

Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel

MEMS Gyroscopes as Physical Unclonable Functions

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

What Else is Revealed by Order-Revealing Encryption?

F. Betül Durak, Thomas M. DuBuisson, David Cash

What Else is Revealed by Order-Revealing Encryption?

Details
Discussion Comments: 0
Verification: Authors have not verified information

High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority

Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara

High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority

Details
Discussion Comments: 0
Verification: Authors have not verified information

Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments

Jonas Schneider, Nils Fleischhacker, Dominique Schröder, Michael Backes

Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments

Details
Discussion Comments: 0
Verification: Authors have not verified information

Security on Wheels: Security and Privacy for Vehicular Communication Systems

Panos Papadimitratos

Security on Wheels: Security and Privacy for Vehicular Communication Systems

Details
Discussion Comments: 0
Verification: Author has not verified information

ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices

Dave (Jing) Tian, Adam M. Bates, Kevin R. B. Butler, Raju Rangaswami

ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic

Martin E. Hellman

Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic

Details
Discussion Comments: 0
Verification: Author has not verified information

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

9th International Workshop on Artificial Intelligence and Security: AISec 2016

David Mandell Freeman, Katerina Mitrokotsa, Arunesh Sinha

9th International Workshop on Artificial Intelligence and Security: AISec 2016

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical Non-Malleable Codes from l-more Extractable Hash Functions

Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis

Practical Non-Malleable Codes from l-more Extractable Hash Functions

Details
Discussion Comments: 0
Verification: Authors have not verified information

Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement

Cecylia Bocovich, Ian Goldberg

Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement

Details
Discussion Comments: 0
Verification: Authors have not verified information

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds

Kevin Lewi, David J. Wu

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification

Stefan Dziembowski, Sebastian Faust, François-Xavier Standaert

Private Circuits III: Hardware Trojan-Resilience via Testing Amplification

Details
Discussion Comments: 0
Verification: Authors have not verified information

PhishEye: Live Monitoring of Sandboxed Phishing Kits

Xiao Han, Nizar Kheir, Davide Balzarotti

PhishEye: Live Monitoring of Sandboxed Phishing Kits

Details
Discussion Comments: 0
Verification: Authors have not verified information

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles

Luke Deshotels, Razvan Deaconescu, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles

Details
Discussion Comments: 0
Verification: Authors have not verified information

MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection

Yuanwen Huang, Swarup Bhunia, Prabhat Mishra

MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection

Details
Discussion Comments: 0
Verification: Authors have not verified information

Targeted Online Password Guessing: An Underestimated Threat

Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang

Targeted Online Password Guessing: An Underestimated Threat

Details
Author Comments: In a pretty quick response to this paper, NIST in the USA have revised the Section 5.2.2 of SP 800-63-3 Digital Authentication Guideline.
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio

Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena

The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)

Hugo Krawczyk

A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)

Details
Discussion Comments: 0
Verification: Author has not verified information

POSTER: Privacy Enhanced Secure Location Verification

Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini

POSTER: Privacy Enhanced Secure Location Verification

Details
Discussion Comments: 0
Verification: Authors have not verified information

MTD 2016: Third ACM Workshop on Moving Target Defense

Peng Liu, Cliff Wang

MTD 2016: Third ACM Workshop on Moving Target Defense

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Secure Sharding Protocol For Open Blockchains

Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena

A Secure Sharding Protocol For Open Blockchains

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Honey Badger of BFT Protocols

Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song

The Honey Badger of BFT Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime

Mingshen Sun, Tao Wei, John C. S. Lui

TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning

Lingling Fan, Minhui Xue, Sen Chen, Lihua Xu, Haojin Zhu

POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning

Details
Discussion Comments: 0
Verification: Authors have not verified information

PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration

Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster

PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Security and Scalability of Bitcoin's Blockchain

Ghassan Karame

On the Security and Scalability of Bitcoin's Blockchain

Details
Discussion Comments: 0
Verification: Author has not verified information

TypeSan: Practical Type Confusion Detection

István Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe

TypeSan: Practical Type Confusion Detection

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Computational Soundness for Dalvik Bytecode

Michael Backes, Robert Künnemann, Esfandiar Mohammadi

Computational Soundness for Dalvik Bytecode

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016)

Xinxin Fan, Tim Güneysu

Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016)

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Improved Markov Strength Meters for Passwords

Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha

POSTER: Improved Markov Strength Meters for Passwords

Details
Discussion Comments: 0
Verification: Authors have not verified information

MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet

Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael Bailey

MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet

Details
Discussion Comments: 0
Verification: Authors have not verified information

SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems

Nicholas J. Multari, Anoop Singhal, David O. Manz

SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Systematic Fuzzing and Testing of TLS Libraries

Juraj Somorovsky

Systematic Fuzzing and Testing of TLS Libraries

Details
Discussion Comments: 0
Verification: Author has not verified information

FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature

Ziyun Zhu, Tudor Dumitras

FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature

Details
Discussion Comments: 0
Verification: Authors have not verified information

WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security

Florian Kerschbaum, Erik-Oliver Blass, Tomas Sander

WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

Build It, Break It, Fix It: Contesting Secure Development

Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel

Build It, Break It, Fix It: Contesting Secure Development

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols

Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li

On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols

Details
Discussion Comments: 0
Verification: Authors have not verified information

C-FLAT: Control-Flow Attestation for Embedded Systems Software

Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik

C-FLAT: Control-Flow Attestation for Embedded Systems Software

Details
Discussion Comments: 0
Verification: Authors have not verified information

High Fidelity Data Reduction for Big Data Security Dependency Analyses

Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang

High Fidelity Data Reduction for Big Data Security Dependency Analyses

Details
Discussion Comments: 0
Verification: Authors have not verified information

Breaking Kernel Address Space Layout Randomization with Intel TSX

Yeongjin Jang, Sangho Lee, Taesoo Kim

Breaking Kernel Address Space Layout Randomization with Intel TSX

Details
Author Comments: DrK was used by IOActive for exploiting CVE-2016-7255 (https://github.com/IOActive/I-know-where-your-page-lives)
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

2nd International Workshop on Software Protection: SPRO 2016

Brecht Wyseur, Bjorn De Sutter

2nd International Workshop on Software Protection: SPRO 2016

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet?

Ercan Ucan, Raphael M. Reischuk, Adrian Perrig

DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet?

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

POSTER: Security Enhanced Administrative Role Based Access Control Models

P. V. Rajkumar, Ravi S. Sandhu

POSTER: Security Enhanced Administrative Role Based Access Control Models

Details
Discussion Comments: 0
Verification: Authors have not verified information

Reliable Third-Party Library Detection in Android and its Security Applications

Michael Backes, Sven Bugiel, Erik Derr

Reliable Third-Party Library Detection in Android and its Security Applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation

Yilin Shen, Hongxia Jin

EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Security and Performance of Proof of Work Blockchains

Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun

On the Security and Performance of Proof of Work Blockchains

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints

Chen Chen, Darius Suciu, Radu Sion

POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Software Approach to Defeating Side Channels in Last-Level Caches

Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang

A Software Approach to Defeating Side Channels in Last-Level Caches

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication

Zhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang

Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Host of Troubles: Multiple Host Ambiguities in HTTP Implementations

Jianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson

Host of Troubles: Multiple Host Ambiguities in HTTP Implementations

Details
Discussion Comments: 0
Verification: Authors have not verified information

Garbling Gadgets for Boolean and Arithmetic Circuits

Marshall Ball, Tal Malkin, Mike Rosulek

Garbling Gadgets for Boolean and Arithmetic Circuits

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identity-Concealed Authenticated Encryption and Key Exchange

Yunlei Zhao

Identity-Concealed Authenticated Encryption and Key Exchange

Details
Discussion Comments: 0
Verification: Author has not verified information

Over-The-Top Bypass: Study of a Recent Telephony Fraud

Merve Sahin, Aurélien Francillon

Over-The-Top Bypass: Study of a Recent Telephony Fraud

Details
Discussion Comments: 0
Verification: Authors have not verified information

How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior

Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek

How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior

Details
Discussion Comments: 0
Verification: Authors have not verified information

On Code Execution Tracking via Power Side-Channel

Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu

On Code Execution Tracking via Power Side-Channel

Details
Discussion Comments: 0
Verification: Authors have not verified information

Privacy and Security in the Genomic Era

Erman Ayday, Jean-Pierre Hubaux

Privacy and Security in the Genomic Era

Details
Discussion Comments: 0
Verification: Authors have not verified information

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals

Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals

Details
Discussion Comments: 0
Verification: Authors have not verified information

DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking

Denis Migdal, Christian Johansen, Audun Jøsang

DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: A Behavioural Authentication System for Mobile Users

Md. Morshedul Islam, Reihaneh Safavi-Naini

POSTER: A Behavioural Authentication System for Mobile Users

Details
Discussion Comments: 0
Verification: Authors have not verified information

Λολ: Functional Lattice Cryptography

Eric Crockett, Chris Peikert

Λολ: Functional Lattice Cryptography

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

SANA: Secure and Scalable Aggregate Network Attestation

Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter

SANA: Secure and Scalable Aggregate Network Attestation

Details
Discussion Comments: 0
Verification: Authors have not verified information

Mix&Slice: Efficient Access Revocation in the Cloud

Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati

Mix&Slice: Efficient Access Revocation in the Cloud

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Online Tracking: A 1-million-site Measurement and Analysis

Steven Englehardt, Arvind Narayanan

Online Tracking: A 1-million-site Measurement and Analysis

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency

Isaac C. Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse

Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency

Details
Discussion Comments: 0
Verification: Authors have not verified information

Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms

Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck

Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms

Details
Discussion Comments: 0
Verification: Authors have not verified information

Improvements to Secure Computation with Penalties

Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan

Improvements to Secure Computation with Penalties

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced no artifacts
Verification: Authors have verified information

Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR

Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard

Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets

Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne S. Winslett, Carl A. Gunter, William P. King

Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications

Yongzhi Wang, Yulong Shen

POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

Alternative Implementations of Secure Real Numbers

Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson

Alternative Implementations of Secure Real Numbers

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Systematic Analysis of the Juniper Dual EC Incident

Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham

A Systematic Analysis of the Juniper Dual EC Incident

Details
Discussion Comments: 0
Verification: Authors have not verified information

Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16)

Alvaro A. Cárdenas, Rakesh B. Bobba

Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16)

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack

Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim

POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack

Details
Discussion Comments: 0
Verification: Authors have not verified information

UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages

Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee

UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Limiting the Impact of Stealthy Attacks on Industrial Control Systems

David I. Urbina, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Richard Candell, Henrik Sandberg

Limiting the Impact of Stealthy Attacks on Industrial Control Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

An In-Depth Study of More Than Ten Years of Java Exploitation

Philipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden

An In-Depth Study of More Than Ten Years of Java Exploitation

Details
Discussion Comments: 0
Verification: Authors have not verified information

CCSW'16: 8th ACM Cloud Computing Security Workshop

Elli Androulaki, Michael K. Reiter

CCSW'16: 8th ACM Cloud Computing Security Workshop

Details
Discussion Comments: 0
Verification: Authors have not verified information

Amortizing Secure Computation with Penalties

Ranjit Kumaresan, Iddo Bentov

Amortizing Secure Computation with Penalties

Details
Discussion Comments: 0
Verification: Authors have not verified information

Android ION Hazard: the Curse of Customizable Memory Management System

Hang Zhang, Dongdong She, Zhiyun Qian

Android ION Hazard: the Curse of Customizable Memory Management System

Details
Discussion Comments: 0
Verification: Authors have not verified information

SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning

George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias

SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Introduction to Credit Networks: Security, Privacy, and Applications

Aniket Kate

Introduction to Credit Networks: Security, Privacy, and Applications

Details
Discussion Comments: 0
Verification: Author has not verified information

Statistical Deobfuscation of Android Applications

Benjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin T. Vechev

Statistical Deobfuscation of Android Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information

POPE: Partial Order Preserving Encoding

Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich

POPE: Partial Order Preserving Encoding

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

On the Provable Security of (EC)DSA Signatures

Manuel Fersch, Eike Kiltz, Bertram Poettering

On the Provable Security of (EC)DSA Signatures

Details
Discussion Comments: 0
Verification: Authors have not verified information

"Make Sure DSA Signing Exponentiations Really are Constant-Time"

Cesar Pereida García, Billy Bob Brumley, Yuval Yarom

"Make Sure DSA Signing Exponentiations Really are Constant-Time"

Details
Discussion Comments: 0
Verification: Authors have not verified information

Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices

Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang

Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks

Johannes Krupp, Michael Backes, Christian Rossow

Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Misuse of Android Unix Domain Sockets and Security Implications

Yuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun Qian, Zhuoqing Morley Mao

