【ccs13】Accepted papper list & part of download


CCS13的papper:部分文章下载。

下载

Monitor Integrity Protection with Space Efficiency and Separate Compilation
Ben Niu (Lehigh University), Gang Tan (Lehigh University)

A Security Framework for the Analysis and Design of Software Attestation
Frederik Armknecht (Universität Mannheim, Germany), Ahmad-Reza Sadeghi (Technische Universität Darmstadt/CASED), Steffen Schulz (Intel Corporation), Christian Wachsmann (Intel Collaborative Research Institute for Secure Computing at TU Darmstadt)

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
Aaron Johnson (U.S. Naval Research Laboratory), Chris Wacek (Georgetown University), Rob Jansen (U.S. Naval Research Laboratory), Micah Sherr (Georgetown University), Paul Syverson (U.S. Naval Research Laboratory)

Certified Computer-Aided Cryptography: Efficient Provably Secure Machine Code from High-Level Implementations
José Bacelar Almeida (HASLab, INESC TEC and Universidade do Minho), Manuel Barbosa (HASLab, INESC TEC and Universidade do Minho), Gilles Barthe (IMDEA Software Institute), François Dupressoir (IMDEA Software Institute)

Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis (New York University), David Pointcheval (Ecole Normale Superieure), Sylvain Ruhault (Ecole Normale Superieure and Oppida), Damien Vergnaud (Ecole Normale Superieure), Daniel Wichs (Northeastern University)

FANCI:  Identification of Stealthy Malicious Logic Using Boolean Functional Analysis
Adam Waksman (Columbia University), Matthew Suozzo (Columbia University), Simha Sethumadhavan (Columbia University)

Rethinking SSL Development in an Appified World
Sascha Fahl (Leibniz University Hannover), Marian Harbach (Leibniz Universität Hannover), Henning Perl (Leibniz Universität Hannover), Markus Koetter (Leibniz Universität Hannover), Matthew Smith (Leibniz Universität Hannover)

Security Analysis of Integrated Circuit Camouflaging
Jeyavijayan Rajendran (Polytechnic Institute of NYU), Michael Sam (Polytechnic Insitute of NYU), Ozgur Sinanoglu (New York University Abu Dhabi), Ramesh Karri (Polytechnic institute of NYU)

Protocol Misidentification Made Easy with Format-Transforming Encryption
Kevin P. Dyer (Portland State University), Scott E. Coull (RedJack, LLC.), Thomas Ristenpart (University of Wisconsin-Madison), Thomas Shrimpton (Portland State University)

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices
Masoud Rostami (ECE Dept, Rice University), Ari Juels (RSA Laboratories), Farinaz Koushanfar (Rice University)

When Kids Toys Breach Mobile Phone Security
Abdul Serwadda (Louisiana Tech University), Vir Phoha (Louisiana Tech University)

Path ORAM: An Extremely Simple Oblivious RAM Protocol
Emil Stefanov (UC Berkeley), Marten van Dijk (University of Connecticut), Elaine Shi (University of Maryland), Christopher Fletcher (MIT), Ling Ren (MIT), Xiangyao Yu (MIT), Srinivas Devadas (MIT)

Identity, Location, Disease and More: Inferring Your Secrets from Android Public Resources
Xiaoyong Zhou (Indiana University, Bloomington), Soteris Demetriou (University of Illinois at Urbana-Champaign), Dongjing He (University of Illinois at Urbana-Champaign), Muhammad Naveed (University of Illinois at Urbana-Champaign), Xiaorui Pan (Indiana University, Bloomington), Xiaofeng Wang (Indiana University, Bloomington), Carl Gunter (University of Illinois at Urbana-Champaign), Klara Nahrstedt (University of Illinois at Urbana-Champaign)

Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently
Marek Jawurek (SAP Research), Florian Kerschbaum (SAP Research), Claudio Orlandi (Aarhus University)

Fully Automated Analysis of Padding-Based Encryption in the Computational Model
Gilles Barthe (IMDEA Software Institute), Juan Manuel Crespo (IMDEA Software Institute), Benjamin Gregoire (INRIA Sophia-Antipolis), César Kunz (IMDEA Software Institute), Yassine Lakhnech (Université de Grenoble, VERIMAG ), Benedikt Schmidt (IMDEA Software Institute), Santiago Zanella-Béguelin (Microsoft Research)

