Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2017.bht:"
@inproceedings{DBLP:conf/ccs/000117, author = {David A. Wagner}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Security and Machine Learning}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134108}, doi = {10.1145/3133956.3134108}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/000117.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001HPZ17, author = {Michael Backes and Mathias Humbert and Jun Pang and Yang Zhang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {walk2friends: Inferring Social Links from Mobility Profiles}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1943--1957}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133972}, doi = {10.1145/3133956.3133972}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001HPZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001M17, author = {Matthew Green and Ian Miers}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Bolt: Anonymous Payment Channels for Decentralized Currencies}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {473--489}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134093}, doi = {10.1145/3133956.3134093}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001M17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0005Y17, author = {Qiang Tang and Moti Yung}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Cliptography: Post-Snowden Cryptography}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2615--2616}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3136065}, doi = {10.1145/3133956.3136065}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0005Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AcerSFFBDBST17, author = {Mustafa Emre Acer and Emily Stark and Adrienne Porter Felt and Sascha Fahl and Radhika Bhargava and Bhanu Dev and Matt Braithwaite and Ryan Sleevi and Parisa Tabriz}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Where the Wild Warnings Are: Root Causes of Chrome {HTTPS} Certificate Errors}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1407--1420}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134007}, doi = {10.1145/3133956.3134007}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AcerSFFBDBST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalBPS017, author = {Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehl{\'{e}} and Shota Yamada}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2277--2293}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134041}, doi = {10.1145/3133956.3134041}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalBPS017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalC17, author = {Shashank Agrawal and Melissa Chase}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{FAME:} Fast Attribute-based Message Encryption}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {665--682}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134014}, doi = {10.1145/3133956.3134014}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhmedK17, author = {Muhammad Ejaz Ahmed and Hyoungshick Kim}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2467--2469}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138853}, doi = {10.1145/3133956.3138853}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AhmedK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Allodi17, author = {Luca Allodi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Economic Factors of Vulnerability Trade and Exploitation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1483--1499}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133960}, doi = {10.1145/3133956.3133960}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Allodi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlmeidaBBBGLOPS17, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Arthur Blot and Benjamin Gr{\'{e}}goire and Vincent Laporte and Tiago Oliveira and Hugo Pacheco and Benedikt Schmidt and Pierre{-}Yves Strub}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Jasmin: High-Assurance and High-Speed Cryptography}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1807--1823}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134078}, doi = {10.1145/3133956.3134078}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlmeidaBBBGLOPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlmeidaBBDGLP17, author = {Jos{\'{e}} Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Fran{\c{c}}ois Dupressoir and Benjamin Gr{\'{e}}goire and Vincent Laporte and Vitor Pereira}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Fast and Verified Software Stack for Secure Function Evaluation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1989--2006}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134017}, doi = {10.1145/3133956.3134017}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AlmeidaBBDGLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AlwenBH17, author = {Jo{\"{e}}l Alwen and Jeremiah Blocki and Benjamin Harsha}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1001--1017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134031}, doi = {10.1145/3133956.3134031}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AlwenBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AmbronaBGW17, author = {Miguel Ambrona and Gilles Barthe and Romain Gay and Hoeteck Wee}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {647--664}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134088}, doi = {10.1145/3133956.3134088}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AmbronaBGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AmesHIV17, author = {Scott Ames and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2087--2104}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134104}, doi = {10.1145/3133956.3134104}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AmesHIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bahri17, author = {Leila Bahri}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Identity Related Threats, Vulnerabilities and Risk Mitigation in Online Social Networks: {A} Tutorial}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2603--2605}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3136066}, doi = {10.1145/3133956.3136066}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Bahri17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareD17, author = {Mihir Bellare and Wei Dai}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {923--940}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133965}, doi = {10.1145/3133956.3133965}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BellareD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareH17, author = {Mihir Bellare and Viet Tung Hoang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Identity-Based Format-Preserving Encryption}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1515--1532}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133995}, doi = {10.1145/3133956.3133995}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BellareH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareJL17, author = {Mihir Bellare and Joseph Jaeger and Julia Len}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {891--906}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134087}, doi = {10.1145/3133956.3134087}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BellareJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BensonLSZ17, author = {Theophilus Benson and Peng Liu and Srikanth Sundaresan and Yuqing Zhang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {IoT S{\&}P 2017: First Workshop on Internet of Things Security and Privacy}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2647--2648}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137053}, doi = {10.1145/3133956.3137053}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BensonLSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BerndtL17, author = {Sebastian Berndt and Maciej Liskiewicz}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Algorithm Substitution Attacks from a Steganographic Perspective}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1649--1660}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133981}, doi = {10.1145/3133956.3133981}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BerndtL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bielova17, author = {Nataliia Bielova}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Web Tracking Technologies and Protection Mechanisms}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2607--2609}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3136067}, doi = {10.1145/3133956.3136067}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Bielova17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BielovaG17, author = {Nataliia Bielova and Marco Gaboardi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{PLAS} 2017: {ACM} {SIGSAC} Workshop on Programming Languages and Analysis for Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2639--2640}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137045}, doi = {10.1145/3133956.3137045}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BielovaG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Biggio0MS17, author = {Battista Biggio and David Freeman and Brad Miller and Arunesh Sinha}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {10th International Workshop on Artificial Intelligence and Security (AISec 2017)}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2621--2622}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137048}, doi = {10.1145/3133956.3137048}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Biggio0MS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BilgeHD17, author = {Leyla Bilge