Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity Toshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada |
POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts Ari Juels, Ahmed E. Kosba, Elaine Shi |
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Protecting Insecure Communications with Topology-aware Network Tunnels Georgios Kontaxis, Angelos D. Keromytis |
Protecting Insecure Communications with Topology-aware Network Tunnels Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Comprehensive Formal Security Analysis of OAuth 2.0 Daniel Fett, Ralf Küsters, Guido Schmitz |
A Comprehensive Formal Security Analysis of OAuth 2.0 Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SmartWalk: Enhancing Social Network Security via Adaptive Random Walks Yushan Liu, Shouling Ji, Prateek Mittal |
SmartWalk: Enhancing Social Network Security via Adaptive Random Walks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Function Secret Sharing: Improvements and Extensions Elette Boyle, Niv Gilboa, Yuval Ishai |
Function Secret Sharing: Improvements and Extensions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Ignacio Martín, José Alberto Hernández, Sergio de los Santos, Antonio Guzmán |
Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Adversarial Data Mining: Big Data Meets Cyber Security Murat Kantarcioglu, Bowei Xi |
Adversarial Data Mining: Big Data Meets Cyber Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Coverage-based Greybox Fuzzing as Markov Chain Marcel Böhme, Van-Thuan Pham, Abhik Roychoudhury |
Coverage-based Greybox Fuzzing as Markov Chain Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Peter Mayer, Stephan Neumann, Melanie Volkamer |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems Talia Ringer, Dan Grossman, Franziska Roesner |
AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient Batched Oblivious PRF with Applications to Private Set Intersection Vladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu |
Efficient Batched Oblivious PRF with Applications to Private Set Intersection Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
A Protocol for Privately Reporting Ad Impressions at Scale Matthew Green, Watson Ladd, Ian Miers |
A Protocol for Privately Reporting Ad Impressions at Scale Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Program Anomaly Detection: Methodology and Practices Xiaokui Shu, Danfeng Yao |
Program Anomaly Detection: Methodology and Practices Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
DPSense: Differentially Private Crowdsourced Spectrum Sensing Xiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, Yanchao Zhang |
DPSense: Differentially Private Crowdsourced Spectrum Sensing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Town Crier: An Authenticated Data Feed for Smart Contracts Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi |
Town Crier: An Authenticated Data Feed for Smart Contracts Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes |
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
15th Workshop on Privacy in the Electronic Society (WPES 2016) Sabrina De Capitani di Vimercati |
15th Workshop on Privacy in the Electronic Society (WPES 2016) Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
MEMS Gyroscopes as Physical Unclonable Functions Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel |
MEMS Gyroscopes as Physical Unclonable Functions Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
What Else is Revealed by Order-Revealing Encryption? F. Betül Durak, Thomas M. DuBuisson, David Cash |
What Else is Revealed by Order-Revealing Encryption? Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara |
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments Jonas Schneider, Nils Fleischhacker, Dominique Schröder, Michael Backes |
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Security on Wheels: Security and Privacy for Vehicular Communication Systems Panos Papadimitratos |
Security on Wheels: Security and Privacy for Vehicular Communication Systems Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler, Raju Rangaswami |
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic Martin E. Hellman |
Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida |
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
9th International Workshop on Artificial Intelligence and Security: AISec 2016 David Mandell Freeman, Katerina Mitrokotsa, Arunesh Sinha |
9th International Workshop on Artificial Intelligence and Security: AISec 2016 Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical Non-Malleable Codes from l-more Extractable Hash Functions Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis |
Practical Non-Malleable Codes from l-more Extractable Hash Functions Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement Cecylia Bocovich, Ian Goldberg |
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds Kevin Lewi, David J. Wu |
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification Stefan Dziembowski, Sebastian Faust, François-Xavier Standaert |
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PhishEye: Live Monitoring of Sandboxed Phishing Kits Xiao Han, Nizar Kheir, Davide Balzarotti |
PhishEye: Live Monitoring of Sandboxed Phishing Kits Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles Luke Deshotels, Razvan Deaconescu, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi |
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection Yuanwen Huang, Swarup Bhunia, Prabhat Mishra |
MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Targeted Online Password Guessing: An Underestimated Threat Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang |
Targeted Online Password Guessing: An Underestimated Threat Details |
Author Comments:
In a pretty quick response to this paper, NIST in the USA have revised the Section 5.2.2 of SP 800-63-3 Digital Authentication Guideline.
