


default search action
22nd CCS 2015: Denver, CO, USA
- Indrajit Ray, Ninghui Li, Christopher Kruegel: 
 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. ACM 2015, ISBN 978-1-4503-3832-5
Keynote Talks
- Moti Yung: 
 From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols? 1-2
- Edward W. Felten: 
 Keynote Talk. 3
Session 1A: How Real World Crypto Fails
- David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé  , Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelin , Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelin , Paul Zimmermann , Paul Zimmermann : :
 Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. 5-17
- Carlo Meijer, Roel Verdult: 
 Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards. 18-30
Session 1B: MAC OS and iOS Security
- Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han: 
 Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS. 31-43
- Zhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu: 
 iRiS: Vetting Private API Abuse in iOS Applications. 44-56
Session 1C: Censorship and Resistance
- Liang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton: 
 Seeing through Network-Protocol Obfuscation. 57-69
- John Holowczak, Amir Houmansadr: 
 CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content. 70-83
Session 2A: Authenticated Encryption
- Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff: 
 Automated Analysis and Synthesis of Authenticated Encryption Schemes. 84-95
- Olivier Pereira, François-Xavier Standaert  , Srinivas Vivek , Srinivas Vivek : :
 Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives. 96-108
- Shay Gueron  , Yehuda Lindell , Yehuda Lindell : :
 GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. 109-119
Session 2B: Android and Web Forensics
- Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu: 
 GUITAR: Piecing Together Android App GUIs from Memory Images. 120-132
- Christopher Neasbitt, Bo Li, Roberto Perdisci  , Long Lu, Kapil Singh, Kang Li: , Long Lu, Kapil Singh, Kang Li:
 WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers. 133-145
- Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu: 
 VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images. 146-157
Session 2C: Password Security
- Matteo Dell'Amico  , Maurizio Filippone , Maurizio Filippone : :
 Monte Carlo Strength Evaluation: Fast and Reliable Password Checking. 158-169
- Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan: 
 Surpass: System-initiated User-replaceable Passwords. 170-181
- Jan Camenisch, Anja Lehmann, Gregory Neven: 
 Optimal Distributed Password Verification. 182-194
Session 3A: Using CryptoCurrency
- Ranjit Kumaresan, Tal Moran, Iddo Bentov: 
 How to Use Bitcoin to Play Decentralized Poker. 195-206
- Rafael Pass  , Abhi Shelat: , Abhi Shelat:
 Micropayments for Decentralized Currencies. 207-218
- Tim Ruffing  , Aniket Kate, Dominique Schröder , Aniket Kate, Dominique Schröder : :
 Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins. 219-230
- Aggelos Kiayias, Qiang Tang  : :
 Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content. 231-242
Session 3B: Memory Randomization
- Stephen J. Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz  , Bjorn De Sutter, Michael Franz: , Bjorn De Sutter, Michael Franz:
 It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks. 243-255
- Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo: 
 Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads. 256-267
- David Bigelow, Thomas Hobson, Robert Rudd, William W. Streilein, Hamed Okhravi  : :
 Timely Rerandomization for Mitigating Memory Disclosures. 268-279
- Kangjie Lu, Chengyu Song  , Byoungyoung Lee , Byoungyoung Lee , Simon P. Chung, Taesoo Kim, Wenke Lee: , Simon P. Chung, Taesoo Kim, Wenke Lee:
 ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. 280-291
Session 3C: Wireless and VoLTE Security
- Tao Wang, Yao Liu, Qingqi Pei, Tao Hou: 
 Location-restricted Services Access Control Leveraging Pinpoint Waveforming. 292-303
- Xiaocong Jin, Jingchao Sun, Rui Zhang  , Yanchao Zhang: , Yanchao Zhang:
 SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users. 304-315
- Chi-Yu Li  , Guan-Hua Tu , Guan-Hua Tu , Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang: , Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang:
