CCS '15- Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Full Citation in the ACM Digital Library
SESSION: Keynote Talks
From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?
Moti Yung
Keynote Talk
Edward W. Felten
SESSION: Session 1A: How Real World Crypto Fails
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
David Adrian
Karthikeyan Bhargavan
Zakir Durumeric
Pierrick Gaudry
Matthew Green
J. Alex Halderman
Nadia Heninger
Drew Springall
Emmanuel Thomé
Luke Valenta
Benjamin VanderSloot
Eric Wustrow
Santiago Zanella-Béguelin
Paul Zimmermann
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards
Carlo Meijer
Roel Verdult
SESSION: Session 1B: MAC OS and iOS Security
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS
Luyi Xing
Xiaolong Bai
Tongxin Li
XiaoFeng Wang
Kai Chen
Xiaojing Liao
Shi-Min Hu
Xinhui Han
iRiS: Vetting Private API Abuse in iOS Applications
Zhui Deng
Brendan Saltaformaggio
Xiangyu Zhang
Dongyan Xu
SESSION: Session 1C: Censorship and Resistance
Seeing through Network-Protocol Obfuscation
Liang Wang
Kevin P. Dyer
Aditya Akella
Thomas Ristenpart
Thomas Shrimpton
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
John Holowczak
Amir Houmansadr
SESSION: Session 2A: Authenticated Encryption
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Viet Tung Hoang
Jonathan Katz
Alex J. Malozemoff
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives
Olivier Pereira
François-Xavier Standaert
Srinivas Vivek
GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte
Shay Gueron
Yehuda Lindell
SESSION: Session 2B: Android and Web Forensics
GUITAR: Piecing Together Android App GUIs from Memory Images
Brendan Saltaformaggio
Rohit Bhatia
Zhongshu Gu
Xiangyu Zhang
Dongyan Xu
WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers
Christopher Neasbitt
Bo Li
Roberto Perdisci
Long Lu
Kapil Singh
Kang Li
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images
Brendan Saltaformaggio
Rohit Bhatia
Zhongshu Gu
Xiangyu Zhang
Dongyan Xu
SESSION: Session 2C: Password Security
Monte Carlo Strength Evaluation: Fast and Reliable Password Checking
Matteo Dell'Amico
Maurizio Filippone
Surpass: System-initiated User-replaceable Passwords
Jun Ho Huh
Seongyeol Oh
Hyoungshick Kim
Konstantin Beznosov
Apurva Mohan
S. Raj Rajagopalan
Optimal Distributed Password Verification
Jan Camenisch
Anja Lehmann
Gregory Neven
SESSION: Session 3A: Using CryptoCurrency
How to Use Bitcoin to Play Decentralized Poker
Ranjit Kumaresan
Tal Moran
Iddo Bentov
Micropayments for Decentralized Currencies
Rafael Pass
abhi shelat
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins
Tim Ruffing
Aniket Kate
Dominique Schröder
Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content
Aggelos Kiayias
Qiang Tang
SESSION: Session 3B: Memory Randomization
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
Stephen J. Crane
Stijn Volckaert
Felix Schuster
Christopher Liebchen
Per Larsen
Lucas Davi
Ahmad-Reza Sadeghi
Thorsten Holz
Bjorn De Sutter
Michael Franz
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads
Adrian Tang
Simha Sethumadhavan
Salvatore Stolfo
Timely Rerandomization for Mitigating Memory Disclosures
David Bigelow
Thomas Hobson
Robert Rudd
William Streilein
Hamed Okhravi
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks
Kangjie Lu
Chengyu Song
Byoungyoung Lee
Simon P. Chung
Taesoo Kim
Wenke Lee
SESSION: Session 3C: Wireless and VoLTE Security
Location-restricted Services Access Control Leveraging Pinpoint Waveforming
Tao Wang
Yao Liu
Qingqi Pei
Tao Hou
SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users
Xiaocong Jin
Jingchao Sun
Rui Zhang
Yanchao Zhang
Insecurity of Voice Solution VoLTE in LTE Mobile Networks
Chi-Yu Li
Guan-Hua Tu
Chunyi Peng
Zengwen Yuan
Yuanjie Li
Songwu Lu
Xinbing Wang
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
Hongil Kim
Dongkwan Kim
Minhee Kwon
Hyungseok Han
Yeongjin Jang
Dongsu Han
Taesoo Kim
Yongdae Kim
SESSION: Session 4A: Applied Crypto
Defeating IMSI Catchers
Fabian van den Broek
Roel Verdult
Joeri de Ruiter
DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles
Aggelos Kiayias
Thomas Zacharias
Bingsheng Zhang
