Accepted posters/demos

ACM CCS 2016 Accepted posters & demos

23rd ACM Conference on Computer and Communication Security October 25 – 27, 2016, Hofburg Palace, Vienna, Austria

The following posters and demos were accepted to be presented at CCS 2016:

Accepted posters

A Behavioural Authentication System for Mobile Users
Md Morshedul Islam (University of Calgary) and Reihaneh Safavi-Naini (University of Calgary)

A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation
Katarzyna Kapusta (Telecom ParisTech), Gerard Memmi (Telecom ParisTech) and Hassan Noura (Telecom ParisTech)

Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning
Lingling Fan (East China Normal University), Minhui Xue (East China Normal University and NYU Shanghai), Sen Chen (East China Normal University), Lihua Xu (East China Normal University), Haojin Zhu (Shanghai Jiao Tong University)

An Educational Network Protocol for Covert Channel Analysis Using Patterns
Steffen Wendzel (Fraunhofer FKIE / Worms University of Applied Sciences) and Wojciech Mazurczyk (Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Telecommunications)

Attack on Non-Linear Physical Unclonable Function
Jing Ye (State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences), Yu Hu (State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences) and Xiaowei Li (State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences)

ConcurORAM: High-Throughput Parallel Multi-Client ORAM
Anrin Chakraborti (Stony Brook University) and Radu Sion (Stony Brook University)

DataLair: A Storage Block Device with Plausible Deniability
Anrin Chakraborti (Stony Brook University), Chen Chen (Stony Brook University) and Radu Sion (Stony Brook University)

DroidShield: Protecting User Applications from Normal World Access
Darius Suciu (Stony Brook University) and Radu Sion (Stony Brook University)

Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions
Chia-Mu Yu (National Chung Hsing University)

Fingerprinting Tor Hidden Services
Asya Mitseva (University of Luxembourg), Andriy Panchenko (University of Luxembourg), Fabian Lanze (Huf Hülsbeck & Fürst GmbH & Co. KG), Martin Henze (RWTH Aachen University), Klaus Wehrle (RWTH Aachen University) and Thomas Engel (University of Luxembourg)

I Don’t Want That Content! On the Risks of Exploiting Bitcoin’s Blockchain as a Content Store
Roman Matzutt (RWTH Aachen University), Oliver Hohlfeld (RWTH Aachen University), Martin Henze (RWTH Aachen University), Robin Rawiel (RWTH Aachen University), Jan Henrik Ziegeldorf (RWTH Aachen University) and Klaus Wehrle (RWTH Aachen University)

Identifying Dynamic Data Structures in Malware
Thomas Rupprecht (University of Bamberg), Xi Chen (Vrije Universiteit Amsterdam), David H. White (University of Bamberg), Jan Tobias Mühlberg (KU Leuven), Herbert Bos (Vrije Universiteit Amsterdam) and Gerald Lüttgen (University of Bamberg)

Improved Markov Strength Meters for Passwords
Harshal Tupsamudre (TCS Research), Vijayanand Banahatti (TCS Research) and Sachin Lodha (TCS Research)

Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach
Ignacio Martín (Universidad Carlos III de Madrid), Jose Alberto Hernandez (Universidad Carlos III de Madrid), Sergio de Los Santos (Telefónica Digital Identity & Pivacy) and Antonio Guzmán (Telefónica Digital Identity & Pivacy)

KXRay: Introspecting the Kernel for Rootkit Timing Footprints
Chen Chen (Stony Brook University), Darius Suciu (Stony Brook University) and Radu Sion (Stony Brook University)

Locally Virtualized Environment for Mitigating Ransomware Threat
Manish Shukla (TCS Research), Sutapa Mondal (TCS Research) and Sachin Lodha (TCS Research)

Mapping the Landscape of Large-Scale Vulnerability Notifications
Ben Stock (CISPA, Saarland University), Giancarlo Pellegrino (CISPA, Saarland University),  Christian Rossow (CISPA, Saarland University), Martin Johns (SAP SE) and Michael Backes (CISPA, Saarland University & MPI-SWS)

Phishing Website Detection with a Multiphase Framework to Find Visual Similarity
Omid Asudeh (University of Texas at Arlington) and Matthew Wright (Rochester Institute of Technology)

Privacy Enhanced Secure Location Verification
Md Mamunur Rashid Akand (University of Calgary) and Rei Safavi-Naini (University of Calgary)

Re-Thinking Risks and Rewards for Trusted Third Parties
Jan-Ole Malchow (Freie Universität Berlin), Benjamin Güldenring (Freie Universität Berlin) and Volker Roth (Freie Universität Berlin)

RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications
Yongzhi Wang (Xidian University) and Yulong Shen (Xidian University)

Security Enhanced Administrative Role Based Access Control Models
Rajkumar P.V. (Texas Southern University) and Ravi Sandhu (University of Texas at San Antonio)

(Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data
Pedro Casas (AIT Austrian Institute of Technology), Alessandro D’Alconzo (AIT Austrian Institute of Technology), Giuseppe Settanni (AIT Austrian Institute of Technology), Pierdomenico Fiadino (Eurecat Technology Centre of Catalonia) and Florian Skopik (AIT Austrian Institute of Technology)

Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity
Toshinori Usui (NTT Secure Platform Laboratories), Tomonori Ikuse (NTT Security(Japan)KK), Makoto Iwamura (NTT Secure Platform Laboratories), Takeshi Yada (NTT Secure Platform Laboratories)

The ART of App Compartmentalization
Michael Backes (CISPA, Saarland University & MPI-SWS), Sven Bugiel (CISPA, Saarland University), Jie Huang (CISPA, Saarland University); Oliver Schranz (CISPA, Saarland University)

Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs
Bo Sun (Waseda University), Akinori Fujino (Waseda University) and Tatsuya Mori (Waseda University)

Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Peter Mayer, Stephan Neumann (Technische Universität Darmstadt) and Melanie Volkamer (Technische Universität Darmstadt & Karlstad University)

Towards Exposing Internet of Things: A Roadmap
Vinay Sachidananda (Singapore University of Technology and Design), Jinghui Toh (Singapore University of Technology and Design), Shachar Siboni (Ben-Gurion University of the Negev), Asaf Shabtai (Ben-Gurion University of the Negev) and Yuval Elovici (Singapore University of Technology and Design)

Towards Highly Interactive Honeypots for Industrial Control Systems
Stephan Lau (Freie Universität Berlin), Johannes Klick (Freie Universität Berlin), Stephan Arndt (Freie Universität Berlin) and Volker Roth (Freie Universität Berlin)

Towards Privacy-Preserving Biometric Identification in Cloud Computing
Changhee Hahn (Department of Computer Science and Engineering, Korea University) and Junbeom Hur (Department of Computer Science and Engineering, Korea University)

VUDEC – A Framework for Vulnerability Management in Decentralized Communication Networks
Michael Steinke (Universität der Bundeswehr), Stefan Metzger (Leibniz Supercomputing Centre) and Wolfgang Hommel (Universität der Bundeswehr)

Weighing in eHealth Security – A Security and Privacy Study of Smart Scales
Martin Krämer (University of Edinburgh), David Aspinall (University of Edinburgh) and Maria Wolters (University of Edinburgh)

WiPING: Wi-Fi signal-based PIN Guessing attack Seunghun Cha (Sungkyunkwan University), Jaewoo Park (Sungkyunkwan University), Geumhwan Cho (Sungkyunkwan University), Jun Ho Huh (Honeywell ACS Labs) and Hyoungshick Kim (Sungkyunkwan University)

Accepted demos

Easy Deployment of a Secure Internet Architecture for the 21st Century – How hard can it be to build a secure Internet? Ercan Ucan, Raphael M. Reischuk and Adrian Perrig (ETH Zurich) High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation Toshinori Araki (NEC Corporation), Assaf Barak (Bar-Ilan University), Jun Furukawa (NEC Corporation), Yehuda Lindell (Bar-Ilan University), Ariel Nof (Bar-Ilan University) and Kazuma Ohara (NEC Corporation) Integrating MPC in Big Data Workflows Nikolaj Volgushev (Boston University), Malte Schwarzkopf (MIT CSAIL), Andrei Lapets (Boston University), Mayank Varia (Boston University) and Azer Bestavros (Boston University) OffPAD — Offline Personal Authenticating Device with Applications in Hospitals and e-Banking Denis Migdal (ENSICAEN), Christian Johansen (University of Oslo) and Audun Jøsang (University of Oslo) Starving Permission-Hungry Android Apps Using SecuRank Vincent Taylor (University of Oxford) and Ivan Martinovic (University of Oxford)

General Information

Follow us!


We are happy to announce the 7 tutorials which will be held at CCS 2016.

Call for Papers

The Call for Papers for CCS 2016 is out. Submisson Deadline: May 23, 2016 23:59 UTC-11


We are happy to announce the 14 workshops which will be held in conjunction with CCS 2016.

CCS 2016

CCS 2016 website is up. CCS will be held from October 24 - 28, 2016 in Vienna, Austria at the Hofburg Palace. Read more about Vienna here.

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.