 Insecurity of Voice Solution VoLTE in LTE Mobile Networks. 316-327
- Hongil Kim, Dongkwan Kim  , Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han , Minhee Kwon, HyungSeok Han, Yeongjin Jang, Dongsu Han , Taesoo Kim, Yongdae Kim , Taesoo Kim, Yongdae Kim : :
 Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations. 328-339
Session 4A: Applied Crypto
- Fabian van den Broek, Roel Verdult, Joeri de Ruiter  : :
 Defeating IMSI Catchers. 340-351
- Aggelos Kiayias, Thomas Zacharias  , Bingsheng Zhang , Bingsheng Zhang : :
 DEMOS-2: Scalable E2E Verifiable Elections without Random Oracles. 352-363
- Giuseppe Ateniese  , Bernardo Magri , Bernardo Magri , Daniele Venturi , Daniele Venturi : :
 Subversion-Resilient Signature Schemes. 364-375
- Qian Wang  , Kui Ren , Kui Ren , Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou , Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou : :
 Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice. 376-387
Session 4B: Software Vulnerabilities
- Qi Alfred Chen, Zhiyun Qian  , Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao: , Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao:
 Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks. 388-400
- Xiaokui Shu, Danfeng Yao  , Naren Ramakrishnan , Naren Ramakrishnan : :
 Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths. 401-413
- Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu: 
 From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. 414-425
- Henning Perl, Sergej Dechand, Matthew Smith  , Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar: , Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar:
 VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits. 426-437
Session 4C: Assessing Current Defences
- Meng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee: 
 UCognito: Private Browsing without Tears. 438-449
- Ian D. Foster  , Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko: , Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko:
 Security by Any Other Name: On the Effectiveness of Provider Based Email Security. 450-464
- Platon Kotzias, Srdjan Matic  , Richard Rivera , Richard Rivera , Juan Caballero: , Juan Caballero:
 Certified PUP: Abuse in Authenticode Code Signing. 465-478
- Ajaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne M. Hirshfield  : :
 A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings. 479-491
Session 5A: Computing on Encrypted Data
- Xiao Shaun Wang  , Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, Diyue Bu: , Yan Huang, Yongan Zhao, Haixu Tang, XiaoFeng Wang, Diyue Bu:
 Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance. 492-503
- Xianrui Meng, Seny Kamara, Kobbi Nissim  , George Kollios , George Kollios : :
 GRECS: Graph Encryption for Approximate Shortest Distance Queries. 504-517
Session 5B: Understanding Android Apps
- Mu Zhang  , Yue Duan , Yue Duan , Qian Feng, Heng Yin , Qian Feng, Heng Yin : :
 Towards Automatic Generation of Security-Centric Descriptions for Android Apps. 518-529
- Deguang Kong, Lei Cen, Hongxia Jin: 
 AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications. 530-541
Session 5C: Scanning the Web
- Zakir Durumeric, David Adrian, Ariana Mirian, Michael D. Bailey, J. Alex Halderman: 
 A Search Engine Backed by Internet-Wide Scanning. 542-553
- Mathias Lécuyer, Riley Spahn, Yannis Spiliopolous, Augustin Chaintreau  , Roxana Geambasu, Daniel J. Hsu: , Roxana Geambasu, Daniel J. Hsu:
 Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence. 554-566
Session 6A: Garbled Circuits
- Shay Gueron  , Yehuda Lindell , Yehuda Lindell , Ariel Nof, Benny Pinkas: , Ariel Nof, Benny Pinkas:
 Fast Garbling of Circuits Under Standard Assumptions. 567-578
- Yehuda Lindell  , Ben Riva: , Ben Riva:
 Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries. 579-590
- Payman Mohassel, Mike Rosulek, Ye Zhang: 
 Fast and Secure Three-party Computation: The Garbled Circuit Approach. 591-602
Session 6B: Web Application Security
- Divya Muthukumaran, Dan O'Keeffe, Christian Priebe, David M. Eyers  , Brian Shand, Peter R. Pietzuch: , Brian Shand, Peter R. Pietzuch:
 FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications. 603-615
- Oswaldo Olivo, Isil Dillig, Calvin Lin: 
 Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications. 616-628
- Andrey Chudnov, David A. Naumann  : :