Subversion-Resilient Signature Schemes
Giuseppe Ateniese
Bernardo Magri
Daniele Venturi
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice
Qian Wang
Kui Ren
Guancheng Li
Chenbo Xia
Xiaobing Chen
Zhibo Wang
Qin Zou
SESSION: Session 4B: Software Vulnerabilities
Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks
Qi Alfred Chen
Zhiyun Qian
Yunhan Jack Jia
Yuru Shao
Zhuoqing Morley Mao
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Xiaokui Shu
Danfeng Yao
Naren Ramakrishnan
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel
Wen Xu
Juanru Li
Junliang Shu
Wenbo Yang
Tianyi Xie
Yuanyuan Zhang
Dawu Gu
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
Henning Perl
Sergej Dechand
Matthew Smith
Daniel Arp
Fabian Yamaguchi
Konrad Rieck
Sascha Fahl
Yasemin Acar
SESSION: Session 4C: Assessing Current Defences
UCognito: Private Browsing without Tears
Meng Xu
Yeongjin Jang
Xinyu Xing
Taesoo Kim
Wenke Lee
Security by Any Other Name: On the Effectiveness of Provider Based Email Security
Ian D. Foster
Jon Larson
Max Masich
Alex C. Snoeren
Stefan Savage
Kirill Levchenko
Certified PUP: Abuse in Authenticode Code Signing
Platon Kotzias
Srdjan Matic
Richard Rivera
Juan Caballero
A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings
Ajaya Neupane
Md. Lutfor Rahman
Nitesh Saxena
Leanne Hirshfield
SESSION: Session 5A: Computing on Encrypted Data
Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance
Xiao Shaun Wang
Yan Huang
Yongan Zhao
Haixu Tang
XiaoFeng Wang
Diyue Bu
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng
Seny Kamara
Kobbi Nissim
George Kollios
SESSION: Session 5B: Understanding Android Apps
Towards Automatic Generation of Security-Centric Descriptions for Android Apps
Mu Zhang
Yue Duan
Qian Feng
Heng Yin
AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications
Deguang Kong
Lei Cen
Hongxia Jin
SESSION: Session 5C: Scanning the Web
A Search Engine Backed by Internet-Wide Scanning
Zakir Durumeric
David Adrian
Ariana Mirian
Michael Bailey
J. Alex Halderman
Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence
Mathias Lecuyer
Riley Spahn
Yannis Spiliopolous
Augustin Chaintreau
Roxana Geambasu
Daniel Hsu
SESSION: Session 6A: Garbled Circuits
Fast Garbling of Circuits Under Standard Assumptions
Shay Gueron
Yehuda Lindell
Ariel Nof
Benny Pinkas
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries
Yehuda Lindell
Ben Riva
Fast and Secure Three-party Computation: The Garbled Circuit Approach
Payman Mohassel
Mike Rosulek
Ye Zhang
SESSION: Session 6B: Web Application Security
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications
Divya Muthukumaran
Dan O'Keeffe
Christian Priebe
David Eyers
Brian Shand
Peter Pietzuch
Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications
Oswaldo Olivo
Isil Dillig
Calvin Lin
Inlined Information Flow Monitoring for JavaScript
Andrey Chudnov
David A. Naumann
SESSION: Session 6C: Property-Preserving Encryption
Inference Attacks on Property-Preserving Encrypted Databases
Muhammad Naveed
Seny Kamara
Charles V. Wright
Frequency-Hiding Order-Preserving Encryption
Florian Kerschbaum
Leakage-Abuse Attacks Against Searchable Encryption
David Cash
Paul Grubbs
Jason Perry
Thomas Ristenpart
SESSION: Session 7A: CryptoCurrency
Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions
Andrew Miller
Ahmed Kosba
Jonathan Katz
Elaine Shi
Tampering with the Delivery of Blocks and Transactions in Bitcoin
Arthur Gervais
Hubert Ritzdorf
Ghassan O. Karame
Srdjan Capkun
Demystifying Incentives in the Consensus Computer
Loi Luu
Jason Teutsch
Raghav Kulkarni
Prateek Saxena
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges
Gaby G. Dagher
Benedikt Bünz
Joseph Bonneau
Jeremy Clark
Dan Boneh
SESSION: Session 7B: Analyzing Obfuscated Code
Symbolic Execution of Obfuscated Code
Babak Yadegari
Saumya Debray
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions
Guillaume Bonfante
Jose Fernandez
Jean-Yves Marion
Benjamin Rouxel
Fabrice Sabatier
Aurélien Thierry
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
Jiang Ming
Dongpeng Xu
Li Wang
Dinghao Wu
MalGene: Automatic Extraction of Malware Analysis Evasion Signature
