


Остановите войну!
for scientists:


default search action
25th CCS 2018: Toronto, ON, Canada
- David Lie, Mohammad Mannan, Michael Backes, XiaoFeng Wang:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5693-0
Keynote
- Helen Nissenbaum:
Achieving Meaningful Privacy in Digital Systems. 1-2
Session 1A: SDN 1
- Haopei Wang, Guangliang Yang, Phakpoom Chinprutthiwong, Lei Xu, Yangyong Zhang, Guofei Gu:
Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era. 3-16 - Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn
, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. 17-34
Session 1B: Privacy
- Payman Mohassel, Peter Rindal:
ABY3: A Mixed Protocol Framework for Machine Learning. 35-52 - Véronique Cortier, Joseph Lallemand:
Voting: You Can't Have Privacy without Individual Verifiability. 53-66
Session 1C: Smart Contracts
- Petar Tsankov, Andrei Marian Dan, Dana Drachsler-Cohen, Arthur Gervais, Florian Bünzli, Martin T. Vechev:
Securify: Practical Security Analysis of Smart Contracts. 67-82 - Massimo Bartoletti, Roberto Zunino:
BitML: A Calculus for Bitcoin Smart Contracts. 83-100
Session 1D: ML for Deanonymization
- Mohammed Abuhamad
, Tamer AbuHmed
, Aziz Mohaisen, DaeHun Nyang:
Large-Scale and Language-Oblivious Code Authorship Identification. 101-114 - Nestor Hernandez, Mizanur Rahman, Ruben Recabarren, Bogdan Carbunar:
Fraud De-Anonymization for Fun and Profit. 115-130
Session 2A: Side Channels
- Young-joo Shin
, Hyung Chan Kim, Dokeun Kwon, Ji-Hoon Jeong, Junbeom Hur:
Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage. 131-145 - Mohammad A. Islam
, Shaolei Ren
:
Ohm's Law in Data Centers: A Voltage Side Channel for Timing Power Attacks. 146-162 - Giovanni Camurati
, Sebastian Poeplau, Marius Muench, Tom Hayes, Aurélien Francillon:
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers. 163-177 - Jo Van Bulck
, Frank Piessens, Raoul Strackx:
Nemesis: Studying Microarchitectural Timing Leaks in Rudimentary CPU Interrupt Logic. 178-195
Session 2B: Differential Privacy 1
- Mehmet Emre Gursoy, Ling Liu, Stacey Truex, Lei Yu, Wenqi Wei:
Utility-Aware Synthesis of Differentially Private and Attack-Resilient Location Traces. 196-211 - Zhikun Zhang, Tianhao Wang
, Ninghui Li, Shibo He, Jiming Chen:
CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. 212-229 - Thee Chanyaswad, Alex Dytso
, H. Vincent Poor
, Prateek Mittal:
MVG Mechanism: Differential Privacy under Matrix-Valued Query. 230-246 - Sebastian Meiser, Esfandiar Mohammadi:
Tight on Budget?: Tight Bounds for r-Fold Approximate Differential Privacy. 247-264
Session 2C: Crypto Attacks
- Shaanan N. Cohney
, Matthew D. Green, Nadia Heninger:
Practical State Recovery Attacks against Legacy RNG Implementations. 265-280 - Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, Juraj Somorovsky:
Prime and Prejudice: Primality Testing Under Adversarial Conditions. 281-298 - Mathy Vanhoef
, Frank Piessens:
Release the Kraken: New KRACKs in the 802.11 Standard. 299-314 - Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries. 315-331
Session 2D: ML 1
- Guixin Ye, Zhanyong Tang, Dingyi Fang, Zhanxing Zhu, Yansong Feng, Pengfei Xu, Xiaojiang Chen, Zheng Wang
:
Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach. 332-348 - Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
Model-Reuse Attacks on Deep Learning Systems. 349-363 - Wenbo Guo
, Dongliang Mu, Jun Xu, Purui Su, Gang Wang, Xinyu Xing:
LEMNA: Explaining Deep Learning based Security Applications. 364-379 - Kihong Heo, Woosuk Lee, Pardis Pashakhanloo, Mayur Naik:
Effective Program Debloating via Reinforcement Learning. 380-394
Session 3A: Binary Analysis
- Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion:
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. 395-411 - Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. 412-425 - Edward J. Schwartz, Cory F. Cohen, Michael Duggan, Jeffrey Gennari, Jeffrey S. Havrilla, Charles Hines:
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables. 426-441 - Dongpeng Xu
, Jiang Ming, Yu Fu, Dinghao Wu:
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification. 442-458
Session 3B: Differential Privacy 2
- Meisam Mohammady, Lingyu Wang, Yuan Hong
, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. 459-474 - Zeyu Ding
, Yuxin Wang
, Guanhong Wang, Danfeng Zhang, Daniel Kifer
:
Detecting Violations of Differential Privacy. 475-489 - Sahar Mazloom, S. Dov Gordon:
Secure Computation with Differentially Private Access Patterns. 490-507 - Benjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, Martin T. Vechev:
DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization. 508-524
Session 3C: Crypto: ZKPs and Lattices
- Jonathan Katz, Vladimir Kolesnikov, Xiao Wang
:
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures. 525-537 - Gilles Barthe
, Xiong Fan, Joshua Gancher, Benjamin Grégoire, Charlie Jacomme, Elaine Shi:
Symbolic Proofs for Lattice-Based Cryptography. 538-555 - Rosario Gennaro, Michele Minelli, Anca Nitulescu, Michele Orrù:
Lattice-Based zk-SNARKs from Square Span Programs. 556-573 - Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler:
Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability. 574-591
Session 3D: ML 2
- Yun Shen, Enrico Mariconti
, Pierre-Antoine Vervier, Gianluca Stringhini:
Tiresias: Predicting Security Events Through Deep Learning. 592-605 - Wei Song, Heng Yin
, Chang Liu, Dawn Song:
DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis. 606-618 - Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov:
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. 619-633 - Milad Nasr, Reza Shokri
, Amir Houmansadr:
Machine Learning with Membership Privacy using Adversarial Regularization. 634-646
Keynote
- Shai Halevi:
Advanced Cryptography: Promise and Challenges. 647
Session 4A: SDN 2
- Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi:
Cross-App Poisoning in Software-Defined Networking. 648-663 - Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, Ziming Zhao, Gail-Joon Ahn
:
AIM-SDN: Attacking Information Mismanagement in SDN-datastores. 664-676
Session 4B: Secure Computation 1
- Megha Byali, Arun Joseph, Arpita Patra, Divya Ravi
:
Fast Secure Computation for Small Population over the Internet. 677-694 - Assi Barak, Martin Hirt, Lior Koskas, Yehuda Lindell
:
An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants. 695-712
Session 4C: Blockchain 1
- Itay Tsabary, Ittay Eyal:
The Gap Game. 713-728 - Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat:
A Better Method to Analyze Blockchain Consistency. 729-744
Session 4D: Encrypted Search & Computation 1
- Shangqi Lai
, Sikhar Patranabis, Amin Sakzad
, Joseph K. Liu, Debdeep Mukhopadhyay, Ron Steinfeld, Shifeng Sun, Dongxi Liu, Cong Zuo:
Result Pattern Hiding Searchable Encryption for Conjunctive Queries. 745-762 - Shifeng Sun, Xingliang Yuan, Joseph K. Liu, Ron Steinfeld, Amin Sakzad
, Viet Vo, Surya Nepal
:
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption. 763-780
Session 5A: Cyberphysical Systems
- Marcel Kneib, Christopher Huth:
Scission: Signal Characteristic-Based Sender Identification and Intrusion Detection in Automotive Networks. 787-800 - Hongjun Choi, Wen-Chuan Lee, Yousra Aafer, Fan Fei, Zhan Tu
, Xiangyu Zhang, Dongyan Xu, Xinyan Deng:
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach. 801-816 - Wissam Aoudi
, Mikel Iturbe
, Magnus Almgren
:
Truth Will Out: Departure-Based Process-Level Detection of Stealthy Attacks on Control Systems. 817-831 - Wenbo Ding, Hongxin Hu:
On the Safety of IoT Device Physical Interaction Control. 832-846
Session 5B: Secure Computation 2
- Niklas Büscher, Daniel Demmler, Stefan Katzenbeisser, David Kretzmer, Thomas Schneider
:
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation. 847-861 - Ruiyu Zhu, Darion Cassel, Amr Sabry
, Yan Huang:
NANOPI: Extreme-Scale Actively-Secure Multi-Party Computation. 862-879 - Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller
, Yehuda Lindell
, Kazuma Ohara
, Hikaru Tsuchida:
Generalizing the SPDZ Compiler For Other Protocols. 880-895 - Elette Boyle, Geoffroy Couteau
, Niv Gilboa
, Yuval Ishai:
Compressing Vector OLE. 896-912
Session 5C: Blockchain 2
- Christian Badertscher
, Peter Gazi, Aggelos Kiayias, Alexander Russell
, Vassilis Zikas:
Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability. 913-930 - Mahdi Zamani, Mahnush Movahedi, Mariana Raykova:
RapidChain: Scaling Blockchain via Full Sharding. 931-948 - Stefan Dziembowski
