CCS 2017 Program (PDF)
CCS 2017
Program Overview (PDF)
Sheraton Dallas Floorplans
Agenda
Monday (October 30th, 2017) — Pre-Conference Workshops
Tuesday (October 31st, 2017) — CCS Main Conference
Wednesday(November 1st, 2017) — CCS Main Conference
Thursday (November 2nd, 2017) — CCS Main Conference
Friday (November 3rd, 2017) — Post-Conference Workshops
Pre-Conference Workshops on Monday, October 30th, 2017 (07:30-6:00)
Time | Multimedia Privacy and Security (MPS) Dallas Ballroom A1 |
Workshop on Privacy in the Electronic Society (WPES) Dallas Ballroom A2 |
Moving Target Defense (MTD) Dallas Ballroom A3 |
Managing Insider Security Threats (MIST) Dallas Ballroom D1 |
Programming Languages and Analysis for Security (PLAS) Dallas Ballroom D2 |
Theory and Practice of Differential Privacy (TPDP) Dallas Ballroom D3 |
Women in Cyber Security (CyberW) Austin Ballroom 1 |
---|---|---|---|---|---|---|---|
07:30-09:00 | Breakfast & Registration | ||||||
9:00-10:00 | MPS | WPES | MTD | MIST | PLAS | TPDP | CyberW |
10:00-10:45 | Break | ||||||
10:45-12:00 | MPS | WPES | MTD | MIST | PLAS | TPDP | CyberW |
12:00-2:00 | Lunch Break | ||||||
2:00-3:00 | MPS | WPES | MTD | MIST | PLAS | TPDP | CyberW |
3:00-3:45 | Break | ||||||
3:45-6:00 | MPS | WPES | MTD | MIST | PLAS | TPDP | CyberW |
CCS Main Conference on Tuesday, October 31st, 2017
Room Time |
Dallas Ballroom A1 | Dallas Ballroom A2 | Dallas Ballroom A3 | Dallas Ballroom D1 | Dallas Ballroom D2 | Dallas Ballroom D3 | |
---|---|---|---|---|---|---|---|
07:30-09:00 | Breakfast & Registration | ||||||
09:00-9:15 | Dallas Ballroom BC | ||||||
Chairs' Welcome | |||||||
09:15-10:30 | Keynote by Prof. David Wagner (UC Berkeley) "Security and Machine Learning" | ||||||
10:30-10:45 | Coffee Break | ||||||
10:45-12:15 | 1A: Multi-Party Computation 1 | 2A: Human Authentication | 3A: Adversarial Machine Learning | 4A: Browsers | 5A: Cryptocurrency | Tutorial [10:45–12:15] |
|
Session chair: Marcel Keller | Session chair: Jeremiah Blocki | Session chair: Saman Zonouz | Session chair: Joseph Calandrino | Session chair: Aniket Kate | |||
DUPLO: Unifying Cut-and-Choose for Garbled Circuits |
Hearing Your Voice Is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication |
Evading Classifiers by Morphing in the Dark |
Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers |
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin |
Cache Side Channels: State-of-the-Art and Research Opportunities |
||
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation★ |
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration |
MagNet: a Two-Pronged Defense against Adversarial Examples |
Deterministic Browser |
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing |
|||
Global-Scale Secure Multiparty Computation |
Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping |
DolphinAttack: Inaudible Voice Commands★ |
Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security |
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services |
|||
12:15-1:45 | Lunch Break | ||||||
1:45-3:15 | 1B: Multi-Party Computation 2 | 2B: Passwords | 3B: Investigating Attacks | 4B: Privacy Policies | 5B: Blockchains | Tutorial [1:45–5:00] |
|
Session chair: Samee Zahur | Session chair: Hamed Okhravi | Session chair: Georgios Portokalidis | Session chair: Michael Hicks | Session chair: Christina Garman | |||
Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries |
Let's go in for a closer look: Observing passwords in their natural habitat |
Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance |
Synthesis of Probabilistic Privacy Enforcement |
Revive: Rebalancing Off-Blockchain Payment Networks |
Cliptography: Post-Snowden Cryptography |
||
A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority |
Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study |
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection |
A Type System for Privacy Properties |
Concurrency and Privacy with Payment-Channel Networks |
|||
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case |
The TypTop System: Personalized Typo-tolerant Password Checking |
RAIN: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking |
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy |
Bolt: Anonymous Payment Channels for Decentralized Currencies |
|||
3:15-3:45 | Coffee Break | ||||||
3:45-5:15 | 1C: Oblivious RAM | 2C: World Wide Web of Wickedness | 3C: Machine Learning Privacy | 4C: From Verification to ABE | 5C: Using Blockchains | Tutorial [1:45–5:00] |
|
Session chair: Yan Huang | Session chair: Gianluca Stringhini | Session chair: Aylin Caliskan | Session chair: Shai Halevi | Session chair: Nicolas Christin | |||
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing |
Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains |
Machine Learning Models that Remember Too Much |
Verifying Security Policies in Multi-agent Workflows with Loops |
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain |
Cliptography: Post-Snowden Cryptography |
||
Deterministic, Stash-Free Write-Only ORAM |
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting |
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning |
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions |
Solidus: Confidential Distributed Ledger Transactions via PVORM |
|||
Scaling ORAM for Secure Computation★ |
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse |
Oblivious Neural Network Predictions via MiniONN transformations |
FAME: Fast Attribute-based Message Encryption |
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards |
|||
5:15-6:00 | Break | ||||||
6:00-8:00 | Welcome Reception & Poster Session |
CCS Main Conference on Wednesday, November 1st, 2017
Room Time |
Dallas Ballroom A1 | Dallas Ballroom A2 | Dallas Ballroom A3 | Dallas Ballroom D1 | Dallas Ballroom D2 | Dallas Ballroom D3 |
---|---|---|---|---|---|---|
07:30-09:00 | Breakfast & Registration | |||||
9:00-10:30 | 1D: Functional Encryption and Obfuscation | 2D: Vulnerable Mobile Apps | 3D: Logical Side Channels | 4D: Crypto Primitives | 5D: Network Security | Tutorial [9:00–10:30] |
Session chair: Tal Malkin | Session chair: Yao Liu | Session chair: Mohit Tiwari | Session chair: abhi shelat | Session chair: Yuan Tian | ||
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits |
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Access Control in Online Services |
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519 |
Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions |
Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study |
||
Iron: Functional Encryption using Intel SGX★ |
Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution |
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves |
Generic Semantic Security against a Kleptographic Adversary |
The Wolf of Name Street: Hijacking Domains Through Their Nameservers |
||
Implementing BP-Obfuscation Using Graph-Induced Encoding |
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews |
Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic |
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction |
Faulds: A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting |
||
10:30-11:00 | Coffee Break | |||||
11:00-12:30 | 1E: Hardening Crypto | 2E: Securing Mobile Apps | 3E: Physical Side Channels | 4E: Adversarial Social Networking | 5E: Privacy-Preserving Analytics | Tutorial [11:00–12:30] |
Session chair: Samee Zahur | Session chair: Kyu Hyung Lee | Session chair: Alvaro A. Cardenas | Session chair: Hao Chen | Session chair: Yinqian Zhang | ||
T/Key: Second-Factor Authentication From Secure Hash Chains |
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android |
Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers |
Practical Attacks Against Graph-based Clustering |
Practical Secure Aggregation for Privacy-Preserving Machine Learning |
||
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions |
Vulnerable Implicit Service: A Revisit |
Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations |
Automated Crowdturfing Attacks and Defenses in Online Review Systems |
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs |
||
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation★ |
A Stitch in Time: Supporting Android Developers in Writing Secure Code |
Viden: Attacker Identification on In-Vehicle Networks |
POISED: Spotting Twitter Spam Off the Beaten Paths |
A Practical Encrypted Data Analytic Framework With Trusted Processors |
||
