CCS '16- Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Full Citation in the ACM Digital Library
SESSION: Keynote
Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic
Martin E. Hellman
SESSION: Paper Session 1A: Blockchain I
On the Security and Performance of Proof of Work Blockchains
Arthur Gervais
Ghassan O. Karame
Karl Wüst
Vasileios Glykantzis
Hubert Ritzdorf
Srdjan Capkun
A Secure Sharding Protocol For Open Blockchains
Loi Luu
Viswesh Narayanan
Chaodong Zheng
Kunal Baweja
Seth Gilbert
Prateek Saxena
The Honey Badger of BFT Protocols
Andrew Miller
Yu Xia
Kyle Croman
Elaine Shi
Dawn Song
SESSION: Paper Session 1B: Differential Privacy
Differential Privacy as a Mutual Information Constraint
Paul Cuff
Lanqing Yu
Advanced Probabilistic Couplings for Differential Privacy
Gilles Barthe
Noémie Fong
Marco Gaboardi
Benjamin Grégoire
Justin Hsu
Pierre-Yves Strub
Differentially Private Bayesian Programming
Gilles Barthe
Gian Pietro Farina
Marco Gaboardi
Emilio Jesus Gallego Arias
Andy Gordon
Justin Hsu
Pierre-Yves Strub
SESSION: Paper Session 1C: Android Security
The Misuse of Android Unix Domain Sockets and Security Implications
Yuru Shao
Jason Ott
Yunhan Jack Jia
Zhiyun Qian
Z. Morley Mao
Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous Callback
Kai Wang
Yuqing Zhang
Peng Liu
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android
Guliz Seray Tuncay
Soteris Demetriou
Carl A. Gunter
SESSION: Paper Session 1D: Hardware Protection
Strong Non-Interference and Type-Directed Higher-Order Masking
Gilles Barthe
Sonia Belaïd
François Dupressoir
Pierre-Alain Fouque
Benjamin Grégoire
Pierre-Yves Strub
Rébecca Zucchini
MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection
Yuanwen Huang
Swarup Bhunia
Prabhat Mishra
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
Stefan Dziembowski
Sebastian Faust
François-Xavier Standaert
SESSION: Paper Session 2A: Blockchain II
On the Instability of Bitcoin Without the Block Reward
Miles Carlsten
Harry Kalodner
S. Matthew Weinberg
Arvind Narayanan
Transparency Overlays and Applications
Melissa Chase
Sarah Meiklejohn
SESSION: Paper Session 2B: Differentially Private Systems I
EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation
Yilin Shen
Hongxia Jin
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy
Zhan Qin
Yin Yang
Ting Yu
Issa Khalil
Xiaokui Xiao
Kui Ren
SESSION: Paper Session 2C: Access Control
AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems
Talia Ringer
Dan Grossman
Franziska Roesner
Mix&Slice: Efficient Access Revocation in the Cloud
Enrico Bacis
Sabrina De Capitani di Vimercati
Sara Foresti
Stefano Paraboschi
Marco Rosa
Pierangela Samarati
SESSION: Paper Session 2D: Security and Persistence
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency
Isaac Sheff
Tom Magrino
Jed Liu
Andrew C. Myers
Robbert van Renesse
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices
Dave (Jing) Tian
Adam Bates
Kevin R.B. Butler
Raju Rangaswami
SESSION: Paper Session 3A: Smart Contracts
Making Smart Contracts Smarter
Loi Luu
Duc-Hiep Chu
Hrishi Olickel
Prateek Saxena
Aquinas Hobor
Town Crier: An Authenticated Data Feed for Smart Contracts