and Yufei Han and Matteo Dell'Amico}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {RiskTeller: Predicting the Risk of Cyber Incidents}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1299--1311}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134022}, doi = {10.1145/3133956.3134022}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BilgeHD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BobbaR17, author = {Rakesh B. Bobba and Awais Rashid}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{CPS-SPC} 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2629--2630}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137051}, doi = {10.1145/3133956.3137051}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BobbaR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BohmePNR17, author = {Marcel B{\"{o}}hme and Van{-}Thuan Pham and Manh{-}Dung Nguyen and Abhik Roychoudhury}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Directed Greybox Fuzzing}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2329--2344}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134020}, doi = {10.1145/3133956.3134020}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BohmePNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BonawitzIKMMPRS17, author = {Kallista A. Bonawitz and Vladimir Ivanov and Ben Kreuter and Antonio Marcedone and H. Brendan McMahan and Sarvar Patel and Daniel Ramage and Aaron Segal and Karn Seth}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Practical Secure Aggregation for Privacy-Preserving Machine Learning}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1175--1191}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133982}, doi = {10.1145/3133956.3133982}, timestamp = {Fri, 09 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BonawitzIKMMPRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BostMO17, author = {Rapha{\"{e}}l Bost and Brice Minaud and Olga Ohrimenko}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1465--1482}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133980}, doi = {10.1145/3133956.3133980}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BostMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyleCGIO17, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Michele Orr{\`{u}}}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Homomorphic Secret Sharing: Optimizations and Applications}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2105--2122}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134107}, doi = {10.1145/3133956.3134107}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyleCGIO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaiCXLX17, author = {Zixi Cai and Zigang Cao and Gang Xiong and Zhen Li and Wei Xia}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} An Empirical Measurement Study on Multi-tenant Deployment Issues of CDNs}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2471--2473}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138852}, doi = {10.1145/3133956.3138852}, timestamp = {Wed, 08 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CaiCXLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CamenischDD17, author = {Jan Camenisch and Manu Drijvers and Maria Dubovitskaya}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {683--699}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134025}, doi = {10.1145/3133956.3134025}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CamenischDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CampanelliGGN17, author = {Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {229--243}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134060}, doi = {10.1145/3133956.3134060}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CampanelliGGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoCLW17, author = {Yinzhi Cao and Zhanhao Chen and Song Li and Shujiang Wu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Deterministic Browser}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {163--178}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133996}, doi = {10.1145/3133956.3133996}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CaoCLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoYZLQX17, author = {Shaosheng Cao and Xinxing Yang and Jun Zhou and Xiaolong Li and Yuan (Alan) Qi and Kai Xiao}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Actively Detecting Implicit Fraudulent Transactions}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2475--2477}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138822}, doi = {10.1145/3133956.3138822}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CaoYZLQX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CarmerM017, author = {Brent Carmer and Alex J. Malozemoff and Mariana Raykova}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {747--764}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133983}, doi = {10.1145/3133956.3133983}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CarmerM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CecchettiMA17, author = {Ethan Cecchetti and Andrew C. Myers and Owen Arden}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Nonmalleable Information Flow Control}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1875--1891}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134054}, doi = {10.1145/3133956.3134054}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CecchettiMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CecchettiZJKJS17, author = {Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed E. Kosba and Ari Juels and Elaine Shi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Solidus: Confidential Distributed Ledger Transactions via {PVORM}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {701--717}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134010}, doi = {10.1145/3133956.3134010}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CecchettiZJKJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChandranGMV17, author = {Nishanth Chandran and Juan A. Garay and Payman Mohassel and Satyanarayana Vusirikala}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Efficient, Constant-Round and Actively Secure {MPC:} Beyond the Three-Party Case}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {277--294}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134100}, doi = {10.1145/3133956.3134100}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChandranGMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChangDKRT17, author = {Chip{-}Hong Chang and Marten van Dijk and Farinaz Koushanfar and Ulrich R{\"{u}}hrmair and Mark M. Tehranipoor}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{ASHES} 2017: Workshop on Attacks and Solutions in Hardware Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2623--2625}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137049}, doi = {10.1145/3133956.3137049}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChangDKRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChaseDGORRSZ17, author = {Melissa Chase and David Derler and Steven Goldfeder and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig and Greg Zaverucha}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1825--1842}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133997}, doi = {10.1145/3133956.3133997}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChaseDGORRSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChatterjeeWPCR17, author = {Rahul Chatterjee and Joanne Woodage and Yuval Pnueli and Anusha Chowdhury and Thomas Ristenpart}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {The TypTop System: Personalized Typo-Tolerant Password Checking}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {329--346}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134000}, doi = {10.1145/3133956.3134000}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChatterjeeWPCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenFD17, author = {Jia Chen and Yu Feng and Isil Dillig}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {875--890}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134058}, doi = {10.1145/3133956.3134058}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenFD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenLR17, author = {Hao Chen and Kim Laine and Peter Rindal}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Fast Private Set Intersection from Homomorphic Encryption}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1243--1255}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134061}, doi = {10.1145/3133956.3134061}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenMHM17, author = {Yan Chen and Ashwin Machanavajjhala and Michael Hay and Gerome Miklau}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {PeGaSus: Data-Adaptive Differentially Private Stream Processing}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1375--1388}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134102}, doi = {10.1145/3133956.3134102}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenMHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenNKMPA017, author = {Yizheng Chen and Yacin Nadji and Athanasios Kountouras and Fabian Monrose and Roberto Perdisci and Manos Antonakakis and Nikolaos Vasiloglou}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Practical Attacks Against Graph-based Clustering}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1125--1142}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134083}, doi = {10.1145/3133956.3134083}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenNKMPA017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenTOCYM17, author = {Qi Alfred Chen and Matthew Thomas and Eric Osterweil and Yulong Cao and Jie