Dhilung Kirat
Giovanni Vigna
SESSION: Session 7C: Online Social Networks
Face/Off: Preventing Privacy Leakage From Photos in Social Networks
Panagiotis Ilia
Iasonas Polakis
Elias Athanasopoulos
Federico Maggi
Sotiris Ioannidis
CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks
Jonghyuk Song
Sangho Lee
Jong Kim
Exploiting Temporal Dynamics in Sybil Defenses
Changchang Liu
Peng Gao
Matthew Wright
Prateek Mittal
Where's Wally?: Precise User Discovery Attacks in Location Proximity Services
Iasonas Polakis
George Argyros
Theofilos Petsios
Suphannee Sivakorn
Angelos D. Keromytis
SESSION: Session 8A: Outsourced Storage
Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward
Vincent Bindschaedler
Muhammad Naveed
Xiaorui Pan
XiaoFeng Wang
Yan Huang
Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound
Xiao Wang
Hubert Chan
Elaine Shi
Constant Communication ORAM with Small Blocksize
Tarik Moataz
Travis Mayberry
Erik-Oliver Blass
Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu
N. Asokan
Benny Pinkas
Transparent Data Deduplication in the Cloud
Frederik Armknecht
Jens-Matthias Bohli
Ghassan O. Karame
Franck Youssef
SESSION: Session 8B: Control Flow Integrity
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity
Isaac Evans
Fan Long
Ulziibayar Otgonbaatar
Howard Shrobe
Martin Rinard
Hamed Okhravi
Stelios Sidiroglou-Douskos
Per-Input Control-Flow Integrity
Ben Niu
Gang Tan
Practical Context-Sensitive CFI
Victor van der Veen
Dennis Andriesse
Enes Göktaş
Ben Gras
Lionel Sambuc
Asia Slowinska
Herbert Bos
Cristiano Giuffrida
CCFI: Cryptographically Enforced Control Flow Integrity
Ali Jose Mashtizadeh
Andrea Bittau
Dan Boneh
David Mazières
Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks
Mauro Conti
Stephen Crane
Lucas Davi
Michael Franz
Per Larsen
Marco Negro
Christopher Liebchen
Mohaned Qunaibit
Ahmad-Reza Sadeghi
SESSION: Session 8C: Enhancing Trust
SEDA: Scalable Embedded Device Attestation
N. Asokan
Ferdinand Brasser
Ahmad Ibrahim
Ahmad-Reza Sadeghi
Matthias Schunter
Gene Tsudik
Christian Wachsmann
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
Trusted Display on Untrusted Commodity Platforms
Miao Yu
Virgil D. Gligor
Zongwei Zhou
PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks
Yasser Shoukry
Paul Martin
Yair Yona
Suhas Diggavi
Mani Srivastava
Clean Application Compartmentalization with SOAAP
Khilan Gudka
Robert N.M. Watson
Jonathan Anderson
David Chisnall
Brooks Davis
Ben Laurie
Ilias Marinos
Peter G. Neumann
Alex Richardson
SESSION: Session 9A: Coding, Commitments, and Cipher Design
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)
Ari Juels
James Kelley
Roberto Tamassia
Nikos Triandopoulos
Fast Non-Malleable Commitments
Hai Brenner
Vipul Goyal
Silas Richelson
Alon Rosen
Margarita Vald
White-Box Cryptography Revisited: Space-Hard Ciphers
Andrey Bogdanov
Takanori Isobe
Lattice Basis Reduction Attack against Physically Unclonable Functions
Fatemeh Ganji
Juliane Krämer
Jean-Pierre Seifert
Shahin Tajik
SESSION: Session 9B: Security-Related Ecosystems
Drops for Stuff: An Analysis of Reshipping Mule Scams
Shuang Hao
Kevin Borgolte
Nick Nikiforakis
Gianluca Stringhini
Manuel Egele
Michael Eubanks
Brian Krebs
Giovanni Vigna
Android Root and its Providers: A Double-Edged Sword
Hang Zhang
Dongdong She
Zhiyun Qian
An Empirical Study of Web Vulnerability Discovery Ecosystems
Mingyi Zhao
Jens Grossklags
Peng Liu
The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics
Bum Jun Kwon
Jayanta Mondal
Jiyong Jang
Leyla Bilge
Tudor Dumitras
SESSION: Session 9C: Formal Methods Meet Cryptography
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits
Omar Chowdhury
Deepak Garg
Limin Jia
Anupam Datta
Automated Symbolic Proofs of Observational Equivalence
David Basin
Jannik Dreier
Ralf Sasse
Automated Proofs of Pairing-Based Cryptography
Gilles Barthe
Benjamin Grégoire
Benedikt Schmidt
Moat: Verifying Confidentiality of Enclave Programs
Rohit Sinha
Sriram Rajamani
Sanjit Seshia
Kapil Vaswani
SESSION: Session 10A: Key Exchange: Theory and Practice
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
Tibor Jager
Jörg Schwenk