Obfuscation Resilient Binary Code Reuse through Trace-oriented Programming
Junyuan Zeng (University of Texas at Dallas), Yangchun Fu (University of Texas at Dallas), Kenneth Miller (University of Texas at Dallas), Zhiqiang Lin (University of Texas at Dallas), Xiangyu Zhang (Purdue University), Dongyan Xu (Purdue University)

Chucky: Exposing Missing Checks in Source Code for Vulnerability Discovery
Fabian Yamaguchi (University of Goettingen), Christian Wressnegger (idalab GmbH), Hugo Gascon (University of Goettingen), Konrad Rieck (University of Goettingen)

AUTOCRYPT: Enabling Homomorphic Computation On Servers To Protect Sensitive Web Content
Shruti Tople (National University of Singapore), Shweta Shinde (National University of Singapore), Prateek Saxena (National University of Singapore), Zhaofeng Chen (National University of Singapore)

Belief Semantics of Authorization Logic
Andrew Hirsch (George Washington University), Michael Clarkson (George Washington University)

Delegatable Pseudorandom Functions and Applications
Aggelos Kiayias (National and Kapodistrian University of Athens), Stavros Papadopoulos (University of Science & Technology, Hong Kong), Nikos Triandopoulos (RSA Laboratories and  Boston University), Thomas Zacharias (National and Kapodistrian University of Athens)

Practical Dynamic Proofs of Retrievability
Elaine Shi (University of Maryland), Emil Stefanov (UC Berkeley), Charalampos Papamanthou (University of Maryland)

ASIST: Architectural Support for Instruction Set Randomization
Antonis Papadogiannakis (Institute of Computer Science, Foundation for Research and Technology – Hellas), Laertis Loutsis (Institute of Computer Science, Foundation for Research and Technology – Hellas), Vassilis Papaefstathiou (Institute of Computer Science, Foundation for Research and Technology – Hellas), Sotiris Ioannidis (Institute of Computer Science, Foundation for Research and Technology – Hellas)

Honeywords: Making Password-Cracking Detectable
Ari Juels (RSA), Ronald Rivest (MIT)

Practical Constructions and New Proof Methods for Large Universe Attribute-Based Encryption
Yannis Rouselakis (University of Texas at Austin), Brent Waters (University of Texas at Austin)

Multi-Cloud Oblivious Storage
Emil Stefanov (UC Berkeley), Elaine Shi (University of Maryland)

FPDetective: Dusting the Web for Fingerprinters
Gunes Acar (KU Leuven), Marc Juarez (Institut d’Investigació en Intel•ligència Artificial and KU Leuven), Nick Nikiforakis (KU Leuven), Claudia Diaz (KU Leuven), Seda Gurses (New York University and  KU Leuven), Frank Piessens (KU Leuven), Bart Preneel (KU Leuven)

librando: Transparent Code Randomization for Just-in-Time Compilers
Andrei Homescu (University of California Irvine), Stefan Brunthaler (University of California, Irvine), Per Larsen (University of California, Irvine), Michael Franz (University of California, Irvine)

AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection
Zhemin Yang (Fudan University), Min Yang (Fudan University), Yuan Zhang (Fudan University), Guofei Gu (Texas A&M University), Peng Ning (NC State University), X. Sean Wang (Fudan University)

Preventing Accidental Data Disclosure in Modern Operating Systems
Adwait Nadkarni (North Carolina State University), William Enck (North Carolina State University)

OASIS: On Achieving a Sanctuary for Integrity and Secrecy on Untrusted Platforms
Emmanuel Owusu (Carnegie Mellon University), Jorge Guajardo (Robert Bosch LLC – Research and Technology Center, Pittsburgh, USA), Jonathan McCune (Carnegie Mellon University), Jim Newsome (Carnegie Mellon University), Adrian Perrig (ETH Zurich, CyLab / Carnegie Mellon University), Amit Vasudevan (Carnegie Mellon University)

Automatic Verification of Protocols with Lists of Unbounded Length
Bruno Blanchet (INRIA Paris-Rocquencourt), Miriam Paiola (INRIA Paris-Rocquencourt)

Ensuring High-Quality Randomness in Cryptographic Key Generation
Henry Corrigan-Gibbs (Stanford University), Wendy Mu (Stanford University), Dan Boneh (Stanford University), Bryan Ford (Yale University)