Fan Zhang
Ethan Cecchetti
Kyle Croman
Ari Juels
Elaine Shi
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
Ari Juels
Ahmed Kosba
Elaine Shi
SESSION: Paper Session 3B: Differentially Private Systems II
DPSense: Differentially Private Crowdsourced Spectrum Sensing
Xiaocong Jin
Rui Zhang
Yimin Chen
Tao Li
Yanchao Zhang
Deep Learning with Differential Privacy
Martin Abadi
Andy Chu
Ian Goodfellow
H. Brendan McMahan
Ilya Mironov
Kunal Talwar
Li Zhang
Membership Privacy in MicroRNA-based Studies
Michael Backes
Pascal Berrang
Mathias Humbert
Praveen Manoharan
SESSION: Paper Session 3C: Mobile Software Analysis
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime
Mingshen Sun
Tao Wei
John C.S. Lui
Statistical Deobfuscation of Android Applications
Benjamin Bichsel
Veselin Raychev
Petar Tsankov
Martin Vechev
Reliable Third-Party Library Detection in Android and its Security Applications
Michael Backes
Sven Bugiel
Erik Derr
SESSION: Paper Session 3D: Kernel Memory Security
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
Daniel Gruss
Clémentine Maurice
Anders Fogh
Moritz Lipp
Stefan Mangard
Breaking Kernel Address Space Layout Randomization with Intel TSX
Yeongjin Jang
Sangho Lee
Taesoo Kim
Enforcing Least Privilege Memory Views for Multithreaded Applications
Terry Ching-Hsiang Hsu
Kevin Hoffman
Patrick Eugster
Mathias Payer
SESSION: Paper Session 4A: Secure MPC I
Improvements to Secure Computation with Penalties
Ranjit Kumaresan
Vinod Vaikuntanathan
Prashant Nalini Vasudevan
Amortizing Secure Computation with Penalties
Ranjit Kumaresan
Iddo Bentov
MPC-Friendly Symmetric Key Primitives
Lorenzo Grassi
Christian Rechberger
Dragos Rotaru
Peter Scholl
Nigel P. Smart
SESSION: Paper Session 4B: Attacks on Ciphers
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption
Mihir Bellare
Viet Tung Hoang
Stefano Tessaro
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
Karthikeyan Bhargavan
Gaëtan Leurent
A Systematic Analysis of the Juniper Dual EC Incident
Stephen Checkoway
Jacob Maskiewicz
Christina Garman
Joshua Fried
Shaanan Cohney
Matthew Green
Nadia Heninger
Ralf-Philipp Weinmann
Eric Rescorla
Hovav Shacham
SESSION: Paper Session 4C: Big Data Meets Security
Scalable Graph-based Bug Search for Firmware Images
Qian Feng
Rundong Zhou
Chengcheng Xu
Yao Cheng
Brian Testa
Heng Yin
SmartWalk: Enhancing Social Network Security via Adaptive Random Walks
Yushan Liu
Shouling Ji
Prateek Mittal
High Fidelity Data Reduction for Big Data Security Dependency Analyses
Zhang Xu
Zhenyu Wu
Zhichun Li
Kangkook Jee
Junghwan Rhee
Xusheng Xiao
Fengyuan Xu
Haining Wang
Guofei Jiang
SESSION: Paper Session 4D: Types and Memory Safety
TypeSan: Practical Type Confusion Detection
Istvan Haller
Yuseok Jeon
Hui Peng
Mathias Payer
Cristiano Giuffrida
Herbert Bos
Erik van der Kouwe
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
Jun Xu
Dongliang Mu
Ping Chen
Xinyu Xing
Pei Wang
Peng Liu
Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms
Christian Wressnegger
Fabian Yamaguchi
Alwin Maier
Konrad Rieck
SESSION: Paper Session 5A: Secure MPC II
Alternative Implementations of Secure Real Numbers
Vassil Dimitrov
Liisi Kerik
Toomas Krips