You and Zhuoqing Morley Mao}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Client-side Name Collision Vulnerability in the New gTLD Era: {A} Systematic Study}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {941--956}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134084}, doi = {10.1145/3133956.3134084}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenTOCYM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenYLCWZ17, author = {Yi Chen and Wei You and Yeonjoon Lee and Kai Chen and XiaoFeng Wang and Wei Zou}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {815--828}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134009}, doi = {10.1145/3133956.3134009}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenYLCWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenZYS17, author = {Li Chen and Mingwei Zhang and Chih{-}Yuan Yang and Ravi Sahita}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Semi-supervised Classification for Dynamic Android Malware Detection}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2479--2481}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138838}, doi = {10.1145/3133956.3138838}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenZYS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChengTY17, author = {Long Cheng and Ke Tian and Danfeng (Daphne) Yao}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Detection of {CPS} Program Anomalies by Enforcing Cyber-Physical Execution Semantics}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2483--2485}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138839}, doi = {10.1145/3133956.3138839}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChengTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChhotarayNSFT17, author = {Animesh Chhotaray and Adib Nahiyan and Thomas Shrimpton and Domenic Forte and Mark M. Tehranipoor}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Standardizing Bad Cryptographic Practice: {A} Teardown of the {IEEE} Standard for Protecting Electronic-design Intellectual Property}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1533--1546}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134040}, doi = {10.1145/3133956.3134040}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChhotarayNSFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoS17, author = {Kyong{-}Tak Cho and Kang G. Shin}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Viden: Attacker Identification on In-Vehicle Networks}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1109--1123}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134001}, doi = {10.1145/3133956.3134001}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Choudhuri00KM17, author = {Arka Rai Choudhuri and Matthew Green and Abhishek Jain and Gabriel Kaptchuk and Ian Miers}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {719--728}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134092}, doi = {10.1145/3133956.3134092}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Choudhuri00KM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CorinaMSSHKV17, author = {Jake Corina and Aravind Machiry and Christopher Salls and Yan Shoshitaishvili and Shuang Hao and Christopher Kruegel and Giovanni Vigna}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{DIFUZE:} Interface Aware Fuzzing for Kernel Drivers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2123--2138}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134069}, doi = {10.1145/3133956.3134069}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CorinaMSSHKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CortierGLM17, author = {V{\'{e}}ronique Cortier and Niklas Grimm and Joseph Lallemand and Matteo Maffei}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Type System for Privacy Properties}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {409--423}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133998}, doi = {10.1145/3133956.3133998}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CortierGLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CremersHHSM17, author = {Cas Cremers and Marko Horvat and Jonathan Hoyland and Sam Scott and Thyla van der Merwe}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Comprehensive Symbolic Analysis of {TLS} 1.3}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1773--1788}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134063}, doi = {10.1145/3133956.3134063}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CremersHHSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CuiCXS17, author = {Mingxin Cui and Zigang Cao and Gang Xiong and Junzheng Shi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} {A} Comprehensive Study of Forged Certificates in the Wild}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2487--2489}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138851}, doi = {10.1145/3133956.3138851}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CuiCXS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DangHC17, author = {Hung Dang and Yue Huang and Ee{-}Chien Chang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Evading Classifiers by Morphing in the Dark}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {119--133}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133978}, doi = {10.1145/3133956.3133978}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DangHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DattaFKMS17, author = {Anupam Datta and Matthew Fredrikson and Gihyuk Ko and Piotr Mardziel and Shayak Sen}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1193--1210}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134097}, doi = {10.1145/3133956.3134097}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DattaFKMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DerrBFA017, author = {Erik Derr and Sven Bugiel and Sascha Fahl and Yasemin Acar and Michael Backes}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2187--2200}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134059}, doi = {10.1145/3133956.3134059}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DerrBFA017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DingDLCZCWW17, author = {Yu Ding and Ran Duan and Long Li and Yueqiang Cheng and Yulong Zhang and Tanghui Chen and Tao Wei and Huibo Wang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Rust {SGX} {SDK:} Towards Memory Safety in Intel {SGX} Enclave}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2491--2493}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138824}, doi = {10.1145/3133956.3138824}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DingDLCZCWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoernerS17, author = {Jack Doerner and Abhi Shelat}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Scaling {ORAM} for Secure Computation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {523--535}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133967}, doi = {10.1145/3133956.3133967}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoernerS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DongWAMM17, author = {Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad van Moorsel}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {211--227}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134032}, doi = {10.1145/3133956.3134032}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DongWAMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DottlingGNNT17, author = {Nico D{\"{o}}ttling and Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges and Roberto Trifiletti}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2263--2276}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134024}, doi = {10.1145/3133956.3134024}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DottlingGNNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Du0ZS17, author = {Min Du and Feifei Li and Guineng Zheng and Vivek Srikumar}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1285--1298}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134015}, doi = {10.1145/3133956.3134015}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Du0ZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuanBXKL17, author = {Ruian Duan and Ashish Bijlani and Meng Xu and Taesoo Kim and Wenke Lee}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Identifying Open-Source License Violation and 1-day Security Risk at Large Scale}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2169--2185}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134048}, doi = {10.1145/3133956.3134048}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DuanBXKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EspitauFGT17, author = {Thomas Espitau and Pierre{-}Alain Fouque and Beno{\^{\i}}t G{\'{e}}rard and Mehdi Tibouchi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Side-Channel Attacks on {BLISS} Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1857--1874}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134028}, doi = {10.1145/3133956.3134028}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EspitauFGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FenskeMJS17, author = {Ellis Fenske and Akshaya Mani and Aaron Johnson and Micah Sherr}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Distributed Measurement with Private Set-Union Cardinality}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2295--2312}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134034}, doi = {10.1145/3133956.3134034}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FenskeMJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Finkbeiner0SZ17, author = {Bernd Finkbeiner and Christian M{\"{u}}ller and Helmut Seidl and Eugen