Verifiable Delegation of Computation on Outsourced Data
Michael Backes (Saarland University and Max Planck Institute for Software Systems), Dario Fiore (Max Planck Institute for Software Systems), Raphael M. Reischuk (Saarland University)

Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
Gianluca Stringhini (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)

Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay
Zhen Liu (Shanghai Jiao Tong University, City University of Hong Kong), Zhenfu Cao (Shanghai Jiao Tong University), Duncan Wong (City University of Hong Kong)

AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-Defined Networks
Seungwon Shin (Texas A&M University), Vinod Yegneswaran (SRI International), Phillip Porras (SRI International), Guofei Gu (Texas A&M University)

Polyglots: Crossing Origins by Crossing Formats
Jonas Magazinius (Chalmers University of Technology), Billy Rios (Google), Andrei Sabelfeld (Chalmers University of Technology)

Membership Privacy: A Unifying Framework For Privacy Definitions
Ninghui Li (Purdue University), Wahbeh Qardaji (Purdue University), Dong Su (Purdue University), Yi Wu (Purdue University), Weining Yang (Purdue University)

Anonymous Credentials Light
Foteini Baldimtsi (Brown University), Anna Lysyanskaya (Brown University)

Catching Click-Spam in Search Ad Networks
Vacha Dave (UC San Diego), Saikat Guha (Microsoft Research India), Yin Zhang (The University of Texas at Austin)

Vetting Undesirable Behaviors in Android Apps with Permission Use Analysis
Yuan Zhang (Fudan University), Min Yang (Fudan University), Bingquan Xu (Fudan University), Zhemin Yang (Fudan University), Guofei Gu (Texas A&M University), Peng Ning (NC State University), X. Sean Wang (Fudan University), Binyu Zang (Fudan University)

Policy-based Secure Deletion
Christian Cachin (IBM Research – Zurich), Kristiyan Haralambiev (IBM Research – Zurich), Hsu-Chun Hsiao (Carnegie Mellon University), Alessandro Sorniotti (IBM Research – Zurich)

How to Keep a Secret: Leakage Deterring Public-key Cryptosystems
Aggelos Kiayias (National and Kapodistrian University of Athens and University of Connecticut), Qiang Tang (National and Kapodistrian University of Athens and University of Connecticut)

PHANTOM: Practical Oblivious Computation in a Secure Processor
Martin Maas (UC Berkeley), Eric Love (UC Berkeley), Emil Stefanov (UC Berkeley), Mohit Tiwari (UT Austin), Elaine Shi (University of Maryland), Krste Asanovic (UC Berkeley), John Kubiatowicz (UC Berkeley), Dawn Song (UC Berkeley)

An Empirical Study of Cryptographic Misuse in Android Applications
Manuel Egele (Carnegie Mellon University), David Brumley (Carnegie Mellon University), Yanick Fratantonio (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara)

On the Security of TLS Renegotiation
Florian Giesen (Ruhr-Universität Bochum), Florian Kohlar (Ruhr-Universität Bochum), Douglas Stebila (Queensland University of Technology)

OAKE: A New Family of Implicitly Authenticated Diffie-Hellman Protocols
Andrew C. Yao (IIIS, Tsinghua University, Beijing, China), Yunlei Zhao (Software School, Fudan University, Shanghai, China)

Diglossia: Detecting Code Injection Attacks With Precision and Efficiency
Sooel Son (The University of Texas at Austin), Kathryn McKinley (Microsoft Research and The University of Texas at Austin), Vitaly Shmatikov (The University of Texas at Austin)

Tappan Zee (North) Bridge: Mining Memory Accesses for Introspection
Brendan Dolan-Gavitt (Georgia Institute of Technology), Tim Leek (MIT Lincoln Laboratory), Josh Hodosh (MIT Lincoln Laboratory), Wenke Lee (Georgia Institute of Technology)

Fast Two-Party Secure Computation with Minimal Assumptions
Abhi Shelat (University of Virginia), Chih-Hao Shen (University of Virginia)

Secure Data Deletion from Persistent Media
Joel Reardon (ETH Zurich), Hubert Ritzdorf (ETH Zurich), David Basin (ETH Zurich), Srdjan Capkun (ETH Zurich)

Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns
Sebastian Uellenbeck (Ruhr-University Bochum), Markus Dürmuth (Ruhr-University Bochum), Christopher Wolf (Ruhr-University Bochum), Thorsten Holz (Ruhr-University Bochum)