 Inlined Information Flow Monitoring for JavaScript. 629-643
Session 6C: Property-Preserving Encryption
- Florian Kerschbaum: 
 Frequency-Hiding Order-Preserving Encryption. 656-667
- David Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart: 
 Leakage-Abuse Attacks Against Searchable Encryption. 668-679
Session 7A: CryptoCurrency
- Andrew Miller, Ahmed E. Kosba, Jonathan Katz, Elaine Shi: 
 Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions. 680-691
- Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun: 
 Tampering with the Delivery of Blocks and Transactions in Bitcoin. 692-705
- Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena: 
 Demystifying Incentives in the Consensus Computer. 706-719
- Gaby G. Dagher  , Benedikt Bünz , Benedikt Bünz , Joseph Bonneau, Jeremy Clark, Dan Boneh: , Joseph Bonneau, Jeremy Clark, Dan Boneh:
 Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges. 720-731
Session 7B: Analyzing Obfuscated Code
- Babak Yadegari, Saumya Debray: 
 Symbolic Execution of Obfuscated Code. 732-744
- Guillaume Bonfante, José M. Fernandez  , Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry: , Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry:
 CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions. 745-756
- Jiang Ming, Dongpeng Xu  , Li Wang, Dinghao Wu: , Li Wang, Dinghao Wu:
 LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code. 757-768
- Dhilung Kirat, Giovanni Vigna: 
 MalGene: Automatic Extraction of Malware Analysis Evasion Signature. 769-780
Session 7C: Online Social Networks
- Panagiotis Ilia  , Iasonas Polakis, Elias Athanasopoulos, Federico Maggi , Iasonas Polakis, Elias Athanasopoulos, Federico Maggi , Sotiris Ioannidis: , Sotiris Ioannidis:
 Face/Off: Preventing Privacy Leakage From Photos in Social Networks. 781-792
- Jonghyuk Song, Sangho Lee, Jong Kim: 
 CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks. 793-804
- Changchang Liu, Peng Gao, Matthew K. Wright  , Prateek Mittal: , Prateek Mittal:
 Exploiting Temporal Dynamics in Sybil Defenses. 805-816
- Iasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis: 
 Where's Wally?: Precise User Discovery Attacks in Location Proximity Services. 817-828
Session 8A: Outsourced Storage
- Vincent Bindschaedler  , Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Yan Huang: , Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Yan Huang:
 Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward. 837-849
- Xiao Wang  , T.-H. Hubert Chan, Elaine Shi: , T.-H. Hubert Chan, Elaine Shi:
 Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound. 850-861
- Tarik Moataz, Travis Mayberry, Erik-Oliver Blass: 
 Constant Communication ORAM with Small Blocksize. 862-873
- Jian Liu, N. Asokan  , Benny Pinkas: , Benny Pinkas:
 Secure Deduplication of Encrypted Data without Additional Independent Servers. 874-885
- Frederik Armknecht  , Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef: , Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef:
 Transparent Data Deduplication in the Cloud. 886-900
Session 8B: Control Flow Integrity
- Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard E. Shrobe, Martin C. Rinard, Hamed Okhravi  , Stelios Sidiroglou-Douskos: , Stelios Sidiroglou-Douskos:
 Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. 901-913
- Ben Niu, Gang Tan  : :
 Per-Input Control-Flow Integrity. 914-926
- Victor van der Veen, Dennis Andriesse, Enes Göktas, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos  , Cristiano Giuffrida , Cristiano Giuffrida : :
 Practical Context-Sensitive CFI. 927-940
- Ali José Mashtizadeh, Andrea Bittau, Dan Boneh, David Mazières: 
 CCFI: Cryptographically Enforced Control Flow Integrity. 941-951
- Mauro Conti  , Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi: , Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi:
 Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks. 952-963
Session 8C: Enhancing Trust
- N. Asokan  , Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann: , Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann:
 SEDA: Scalable Embedded Device Attestation. 964-975
- He Sun, Kun Sun  , Yuewu Wang, Jiwu Jing: , Yuewu Wang, Jiwu Jing:
 TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens. 976-988
- Miao Yu, Virgil D. Gligor, Zongwei Zhou: 