Zalinescu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Verifying Security Policies in Multi-agent Workflows with Loops}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {633--645}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134080}, doi = {10.1145/3133956.3134080}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Finkbeiner0SZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FischVBG17, author = {Ben Fisch and Dhinakaran Vinayagamurthy and Dan Boneh and Sergey Gorbunov}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{IRON:} Functional Encryption using Intel {SGX}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {765--782}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134106}, doi = {10.1145/3133956.3134106}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FischVBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrassettoGLS17, author = {Tommaso Frassetto and David Gens and Christopher Liebchen and Ahmad{-}Reza Sadeghi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {JITGuard: Hardening Just-in-time Compilers with {SGX}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2405--2419}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134037}, doi = {10.1145/3133956.3134037}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FrassettoGLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FreireNFB17, author = {Lucas Freire and Miguel C. Neves and Alberto E. Schaeffer Filho and Marinho P. Barcellos}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Finding Vulnerabilities in {P4} Programs with Assertion-based Verification}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2495--2497}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138837}, doi = {10.1145/3133956.3138837}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FreireNFB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gamero-GarridoS17, author = {Alexander Gamero{-}Garrido and Stefan Savage and Kirill Levchenko and Alex C. Snoeren}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1501--1513}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134047}, doi = {10.1145/3133956.3134047}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Gamero-GarridoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GenkinVY17, author = {Daniel Genkin and Luke Valenta and Yuval Yarom}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {May the Fourth Be With You: {A} Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {845--858}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134029}, doi = {10.1145/3133956.3134029}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GenkinVY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GueronL17, author = {Shay Gueron and Yehuda Lindell}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1019--1036}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133992}, doi = {10.1145/3133956.3133992}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GueronL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HafizH17, author = {Syed Mahbub Hafiz and Ryan Henry}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Querying for Queries: Indexes of Queries for Efficient and Expressive {IT-PIR}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1361--1373}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134008}, doi = {10.1145/3133956.3134008}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HafizH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaleviHSS17, author = {Shai Halevi and Tzipora Halevi and Victor Shoup and Noah Stephens{-}Davidowitz}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Implementing BP-Obfuscation Using Graph-Induced Encoding}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {783--798}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133976}, doi = {10.1145/3133956.3133976}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaleviHSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HallmanRC17, author = {Roger Hallman and Kurt Rohloff and Victor Chang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Workshop on Multimedia Privacy and Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2645--2646}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137043}, doi = {10.1145/3133956.3137043}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HallmanRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HanC17, author = {HyungSeok Han and Sang Kil Cha}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{IMF:} Inferred Model-based Fuzzer}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2345--2358}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134103}, doi = {10.1145/3133956.3134103}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HanC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HanELZP17, author = {Yi Han and Sriharsha Etigowni and Hua Liu and Saman A. Zonouz and Athina P. Petropulu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1095--1108}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134081}, doi = {10.1145/3133956.3134081}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HanELZP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HartungH0R17, author = {Gunnar Hartung and Max Hoffmann and Matthias Nagel and Andy Rupp}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{BBA+:} Improving the Security and Applicability of Privacy-Preserving Point Collection}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1925--1942}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134071}, doi = {10.1145/3133956.3134071}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HartungH0R17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeMFS17, author = {Xi He and Ashwin Machanavajjhala and Cheryl J. Flynn and Divesh Srivastava}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Composing Differential Privacy and Secure Computation: {A} Case Study on Scaling Private Record Linkage}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1389--1406}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134030}, doi = {10.1145/3133956.3134030}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeMFS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Henry17, author = {Ryan Henry}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Tutorial: Private Information Retrieval}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2611--2612}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3136069}, doi = {10.1145/3133956.3136069}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Henry17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HernandezFTYB17, author = {Grant Hernandez and Farhaan Fowze and Dave (Jing) Tian and Tuba Yavuz and Kevin R. B. Butler}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {FirmUSB: Vetting {USB} Device Firmware using Domain Informed Symbolic Execution}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2245--2262}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134050}, doi = {10.1145/3133956.3134050}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HernandezFTYB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeroldHKRR17, author = {Gottfried Herold and Max Hoffmann and Michael Kloo{\ss} and Carla R{\`{a}}fols and Andy Rupp}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1547--1564}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134068}, doi = {10.1145/3133956.3134068}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeroldHKRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HitajAP17, author = {Briland Hitaj and Giuseppe Ateniese and Fernando P{\'{e}}rez{-}Cruz}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Deep Models Under the {GAN:} Information Leakage from Collaborative Deep Learning}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {603--618}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134012}, doi = {10.1145/3133956.3134012}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HitajAP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HoWK17, author = {Jun{-}Won Ho and KyungRok Won and Jee Sun Kim}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Covert Channel Based on the Sequential Analysis in Android Systems}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2499--2501}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138847}, doi = {10.1145/3133956.3138847}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HoWK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HoangOYGN17, author = {Thang Hoang and Ceyhun D. Ozkaptan and Attila A. Yavuz and Jorge Guajardo and Tam Nguyen}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {S\({}^{\mbox{3}}\)ORAM: {A} Computation-Efficient and Constant Client Bandwidth Blowup {ORAM} with Shamir Secret Sharing}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {491--505}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134090}, doi = {10.1145/3133956.3134090}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HoangOYGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HollandS17, author = {Jordan Holland and Max Schuchard}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Why Are You Going That Way? Measuring Unnecessary Exposure of Network Traffic to Nation States}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2503--2505}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138842}, doi = {10.1145/3133956.3138842}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HollandS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangSB017, author = {Jie Huang and Oliver Schranz and Sven Bugiel and Michael Backes}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {The {ART} of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1037--1049}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134064}, doi = {10.1145/3133956.3134064}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangSB017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangXXLQ17, author = {Jian Huang and Jun Xu and Xinyu Xing and Peng Liu and Moinuddin K. Qureshi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {FlashGuard: Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2231--2244}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134035}, doi = {10.1145/3133956.3134035}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangXXLQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IslamRW17, author = {Mohammad A. Islam and Shaolei Ren and Adam Wierman}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1079--1094}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133994}, doi = {10.1145/3133956.3133994}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IslamRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JeonBCLP17, author = {Yuseok Jeon and Priyam Biswas and Scott A. Carr and Byoungyoung Lee and Mathias Payer}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {HexType: Efficient Detection of Type Confusion Errors for {C++}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2373--2387}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134062}, doi = {10.1145/3133956.3134062}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JeonBCLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiLDWFKOL17, author = {Yang Ji and Sangho Lee and Evan Downing and Weiren Wang and Mattia Fazzini and Taesoo Kim and Alessandro Orso and Wenke Lee}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{RAIN:} Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {377--390}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134045}, doi = {10.1145/3133956.3134045}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JiLDWFKOL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiaXCL17, author = {Shijie Jia and Luning Xia and Bo Chen and Peng Liu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{DEFTL:} Implementing Plausibly Deniable Encryption in Flash Translation Layer}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2217--2229}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134011}, doi = {10.1145/3133956.3134011}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiaXCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarLRR17, author = {Diptendu Mohan Kar and Ibrahim Lazrig and Indrajit Ray and Indrakshi Ray}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} PriReMat: {A} Distributed Tool for Privacy Preserving Record Linking in Healthcare}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2507--2509}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138845}, doi = {10.1145/3133956.3138845}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KarLRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarameS17, author = {Ghassan O. Karame and Angelos Stavrou}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {CCSW'17: 2017 {ACM} Cloud Computing Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2627--2628}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137050}, doi = {10.1145/3133956.3137050}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KarameS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KerstenLP17, author = {Rody Kersten and Kasper S{\o}e Luckow and Corina S. Pasareanu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} AFL-based Fuzzing for Java with Kelinci}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2511--2513}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138820}, doi = {10.1145/3133956.3138820}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KerstenLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KhalilG17, author = {Rami Khalil and Arthur Gervais}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Revive: Rebalancing Off-Blockchain Payment Networks}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {439--453}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134033}, doi = {10.1145/3133956.3134033}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KhalilG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimKD17, author = {Doowon Kim and Bum Jun Kwon and Tudor Dumitras}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing {PKI}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1435--1448}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133958}, doi = {10.1145/3133956.3133958}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KimKD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimKLPK17, author = {Kee Sung Kim and Minkyu Kim and Dongsoo Lee and Je Hong Park and Woo{-}Hwan Kim}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1449--1463}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133970}, doi = {10.1145/3133956.3133970}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimKLPK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimLK17, author = {Seungyeon Kim and Hoyeon Lee and Taekyoung Kwon}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Rethinking Fingerprint Identification on Smartphones}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2515--2517}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138832}, doi = {10.1145/3133956.3138832}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimLT17, author = {Taesoo Kim and Zhiqiang Lin and Chia{-}che Tsai}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {CCS'17 Tutorial Abstract / {SGX} Security and Privacy}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2613--2614}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3136068}, doi = {10.1145/3133956.3136068}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimLT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimW17, author = {Taesoo Kim and Dinghao Wu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{FEAST} 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2633--2634}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137052}, doi = {10.1145/3133956.3137052}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KintisMLCGPNA17, author = {Panagiotis Kintis and Najmeh Miramirkhani and Charles Lever and Yizheng Chen and Rosa Romero G{\'{o}}mez and Nikolaos Pitropakis and Nick Nikiforakis and Manos Antonakakis}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Hiding in Plain Sight: {A} Longitudinal Study of Combosquatting Abuse}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {569--586}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134002}, doi = {10.1145/3133956.3134002}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KintisMLCGPNA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KleinKPSW17, author = {Amit Klein and Vladimir Kravtsov and Alon Perlmuter and Haya Schulmann and Michael Waidner}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} X-Ray Your {DNS}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2519--2521}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138821}, doi = {10.1145/3133956.3138821}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KleinKPSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KoganMB17, author = {Dmitry Kogan and Nathan Manohar and Dan Boneh}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {T/Key: Second-Factor Authentication From Secure Hash Chains}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {983--999}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133989}, doi = {10.1145/3133956.3133989}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KoganMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KohlbrennerATS17, author = {Anne Kohlbrenner and Frederico Araujo and Teryl Taylor and Marc Ph. Stoecklin}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Hidden in Plain Sight: {A} Filesystem for Data Integrity and Confidentiality}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2523--2525}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138841}, doi = {10.1145/3133956.3138841}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KohlbrennerATS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolesnikovMPRT17, author = {Vladimir Kolesnikov and Naor Matania and Benny Pinkas and Mike Rosulek and Ni Trieu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Practical Multi-party Private Set Intersection from Symmetric-Key Techniques}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1257--1272}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134065}, doi = {10.1145/3133956.3134065}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KolesnikovMPRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolesnikovNRTT17, author = {Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {3--20}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133991}, doi = {10.1145/3133956.3133991}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KolesnikovNRTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KorczynskiY17, author = {David Korczynski and Heng Yin}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Capturing Malware Propagations with Code Injections and Code-Reuse Attacks}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1691--1708}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134099}, doi = {10.1145/3133956.3134099}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KorczynskiY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KuceraTGGV17, author = {Martin Kucera and Petar Tsankov and Timon Gehr and Marco Guarnieri and Martin T. Vechev}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Synthesis of Probabilistic Privacy Enforcement}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {391--408}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134079}, doi = {10.1145/3133956.3134079}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KuceraTGGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KwonKSVK17, author = {Yujin Kwon and Dohyun Kim and Yunmok Son and Eugene Y. Vasserman and Yongdae Kim}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Be