When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol
Changyu Dong (University of Strathclyde), Liqun Chen (Hewlett-Packard Laboratories), Zikai Wen (University of Strathclyde)

Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel
Mads Dam (KTH), Roberto Guanciale (KTH), Narges Khakpour (CSC, KTH), Hamed Nemati (KTH), Oliver Schwarz (SICS Swedish Institute of Computer Science)

25 Million Flows Later – Large-scale Detection of DOM-based XSS
Sebastian Lekies (SAP AG), Ben Stock (Friedrich-Alexander-University Erlangen-Nuremberg), Martin Johns (SAP AG)

ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking
Kangkook Jee (Columbia University), Vasileios P. Kemerlis (Columbia University), Angelos D. Keromytis (Columbia University), Georgios Portokalidis (Stevens Institute of Technology)

Impact of Integrity Attacks on Real-Time Pricing in Smart Grids
Rui Tan (Advanced Digital Sciences Center, Illinois at Singapore), Varun Badrinath Krishna (Advanced Digital Sciences Center, Illinois at Singapore), David K. Y. Yau (Advanced Digital Sciences Center, Illinois at Singapore and Singapore Univeristy of Technology and Design), Zbigniew Kalbarczyk (University of Illinois at Urbana-Champaign)

Predictability of Android OpenSSL’s Pseudo Random Number Generator
Soo Hyeon Kim (The Attached Institute of ETRI and KOREA Unisversity), Daewan Han (The Attached Institute of ETRI), Dong Hoon Lee (KOREA University)

Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy
Mathias Humbert (EPFL), Erman Ayday (EPFL), Jean-Pierre Hubaux (EPFL), Amalio Telenti (Institute of Microbiology, University Hospital and University of Lausanne)

deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation
Adam Doupe (University of California, Santa Barbara), Weidong Cui (Microsoft Research), Mariusz Jakubowski (Microsoft Research), Marcus Peinado (Microsoft Research), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)

Seeing Double: Reconstructing Obscured Typed Input from Repeated Compromising Reflections
Yi Xu (University of North Carolina at Chapel Hill), Jared Heinly (University of North Carolina at Chapel Hill), Andrew White (University of North Carolina at Chapel Hill), Jan-Michael Frahm (University of North Carolina at Chapel Hill), Fabian Monrose (University of North Carolina at Chapel Hill)

Computationally Complete Symbolic Attacker and Key Exchange
Gergei Bana (INRIA, Paris), Koji Hasebe (University of Tsukuba), Mitsuhiro Okada (Keio University)

Deduction Soundness: Prove One, Get Five for Free
Florian Böhl (Karlsruhe Institute of Technology), Véronique Cortier (LORIA – CNRS), Bogdan Warinschi (University of Bristol)

Cross-Origin Pixel Stealing: Timing Attacks Using CSS Filters
Robert Kotcher (Carnegie Mellon University), Yutong Pei (Carnegie Mellon University), Pranjal Jumde (Carnegie Mellon University), Collin Jackson (Carnegie Mellon University)

Low-Fat Pointers: Compact Encoding and Efficient Gate-Level Implementation of Fat Pointers for Spatial Safety and Capability-based Security
Albert Kwon (University of Pennsylvania, Philadelphia), Udit Dhawan (University of Pennsylvania, Philadelphia), Jonathan Smith (University of Pennsylvania, Philadelphia), Thomas Knight (BAE Systems), Andre Dehon (University of Pennsylvania, Philadelphia)

BIOS Chronomancy: Fixing the Core Root of Trust for Measurement
John Butterworth (MITRE), Corey Kallenberg (MITRE), Xeno Kovah (MITRE), Amy Herzog (MITRE)

PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks
Mashael Alsabah (Qatar Computing Research Institute), Ian Goldberg (University of Waterloo)

Towards Reducing the Attack Surface of Software Backdoors
Felix Schuster (Ruhr-Universität Bochum), Thorsten Holz (Ruhr-Universität Bochum)

Breaking and Entering through the Silicon
Clemens Helfmeier (Semiconductor Devices, TU Berlin), Dmitry Nedospasov (Security in Telecommunications, TU Berlin), Christopher Tarnovsky (IOActive Inc.), Jan Krissler (Security in Telecommunications, TU Berlin), Christian Boit (Semiconductor Devices, TU Berlin), Jean-Pierre Seifert (Security in Telecommunications, TU Berlin)