Jaak Randmets
Jan Willemson
Garbling Gadgets for Boolean and Arithmetic Circuits
Marshall Ball
Tal Malkin
Mike Rosulek
Optimizing Semi-Honest Secure Multiparty Computation for the Internet
Aner Ben-Efraim
Yehuda Lindell
Eran Omri
SESSION: Paper Session 5B: Physically Based Authentication
MEMS Gyroscopes as Physical Unclonable Functions
Oliver Willers
Christopher Huth
Jorge Guajardo
Helmut Seidel
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols
Tianhao Wang
Huangyi Ge
Omar Chowdhury
Hemanta K. Maji
Ninghui Li
Instant and Robust Authentication and Key Agreement among Mobile Devices
Wei Xi
Chen Qian
Jinsong Han
Kun Zhao
Sheng Zhong
Xiang-Yang Li
Jizhong Zhao
SESSION: Paper Session 5C: Web Security
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem
Frank Cangialosi
Taejoong Chung
David Choffnes
Dave Levin
Bruce M. Maggs
Alan Mislove
Christo Wilson
Chainsaw: Chained Automated Workflow-based Exploit Generation
Abeer Alhuzali
Birhanu Eshete
Rigel Gjomemo
V.N. Venkatakrishnan
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites
Xiang Pan
Yinzhi Cao
Shuangping Liu
Yu Zhou
Yan Chen
Tingzhe Zhou
SESSION: Paper Session 5D: Security Bug Finding
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior
Elissa M. Redmiles
Sean Kross
Michelle L. Mazurek
Practical Detection of Entropy Loss in Pseudo-Random Number Generators
Felix Dörre
Vladimir Klebanov
Build It, Break It, Fix It: Contesting Secure Development
Andrew Ruef
Michael Hicks
James Parker
Dave Levin
Michelle L. Mazurek
Piotr Mardziel
SESSION: Paper Session 6A: Phone Security using Formal Methods
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Luke Deshotels
Razvan Deaconescu
Mihai Chiroiu
Lucas Davi
William Enck
Ahmad-Reza Sadeghi
Computational Soundness for Dalvik Bytecode
Michael Backes
Robert Künnemann
Esfandiar Mohammadi
SESSION: Paper Session 6B: Attestation
SANA: Secure and Scalable Aggregate Network Attestation
Moreno Ambrosin
Mauro Conti
Ahmad Ibrahim
Gregory Neven
Ahmad-Reza Sadeghi
Matthias Schunter
C-FLAT: Control-Flow Attestation for Embedded Systems Software
Tigist Abera
N. Asokan
Lucas Davi
Jan-Erik Ekberg
Thomas Nyman
Andrew Paverd
Ahmad-Reza Sadeghi
Gene Tsudik
SESSION: Paper Session 6C: Mine your Literature
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence
Xiaojing Liao
Kan Yuan
XiaoFeng Wang
Zhou Li
Luyi Xing
Raheem Beyah
FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature
Ziyun Zhu
Tudor Dumitras
SESSION: Paper Session 6D: Security Studies
An In-Depth Study of More Than Ten Years of Java Exploitation
Philipp Holzinger
Stefan Triller
Alexandre Bartel
Eric Bodden
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Yaoqi Jia
Zheng Leong Chua
Hong Hu
Shuo Chen
Prateek Saxena
Zhenkai Liang
SESSION: Paper Session 7A: Secure MPC III
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
Toshinori Araki
Jun Furukawa
Yehuda Lindell
Ariel Nof
Kazuma Ohara
Efficient Batched Oblivious PRF with Applications to Private Set Intersection
Vladimir Kolesnikov
Ranjit Kumaresan
Mike Rosulek
Ni Trieu
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer
Marcel Keller
Emmanuela Orsini
Peter Scholl
