CCS 2016 Program Guide (PDF)
Overview Schedule & Floor map (PDF)
Floor Maps (PDF)
CCS 2016 Proceedings (main conference) – OpenTOC
Pre-Conference Workshops on Monday, October 24, 2016 (09.00-17.00)
SPSM 2016DETAILED PROGRAM
|
WPES 2016DETAILED PROGRAM
|
WISCS 2016DETAILED PROGRAM
|
MTD 2016detailed program
|
SafeConfig 2016DETAILED PROGRAM
|
TIs 2016Detailed program
|
PLAS 2016DETAILED PROGRAM
|
|
---|---|---|---|---|---|---|---|
07.30-09.00 |
Registration & Early Bird Coffee |
||||||
08.30/09.00-10.30 |
SPSM 109.00-10.30 |
WPES 108.25-10.30 |
WISCS 109.00-10.30 |
MTD 108.50-11.00 |
SafeConfig 109.00-10.35 |
TIs 109.00-10.30 |
PLAS 108.50-10.30 |
10.30-11.00 |
Coffee Break |
||||||
11.00-12.30 |
SPSM 2 |
WPES 2 |
WISCS 2 |
MTD 2 |
SafeConfig 2 |
TIs 2 |
PLAS 2 |
12.30-14.00 |
Lunch Break |
||||||
14.00-15.30 |
SPSM 3 |
WPES 3 |
WISCS 3 |
MTD 3 |
SafeConfig 3 |
TIs 3 |
PLAS 3 |
15.30-16.00 |
Coffee Break |
||||||
16.00-17.30/18.00 |
SPSM 416.00-17.40 |
WPES 416.00-18.10 |
WISCS 416.00-17.30 |
MTD 416.05-17.40 |
SafeConfig 416.00-17.30 |
TIs 416.00-17.30 |
PLAS 416.00-18.10 |
CCS 2016 Main Conference, Tuesday, October 25, 2016
CCS 2016 Proceedings (main conference) – OpenTOC
Track 1cryptographic mechanisms
Lecture Hall A |
Track 2differential privacy / cryptography / attacks
Lecture Hall B |
Track 3web/mobile security
Lecture Hall C |
Track 4secure code and systems
Lecture Hall D |
Track 5Tutorials & Talks
Lecture Hall E |
|
---|---|---|---|---|---|
07.30-08.40 |
Registration & Early Bird Coffee |
||||
08.40-08.50 |
OpeningLecture Hall C |
||||
08.50-09.50 |
KeynoteLecture Hall C Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic
|
||||
10.00-11.30 |
Session 1ABlockchain I
Session Chair: |
Session 1BDifferential Privacy
Session Chair: |
Session 1CAndroid Security
Session Chair: |
Session 1DHardware Protection
Session Chair: |
Tutorial |
On the Security and Performance of Proof of Work Blockchains |
Differential Privacy as a Mutual Information Constraint |
The Misuse of Android Unix Domain Sockets and Security Implications |
Strong Non-Interference and Type-Directed Higher-Order Masking |
Program Anomaly Detection: Methodology and Practices |
|
11.30-12.00 |
Coffee Break |
||||
12.00-13.00 |
Session 2ABlockchain II
Session Chair: |
Session 2BDifferentially Private Systems I
Session Chair: |
Session 2CAccess Control
Session Chair: |
Session 2DSecurity and Persistence
Session Chair: |
Invited Talk |
On the Instability of Bitcoin Without the Block Reward |
A EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation |
AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems |
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency |
Colorful like a Chameleon: Security Nightmares of Embedded Systems |
|
13.00-14.30 |
Lunch Break |
||||
14.30-16.00 |
Session 3ASmart Contracts
Session Chair: |
Session 3BDifferentially Private Systems II
Session Chair: |
Session 3CMobile Software Analysis
Session Chair: |
Session 3DKernel Memory Security
Session Chair: |
Tutorial |
Making Smart Contracts Smarter |
DPSense: Differentially Private Crowdsourced Spectrum Sensing |
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime |
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR |
Security on Wheels: Security and Privacy for Vehicular Communication Systems |
|
16.00-16.30 |
Coffee Break |
||||
16.30-18.00 |
Session 4ASecure MPC I
Session Chair: |
Session 4BAttacks on Ciphers
Session Chair: |
Session 4CBig Data Meets Security
Session Chair: |
Session 4DTypes and Memory Safety
Session Chair: |
Tutorial |
Improvements to Secure Computation with Penalties |
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption |
Scalable Graph-based Bug Search for Firmware Images |
TypeSanitizer: Practical Type Confusion Detection |
Security on Wheels: Security and Privacy for Vehicular Communication Systems |
|
18.30-23.00 |
Mayor’s Dinner @ Vienna City HallPoster / Demo Session & Award Ceremony
18.15 Meeting point in front of the Conference Venue entrance (or you join us directly at the City Hall)
|
CCS 2016 Main Conference, Wednesday, October 26, 2016
CCS 2016 Proceedings (main conference) – OpenTOC
Track 1cryptographic mechanisms
Lecture Hall A |
Track 2differential privacy / cryptography / attacks
Lecture Hall B |
Track 3web/mobile security
Lecture Hall C |
Track 4secure code and systems
Lecture Hall D |
Track 5Tutorials & Talks
Lecture Hall E |
|
---|---|---|---|---|---|
07.30-08.50 |
Registration & Early Bird Coffee |
||||
08.50-09.50 |
KeynoteLecture Hall C Is it practical to build a truly distributed payment system?