The Misuse of Android Unix Domain Sockets and Security Implications

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing

Changhee Hahn, Junbeom Hur

POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems

Stephan Lau, Johannes Klick, Stephan Arndt, Volker Roth

POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems

Details
Discussion Comments: 0
Verification: Authors have not verified information

Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks

Yunlong Mao, Yuan Zhang, Sheng Zhong

Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Strong Non-Interference and Type-Directed Higher-Order Masking

Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini

Strong Non-Interference and Type-Directed Higher-Order Masking

Details
Discussion Comments: 0
Verification: Authors have not verified information

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy

Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM

Anrin Chakraborti, Radu Sion

POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM

Details
Discussion Comments: 0
Verification: Authors have not verified information

Differentially Private Bayesian Programming

Gilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub

Differentially Private Bayesian Programming

Details
Discussion Comments: 0
Verification: Authors have not verified information

Making Smart Contracts Smarter

Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor

Making Smart Contracts Smarter

Details
Discussion Comments: 0
Verification: Authors have not verified information

∑oφoς: Forward Secure Searchable Encryption

Raphael Bost

∑oφoς: Forward Secure Searchable Encryption

Details
Discussion Comments: 0
Verification: Author has not verified information

Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild

Stefano Calzavara, Alvise Rabitti, Michele Bugliesi

Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild

Details
Discussion Comments: 0
Verification: Authors have not verified information

Advanced Probabilistic Couplings for Differential Privacy

Gilles Barthe, Noémie Fong, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub

Advanced Probabilistic Couplings for Differential Privacy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Theory of Implementation Security Workshop (TIs 2016)

Begül Bilgin, Svetla Nikova, Vincent Rijmen

Theory of Implementation Security Workshop (TIs 2016)

Details
Discussion Comments: 0
Verification: Authors have not verified information

All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records

Daiping Liu, Shuai Hao, Haining Wang

All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records

Details
Author Comments:
Discussion Comments: 0
Sharing: Other
Verification: Authors have verified information

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing

Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing

Details
Discussion Comments: 0
Verification: Authors have not verified information

Membership Privacy in MicroRNA-based Studies

Michael Backes, Pascal Berrang, Mathias Humbert, Praveen Manoharan

Membership Privacy in MicroRNA-based Studies

Details
Discussion Comments: 0
Verification: Authors have not verified information

New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks

Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, Songwu Lu

New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android

Güliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter

Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Practical Censorship Evasion Leveraging Content Delivery Networks

Hadi Zolfaghari, Amir Houmansadr

Practical Censorship Evasion Leveraging Content Delivery Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security

Toby C. Murray, Deian Stefan

PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation

Toshinori Araki, Assaf Barak, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara

DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity

Omid Asudeh, Mathew Wright

POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE

Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

DEMO: Integrating MPC in Big Data Workflows

Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros

DEMO: Integrating MPC in Big Data Workflows

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation

Katarzyna Kapusta, Gérard Memmi, Hassan Noura

POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation

Details
Discussion Comments: 0
Verification: Authors have not verified information

MIST 2016: 8th International Workshop on Managing Insider Security Threats

Ilsun You, Elisa Bertino

MIST 2016: 8th International Workshop on Managing Insider Security Threats

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Security of Cracking-Resistant Password Vaults

Maximilian Golla, Benedict Beuscher, Markus Dürmuth

On the Security of Cracking-Resistant Password Vaults

Details
Discussion Comments: 0
Verification: Authors have not verified information

Generic Attacks on Secure Outsourced Databases

Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill

Generic Attacks on Secure Outsourced Databases

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Surfeit of SSH Cipher Suites

Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson

A Surfeit of SSH Cipher Suites

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties

Jan-Ole Malchow, Benjamin Güldenring, Volker Roth

POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties

Details
Discussion Comments: 0
Verification: Authors have not verified information

Condensed Cryptographic Currencies Crash Course (C5)

Aljosha Judmayer, Edgar R. Weippl

Condensed Cryptographic Currencies Crash Course (C5)

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

POSTER: DroidShield: Protecting User Applications from Normal World Access

Darius Suciu, Radu Sion

POSTER: DroidShield: Protecting User Applications from Normal World Access

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN

Karthikeyan Bhargavan, Gaëtan Leurent

On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Attack on Non-Linear Physical Unclonable Function