SESSION: Paper Session 7B: Side-Channel Attacks
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations
Dmitry Evtyushkin
Dmitry Ponomarev
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices
Xiaokuan Zhang
Yuan Xiao
Yinqian Zhang
A Software Approach to Defeating Side Channels in Last-Level Caches
Ziqiao Zhou
Michael K. Reiter
Yinqian Zhang
SESSION: Paper Session 7C: Acoustic Attacks
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets
Avesta Hojjati
Anku Adhikari
Katarina Struckmann
Edward Chou
Thi Ngoc Tho Nguyen
Kushagra Madan
Marianne S. Winslett
Carl A. Gunter
William P. King
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers
Chen Song
Feng Lin
Zhongjie Ba
Kui Ren
Chi Zhou
Wenyao Xu
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio
Babins Shrestha
Maliheh Shirvanian
Prakash Shrestha
Nitesh Saxena
SESSION: Paper Session 7D: Protection Across Executions
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages
Kangjie Lu
Chengyu Song
Taesoo Kim
Wenke Lee
iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft
Tao Li
Yimin Chen
Jingchao Sun
Xiaocong Jin
Yanchao Zhang
Hypnoguard: Protecting Secrets across Sleep-wake Cycles
Lianying Zhao
Mohammad Mannan
SESSION: Paper Session 8A: Lattices and Obfuscation
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
Kevin Lewi
Alex J. Malozemoff
Daniel Apon
Brent Carmer
Adam Foltzer
Daniel Wagner
David W. Archer
Dan Boneh
Jonathan Katz
Mariana Raykova
Λολ: Functional Lattice Cryptography
Eric Crockett
Chris Peikert
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
Joppe Bos
Craig Costello
Leo Ducas
Ilya Mironov
Michael Naehrig
Valeria Nikolaenko
Ananth Raghunathan
Douglas Stebila
SESSION: Paper Session 8B: Attacks and Defenses
On Code Execution Tracking via Power Side-Channel
Yannan Liu
Lingxiao Wei
Zhe Zhou
Kehuan Zhang
Wenyuan Xu
Qiang Xu
Coverage-based Greybox Fuzzing as Markov Chain
Marcel Böhme
Van-Thuan Pham
Abhik Roychoudhury
Error Handling of In-vehicle Networks Makes Them Vulnerable
Kyong-Tak Cho
Kang G. Shin
SESSION: Paper Session 8C: Phone Security
Using Reflexive Eye Movements for Fast Challenge-Response Authentication
Ivo Sluganovic
Marc Roeschlin
Kasper B. Rasmussen
Ivan Martinovic
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
Mengyuan Li
Yan Meng
Junyi Liu
Haojin Zhu
Xiaohui Liang
Yao Liu
Na Ruan
VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones
Linghan Zhang
Sheng Tan
Jie Yang
Yingying Chen
SESSION: Paper Session 8D: Infrastructure Attacks
Limiting the Impact of Stealthy Attacks on Industrial Control Systems
David I. Urbina
Jairo A. Giraldo
Alvaro A. Cardenas
Nils Ole Tippenhauer
Junia Valente
Mustafa Faisal
Justin Ruths
Richard Candell
Henrik Sandberg
Over-The-Top Bypass: Study of a Recent Telephony Fraud
Merve Sahin
Aurélien Francillon
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks
Guan-Hua Tu
Chi-Yu Li
Chunyi Peng
Yuanjie Li
Songwu Lu
SESSION: Paper Session 9A: Order-Revealing and Searchable Encryption
POPE: Partial Order Preserving Encoding
Daniel S. Roche
Daniel Apon
Seung Geol Choi
Arkady Yerukhimovich
∑oφoς: Forward Secure Searchable Encryption
Raphael Bost
What Else is Revealed by Order-Revealing Encryption?