 Trusted Display on Untrusted Commodity Platforms. 989-1003
- Yasser Shoukry  , Paul Martin, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava , Paul Martin, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava : :
 PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks. 1004-1015
- Khilan Gudka, Robert N. M. Watson, Jonathan Anderson  , David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson , David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson : :
 Clean Application Compartmentalization with SOAAP. 1016-1031
Session 9A: Coding, Commitments, and Cipher Design
- Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos: 
 Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable). 1032-1047
- Hai Brenner, Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald: 
 Fast Non-Malleable Commitments. 1048-1057
- Andrey Bogdanov, Takanori Isobe: 
 White-Box Cryptography Revisited: Space-Hard Ciphers. 1058-1069
- Fatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik: 
 Lattice Basis Reduction Attack against Physically Unclonable Functions. 1070-1080
Session 9B: Security-Related Ecosystems
- Shuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna: 
 Drops for Stuff: An Analysis of Reshipping Mule Scams. 1081-1092
- Hang Zhang, Dongdong She, Zhiyun Qian  : :
 Android Root and its Providers: A Double-Edged Sword. 1093-1104
- Mingyi Zhao, Jens Grossklags, Peng Liu: 
 An Empirical Study of Web Vulnerability Discovery Ecosystems. 1105-1117
- Bum Jun Kwon  , Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras: , Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras:
 The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics. 1118-1129
Session 9C: Formal Methods Meet Cryptography
- Omar Chowdhury, Deepak Garg, Limin Jia  , Anupam Datta: , Anupam Datta:
 Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. 1130-1143
- David A. Basin  , Jannik Dreier, Ralf Sasse , Jannik Dreier, Ralf Sasse : :
 Automated Symbolic Proofs of Observational Equivalence. 1144-1155
- Gilles Barthe  , Benjamin Grégoire, Benedikt Schmidt: , Benjamin Grégoire, Benedikt Schmidt:
 Automated Proofs of Pairing-Based Cryptography. 1156-1168
- Rohit Sinha, Sriram K. Rajamani, Sanjit A. Seshia, Kapil Vaswani: 
 Moat: Verifying Confidentiality of Enclave Programs. 1169-1184
Session 10A: Key Exchange: Theory and Practice
- Tibor Jager, Jörg Schwenk, Juraj Somorovsky: 
 On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption. 1185-1196
- Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila  : :
 A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. 1197-1210
- Nik Unger, Ian Goldberg: 
 Deniable Key Exchanges for Secure Messaging. 1211-1223
- Sven Schäge  : :
 TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity. 1224-1235
Session 10B: Mobile Device Attacks
- Heqing Huang, Sencun Zhu, Kai Chen, Peng Liu: 
 From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App. 1236-1247
- Yousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen, XiaoFeng Wang, Xiao-yong Zhou, Wenliang Du, Michael Grace: 
 Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References. 1248-1259
- Yangyi Chen, Tongxin Li, XiaoFeng Wang, Kai Chen, Xinhui Han: 
 Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations. 1260-1272
- Xiangyu Liu, Zhe Zhou, Wenrui Diao  , Zhou Li , Zhou Li , Kehuan Zhang: , Kehuan Zhang:
 When Good Becomes Evil: Keystroke Inference with Smartwatch. 1273-1285
Session 10C: Statistical Privacy
- Florian Tramèr  , Zhicong Huang, Jean-Pierre Hubaux, Erman Ayday: , Zhicong Huang, Jean-Pierre Hubaux, Erman Ayday:
 Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies. 1286-1297
- Yonghui Xiao, Li Xiong  : :
 Protecting Locations with Differential Privacy under Temporal Correlations. 1298-1309
- Reza Shokri  , Vitaly Shmatikov: , Vitaly Shmatikov:
 Privacy-Preserving Deep Learning. 1310-1321
- Matt Fredrikson  , Somesh Jha, Thomas Ristenpart: , Somesh Jha, Thomas Ristenpart:
 Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures. 1322-1333
Session 11A: Privacy-Preserving Authentication
- Vireshwar Kumar  , He Li, Jung-Min "Jerry" Park, Kaigui Bian, Yaling Yang: , He Li, Jung-Min "Jerry" Park, Kaigui Bian, Yaling Yang:
 Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. 1334-1345
- Aldo Cassola, Erik-Oliver Blass, Guevara Noubir: 