, Sebastian Faust, Kristina Hostáková:
General State Channel Networks. 949-966 - Stefan Dziembowski
, Lisa Eckey, Sebastian Faust:
FairSwap: How To Fairly Exchange Digital Goods. 967-984
Session 5D: Encrypted Search & Computation 2
- Adi Akavia, Dan Feldman, Hayim Shaul:
Secure Search on Encrypted Data via Multi-Ring Sketch. 985-1001 - Sarvar Patel, Giuseppe Persiano, Kevin Yeo:
Private Stateful Information Retrieval. 1002-1019 - Eric Crockett, Chris Peikert, Chad Sharp:
ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY. 1020-1037 - Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili:
New Constructions for Forward and Backward Private Symmetric Searchable Encryption. 1038-1055
Session 6A: IoT Security
- Roei Schuster, Vitaly Shmatikov, Eran Tromer:
Situational Access Control in the Internet of Things. 1056-1073 - Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu
:
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. 1074-1088 - Hyunwoo Yu, Jaemin Lim, Kiyeon Kim, Suk-Bok Lee:
Pinto: Enabling Video Privacy for Commodity IoT Cameras. 1089-1101 - Iulia Bastys
, Musard Balliu, Andrei Sabelfeld:
If This Then What?: Controlling Flows in IoT Apps. 1102-1119
Session 6B: Mobile Security 1
- Andrea Possemato, Andrea Lanzi, Simon Pak Ho Chung, Wenke Lee, Yanick Fratantonio:
ClickShield: Are You Hiding Something? Towards Eradicating Clickjacking on Android. 1120-1136 - Fengguo Wei, Xingwei Lin, Xinming Ou, Ting Chen, Xiaosong Zhang:
JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code. 1137-1150 - Yousra Aafer, Guanhong Tao, Jianjun Huang, Xiangyu Zhang, Ninghui Li:
Precise Android API Protection Mapping Derivation and Reasoning. 1151-1164 - Lei Zhang
, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian
, Geng Hong, Yuan Zhang, Min Yang:
Invetter: Locating Insecure Input Validations in Android Services. 1165-1178
Session 6C: Crypto 1
- Rosario Gennaro, Steven Goldfeder:
Fast Multiparty Threshold ECDSA with Fast Trustless Setup. 1179-1194 - Tibor Jager, Saqib A. Kakvi
, Alexander May
:
On the Security of the PKCS#1 v1.5 Signature Scheme. 1195-1208 - Xiaoqian Jiang, Miran Kim
, Kristin E. Lauter, Yongsoo Song
:
Secure Outsourced Matrix Computation and Application to Neural Networks. 1209-1222 - Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal:
Labeled PSI from Fully Homomorphic Encryption with Malicious Security. 1223-1237
Session 6D: Usable Security
- Elissa M. Redmiles, Ziyun Zhu, Sean Kross, Dhruv Kuchhal, Tudor Dumitras, Michelle L. Mazurek:
Asking for a Friend: Evaluating Response Biases in Security User Studies. 1238-1255 - Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin
:
Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses. 1256-1271 - Constanze Dietrich, Katharina Krombholz, Kevin Borgolte, Tobias Fiebig
:
Investigating System Operators' Perspective on Security Misconfigurations. 1272-1289 - Kevin Gallagher
, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, Nasir D. Memon:
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser. 1290-1305
Session 7A: Forensics
- Zhengxiong Li, Aditya Singh Rathore, Chen Song, Sheng Wei, Yanzhi Wang, Wenyao Xu:
PrinTracker: Fingerprinting 3D Printers using Commodity Scanners. 1306-1323 - Yutao Tang, Ding Li, Zhichun Li, Mu Zhang
, Kangkook Jee, Xusheng Xiao
, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li:
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. 1324-1337 - Chris Chao-Chun Cheng, Chen Shi, Neil Zhenqiang Gong, Yong Guan:
EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis. 1338-1350
Session 7B: Formal Methods and Language Security
- Carmine Abate, Arthur Azevedo de Amorim, Roberto Blanco, Ana Nora Evans, Guglielmo Fachini, Catalin Hritcu, Théo Laurent, Benjamin C. Pierce, Marco Stronati, Andrew Tolmach:
When Good Components Go Bad: Formally Secure Compilation Despite Dynamic Compromise. 1351-1368 - Marc Andrysco, Andres Nötzli
, Fraser Brown, Ranjit Jhala, Deian Stefan:
Towards Verified, Constant-time Floating Point Operations. 1369-1382 - David A. Basin, Jannik Dreier, Lucca Hirschi
, Sasa Radomirovic
, Ralf Sasse
, Vincent Stettler:
A Formal Analysis of 5G Authentication. 1383-1396
Session 7C: TLS