F. Betül Durak
Thomas M. DuBuisson
David Cash
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
Kevin Lewi
David J. Wu
SESSION: Paper Session 9B: Authentication
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication
Zhenfeng Zhang
Kang Yang
Xuexian Hu
Yuchen Wang
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments
Jonas Schneider
Nils Fleischhacker
Dominique Schröder
Michael Backes
A Comprehensive Formal Security Analysis of OAuth 2.0
Daniel Fett
Ralf Küsters
Guido Schmitz
SESSION: Paper Session 9C: Passwords
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies
Weining Yang
Ninghui Li
Omar Chowdhury
Aiping Xiong
Robert W. Proctor
On the Security of Cracking-Resistant Password Vaults
Maximilian Golla
Benedict Beuscher
Markus Dürmuth
Targeted Online Password Guessing: An Underestimated Threat
Ding Wang
Zijian Zhang
Ping Wang
Jeff Yan
Xinyi Huang
SESSION: Paper Session 9D: Internet Security
PIPSEA: A Practical IPsec Gateway on Embedded APUs
Jungho Park
Wooken Jung
Gangwon Jo
Ilkoo Lee
Jaejin Lee
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet
Zhuotao Liu
Hao Jin
Yih-Chun Hu
Michael Bailey
Protecting Insecure Communications with Topology-aware Network Tunnels
Georgios Kontaxis
Angelos D. Keromytis
SESSION: Paper Session 10A: Specialized Crypto Tools
Function Secret Sharing: Improvements and Extensions
Elette Boyle
Niv Gilboa
Yuval Ishai
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
Dario Fiore
Cédric Fournet
Esha Ghosh
Markulf Kohlweiss
Olga Ohrimenko
Bryan Parno
Practical Non-Malleable Codes from l-more Extractable Hash Functions
Aggelos Kiayias
Feng-Hao Liu
Yiannis Tselekounis
SESSION: Paper Session 10B: Crypto Implementations
A Surfeit of SSH Cipher Suites
Martin R. Albrecht
Jean Paul Degabriele
Torben Brandt Hansen
Kenneth G. Paterson
Systematic Fuzzing and Testing of TLS Libraries
Juraj Somorovsky
Attacking OpenSSL Implementation of ECDSA with a Few Signatures
Shuqin Fan
Wenbo Wang
Qingfeng Cheng
SESSION: Paper Session 10C: Measuring Security in the Wild
Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the Wild
Stefano Calzavara
Alvise Rabitti
Michele Bugliesi
CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy
Lukas Weichselbaum
Michele Spagnuolo
Sebastian Lekies
Artur Janc
Online Tracking: A 1-million-site Measurement and Analysis
Steven Englehardt
Arvind Narayanan
SESSION: Paper Session 10D: Network Security I
PhishEye: Live Monitoring of Sandboxed Phishing Kits
Xiao Han
Nizar Kheir
Davide Balzarotti
All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS Records
Daiping Liu
Shuai Hao
Haining Wang
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks
Johannes Krupp
Michael Backes
Christian Rossow
SESSION: Paper Session 11A: Key Exchange
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
Hugo Krawczyk
Attribute-based Key Exchange with General Policies
Vladimir Kolesnikov
Hugo Krawczyk
Yehuda Lindell
Alex Malozemoff
Tal Rabin
Identity-Concealed Authenticated Encryption and Key Exchange
Yunlei Zhao
SESSION: Paper Session 11B: Attacks using a Little Leakage
Generic Attacks on Secure Outsourced Databases
Georgios Kellaris
George Kollios
Kobbi Nissim
Adam O'Neill
The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption
David Pouliot
Charles V. Wright
Breaking Web Applications Built On Top of Encrypted Data
Paul Grubbs
Richard McPherson
Muhammad Naveed
Thomas Ristenpart
Vitaly Shmatikov
SESSION: Paper Session 11C: More Attacks
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations
Jianjun Chen
Jian Jiang
Haixin Duan
Nicholas Weaver
Tao Wan
Vern Paxson
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
Mahmood Sharif
Sruti Bhagavatula
Lujo Bauer
Michael K. Reiter
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service
Xiaojing Liao
Sumayah Alrwais
Kan Yuan
Luyi Xing
XiaoFeng Wang
Shuang Hao
Raheem Beyah
SESSION: Paper Session 11D: Network Security II
Safely Measuring Tor
Rob Jansen
Aaron Johnson
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Shuang Hao