Selfish and Avoid Dilemmas: Fork After Withholding {(FAW)} Attacks on Bitcoin}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {195--209}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134019}, doi = {10.1145/3133956.3134019}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KwonKSVK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Lee17, author = {Adam J. Lee}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {16th Workshop on Privacy in the Electronic Society {(WPES} 2017)}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2643--2644}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137047}, doi = {10.1145/3133956.3137047}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Lee17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeYK17, author = {Youngjoo Lee and WonSeok Yang and Taekyoung Kwon}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Watch Out Your Smart Watch When Paired}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2527--2529}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138831}, doi = {10.1145/3133956.3138831}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeYK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeiHSJWLW17, author = {Lingguang Lei and Yi He and Kun Sun and Jiwu Jing and Yuewu Wang and Qi Li and Jian Weng}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Vulnerable Implicit Service: {A} Revisit}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1051--1063}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133975}, doi = {10.1145/3133956.3133975}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeiHSJWLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LekiesKGNJ17, author = {Sebastian Lekies and Krzysztof Kotowicz and Samuel Gro{\ss} and Eduardo A. Vela Nava and Martin Johns}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1709--1723}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134091}, doi = {10.1145/3133956.3134091}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LekiesKGNJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LernerKR17, author = {Ada Lerner and Tadayoshi Kohno and Franziska Roesner}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Rewriting History: Changing the Archived Web from the Present}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1741--1755}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134042}, doi = {10.1145/3133956.3134042}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LernerKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiP17, author = {Frank Li and Vern Paxson}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Large-Scale Empirical Study of Security Patches}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2201--2215}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134072}, doi = {10.1145/3133956.3134072}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiS17, author = {Yong Li and Sven Sch{\"{a}}ge}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {No-Match Attacks and Robust Partnering Definitions: Defining Trivial Attacks for Security Protocols is Not Trivial}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1343--1360}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134006}, doi = {10.1145/3133956.3134006}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiWZCWXBZH17, author = {Tongxin Li and Xueqiang Wang and Mingming Zha and Kai Chen and XiaoFeng Wang and Luyi Xing and Xiaolong Bai and Nan Zhang and Xinhui Han}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {829--844}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134021}, doi = {10.1145/3133956.3134021}, timestamp = {Sun, 22 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiWZCWXBZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiZJASY17, author = {Huaxin Li and Li Zhao and Marcio Juliato and Shabbir Ahmed and Manoj R. Sastry and Lily L. Yang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Intrusion Detection System for In-vehicle Networks using Sensor Correlation and Integration}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2531--2533}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138843}, doi = {10.1145/3133956.3138843}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiZJASY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiZLC17, author = {Longfei Li and Jun Zhou and Xiaolong Li and Tao Chen}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Practical Fraud Transaction Prediction}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2535--2537}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138826}, doi = {10.1145/3133956.3138826}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiZLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LinZLPX17, author = {Guanjun Lin and Jun Zhang and Wei Luo and Lei Pan and Yang Xiang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Vulnerability Discovery with Function Representation Learning from Unlabeled Projects}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2539--2541}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138840}, doi = {10.1145/3133956.3138840}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LinZLPX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LindellN17, author = {Yehuda Lindell and Ariel Nof}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Framework for Constructing Fast {MPC} over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {259--276}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133999}, doi = {10.1145/3133956.3133999}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LindellN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuCZLXCS17, author = {Ziqi Liu and Chaochao Chen and Jun Zhou and Xiaolong Li and Feng Xu and Tao Chen and Le Song}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Neural Network-based Graph Embedding for Malicious Accounts Detection}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2543--2545}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138827}, doi = {10.1145/3133956.3138827}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuCZLXCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuJLA17, author = {Jian Liu and Mika Juuti and Yao Lu and N. Asokan}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Oblivious Neural Network Predictions via MiniONN Transformations}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {619--631}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134056}, doi = {10.1145/3133956.3134056}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuJLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuLDWLD17, author = {Daiping Liu and Zhou Li and Kun Du and Haining Wang and Baojun Liu and Hai{-}Xin Duan}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {537--552}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134049}, doi = {10.1145/3133956.3134049}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuLDWLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuTJ17, author = {Shen Liu and Gang Tan and Trent Jaeger}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {PtrSplit: Supporting General Pointers in Automatic Program Partitioning}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2359--2371}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134066}, doi = {10.1145/3133956.3134066}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuTJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuWCS17, author = {Jian Liu and Chen Wang and Yingying Chen and Nitesh Saxena}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {73--87}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133964}, doi = {10.1145/3133956.3133964}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuWCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuY17, author = {Pei{-}Hsuan Lu and Chia{-}Mu Yu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} {A} Unified Framework of Differentially Private Synthetic Data Release with Generative Adversarial Network}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2547--2549}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138823}, doi = {10.1145/3133956.3138823}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuoSHN17, author = {Meng Luo and Oleksii Starov and Nima Honarmand and Nick Nikiforakis}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Hindsight: Understanding the Evolution of {UI} Vulnerabilities in Mobile Browsers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {149--162}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133987}, doi = {10.1145/3133956.3133987}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LuoSHN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MalavoltaMKMR17, author = {Giulio Malavolta and Pedro Moreno{-}Sanchez and Aniket Kate and Matteo Maffei and Srivatsan Ravi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Concurrency and Privacy with Payment-Channel Networks}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {455--471}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134096}, doi = {10.1145/3133956.3134096}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MalavoltaMKMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaruyamaWM17, author = {Seita Maruyama and Satohiro Wakabayashi and Tatsuya Mori}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} {TOUCHFLOOD:} {A} Novel Class of Attacks against Capacitive Touchscreens}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2551--2553}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138829}, doi = {10.1145/3133956.3138829}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaruyamaWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MasoodZAK17, author = {Rahat Masood and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and Mohamed Ali K{\^{a}}afar}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} TouchTrack: How Unique are your Touch Gestures?