- Eyal Ronen, Kenneth G. Paterson, Adi Shamir:
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure. 1397-1414 - Christopher Patton, Thomas Shrimpton:
Partially Specified Channels: The TLS 1.3 Record Layer without Elision. 1415-1428 - Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam:
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. 1429-1440
Session 7D: Binary Defenses 1
- Hojoon Lee, Chihyun Song, Brent ByungHoon Kang:
Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86. 1441-1454 - Zhihao Yao, Saeed Mirzamohammadi, Ardalan Amiri Sani, Mathias Payer:
Milkomeda: Safeguarding the Mobile GPU Interface Using WebGL Security Checks. 1455-1469 - Hong Hu
, Chenxiong Qian, Carter Yagemann
, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, Wenke Lee:
Enforcing Unique Code Target Property for Control-Flow Integrity. 1470-1486
Session 8A: Web Security 1
- Mahmood Sharif
, Jumpei Urakawa, Nicolas Christin
, Ayumu Kubota, Akira Yamada:
Predicting Impending Exposure to Malicious Content from User Behavior. 1487-1501 - Iskander Sánchez-Rola, Igor Santos, Davide Balzarotti:
Clock Around the Clock: Time-Based Device Fingerprinting. 1502-1514 - Anupam Das, Gunes Acar, Nikita Borisov, Amogh Pradeep:
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. 1515-1532
Session 8B: Usable Passwords
- Zeinab Joudaki, Julie Thorpe
, Miguel Vargas Martin:
Reinforcing System-Assigned Passphrases Through Implicit Learning. 1533-1548 - Maximilian Golla, Miranda Wei, Juliette Hainline, Lydia Filipe, Markus Dürmuth
, Elissa M. Redmiles, Blase Ur:
"What was that site doing with my Facebook password?": Designing Password-Reuse Notifications. 1549-1566 - Maximilian Golla, Markus Dürmuth
:
On the Accuracy of Password Strength Meters. 1567-1582
Session 8C: Information Flow
- Andrew Ferraiuolo, Mark Zhao
, Andrew C. Myers, G. Edward Suh
:
HyperFlow: A Processor Architecture for Nonmalleable, Timing-Safe Information Flow Security. 1583-1600 - Thomas F. J.-M. Pasquier
, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers
, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. 1601-1616 - Thomas Schmitz, Maximilian Algehed, Cormac Flanagan, Alejandro Russo:
Faceted Secure Multi Execution. 1617-1634
Session 8D: Binary Defenses 2
- Daiping Liu, Mingwei Zhang, Haining Wang:
A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping. 1635-1648 - Benjamin Kollenda, Philipp Koppe, Marc Fyrbiak, Christian Kison, Christof Paar, Thorsten Holz
:
An Exploratory Analysis of Microcode as a Building Block for System Defenses. 1649-1666 - Jingxuan He, Pesho Ivanov
, Petar Tsankov, Veselin Raychev, Martin T. Vechev:
Debin: Predicting Debug Information in Stripped Binaries. 1667-1680
Session 9A: Web Security 2
- Quan Chen, Alexandros Kapravelos:
Mystique: Uncovering Information Leakage from Browser Extensions. 1687-1700 - Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang
, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian
, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. 1701-1713 - Radhesh Krishnan Konoth, Emanuele Vineti, Veelasha Moonsamy, Martina Lindorfer, Christopher Kruegel, Herbert Bos
, Giovanni Vigna:
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense. 1714-1730 - Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, Sooel Son
:
Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications. 1731-1746
Session 9B: Mobile Security 2
- Song Fang, Ian D. Markwood, Yao Liu, Shangqing Zhao, Zhuo Lu, Haojin Zhu
:
No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing. 1747-1760 - Stefan Savage:
Lawful Device Access without Mass Surveillance Risk: A Technical Design Discussion. 1761-1774 - Man Zhou
, Qian Wang
, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. 1775-1787 - Simone Aonzo
, Alessio Merlo, Giulio Tavella, Yanick Fratantonio:
Phishing Attacks on Modern Android. 1788-1801
Session 9C: Crypto 2
- Katriel Cohn-Gordon, Cas Cremers, Luke Garratt, Jon Millican, Kevin Milner:
On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees. 1802-1819 - Jeremiah Blocki, Ling Ren
, Samson Zhou:
Bandwidth-Hard Functions: Reductions and Lower Bounds. 1820-1836 - Yehuda Lindell
, Ariel Nof:
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody. 1837-1854 - Rouzbeh Behnia,