Alex Kantchelian
Brad Miller
Vern Paxson
Nick Feamster
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks
Yunlong Mao
Yuan Zhang
Sheng Zhong
SESSION: Paper Session 12A: Secure Protocols
A Protocol for Privately Reporting Ad Impressions at Scale
Matthew Green
Watson Ladd
Ian Miers
Secure Stable Matching at Scale
Jack Doerner
David Evans
abhi shelat
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme
Pyrros Chaidos
Véronique Cortier
Georg Fuchsbauer
David Galindo
SESSION: Paper Session 12B: DSA/ECDSA
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
Yuval Yarom
"Make Sure DSA Signing Exponentiations Really are Constant-Time"
Cesar Pereida García
Billy Bob Brumley
Yuval Yarom
On the Provable Security of (EC)DSA Signatures
Manuel Fersch
Eike Kiltz
Bertram Poettering
SESSION: Paper Session 12C: Even more Attacks
Android ION Hazard: the Curse of Customizable Memory Management System
Hang Zhang
Dongdong She
Zhiyun Qian
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
Victor van der Veen
Yanick Fratantonio
Martina Lindorfer
Daniel Gruss
Clementine Maurice
Giovanni Vigna
Herbert Bos
Kaveh Razavi
Cristiano Giuffrida
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning
George Argyros
Ioannis Stais
Suman Jana
Angelos D. Keromytis
Aggelos Kiayias
SESSION: Paper Session 12D: Censorship Resistance
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement
Cecylia Bocovich
Ian Goldberg
Practical Censorship Evasion Leveraging Content Delivery Networks
Hadi Zolfaghari
Amir Houmansadr
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory
Milad Nasr
Amir Houmansadr
POSTER SESSION: Posters
POSTER: An Educational Network Protocol for Covert Channel Analysis Using Patterns
Steffen Wendzel
Wojciech Mazurczyk
POSTER: A Behavioural Authentication System for Mobile Users
Md Morshedul Islam
Reihaneh Safavi-Naini
POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation
Katarzyna Kapusta
Gerard Memmi
Hassan Noura
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning
Lingling Fan
Minhui Xue
Sen Chen
Lihua Xu
Haojin Zhu
POSTER: Attack on Non-Linear Physical Unclonable Function
Jing Ye
Yu Hu
Xiaowei Li
POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAM
Anrin Chakraborti
Radu Sion
POSTER: DataLair: A Storage Block Device with Plausible Deniability
Anrin Chakraborti
Chen Chen
Radu Sion
POSTER: DroidShield: Protecting User Applications from Normal World Access
Darius Suciu
Radu Sion
POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions
Chia-Mu Yu
POSTER: Fingerprinting Tor Hidden Services
Asya Mitseva
Andriy Panchenko
Fabian Lanze
Martin Henze
Klaus Wehrle
Thomas Engel
POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store
Roman Matzutt
Oliver Hohlfeld
Martin Henze
Robin Rawiel
Jan Henrik Ziegeldorf
Klaus Wehrle
POSTER: Identifying Dynamic Data Structures in Malware
Thomas Rupprecht
Xi Chen
David H. White
Jan Tobias Mühlberg
Herbert Bos
Gerald Lüttgen
POSTER: Improved Markov Strength Meters for Passwords
Harshal Tupsamudre
Vijayanand Banahatti
Sachin Lodha
POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach
Ignacio Martín
José Alberto Hernández
Sergio de los Santos
Antonio Guzmán
POSTER: KXRay: Introspecting the Kernel for Rootkit Timing Footprints
Chen Chen
Darius Suciu
Radu Sion
POSTER: Locally Virtualized Environment for Mitigating Ransomware Threat
Manish Shukla
Sutapa Mondal
Sachin Lodha
POSTER: Mapping the Landscape of Large-Scale Vulnerability Notifications
Ben Stock
Giancarlo Pellegrino
Christian Rossow
Martin Johns
Michael Backes
POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity
Omid Asudeh
Mathew Wright
POSTER: Privacy Enhanced Secure Location Verification
Md Mamunur Rashid Akand
Reihaneh Safavi-Naini
POSTER: Re-Thinking Risks and Rewards for Trusted Third Parties
Jan-Ole Malchow
Benjamin Güldenring
Volker Roth
POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications
Yongzhi Wang
Yulong Shen
POSTER: Security Enhanced Administrative Role Based Access Control Models
Rajkumar P.V.