}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2555--2557}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138850}, doi = {10.1145/3133956.3138850}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MasoodZAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MavroudisCSCKD17, author = {Vasilios Mavroudis and Andrea Cerulli and Petr Svenda and Dan Cvrcek and Dusan Klinec and George Danezis}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1583--1600}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133961}, doi = {10.1145/3133956.3133961}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MavroudisCSCKD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MengC17, author = {Dongyu Meng and Hao Chen}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {MagNet: {A} Two-Pronged Defense against Adversarial Examples}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {135--147}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134057}, doi = {10.1145/3133956.3134057}, timestamp = {Wed, 20 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MengC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MukherjeeCWWRR17, author = {Subhojeet Mukherjee and Noah Cain and Jacob Walker and David White and Indrajit Ray and Indrakshi Ray}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2559--2561}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138844}, doi = {10.1145/3133956.3138844}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MukherjeeCWWRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MultariSM17, author = {Nicholas J. Multari and Anoop Singhal and Erin Miller}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {SafeConfig'17: Applying the Scientific Method to Active Cyber Defense Research}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2641--2642}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137054}, doi = {10.1145/3133956.3137054}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MultariSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaiakshinaDTHD017, author = {Alena Naiakshina and Anastasia Danilova and Christian Tiefenau and Marco Herzog and Sergej Dechand and Matthew Smith}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Why Do Developers Get Password Storage Wrong?: {A} Qualitative Usability Study}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {311--328}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134082}, doi = {10.1145/3133956.3134082}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaiakshinaDTHD017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NasrHM17, author = {Milad Nasr and Amir Houmansadr and Arya Mazumdar}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Compressive Traffic Analysis: {A} New Paradigm for Scalable Traffic Analysis}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2053--2069}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134074}, doi = {10.1145/3133956.3134074}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NasrHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NasrZH17, author = {Milad Nasr and Hadi Zolfaghari and Amir Houmansadr}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {The Waterfall of Liberty: Decoy Routing Circumvention that Resists Routing Attacks}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2037--2052}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134075}, doi = {10.1145/3133956.3134075}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NasrZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NemecSSKM17, author = {Mat{\'{u}}s Nemec and Marek S{\'{y}}s and Petr Svenda and Dusan Klinec and Vashek Matyas}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {The Return of Coppersmith's Attack: Practical Factorization of Widely Used {RSA} Moduli}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1631--1648}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133969}, doi = {10.1145/3133956.3133969}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NemecSSKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NguyenWA0WF17, author = {Duc Cuong Nguyen and Dominik Wermke and Yasemin Acar and Michael Backes and Charles Weir and Sascha Fahl}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Stitch in Time: Supporting Android Developers in WritingSecure Code}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1065--1077}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133977}, doi = {10.1145/3133956.3133977}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NguyenWA0WF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NilizadehLSZFKS17, author = {Shirin Nilizadeh and Francois Labreche and Alireza Sedighian and Ali Zand and Jos{\'{e}} M. Fernandez and Christopher Kruegel and Gianluca Stringhini and Giovanni Vigna}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POISED:} Spotting Twitter Spam Off the Beaten Paths}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1159--1174}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134055}, doi = {10.1145/3133956.3134055}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NilizadehLSZFKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OkhraviO17, author = {Hamed Okhravi and Xinming Ou}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{MTD} 2017: Fourth {ACM} Workshop on Moving Target Defense {(MTD)}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2637--2638}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137044}, doi = {10.1145/3133956.3137044}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OkhraviO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OkutanWMY17, author = {Ahmet Okutan and Gordon Werner and Katie McConky and Shanchieh Jay Yang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Cyber Attack Prediction of Threats from Unconventional Resources {(CAPTURE)}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2563--2565}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138834}, doi = {10.1145/3133956.3138834}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OkutanWMY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OverdorfJAGD17, author = {Rebekah Overdorf and Marc Ju{\'{a}}rez and Gunes Acar and Rachel Greenstadt and Claudia D{\'{\i}}az}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2021--2036}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134005}, doi = {10.1145/3133956.3134005}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/OverdorfJAGD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OyaTP17, author = {Simon Oya and Carmela Troncoso and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1959--1972}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134004}, doi = {10.1145/3133956.3134004}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OyaTP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PalomboZL17, author = {Hernan M. Palombo and Hao Zheng and Jay Ligatti}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Towards Precise and Automated Verification of Security Protocols in Coq}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2567--2569}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138846}, doi = {10.1145/3133956.3138846}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PalomboZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ParkL17, author = {Jonghyeon Park and Youngseok Lee}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Probing Tor Hidden Service with Dockers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2571--2573}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138849}, doi = {10.1145/3133956.3138849}, timestamp = {Sun, 19 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ParkL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PearmanTNHBCCEF17, author = {Sarah Pearman and Jeremy Thomas and Pardis Emami Naeini and Hana Habib and Lujo Bauer and Nicolas Christin and Lorrie Faith Cranor and Serge Egelman and Alain Forget}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Let's Go in for a Closer Look: Observing Passwords in Their Natural Habitat}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {295--310}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133973}, doi = {10.1145/3133956.3133973}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PearmanTNHBCCEF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PellegrinoJ0BR17, author = {Giancarlo Pellegrino and Martin Johns and Simon Koch and Michael Backes and Christian Rossow}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Deemon: Detecting {CSRF} with Dynamic Analysis and Property Graphs}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1757--1771}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133959}, doi = {10.1145/3133956.3133959}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PellegrinoJ0BR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PesslBY17, author = {Peter Pessl and Leon Groot Bruinderink and Yuval Yarom}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {To {BLISS-B} or not to be: Attacking strongSwan's Implementation of Post-Quantum Signatures}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1843--1855}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134023}, doi = {10.1145/3133956.3134023}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PesslBY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PetsiosZKJ17, author = {Theofilos Petsios and Jason Zhao and Angelos D. Keromytis and Suman Jana}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2155--2168}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134073}, doi = {10.1145/3133956.3134073}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PetsiosZKJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PinoLNS17, author = {Rafa{\"{e}}l del Pino and Vadim Lyubashevsky and Gregory Neven and Gregor