Using SMT Solvers to Automate Design Tasks for Encryption and Signature Schemes
Joseph A. Akinyele (Johns Hopkins University), Matthew Green (Johns Hopkins University), Susan Hohenberger (Johns Hopkins University)

Detecting Stealthy, Distributed SSH Bruteforcing
Mobin Javed (UC Berkeley), Vern Paxson (UC Berkeley and ICSI)

Relational Abstraction in Community-Based Secure Collaboration
Philip Fong (University of Calgary), Pooya Mehregan (University of Calgary), Ram Krishnan (University of Texas at San Antonio)

Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties
Máté Kovács (Technische Universität München), Helmut Seidl (Technische Universität München), Bernd Finkbeiner (Saarland University)

Content-Based Isolation: Rethinking Isolation Policy Design on Client Systems
Alexander Moshchuk (Microsoft Research), Helen Wang (Microsoft Research), Yunxin Liu (Microsoft Research Asia)

mXSS Attacks: Attacking well-secured Web-Applications by using innerHTML Mutations
Mario Heiderich (Ruhr-Universität Bochum), Jörg Schwenk (Ruhr-Universität Bochum), Tilman Frosch (Ruhr-Universität Bochum), Jonas Magazinius (Chalmers University of Technology), Edward Z. Yang (Stanford University)

HIFS: History Independence for File Systems
Sumeet Bajaj (Stony Brook University), Radu Sion (Stony Brook University)

Delta: Automatic Identification of Unknown Web-Based Infection Campaigns
Kevin Borgolte (UC Santa Barbara), Christopher Kruegel (UC Santa Barbara), Giovanni Vigna (UC Santa Barbara)

Measuring Password Guessability for an Entire University
Michelle L. Mazurek (Carnegie Mellon University), Saranga Komanduri (Carnegie Mellon University), Timothy Vidas (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Patrick Gage Kelley (University of New Mexico), Richard Shay (Carnegie Mellon University), Blase Ur (Carnegie Mellon University)

Unauthorized Origin Crossing on Mobile Platforms: Threats and Mitigation
Rui Wang (Microsoft Research), Luyi Xing (Indiana University), Xiaofeng Wang (Indiana University), Shuo Chen (Microsoft Research)

The Impact of Vendor Customizations on Android Security
Lei Wu (North Carolina State University), Michael Grace (North Carolina State University), Yajin Zhou (North Carolina State University), Chiachih Wu (North Carolina State University), Xuxian Jiang (North Carolina State University)

Flexible and Scalable Digital Signatures in TPM 2.0
Liqun Chen (HP Labs), Jiangtao Li (Intel Labs)

Outsourced Symmetric Private Information Retrieval
Stanislaw Jarecki (University of California, Irvine), Charanjit Jutla (IBM T.J. Watson Research Center), Hugo Krawczyk (IBM), Marcel C. Rosu (IBM T.J. Watson), Michael Steiner (IBM Research)

LogGC: Garbage Collecting Audit Log
Kyu Hyung Lee (Purdue University), Xiangyu Zhang (Purdue University), Dongyan Xu (Purdue University)

The Robustness of Hollow CAPTCHAs
Haichang Gao (Xidian University), Wei Wang (Xidian University), Jiao Qi (Xidian University), Xuqin Wang (Xidian University), Xiyang Liu (Xidian University), Jeff Yan (Newcastle University)

Security Analysis of a Widely Deployed Locking System
Michael Weiner (Technische Universität München), Maurice Massar (Technische Universität Kaiserslautern), Erik Tews (Technische Universität Darmstadt), Dennis Giese (Technische Universität Darmstadt), Wolfgang Wieser (Ludwig-Maximilians-Universität München)

Elligator: Elliptic-Curve Points Indistinguishable from Uniform Random Strings
Daniel Bernstein (University of Illinois at Chicago), Mike Hamburg (Cryptography Research), Anna Krasnova (RU Nijmegen), Tanja Lange (Technische Universiteit Eindhoven)

Geo-Indistinguishability: Differential Privacy for Location-Based Systems
Miguel E. Andres (École Polytechnique), Nicolás E. Bordenabe (INRIA and École Polytechnique), Konstantinos Chatzikokolakis (CNRS and École Polytechnique ), Catuscia Palamidessi (INRIA and École Polytechnique)