Ravi Sandhu
POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data
Pedro Casas
Alessandro D'Alconzo
Giuseppe Settanni
Pierdomenico Fiadino
Florian Skopik
POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity
Toshinori Usui
Tomonori Ikuse
Makoto Iwamura
Takeshi Yada
POSTER: The ART of App Compartmentalization
Michael Backes
Sven Bugiel
Jie Huang
Oliver Schranz
POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs
Bo Sun
Akinori Fujino
Tatsuya Mori
POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes
Peter Mayer
Stephan Neumann
Melanie Volkamer
POSTER: Towards Exposing Internet of Things: A Roadmap
Vinay Sachidananda
Jinghui Toh
Shachar Siboni
Asaf Shabtai
Yuval Elovici
POSTER: Towards Highly Interactive Honeypots for Industrial Control Systems
Stephan Lau
Johannes Klick
Stephan Arndt
Volker Roth
POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing
Changhee Hahn
Junbeom Hur
POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication Networks
Michael Steinke
Stefan Metzger
Wolfgang Hommel
POSTER: Weighing in eHealth Security
Martin Krämer
David Aspinall
Maria Wolters
POSTER: WiPING: Wi-Fi signal-based PIN Guessing attack
Seunghun Cha
Jaewoo Park
Geumhwan Cho
Jun Ho Huh
Hyoungshick Kim
DEMONSTRATION SESSION: Demonstrations
DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet?
Ercan Ucan
Raphael M. Reischuk
Adrian Perrig
DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation
Toshinori Araki
Assaf Barak
Jun Furukawa
Yehuda Lindell
Ariel Nof
Kazuma Ohara
DEMO: Integrating MPC in Big Data Workflows
Nikolaj Volgushev
Malte Schwarzkopf
Andrei Lapets
Mayank Varia
Azer Bestavros
DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking
Denis Migdal
Christian Johansen
Audun Jøsang
DEMO: Starving Permission-Hungry Android Apps Using SecuRank
Vincent F. Taylor
Ivan Martinovic
TUTORIAL SESSION: Tutorials
Program Anomaly Detection: Methodology and Practices
Xiaokui Shu
Danfeng Yao
Security on Wheels: Security and Privacy for Vehicular Communication Systems
Panos Papadimitratos
Condensed Cryptographic Currencies Crash Course (C5)
Aljosha Judmayer
Edgar Weippl
Introduction to Credit Networks: Security, Privacy, and Applications
Aniket Kate
On the Security and Scalability of Bitcoin's Blockchain
Ghassan Karame
Privacy and Security in the Genomic Era
Erman Ayday
Jean-Pierre Hubaux
Adversarial Data Mining: Big Data Meets Cyber Security
Murat Kantarcioglu
Bowei Xi
WORKSHOP SESSION: Pre-Conference Workshops co-located with CCS 2016
MTD 2016: Third ACM Workshop on Moving Target Defense
Peng Liu
Cliff Wang
PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for Security
Toby Murray
Deian Stefan
SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems
Nicholas J. Multari
Anoop Singhal
David O. Manz
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016)
Long Lu
Mohammad Mannan
Theory of Implementation Security Workshop (TIs 2016)
Begul Bilgin
Svetla Nikova
Vincent Rijmen
WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative Security
Florian Kerschbaum
Erik-Oliver Blass
Tomas Sander
15th Workshop on Privacy in the Electronic Society (WPES 2016)
Sabrina De Capitani di Vimercati
WORKSHOP SESSION: Post-Conference Workshops co-located with CCS 2016
9th International Workshop on Artificial Intelligence and Security: AISec 2016
David Mandell Freeman
Katerina Mitrokotsa
Arunesh Sinha
CCSW'16: 8th ACM Cloud Computing Security Workshop
Elli Androulaki
Michael K. Reiter
Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16)
Alvaro A. Cérdenas
Rakesh B. Bobba
2nd International Workshop on Software Protection: SPRO 2016
Brecht Wyseur
Bjorn De Sutter
Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016)
Xinxin Fan
Tim Güneysu
MIST 2016: 8th International Workshop on Managing Insider Security Threats
Ilsun You
Elisa Bertino