Juraj Somorovsky
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
Benjamin Dowling
Marc Fischlin
Felix Günther
Douglas Stebila
Deniable Key Exchanges for Secure Messaging
Nik Unger
Ian Goldberg
TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity
Sven Schäge
SESSION: Session 10B: Mobile Device Attacks
From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App
Heqing Huang
Sencun Zhu
Kai Chen
Peng Liu
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References
Yousra Aafer
Nan Zhang
Zhongwen Zhang
Xiao Zhang
Kai Chen
XiaoFeng Wang
Xiaoyong Zhou
Wenliang Du
Michael Grace
Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations
Yangyi Chen
Tongxin Li
XiaoFeng Wang
Kai Chen
Xinhui Han
When Good Becomes Evil: Keystroke Inference with Smartwatch
Xiangyu Liu
Zhe Zhou
Wenrui Diao
Zhou Li
Kehuan Zhang
SESSION: Session 10C: Statistical Privacy
Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies
Florian Tramèr
Zhicong Huang
Jean-Pierre Hubaux
Erman Ayday
Protecting Locations with Differential Privacy under Temporal Correlations
Yonghui Xiao
Li Xiong
Privacy-Preserving Deep Learning
Reza Shokri
Vitaly Shmatikov
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
Matt Fredrikson
Somesh Jha
Thomas Ristenpart
SESSION: Session 11A: Privacy-Preserving Authentication
Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication
Vireshwar Kumar
He Li
Jung-Min (Jerry) Park
Kaigui Bian
Yaling Yang
Authenticating Privately over Public Wi-Fi Hotspots
Aldo Cassola
Erik-Oliver Blass
Guevara Noubir
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web
Daniel Fett
Ralf Küesters
Guido Schmitz
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
Joseph A. Akinyele
Christina Garman
Susan Hohenberger
SESSION: Session 11B: Web Attacks
The Clock is Still Ticking: Timing Attacks in the Modern Web
Tom Van Goethem
Wouter Joosen
Nick Nikiforakis
Cross-Site Search Attacks
Nethanel Gelernter
Amir Herzberg
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications
Yossef Oren
Vasileios P. Kemerlis
Simha Sethumadhavan
Angelos D. Keromytis
From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting
Ben Stock
Stephan Pfistner
Bernd Kaiser
Sebastian Lekies
Martin Johns
SESSION: Session 11C: Surveillance and Countermeasures
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
Mihir Bellare
Joseph Jaeger
Daniel Kane
HORNET: High-speed Onion Routing at the Network Layer
Chen Chen
Daniele E. Asoni
David Barrera
George Danezis
Adrain Perrig
CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services
Srdjan Matic
Platon Kotzias
Juan Caballero
(Un)linkable Pseudonyms for Governmental Databases
Jan Camenisch
Anja Lehmann
SESSION: Session 12A: Outsourcing Data and Computation
IntegriDB: Verifiable SQL for Outsourced Databases
Yupeng Zhang
Jonathan Katz
Charalampos Papamanthou
A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols
Peeter Laud
Jaak Randmets
Automated Synthesis of Optimized Circuits for Secure Computation
Daniel Demmler
Ghada Dessouky
Farinaz Koushanfar
Ahmad-Reza Sadeghi
Thomas Schneider
Shaza Zeitouni
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data
Dario Catalano
Dario Fiore
SESSION: Session 12B: Cloud, Web, and Authentication
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers
Thomas Vissers
Tom Van Goethem
Wouter Joosen
Nick Nikiforakis
The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript
Pratik Soni
Enrico Budianto
Prateek Saxena
Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication
Yan Li
Yingjiu Li
Qiang Yan
Hancong Kong
Robert H. Deng
SESSION: Session 12C: Side Channels
Observing and Preventing Leakage in MapReduce
Olga Ohrimenko
Manuel Costa
Cédric Fournet
Christos Gkantsidis
Markulf Kohlweiss
Divya Sharma
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms
Qiuyu Xiao
Michael K. Reiter
Yinqian Zhang
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration
Soo-Jin Moon
Vyas Sekar
Michael K. Reiter
Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation
Yutao Liu
Tianyu Zhou
Kexin Chen
Haibo Chen
Yubin Xia
POSTER SESSION: Demo & Poster Abstracts
DEMO: Action Recommendation for Cyber Resilience
Luke Rodriguez
Darren Curtis