Scheduling Blackbox Mutational Fuzzing
Maverick Woo (Carnegie Mellon University), Sang Kil Cha (Carnegie Mellon University), Samantha Gottlieb (Carnegie Mellon University), David Brumley (Carnegie Mellon University)

MinimaLT: Minimal-latency Networking Through Better Security
W. Michael Petullo (University of Illinois at Chicago), Jon Solworth (University of Illinois at Chicago), Daniel Bernstein (University of Illinois at Chicago), Tanja Lange (TU Eindhoven), Xu Zhang (University of Illinois at Chicago)

More Efficient Oblivious Transfer and Extensions for Faster Secure Computation
Gilad Asharov (Bar-Ilan University), Yehuda Lindell (Bar-Ilan University), Thomas Schneider (TU Darmstadt), Michael Zohner (TU Darmstadt)

Efficient Targeted Key Subset Retrieval in Fractal Hash Sequences
Kelsey Cairns (Washington State University), Thoshitha Gamage (Washington State University), Carl Hauser (Washington State University)

Hang with Your Buddies to Resist Intersection Attacks
David Wolinsky (Yale University), Ewa Syta (Yale University), Bryan Ford (Yale University)

Düppel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud
Yinqian Zhang (University of North Carolina at Chapel Hill), Michael Reiter (University of North Carolina at Chapel Hill)

Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention
John Geddes (University of Minnesota), Maxfield Schuchard (University of Minnesota), Nicholas Hopper (University of Minnesota)

Protecting Sensitive Web Content from Client-side Vulnerabilities with Cryptons
Xinshu Dong (National University of Singapore), Zhaofeng Chen (Peking  University ), Hossein Siadati (Polytechnic Institute of New York University), Shruti Tople (National University of Singapore), Prateek Saxena (National University of Singapore), Zhenkai Liang (National University of Singapore)

An Architecture for Practical Actively Secure MPC with Dishonest Majority
Marcel Keller (University of Bristol), Peter Scholl (University of Bristol), Nigel Smart (University of Bristol)

Configuration-based IDS for Advanced Metering Infrastructure
Muhammad Qasim Ali (University of North Carolina at Charlotte), Ehab Al-Shaer (UNCC)

SAuth: Protecting User Accounts from Password Database Leaks
Georgios Kontaxis (Columbia University), Elias Athanasopoulos (Columbia University), Georgios Portokalidis (Stevens Institute of Technology), Angelos D. Keromytis (Columbia University)

A Clinical Study of Risk Factors Related to Malware Infections
Fanny Lalonde Lévesque (École Polytechnique de Montréal), Jude Nsiempba (École Polytechnique de Montréal), José M. Fernandez (École Polytechnique de Montréal), Sonia Chiasson (Carleton University), Anil Somayaji (Carleton University)

An Analysis of the EMV Channel Establishment Protocol
Christina Brzuska (Tel Aviv University), Nigel P. Smart (University of Bristol), Bogdan Warinschi (University of Bristol), Gaven J. Watson (University of Bristol)

Beheading Hydras: Performing Effective Botnet Takedowns
Yacin Nadji (Georgia Institute of Technology), Manos Antonakakis (Damballa Inc.), Roberto      Perdisci (University of Georgia), David Dagon (Georgia Institute of Technology), Wenke Lee (Georgia Institute of Technology),

PoWerStore: Proofs of Writing for Efficient and Robust Storage
Dan Dobre (NEC Labs Europe), Ghassan Karame (NEC Labs Europe), Wenting Li (NEC Labs Europe), Matthias Majuntke (Capgemini Deutschland ), Neeraj Suri (TU Darmstadt), Marko Vukolić (Eurecom)

Privacy-Preserving Matrix Factorization
Valeria Nikolaenko (Stanford), Stratis Ioannidis (Technicolor), Udi Weinsberg (Technicolor), Marc Joye (Technicolor), Nina Taft (Technicolor), Dan Boneh (Stanford)

PICCO: A General-Purpose Compiler for Private Distributed Computation
Yihua Zhang (University of Notre Dame), Aaron Steele (University of Notre Dame), Marina Blanton (University of Notre Dame)

Control-Alt-Hack: The Design and Evaluation of a Card Game for Computer Security Awareness and Education
Tamara Denning (University of Washington), Adam Lerner (University of Washington), Adam Shostack, Tadayoshi Kohno (University of Washington)

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值