 Authenticating Privately over Public Wi-Fi Hotspots. 1346-1357
- Daniel Fett, Ralf Küsters, Guido Schmitz  : :
 SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web. 1358-1369
- Joseph A. Akinyele, Christina Garman, Susan Hohenberger: 
 Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. 1370-1381
Session 11B: Web Attacks
- Tom van Goethem, Wouter Joosen, Nick Nikiforakis: 
 The Clock is Still Ticking: Timing Attacks in the Modern Web. 1382-1393
- Nethanel Gelernter, Amir Herzberg: 
 Cross-Site Search Attacks. 1394-1405
- Yossef Oren  , Vasileios P. Kemerlis , Vasileios P. Kemerlis , Simha Sethumadhavan, Angelos D. Keromytis: , Simha Sethumadhavan, Angelos D. Keromytis:
 The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. 1406-1418
- Ben Stock  , Stephan Pfistner, Bernd Kaiser, Sebastian Lekies, Martin Johns , Stephan Pfistner, Bernd Kaiser, Sebastian Lekies, Martin Johns : :
 From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting. 1419-1430
Session 11C: Surveillance and Countermeasures
- Mihir Bellare, Joseph Jaeger  , Daniel Kane: , Daniel Kane:
 Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks. 1431-1440
- Chen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig: 
 HORNET: High-speed Onion Routing at the Network Layer. 1441-1454
- Srdjan Matic  , Platon Kotzias, Juan Caballero: , Platon Kotzias, Juan Caballero:
 CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services. 1455-1466
- Jan Camenisch, Anja Lehmann: 
 (Un)linkable Pseudonyms for Governmental Databases. 1467-1479
Session 12A: Outsourcing Data and Computation
- Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou: 
 IntegriDB: Verifiable SQL for Outsourced Databases. 1480-1491
- Peeter Laud  , Jaak Randmets: , Jaak Randmets:
 A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols. 1492-1503
- Daniel Demmler, Ghada Dessouky, Farinaz Koushanfar  , Ahmad-Reza Sadeghi, Thomas Schneider , Ahmad-Reza Sadeghi, Thomas Schneider , Shaza Zeitouni: , Shaza Zeitouni:
 Automated Synthesis of Optimized Circuits for Secure Computation. 1504-1517
- Dario Catalano, Dario Fiore: 
 Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data. 1518-1529
Session 12B: Cloud, Web, and Authentication
- Thomas Vissers, Tom van Goethem, Wouter Joosen, Nick Nikiforakis: 
 Maneuvering Around Clouds: Bypassing Cloud-based Security Providers. 1530-1541
- Pratik Soni, Enrico Budianto, Prateek Saxena: 
 The SICILIAN Defense: Signature-based Whitelisting of Web JavaScript. 1542-1557
- Yan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng  : :
 Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication. 1558-1569
Session 12C: Side Channels
- Olga Ohrimenko  , Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss , Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss , Divya Sharma: , Divya Sharma:
 Observing and Preventing Leakage in MapReduce. 1570-1581
- Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang: 
 Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. 1582-1594
- Soo-Jin Moon, Vyas Sekar, Michael K. Reiter: 
 Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration. 1595-1606
- Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia: 
 Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation. 1607-1619
Demo & Poster Abstracts
- Luke Rodriguez, Darren S. Curtis  , Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray: , Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray:
 DEMO: Action Recommendation for Cyber Resilience. 1620-1622
- Ruba Abu-Salma, M. Angela Sasse  , Joseph Bonneau, Matthew Smith: , Joseph Bonneau, Matthew Smith:
 POSTER: Secure Chat for the Masses? User-centered Security to the Rescue. 1623-1625
- Michael Backes, Simon Koch, Sebastian Meiser, Esfandiar Mohammadi, Christian Rossow: 
 POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor. 1626-1628
- Michael Backes, Oliver Schranz, Philipp von Styp-Rekowsky: 
 POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART). 1629-1631
- Peixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su  , Huan Zhou: , Huan Zhou:
 POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol. 1632-1634
- Manh Huynh, Phuc Nguyen, Marco Gruteser, Tam Vu: 
 POSTER: Mobile Device Identification by Leveraging Built-in Capacitive Signature. 1635-1637
- Samuel Jackson, Scott Kerlin, Jeremy Straub  : :
 POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small Satellites. 1638-1640
- JungSeung Lee, Han Park  , GyeongYong Bang, JooSeok Song: , GyeongYong Bang, JooSeok Song:
 POSTER: A Password-based Authentication by Splitting Roles of User Interface. 1641-1643
- JungSeung Lee, HyoungMin Ham  , InHwan Kim, JooSeok Song: , InHwan Kim, JooSeok Song:
 POSTER: Page Table Manipulation Attack. 1644-1646
- Depeng Li, Sachin Shetty  : :
 POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use. 1647-1649
- Fengjun Li  , Xin Fu, Bo Luo , Xin Fu, Bo Luo : :
 POSTER: A Hardware Fingerprint Using GPU Core Frequency Variations. 1650-1652
- Xing Liu, Wei Wang, Jiqiang Liu: 
 POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy. 1653-1655
- Tianyue Luo, Chen Ni, Qing Han, Mutian Yang, JingZheng Wu, Yanjun Wu: 
 POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities. 1656-1658
- Mahmoud Mohammadi, Bill Chu, Heather Richter Lipford: 
 POSTER: Using Unit Testing to Detect Sanitization Flaws. 1659-1661
- Subhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, Adele E. Howe: 
 POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations. 1662-1664
- N. V. Narendra Kumar, R. K. Shyamasundar: 
 POSTER: Dynamic Labelling for Analyzing Security Protocols. 1665-1667
- Laurynas Riliskis  , Hossein Shafagh, Philip Alexander Levis: , Hossein Shafagh, Philip Alexander Levis:
 POSTER: Computations on Encrypted Data in the Internet of Things Applications. 1668-1670
- Toshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada: 
 POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains. 1671-1673
- Manish Shukla, Sumesh Manjunath  , Rohit Saxena, Sutapa Mondal, Sachin Lodha: , Rohit Saxena, Sutapa Mondal, Sachin Lodha:
 POSTER: WinOver Enterprise Dark Data. 1674-1676
- Anoop Singhal, Changwei Liu, Duminda Wijesekera: 
 POSTER: A Logic Based Network Forensics Model for Evidence Analysis. 1677
- John Sonchack, Adam J. Aviv, Eric Keller, Jonathan M. Smith: 
 POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security Applications. 1678-1680
- Jeremy Straub  : :
 POSTER: Blackboard-Based Electronic Warfare System. 1681-1683
- Lihua Wang, Takuya Hayashi  , Sachiko Kanamori, Atsushi Waseda, Ryo Nojima, Shiho Moriai: , Sachiko Kanamori, Atsushi Waseda, Ryo Nojima, Shiho Moriai:
 POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity. 1684-1686
- Zheng Wang: 
 POSTER: Pseudonymizing Client as a Privacy-Preserving Service: A Case Study of CDN. 1687-1689
- JingZheng Wu, Yanjun Wu, Mutian Yang, Zhifei Wu, Tianyue Luo, Yongji Wang: 
 POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application. 1690-1692
- Chia-Mu Yu: 
 POSTER: Lightweight Streaming Authenticated Data Structures. 1693-1695
Tutorial Abstracts
- Alex Beutel, Leman Akoglu, Christos Faloutsos: 
 Fraud Detection through Graph-Based User Behavior Modeling. 1696-1697
- Marco Pistoia: 
 Program Analysis for Mobile Application Integrity and Privacy Enforcement. 1698-1699
- Stefan Dziembowski: 
 Introduction to Cryptocurrencies. 1700-1701
Workshop Summaries
- Christos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha: 
 Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security. 1702
- Florian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray: 
 CCSW 2015: The 7th ACM Cloud Computing Security Workshop. 1703-1704
- Roshan K. Thomas, Alvaro A. Cárdenas, Rakesh B. Bobba  : :
 First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions. 1705-1706
- Ilsun You, Elisa Bertino: 
 MIST 2015: 7th International Workshop on Managing Insider Security Threats. 1707-1708
- George Cybenko, Dijiang Huang  : :
 MTD 2015: Second ACM Workshop on Moving Target Defense. 1709-1710
- Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman  : :
 SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense. 1711-1712
- Glenn Wurster, David Lie: 
 SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices. 1713-1714
- Jorge Guajardo, Stefan Katzenbeisser: 
 Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015). 1715-1716
- Tomas Sander, Moti Yung: 
 WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative Security. 1717-1718
- Nicholas Hopper, Rob Jansen: 
 WPES 2015: The 14th Workshop on Privacy in the Electronic Society. 1719-1720

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