|
||||
10.00-11.30 |
Session 5ASecure MPC II
Session Chair: |
Session 5BPhysically Based Authentication
Session Chair: |
Session 5CWeb Security
Session Chair: |
Session 5DSecurity Bug Finding
Session Chair: |
Tutorial(CCS)^2 – Crypto-Currencies Special @ CCS 2016 (Part I) |
Alternative Implementations of Secure Real Numbers |
MEMS Gyroscopes as Physical Unclonable Functions |
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem |
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior |
Cryptographic Currencies Crash Course (C5) |
|
11.30-12.00 |
Coffee Break |
||||
12.00-13.00 |
Session 6APhone security using formal methods
Session Chair: |
Session 6BAttestation
Session Chair: |
Session 6CMine your Literature
Session Chair: |
Session 6DSecurity Studies
Session Chair: |
Tutorial(CCS)^2 – Crypto-Currencies Special @ CCS 2016 (Part II) |
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles |
SANA: Secure and Scalable Aggregate Network Attestation |
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence |
An In-Depth Study of More Than Ten Years of Java Exploitation |
Introduction to Credit Networks (12.00 – 13.15) |
|
13.00-14.30 |
Lunch Break |
||||
14.30-16.00 |
Session 7ASecure MPC III
Session Chair: |
Session 7BSide-Channel Attacks
Session Chair:
|
Session 7CAcoustic attacks
Session Chair: |
Session 7DProtection Across Executions
Session Chair:
|
Tutorial(CCS)^2 – Crypto-Currencies Special @ CCS 2016 (Part III) |
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority |
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations |
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets |
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages |
On the Security and Scalability of Bitcoin’s Blockchain |
|
16.00-16.30 |
Coffee Break |
||||
16.30-18.00 |
Session 8ALattices and Obfuscation
Session Chair: |
Session 8BAttacks and Defences
Session Chair: |
Session 8CPhone Security
Session Chair: |
Session 8DInfrastructure attacks
Session Chair: |
Invited Talk |
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs |
On Code Execution Tracking via Power Side-Channel |
Using Reflexive Eye Movements For Fast Challenge-Response Authentication |
Limiting the Impact of Stealthy Attacks on Industrial Control Systems |
Thorsten Borrmann, DB Netz AG, Germany (16.30 – 17.15) Experiences in Securing Smart Grids and their Operations (17.15 – 18.00) |
|
18.05-19.00 |
Panel DiscussionLecture Hall C Impact of Academic Security Research: Frogs in Wells, Storms in Teacups, or Raw Diamonds?
Chair: Ahmad-Reza Sadeghi, TU Darmstadt, CYSEC, Germany
Panelists: |
||||
19.05-24.00 |
Traditional Viennese Dinner @ Heuriger
The Dinner will take place at a “Heuriger” (traditional wine tavern), located on the outskirts of Vienna.