12:30-2:00 | Lunch Break | |||||
2:00-3:30 | 1F: Private Set Intersection | 2F: Insights from Log(in)s | 3F: Crypto Pitfalls | 4F: Private Queries | 5F: Understanding Security Fails | Tutorial [2:00–5:00] |
Session chair: XiaoFeng Wang | Session chair: Trent Jaeger | Session chair: Guanhua Yan | Session chair: Amir Houmansadr | Session chair: Nick Nikiforakis | ||
Malicious-Secure Private Set Intersection via Dual Execution |
Detecting Structurally Anomalous Logins Within Enterprise Networks |
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2★ |
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR |
Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors |
Adversarial Data Mining: Big Data Meets Cyber Security |
|
Fast Private Set Intersection from Homomorphic Encryption |
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning |
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through |
PeGaSus: Data-Adaptive Differentially Private Stream Processing |
Data breaches, phishing, or malware? Understanding the risks of stolen credentials |
||
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques |
Predicting the Risk of Cyber Incidents |
No-Match Attacks and Robust Partnering Definitions — Defining Trivial Attacks for Security Protocols is Not Trivial |
Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage |
Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI |
||
3:30-4:00 | Coffee Break | |||||
4:00-5:00 | 1G: Searchable Encryption | 2G: Bug-Hunting Risks and Rewards | 3G: Crypto Standards | 4G: Voting | 5G: Hardening Hardware | Tutorial [2:00–5:00] |
Session chair: Mariana Raykova | Session chair: Mathias Payer | Session chair: Shai Halevi | Session chair: Marcel Keller | Session chair: Haining Wang | ||
Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates |
Economic Factors of Vulnerability Trade and Exploitation: Empirical evidence from a prominent Russian cybercrime market |
Identity-Based Format-Preserving Encryption |
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs |
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components |
Adversarial Data Mining: Big Data Meets Cyber Security |
|
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives |
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research |
Standardizing Bad Cryptographic Practice - A teardown of the IEEE standard for protecting electronic-design intellectual property |
Practical Quantum-Safe Voting from Lattices |
Provably-Secure Logic Locking: From Theory To Practice |
||
5:00-5:15 | Break | |||||
5:15-6:45 | Dallas Ballroom BC | |||||
Panel | ||||||
6:45-7:00 | Break | |||||
7:00-9:00 | Award Ceremony & Banquet |
CCS Main Conference on Thursday, November 2nd, 2017
Room Time |
Dallas Ballroom A1 | Dallas Ballroom A2 | Dallas Ballroom A3 | Dallas Ballroom D1 | Dallas Ballroom D2 | Dallas Ballroom D3 |
---|---|---|---|---|---|---|
07:30-09:00 | Breakfast & Registration | |||||
09:00-10:30 | 1H: Crypto Attacks | 2H: Code Reuse Attacks | 3H: Web Security | 4H: Formal Verification | Tutorial [9:00–12:30] |
|
Session chair: Daniel Genkin | Session chair: Hovav Shacham | Session chair: Suman Jana | Session chair: Dinghao Wu | |||
The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli★ |
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later |
Rewriting History: Changing the Archived Web from the Present |
A Comprehensive Symbolic Analysis of TLS 1.3 |
SGX Security and Privacy |
||
Algorithm Substitution Attacks from a Steganographic Perspective | Capturing Malware Propagations with Code Injections and Code-Reuse attacks |
Deemon: Detecting CSRF with Dynamic Analysis and Property Graphs |
HACL*: A Verified Modern Cryptographic Library |
|||
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs★ |
Code-reuse attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets |
Tail Attacks on Web Applications |
Jasmin: High-Assurance and High-Speed Cryptography |
|||
10:30-11:00 | Coffee Break | |||||
11:00-12:30 | 1I: Post-Quantum | 2I: Information Flow | 3I: Personal Privacy | 4I: Verifying Crypto | 5I: Communication Privacy | Tutorial [9:00–12:30] |
Session chair: Fengwei Zhang | Session chair: Heng Yin | Session chair: David Kotz | Session chair: Micah Sherr | Session chair: Matthew Wright | ||