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio Babins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena |
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hugo Krawczyk |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
POSTER: Privacy Enhanced Secure Location Verification Md. Mamunur Rashid Akand, Reihaneh Safavi-Naini |
POSTER: Privacy Enhanced Secure Location Verification Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MTD 2016: Third ACM Workshop on Moving Target Defense Peng Liu, Cliff Wang |
MTD 2016: Third ACM Workshop on Moving Target Defense Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Secure Sharding Protocol For Open Blockchains Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena |
A Secure Sharding Protocol For Open Blockchains Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The Honey Badger of BFT Protocols Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song |
The Honey Badger of BFT Protocols Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime Mingshen Sun, Tao Wei, John C. S. Lui |
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning Lingling Fan, Minhui Xue, Sen Chen, Lihua Xu, Haojin Zhu |
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration Shuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster |
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Security and Scalability of Bitcoin's Blockchain Ghassan Karame |
On the Security and Scalability of Bitcoin's Blockchain Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
TypeSan: Practical Type Confusion Detection István Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe |
TypeSan: Practical Type Confusion Detection Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Computational Soundness for Dalvik Bytecode Michael Backes, Robert Künnemann, Esfandiar Mohammadi |
Computational Soundness for Dalvik Bytecode Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016) Xinxin Fan, Tim Güneysu |
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Improved Markov Strength Meters for Passwords Harshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha |
POSTER: Improved Markov Strength Meters for Passwords Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael Bailey |
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems Nicholas J. Multari, Anoop Singhal, David O. Manz |
SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Systematic Fuzzing and Testing of TLS Libraries Juraj Somorovsky |
Systematic Fuzzing and Testing of TLS Libraries Details |
Discussion Comments:
0
Verification:
Author has
not verified
information
|
|
Ziyun Zhu, Tudor Dumitras |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security Florian Kerschbaum, Erik-Oliver Blass, Tomas Sander |
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Build It, Break It, Fix It: Contesting Secure Development Andrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel |
Build It, Break It, Fix It: Contesting Secure Development Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li |
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
C-FLAT: Control-Flow Attestation for Embedded Systems Software Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik |
C-FLAT: Control-Flow Attestation for Embedded Systems Software Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
High Fidelity Data Reduction for Big Data Security Dependency Analyses Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang |
High Fidelity Data Reduction for Big Data Security Dependency Analyses Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Breaking Kernel Address Space Layout Randomization with Intel TSX Yeongjin Jang, Sangho Lee, Taesoo Kim |
Breaking Kernel Address Space Layout Randomization with Intel TSX Details |
Author Comments:
DrK was used by IOActive for exploiting CVE-2016-7255 (https://github.com/IOActive/I-know-where-your-page-lives)
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
2nd International Workshop on Software Protection: SPRO 2016 Brecht Wyseur, Bjorn De Sutter |
2nd International Workshop on Software Protection: SPRO 2016 Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Ercan Ucan, Raphael M. Reischuk, Adrian Perrig |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
POSTER: Security Enhanced Administrative Role Based Access Control Models P. V. Rajkumar, Ravi S. Sandhu |
POSTER: Security Enhanced Administrative Role Based Access Control Models Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reliable Third-Party Library Detection in Android and its Security Applications Michael Backes, Sven Bugiel, Erik Derr |
Reliable Third-Party Library Detection in Android and its Security Applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation Yilin Shen, Hongxia Jin |
EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Security and Performance of Proof of Work Blockchains Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun |
On the Security and Performance of Proof of Work Blockchains Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints Chen Chen, Darius Suciu, Radu Sion |
POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Software Approach to Defeating Side Channels in Last-Level Caches Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang |
A Software Approach to Defeating Side Channels in Last-Level Caches Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication Zhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang |
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations Jianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson |
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Garbling Gadgets for Boolean and Arithmetic Circuits Marshall Ball, Tal Malkin, Mike Rosulek |
Garbling Gadgets for Boolean and Arithmetic Circuits Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identity-Concealed Authenticated Encryption and Key Exchange Yunlei Zhao |
Identity-Concealed Authenticated Encryption and Key Exchange Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Over-The-Top Bypass: Study of a Recent Telephony Fraud Merve Sahin, Aurélien Francillon |
Over-The-Top Bypass: Study of a Recent Telephony Fraud Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior Elissa M. Redmiles, Sean Kross, Michelle L. Mazurek |
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On Code Execution Tracking via Power Side-Channel Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu |
On Code Execution Tracking via Power Side-Channel Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Privacy and Security in the Genomic Era Erman Ayday, Jean-Pierre Hubaux |
Privacy and Security in the Genomic Era Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan |
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking Denis Migdal, Christian Johansen, Audun Jøsang |
DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: A Behavioural Authentication System for Mobile Users Md. Morshedul Islam, Reihaneh Safavi-Naini |
POSTER: A Behavioural Authentication System for Mobile Users Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Λολ: Functional Lattice Cryptography Eric Crockett, Chris Peikert |
Λολ: Functional Lattice Cryptography Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
SANA: Secure and Scalable Aggregate Network Attestation Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter |
SANA: Secure and Scalable Aggregate Network Attestation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mix&Slice: Efficient Access Revocation in the Cloud Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati |
Mix&Slice: Efficient Access Revocation in the Cloud Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Online Tracking: A 1-million-site Measurement and Analysis Steven Englehardt, Arvind Narayanan |
Online Tracking: A 1-million-site Measurement and Analysis Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency Isaac C. Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse |
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms Christian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck |
Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Improvements to Secure Computation with Penalties Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan |
Improvements to Secure Computation with Penalties Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Research produced no artifacts
Verification:
Authors have
verified
information
|
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard |
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne S. Winslett, Carl A. Gunter, William P. King |
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications Yongzhi Wang, Yulong Shen |
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Alternative Implementations of Secure Real Numbers Vassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson |
Alternative Implementations of Secure Real Numbers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Systematic Analysis of the Juniper Dual EC Incident Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham |
A Systematic Analysis of the Juniper Dual EC Incident Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16) Alvaro A. Cárdenas, Rakesh B. Bobba |
Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack Seunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim |
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages Kangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee |
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Limiting the Impact of Stealthy Attacks on Industrial Control Systems David I. Urbina, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Richard Candell, Henrik Sandberg |
Limiting the Impact of Stealthy Attacks on Industrial Control Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An In-Depth Study of More Than Ten Years of Java Exploitation Philipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden |
An In-Depth Study of More Than Ten Years of Java Exploitation Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
CCSW'16: 8th ACM Cloud Computing Security Workshop Elli Androulaki, Michael K. Reiter |
CCSW'16: 8th ACM Cloud Computing Security Workshop Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Amortizing Secure Computation with Penalties Ranjit Kumaresan, Iddo Bentov |
Amortizing Secure Computation with Penalties Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Android ION Hazard: the Curse of Customizable Memory Management System Hang Zhang, Dongdong She, Zhiyun Qian |
Android ION Hazard: the Curse of Customizable Memory Management System Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning George Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias |
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Introduction to Credit Networks: Security, Privacy, and Applications Aniket Kate |
Introduction to Credit Networks: Security, Privacy, and Applications Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Statistical Deobfuscation of Android Applications Benjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin T. Vechev |
Statistical Deobfuscation of Android Applications Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POPE: Partial Order Preserving Encoding Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich |
POPE: Partial Order Preserving Encoding Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
On the Provable Security of (EC)DSA Signatures Manuel Fersch, Eike Kiltz, Bertram Poettering |
On the Provable Security of (EC)DSA Signatures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
"Make Sure DSA Signing Exponentiations Really are Constant-Time" Cesar Pereida García, Billy Bob Brumley, Yuval Yarom |
"Make Sure DSA Signing Exponentiations Really are Constant-Time" Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang |
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks Johannes Krupp, Michael Backes, Christian Rossow |
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Misuse of Android Unix Domain Sockets and Security Implications Yuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun Qian, Zhuoqing Morley Mao |
The Misuse of Android Unix Domain Sockets and Security Implications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing Changhee Hahn, Junbeom Hur |
POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems Stephan Lau, Johannes Klick, Stephan Arndt, Volker Roth |
POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks Yunlong Mao, Yuan Zhang, Sheng Zhong |
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Strong Non-Interference and Type-Directed Higher-Order Masking Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini |
Strong Non-Interference and Type-Directed Higher-Order Masking Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren |
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM Anrin Chakraborti, Radu Sion |
POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Differentially Private Bayesian Programming Gilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub |
Differentially Private Bayesian Programming Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Making Smart Contracts Smarter Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor |
Making Smart Contracts Smarter Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
∑oφoς: Forward Secure Searchable Encryption Raphael Bost |
∑oφoς: Forward Secure Searchable Encryption Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild Stefano Calzavara, Alvise Rabitti, Michele Bugliesi |
Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Advanced Probabilistic Couplings for Differential Privacy Gilles Barthe, Noémie Fong, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub |
Advanced Probabilistic Couplings for Differential Privacy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Theory of Implementation Security Workshop (TIs 2016) Begül Bilgin, Svetla Nikova, Vincent Rijmen |
Theory of Implementation Security Workshop (TIs 2016) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records Daiping Liu, Shuai Hao, Haining Wang |
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Other
Verification:
Authors have
verified
information
|
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing Yaoqi Jia, Zheng Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang |
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Membership Privacy in MicroRNA-based Studies Michael Backes, Pascal Berrang, Mathias Humbert, Praveen Manoharan |
Membership Privacy in MicroRNA-based Studies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks Guan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, Songwu Lu |
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android Güliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter |
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Practical Censorship Evasion Leveraging Content Delivery Networks Hadi Zolfaghari, Amir Houmansadr |
Practical Censorship Evasion Leveraging Content Delivery Networks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security Toby C. Murray, Deian Stefan |
PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation Toshinori Araki, Assaf Barak, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara |
DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity Omid Asudeh, Matthew Wright |
POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila |
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
DEMO: Integrating MPC in Big Data Workflows Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros |
DEMO: Integrating MPC in Big Data Workflows Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation Katarzyna Kapusta, Gérard Memmi, Hassan N. Noura |
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MIST 2016: 8th International Workshop on Managing Insider Security Threats Ilsun You, Elisa Bertino |
MIST 2016: 8th International Workshop on Managing Insider Security Threats Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Security of Cracking-Resistant Password Vaults Maximilian Golla, Benedict Beuscher, Markus Dürmuth |
On the Security of Cracking-Resistant Password Vaults Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Generic Attacks on Secure Outsourced Databases Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill |
Generic Attacks on Secure Outsourced Databases Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Surfeit of SSH Cipher Suites Martin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson |
A Surfeit of SSH Cipher Suites Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties Jan-Ole Malchow, Benjamin Güldenring, Volker Roth |
POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Condensed Cryptographic Currencies Crash Course (C5) Aljosha Judmayer, Edgar R. Weippl |
Condensed Cryptographic Currencies Crash Course (C5) Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
POSTER: DroidShield: Protecting User Applications from Normal World Access Darius Suciu, Radu Sion |
POSTER: DroidShield: Protecting User Applications from Normal World Access Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Karthikeyan Bhargavan, Gaëtan Leurent |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Attack on Non-Linear Physical Unclonable Function Jing Ye, Yu Hu, Xiaowei Li |
POSTER: Attack on Non-Linear Physical Unclonable Function Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks Michael Steinke, Stefan Metzger, Wolfgang Hommel |
POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Roman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan Henrik Ziegeldorf, Klaus Wehrle |
Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat Manish Shukla, Sutapa Mondal, Sachin Lodha |
POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova |
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Optimizing Semi-Honest Secure Multiparty Computation for the Internet Aner Ben-Efraim, Yehuda Lindell, Eran Omri |
Optimizing Semi-Honest Secure Multiparty Computation for the Internet Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme Pyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo |
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites Xiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou |
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations Dmitry Evtyushkin, Dmitry V. Ponomarev |
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns Steffen Wendzel, Wojciech Mazurczyk |
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Differential Privacy as a Mutual Information Constraint Paul Cuff, Lanqing Yu |
Differential Privacy as a Mutual Information Constraint Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li, Luyi Xing, Raheem A. Beyah |
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter |
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Chia-Mu Yu |
Details |
|
Discussion Comments:
0
Verification:
Author has
not verified
information
|
Chainsaw: Chained Automated Workflow-based Exploit Generation Abeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan |
Chainsaw: Chained Automated Workflow-based Exploit Generation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
PIPSEA: A Practical IPsec Gateway on Embedded APUs Jung-Ho Park, Wookeun Jung, Gangwon Jo, Ilkoo Lee, Jaejin Lee |
PIPSEA: A Practical IPsec Gateway on Embedded APUs Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Error Handling of In-vehicle Networks Makes Them Vulnerable Kyong-Tak Cho, Kang G. Shin |