Jing Ye, Yu Hu, Xiaowei Li

POSTER: Attack on Non-Linear Physical Unclonable Function

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks

Michael Steinke, Stefan Metzger, Wolfgang Hommel

POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store

Roman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan Henrik Ziegeldorf, Klaus Wehrle

POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat

Manish Shukla, Sutapa Mondal, Sachin Lodha

POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat

Details
Discussion Comments: 0
Verification: Authors have not verified information

5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs

Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova

5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Optimizing Semi-Honest Secure Multiparty Computation for the Internet

Aner Ben-Efraim, Yehuda Lindell, Eran Omri

Optimizing Semi-Honest Secure Multiparty Computation for the Internet

Details
Discussion Comments: 0
Verification: Authors have not verified information

BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme

Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo

BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme

Details
Discussion Comments: 0
Verification: Authors have not verified information

CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites

Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou

CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations

Dmitry Evtyushkin, Dmitry V. Ponomarev

Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns

Steffen Wendzel, Wojciech Mazurczyk

POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Differential Privacy as a Mutual Information Constraint

Paul Cuff, Lanqing Yu

Differential Privacy as a Mutual Information Constraint

Details
Discussion Comments: 0
Verification: Authors have not verified information

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li, Luyi Xing, Raheem A. Beyah

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence

Details
Discussion Comments: 0
Verification: Authors have not verified information

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition

Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions

Chia-Mu Yu

POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions

Details
Discussion Comments: 0
Verification: Author has not verified information

Chainsaw: Chained Automated Workflow-based Exploit Generation

Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan

Chainsaw: Chained Automated Workflow-based Exploit Generation

Details
Discussion Comments: 0
Verification: Authors have not verified information

PIPSEA: A Practical IPsec Gateway on Embedded APUs

Jung-Ho Park, Wookeun Jung, Gangwon Jo, Ilkoo Lee, Jaejin Lee

PIPSEA: A Practical IPsec Gateway on Embedded APUs

Details
Discussion Comments: 0
Verification: Authors have not verified information

Error Handling of In-vehicle Networks Makes Them Vulnerable

Kyong-Tak Cho, Kang G. Shin

Error Handling of In-vehicle Networks Makes Them Vulnerable

Details
Discussion Comments: 0
Verification: Authors have not verified information

Breaking Web Applications Built On Top of Encrypted Data

Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov

Breaking Web Applications Built On Top of Encrypted Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

GAME OF DECOYS: Optimal Decoy Routing Through Game Theory

Milad Nasr, Amir Houmansadr

GAME OF DECOYS: Optimal Decoy Routing Through Game Theory

Details
Discussion Comments: 0
Verification: Authors have not verified information

My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers

Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, Wenyao Xu

My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Towards Exposing Internet of Things: A Roadmap

Vinay Sachidananda, Jinghui Toh, Shachar Siboni, Asaf Shabtai, Yuval Elovici

POSTER: Towards Exposing Internet of Things: A Roadmap

Details
Discussion Comments: 0
Verification: Authors have not verified information

CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy

Lukas Weichselbaum, Michele Spagnuolo, Sebastian Lekies, Artur Janc

CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Enforcing Least Privilege Memory Views for Multithreaded Applications

Terry Ching-Hsiang Hsu, Kevin J. Hoffman, Patrick Eugster, Mathias Payer

Enforcing Least Privilege Memory Views for Multithreaded Applications

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Safely Measuring Tor

Rob Jansen, Aaron Johnson

Safely Measuring Tor

Details
Discussion Comments: 0
Verification: Authors have not verified information

Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback

Kai Wang, Yuqing Zhang, Peng Liu

Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback

Details
Discussion Comments: 0
Verification: Authors have not verified information

Practical Detection of Entropy Loss in Pseudo-Random Number Generators

Felix Dörre, Vladimir Klebanov

Practical Detection of Entropy Loss in Pseudo-Random Number Generators

Details
Discussion Comments: 0
Verification: Authors have not verified information

CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump

Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu

CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Identifying Dynamic Data Structures in Malware

Thomas Rupprecht, Xi Chen, David H. White, Jan Tobias Mühlberg, Herbert Bos, Gerald Lüttgen

POSTER: Identifying Dynamic Data Structures in Malware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Attacking OpenSSL Implementation of ECDSA with a Few Signatures