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives |
Nonmalleable Information Flow Control★ |
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection |
Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs |
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services★ |
SGX Security and Privacy |
|
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures |
Cryptographically Secure Information Flow Control on Key-Value Stores |
walk2friends: Inferring Social Links from Mobility Profiles |
A Fast and Verified Software Stack for Secure Function Evaluation |
The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks |
||
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers |
Object Flow Integrity |
Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms |
Verified Correctness and Security of mbedTLS HMAC-DRBG |
Compressive Traffic Analysis: A New Paradigm for Scalable Traffic Analysis |
||
12:30-2:00 | Lunch Break | |||||
2:00-3:30 | 1J: Outsourcing | 2J: Fun with Fuzzing | 3J: Problematic Patches | 4J: Flash Security | Tutorial [2:00–5:00] |
|
Session chair: Daniel Genkin | Session chair: Byoungyoung Lee | Session chair: Xinyu Xing | Session chair: Taesoo Kim | |||
Full accounting for verifiable outsourcing |
DIFUZE:Interface Aware Fuzzing for Kernel Drivers |
Checking Open-Source License Violation and 1-day Security Risk at Large Scale |
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer |
Private Information Retrieval |
||
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup |
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits |
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android |
FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware |
|||
Homomorphic Secret Sharing: Optimizations and Applications |
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities |
A Large-Scale Empirical Study of Security Patches |
FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution |
|||
3:30-4:00 | Coffee Break | |||||
4:00-5:30 | 1K: Secure Computation | 2K: Fuzzing Finer and Faster | 3K: Program Analysis | 4K: Secure Enclaves | Tutorial [2:00–5:00] |
|
Session chair: Stefan Katzenbeisser | Session chair: Wil Robertson | Session chair: Wenke Lee | Session chair: Alex Malozemoff | |||
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation |
Designing New Operating Primitives to Improve Fuzzing Performance |
PtrSplit: Supporting general pointers in automatic program partitioning |
JITGuard: Hardening Just-in-time Compilers with SGX |
Private Information Retrieval |
||
Distributed Measurement with Private Set-Union Cardinality |
Directed Greybox Fuzzing |
HexType: Efficient Detection of Type Confusion Errors for C++ |
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX |
|||
Efficient Public Trace-and-Revoke from Standard Assumptions |
IMF: Inferred Model-based Fuzzer |
FreeGuard: A Faster Secure Heap Allocator |
A Formal Foundation for Secure Remote Execution of Enclaves★ |
|||
5:30-5:45 | Break | |||||
5:45-6:30 | Dallas Ballroom BC | |||||
Business Meeting |
Post-Conference Workshops on Friday, November 3rd, 2017 (07:30-5:00)
Time | Applying the Scientific Method to Active Cyber Defense Research (SafeConfig) Dallas Ballroom A1 |
Cyber-Physical System Security & Privacy (CPS-SPC) Dallas Ballroom A2 |
Forming an Ecosystem Around Software Transformation (FEAST) Dallas Ballroom A3 |
Attacks and Solutions in Hardware Security (ASHES) Dallas Ballroom D1 |
Internet of Things Security and Privacy (IoT S&P) Dallas Ballroom D2 |
Cloud Computing Security Workshop (CCSW) Dallas Ballroom D3 |
Artificial Intelligence and Security (AISec) Austin Ballroom 1 |
---|---|---|---|---|---|---|---|
07:30-09:00 | Breakfast & Registration | ||||||
9:00-10:00 | SafeConfig | CPS-SPC | FEAST | ASHES | IoT S&P | CCSW | AISec |
10:00-10:45 | Break | ||||||
10:45-12:00 | SafeConfig | CPS-SPC | FEAST | ASHES | IoT S&P | CCSW | AISec |
12:00-2:00 | Lunch Break | ||||||
2:00-3:00 | SafeConfig | CPS-SPC | FEAST | ASHES | IoT S&P | CCSW | AISec |
3:00-3:45 | Break | ||||||
3:45-5:00** | SafeConfig | CPS-SPC | FEAST | ASHES | IoT S&P | CCSW | AISec |
★Finalists for paper awards. The awards will be announced at the CCS Banquet, 1 November 2017
**Workshops must end no later than 5pm