19.05 Meeting point in front of the Conference Venue entrance
|
CCS 2016 Main Conference, Thursday, October 27, 2016
CCS 2016 Proceedings (main conference) – OpenTOC
Track 1cryptographic mechanisms
Lecture Hall A |
Track 2differential privacy / cryptography / attacks
Lecture Hall B |
Track 3web/mobile security
Lecture Hall C |
Track 4secure code and systems
Lecture Hall D |
Track 5Tutorials & Talks
Lecture Hall E |
|
---|---|---|---|---|---|
08.15-09.30 |
Registration & Early Bird Coffee |
||||
09.00/09.30-11.00 |
Session 9AOrder-Revealing and Searchable Encryption
Session Chair: (09.00 – 11.00) |
Session 9BAuthentication
Session Chair: (09.30 – 11.00) |
Session 9CPasswords
Session Chair: (09.30 – 11.00) |
Session 9DInternet security
Session Chair: (09.30 – 11.00) |
|
POPE: Partial Order Preserving Encoding |
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication |
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies |
PIPSEA: A Practical IPsec Gateway on Embedded APUs |
||
11.00-11.30 |
Coffee Break |
||||
11.30-13.00 |
Session 10ASpecialized crypto tools
Session Chair: |
Session 10BCrypto Implementations
Session Chair: |
Session 10CMeasuring security in the wild
Session Chair: |
Session 10DNetwork security I
Session Chair: |
Tutorial |
Function Secret Sharing: Improvements and Extensions |
A Surfeit of SSH Cipher Suites |
Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild |
PhishEye: Live Monitoring of Sandboxed Phishing Kits |
Privacy and Security in the Genomic Era |
|
13.00-14.30 |
Lunch Break |
||||
14.30-16.00 |
Session 11AKey Exchange
Session Chair: |
Session 11BAttacks using a little leakage
Session Chair: |
Session 11CMore attacks
Session Chair: |
Session 11DNetwork security II
Session Chair: |
Tutorial |
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3) |
Generic Attacks on Secure Outsourced Databases |
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations |
Safely Measuring Tor |
Adversarial Data Mining: Big Data Meets Cyber Security |
|
16.00-16.30 |
Coffee Break |
||||
16.30-18.00 |
Session 12ASecure Protocols
Session Chair: |
Session 12BDSA/ECDSA
Session Chair: |
Session 12CEven more attacks
Session Chair: |
Session 12DCensorship Resistance
Session Chair: |
Tutorial |
A Protocol for Privately Reporting Ad Impressions at Scale |
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels |
Android ION Hazard: the Curse of Customizable Memory Management System |
Slitheen: Perfectly imitated decoy routing through traffic replacement |
Adversarial Data Mining: Big Data Meets Cyber Security |
|
18.00-19.00 |
CCS Business MeetingLecture Hall C |
||||
19.10-20.30 |
optional Sightseeing Tour(For ticket holders only!) |
Post-Conference Workshops on Friday, October 28, 2016 (09.00-17.00)
CCSW 2016Open TOC CCSW |
CPS-SPC 2016Open TOC CPS-SPC |
TRUSTED 2016Open TOC TrustED |
FEAST 2016DETAILED PROGRAM |
MIST 2016Open TOC MIST |
SPRO 2016Open TOC SPRO |
Aisec 2016Open TOC AISec |
|
---|---|---|---|---|---|---|---|
07.30-09.00 |
Registration & Early Bird Coffee |
||||||
08.30/09.00-10.30 |
CCSW 109.00-10.30 |
CPS-SPC 108.50-10.30 |
TrustED 109.00-10.30 |
FEAST 108.30-10.30 |
MIST 108.50-10.30 |
SPRO 108.30-10.30 |
AIsec 108.50-10.30 |
10.30-11.00 |
Coffee Break |
||||||
11.00-12.30 |
CCSW 2 |
CPS-SPC 2 |
TrustED 2 |
FEAST 2 |
MIST 2 |
SPRO 2 |
AIsec 2 |
12.30-14.00 |
Lunch Break |
||||||
14.00-15.30 |
CCSW 3 |
CPS-SPC 3 |
TrustED 3 |
FEAST 3 |
MIST 3 |
SPRO 3 |
AIsec 3 |
15.30-16.00 |
Coffee Break |
||||||
16.00-17.30/18.00 |
CCSW 416.00-18.00 |
CPS-SPC 416.00-17.30 |
TrustED 416.00-17.30 |
FEAST 416.00-18.00 |
MIST 416.00-17.30 |
SPRO 416.00-18.00 |
AIsec 416.00-17.45 |