Error Handling of In-vehicle Networks Makes Them Vulnerable Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Breaking Web Applications Built On Top of Encrypted Data Paul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov |
Breaking Web Applications Built On Top of Encrypted Data Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory Milad Nasr, Amir Houmansadr |
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, Wenyao Xu |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Towards Exposing Internet of Things: A Roadmap Vinay Sachidananda, Jinghui Toh, Shachar Siboni, Asaf Shabtai, Yuval Elovici |
POSTER: Towards Exposing Internet of Things: A Roadmap Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Lukas Weichselbaum, Michele Spagnuolo, Sebastian Lekies, Artur Janc |
Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Enforcing Least Privilege Memory Views for Multithreaded Applications Terry Ching-Hsiang Hsu, Kevin J. Hoffman, Patrick Eugster, Mathias Payer |
Enforcing Least Privilege Memory Views for Multithreaded Applications Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Rob Jansen, Aaron Johnson |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback Kai Wang, Yuqing Zhang, Peng Liu |
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical Detection of Entropy Loss in Pseudo-Random Number Generators Felix Dörre, Vladimir Klebanov |
Practical Detection of Entropy Loss in Pseudo-Random Number Generators Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump Jun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu |
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Identifying Dynamic Data Structures in Malware Thomas Rupprecht, Xi Chen, David H. White, Jan Tobias Mühlberg, Herbert Bos, Gerald Lüttgen |
POSTER: Identifying Dynamic Data Structures in Malware Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Attacking OpenSSL Implementation of ECDSA with a Few Signatures Shuqin Fan, Wenbo Wang, Qingfeng Cheng |
Attacking OpenSSL Implementation of ECDSA with a Few Signatures Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
On the Instability of Bitcoin Without the Block Reward Miles Carlsten, Harry A. Kalodner, S. Matthew Weinberg, Arvind Narayanan |
On the Instability of Bitcoin Without the Block Reward Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
POSTER: The ART of App Compartmentalization Michael Backes, Sven Bugiel, Jie Huang, Oliver Schranz |
POSTER: The ART of App Compartmentalization Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Deep Learning with Differential Privacy Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang |
Deep Learning with Differential Privacy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hypnoguard: Protecting Secrets across Sleep-wake Cycles Lianying Zhao, Mohammad Mannan |
Hypnoguard: Protecting Secrets across Sleep-wake Cycles Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
DEMO: Starving Permission-Hungry Android Apps Using SecuRank Vincent F. Taylor, Ivan Martinovic |
DEMO: Starving Permission-Hungry Android Apps Using SecuRank Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption David Pouliot, Charles V. Wright |
The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem Frank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson |
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem A. Beyah |
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno |
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Secure Stable Matching at Scale Jack Doerner, David Evans, Abhi Shelat |
Secure Stable Matching at Scale Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Using Reflexive Eye Movements for Fast Challenge-Response Authentication Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic |
Using Reflexive Eye Movements for Fast Challenge-Response Authentication Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016) Long Lu, Mohammad Mannan |
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016) Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Pedro Casas, Alessandro D'Alconzo, Giuseppe Settanni, Pierdomenico Fiadino, Florian Skopik |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Scalable Graph-based Bug Search for Firmware Images Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, Heng Yin |
Scalable Graph-based Bug Search for Firmware Images Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor |
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer Marcel Keller, Emmanuela Orsini, Peter Scholl |
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom |
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: DataLair: A Storage Block Device with Plausible Deniability Anrin Chakraborti, Chen Chen, Radu Sion |
POSTER: DataLair: A Storage Block Device with Plausible Deniability Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Instant and Robust Authentication and Key Agreement among Mobile Devices Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao |
Instant and Robust Authentication and Key Agreement among Mobile Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
POSTER: Weighing in eHealth Security Martin Krämer, David Aspinall, Maria Wolters |
POSTER: Weighing in eHealth Security Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs Bo Sun, Akinori Fujino, Tatsuya Mori |
POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
POSTER: Fingerprinting Tor Hidden Services Asya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel |
POSTER: Fingerprinting Tor Hidden Services Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Attribute-based Key Exchange with General Policies Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin |
Attribute-based Key Exchange with General Policies Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption Mihir Bellare, Viet Tung Hoang, Stefano Tessaro |
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft Tao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, Yanchao Zhang |
iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones Linghan Zhang, Sheng Tan, Jie Yang, Yingying Chen |
VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
MPC-Friendly Symmetric Key Primitives Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart |
MPC-Friendly Symmetric Key Primitives Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Transparency Overlays and Applications Melissa Chase, Sarah Meiklejohn |
Transparency Overlays and Applications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|