Shuqin Fan, Wenbo Wang, Qingfeng Cheng

Attacking OpenSSL Implementation of ECDSA with a Few Signatures

Details
Discussion Comments: 0
Verification: Authors have not verified information

On the Instability of Bitcoin Without the Block Reward

Miles Carlsten, Harry A. Kalodner, S. Matthew Weinberg, Arvind Narayanan

On the Instability of Bitcoin Without the Block Reward

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

POSTER: The ART of App Compartmentalization

Michael Backes, Sven Bugiel, Jie Huang, Oliver Schranz

POSTER: The ART of App Compartmentalization

Details
Discussion Comments: 0
Verification: Authors have not verified information

Deep Learning with Differential Privacy

Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang

Deep Learning with Differential Privacy

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hypnoguard: Protecting Secrets across Sleep-wake Cycles

Lianying Zhao, Mohammad Mannan

Hypnoguard: Protecting Secrets across Sleep-wake Cycles

Details
Discussion Comments: 0
Verification: Authors have not verified information

DEMO: Starving Permission-Hungry Android Apps Using SecuRank

Vincent F. Taylor, Ivan Martinovic

DEMO: Starving Permission-Hungry Android Apps Using SecuRank

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption

David Pouliot, Charles V. Wright

The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Frank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service

Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem A. Beyah

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service

Details
Discussion Comments: 0
Verification: Authors have not verified information

Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data

Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno

Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Secure Stable Matching at Scale

Jack Doerner, David Evans, Abhi Shelat

Secure Stable Matching at Scale

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Using Reflexive Eye Movements for Fast Challenge-Response Authentication

Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic

Using Reflexive Eye Movements for Fast Challenge-Response Authentication

Details
Discussion Comments: 0
Verification: Authors have not verified information

Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016)

Long Lu, Mohammad Mannan

Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016)

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data

Pedro Casas, Alessandro D'Alconzo, Giuseppe Settanni, Pierdomenico Fiadino, Florian Skopik

POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Scalable Graph-based Bug Search for Firmware Images

Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, Heng Yin

Scalable Graph-based Bug Search for Firmware Images

Details
Discussion Comments: 0
Verification: Authors have not verified information

An Empirical Study of Mnemonic Sentence-based Password Generation Strategies

Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor

An Empirical Study of Mnemonic Sentence-based Password Generation Strategies

Details
Discussion Comments: 0
Verification: Authors have not verified information

MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer

Marcel Keller, Emmanuela Orsini, Peter Scholl

MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: DataLair: A Storage Block Device with Plausible Deniability

Anrin Chakraborti, Chen Chen, Radu Sion

POSTER: DataLair: A Storage Block Device with Plausible Deniability

Details
Discussion Comments: 0
Verification: Authors have not verified information

Instant and Robust Authentication and Key Agreement among Mobile Devices

Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao

Instant and Robust Authentication and Key Agreement among Mobile Devices

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Weighing in eHealth Security

Martin Krämer, David Aspinall, Maria Wolters

POSTER: Weighing in eHealth Security

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs

Bo Sun, Akinori Fujino, Tatsuya Mori

POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs

Details
Discussion Comments: 0
Verification: Authors have not verified information

POSTER: Fingerprinting Tor Hidden Services

Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel

POSTER: Fingerprinting Tor Hidden Services

Details
Discussion Comments: 0
Verification: Authors have not verified information

Attribute-based Key Exchange with General Policies

Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin

Attribute-based Key Exchange with General Policies

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Message-Recovery Attacks on Feistel-Based Format Preserving Encryption

Mihir Bellare, Viet Tung Hoang, Stefano Tessaro

Message-Recovery Attacks on Feistel-Based Format Preserving Encryption

Details
Discussion Comments: 0
Verification: Authors have not verified information

iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft

Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, Yanchao Zhang

iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft

Details
Discussion Comments: 0
Verification: Authors have not verified information

VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones

Linghan Zhang, Sheng Tan, Jie Yang, Yingying Chen

VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones

Details
Discussion Comments: 0
Verification: Authors have not verified information

MPC-Friendly Symmetric Key Primitives

Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart

MPC-Friendly Symmetric Key Primitives

Details
Discussion Comments: 0
Verification: Authors have not verified information

Transparency Overlays and Applications

Melissa Chase, Sarah Meiklejohn

Transparency Overlays and Applications

Details
Discussion Comments: 0
Verification: Authors have not verified information