Sutanay Choudhury
Kiri Oler
Peter Nordquist
Pin-Yu Chen
Indrajit Ray
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue
Ruba Abu-Salma
M. Angela Sasse
Joseph Bonneau
Matthew Smith
POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor
Michael Backes
Simon Koch
Sebastian Meiser
Esfandiar Mohammadi
Christian Rossow
POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)
Michael Backes
Oliver Schranz
Philipp von Styp-Rekowsky
POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol
Peixin Chen
Xiaofeng Wang
Yilun Wu
Jinshu Su
Huan Zhou
POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature
Manh Huynh
Phuc Nguyen
Marco Gruteser
Tam Vu
POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small Satellites
Samuel Jackson
Scott Kerlin
Jeremy Straub
POSTER: A Password-based Authentication by Splitting Roles of User Interface
JungSeung Lee
Han Park
GyeongYong Bang
JooSeok Song
POSTER: Page Table Manipulation Attack
JungSeung Lee
HyoungMin Ham
InHwan Kim
JooSeok Song
POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use
Depeng Li
Sachin Shetty
POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations
Fengjun Li
Xin Fu
Bo Luo
POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy
Xing Liu
Wei Wang
Jiqiang Liu
POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities
Tianyue Luo
Chen Ni
Qing Han
Mutian Yang
Jingzheng Wu
Yanjun Wu
POSTER: Using Unit Testing to Detect Sanitization Flaws
Mahmoud Mohammadi
Bill Chu
Heather Ritcher Lipford
POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations
Subhojeet Mukherjee
Sachini Weerawardhana
Chancey Dunn
Indrajit Ray
Adele Howe
POSTER: Dynamic Labelling for Analyzing Security Protocols
N.V. Narendra Kumar
R.K. Shyamasundar
POSTER: Computations on Encrypted Data in the Internet of Things Applications
Laurynas Riliskis
Hossein Shafagh
Philip Levis
POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains
Toshiki Shibahara
Takeshi Yagi
Mitsuaki Akiyama
Yuta Takata
Takeshi Yada
POSTER: WinOver Enterprise Dark Data
Manish Shukla
Sumesh Manjunath
Rohit Saxena
Sutapa Mondal
Sachin Lodha
POSTER: A Logic Based Network Forensics Model for Evidence Analysis
Anoop Singhal
Changwei Liu
Duminda Wijesekara
POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications
John Sonchack
Adam J. Aviv
Eric Keller
Jonathan M. Smith
POSTER: Blackboard-Based Electronic Warfare System
Jeremy Straub
POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity
Lihua Wang
Takuya Hayashi
Sachiko Kanamori
Atsushi Waseda
Ryo Nojima
Shiho Moriai
POSTER: Pseudonymizing Client as a Privacy-Preserving Service: A Case Study of CDN
Zheng Wang
POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application
Jingzheng Wu
Yanjun Wu
Mutian Yang
Zhifei Wu
Tianyue Luo
Yongji Wang
POSTER: Lightweight Streaming Authenticated Data Structures
Chia-Mu Yu
TUTORIAL SESSION: Tutorial Abstracts
Fraud Detection through Graph-Based User Behavior Modeling
Alex Beutel
Leman Akoglu
Christos Faloutsos
Program Analysis for Mobile Application Integrity and Privacy Enforcement
Marco Pistoia
Introduction to Cryptocurrencies
Stefan Dziembowski
WORKSHOP SESSION: Workshop Summaries
Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security
Christos Dimitrakakis
Aikaterini Mitrokotsa
Arunesh Sinha
CCSW 2015: The 7th ACM Cloud Computing Security Workshop
Florian Kerschbaum
Cristina Nita-Rotaru
Indrajit Ray
First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions
Roshan K. Thomas
Alvaro A. Cardenas
Rakesh B. Bobba
MIST 2015: 7th International Workshop on Managing Insider Security Threats
Ilsun You
Elisa Bertino
MTD 2015: Second ACM Workshop on Moving Target Defense
George Cybenko
Dijiang Huang
SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense
Ehab Al-Shaer
Christopher Oehmen
Mohammad Ashiqur Rahman
SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
Glenn Wurster
David Lie
Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015)
Jorge Guajardo
Stefan Katzenbeisser
WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security
Tomas Sander
Moti Yung
WPES 2015: The 14th Workshop on Privacy in the Electronic Society
Nicholas Hopper
Rob Jansen