Seiler}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Practical Quantum-Safe Voting from Lattices}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1565--1581}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134101}, doi = {10.1145/3133956.3134101}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PinoLNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QinYYKX017, author = {Zhan Qin and Ting Yu and Yin Yang and Issa Khalil and Xiaokui Xiao and Kui Ren}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Generating Synthetic Decentralized Social Graphs with Local Differential Privacy}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {425--438}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134086}, doi = {10.1145/3133956.3134086}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/QinYYKX017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RindalR17, author = {Peter Rindal and Mike Rosulek}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Malicious-Secure Private Set Intersection via Dual Execution}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1229--1242}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134044}, doi = {10.1145/3133956.3134044}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RindalR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RocheACM17, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Deterministic, Stash-Free Write-Only {ORAM}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {507--521}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134051}, doi = {10.1145/3133956.3134051}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RocheACM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Russell0YZ17, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong{-}Sheng Zhou}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Generic Semantic Security against a Kleptographic Adversary}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {907--922}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133993}, doi = {10.1145/3133956.3133993}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Russell0YZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShamsiCL17, author = {Zain Shamsi and Daren B. H. Cline and Dmitri Loguinov}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Faulds: {A} Non-Parametric Iterative Classifier for Internet-Wide {OS} Fingerprinting}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {971--982}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133963}, doi = {10.1145/3133956.3133963}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShamsiCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShanWP17, author = {Huasong Shan and Qingyang Wang and Calton Pu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Tail Attacks on Web Applications}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1725--1739}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133968}, doi = {10.1145/3133956.3133968}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShanWP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShaonKLK17, author = {Fahad Shaon and Murat Kantarcioglu and Zhiqiang Lin and Latifur Khan}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {SGX-BigMatrix: {A} Practical Encrypted Data Analytic Framework With Trusted Processors}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1211--1228}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134095}, doi = {10.1145/3133956.3134095}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShaonKLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShawAKTCH17, author = {Thomas Shaw and James Arrowood and Michael Kvasnicka and Shay Taylor and Kyle Cook and John Hale}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Evaluating Reflective Deception as a Malware Mitigation Strategy}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2575--2577}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138833}, doi = {10.1145/3133956.3138833}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShawAKTCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShirvanianS17, author = {Maliheh Shirvanian and Nitesh Saxena}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{CCCP:} Closed Caption Crypto Phones to Resist {MITM} Attacks, Human Errors and Click-Through}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1329--1342}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134013}, doi = {10.1145/3133956.3134013}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShirvanianS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Shoshitaishvili17, author = {Yan Shoshitaishvili and Michael Weissbacher and Lukas Dresel and Christopher Salls and Ruoyu Wang and Christopher Kruegel and Giovanni Vigna}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {347--362}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134105}, doi = {10.1145/3133956.3134105}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Shoshitaishvili17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SiadatiM17, author = {Hossein Siadati and Nasir D. Memon}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Detecting Structurally Anomalous Logins Within Enterprise Networks}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1273--1284}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134003}, doi = {10.1145/3133956.3134003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SiadatiM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SilvestroLCLL17, author = {Sam Silvestro and Hongyu Liu and Corey Crosser and Zhiqiang Lin and Tongping Liu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {FreeGuard: {A} Faster Secure Heap Allocator}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2389--2403}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133957}, doi = {10.1145/3133956.3133957}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SilvestroLCLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Singh17, author = {Abhishek Singh}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Improving Anonymity of Services Deployed Over Tor by Changing Guard Selection}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2579--2581}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138835}, doi = {10.1145/3133956.3138835}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Singh17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SmithGF17, author = {Jared M. Smith and Elliot Greenlee and Aaron E. Ferber}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{DEMO:} Akatosh: Automated Cyber Incident Verification and Impact Analysis}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2463--2465}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138854}, doi = {10.1145/3133956.3138854}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SmithGF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SnyderTK17, author = {Peter Snyder and Cynthia Bagier Taylor and Chris Kanich}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Most Websites Don't Need to Vibrate: {A} Cost-Benefit Approach to Improving Browser Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {179--194}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133966}, doi = {10.1145/3133956.3133966}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SnyderTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SongM17, author = {Liwei Song and Prateek Mittal}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Inaudible Voice Commands}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2583--2585}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138836}, doi = {10.1145/3133956.3138836}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SongM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SongRS17, author = {Congzheng Song and Thomas Ristenpart and Vitaly Shmatikov}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Machine Learning Models that Remember Too Much}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {587--601}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134077}, doi = {10.1145/3133956.3134077}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SongRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Subramanyan0LDS17, author = {Pramod Subramanyan and Rohit Sinha and Ilia A. Lebedev and Srinivas Devadas and Sanjit A. Seshia}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {A Formal Foundation for Secure Remote Execution of Enclaves}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2435--2450}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134098}, doi = {10.1145/3133956.3134098}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Subramanyan0LDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Tajalizadehkhoob17a, author = {Samaneh Tajalizadehkhoob and Tom van Goethem and Maciej Korczynski and Arman Noroozian and Rainer B{\"{o}}hme and Tyler Moore and Wouter Joosen and Michel van Eeten}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Herding Vulnerable Cats: {A} Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {553--567}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133971}, doi = {10.1145/3133956.3133971}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Tajalizadehkhoob17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TajikLSB17, author = {Shahin Tajik and Heiko Lohrke and Jean{-}Pierre Seifert and Christian Boit}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1661--1674}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134039}, doi = {10.1145/3133956.3134039}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TajikLSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasLZBRIMCEM17, author = {Kurt Thomas and Frank Li and Ali Zand and Jacob Barrett and Juri Ranieri and Luca Invernizzi and Yarik Markov and Oxana Comanescu and Vijay Eranti and Angelika Moscicki and Daniel Margolis and Vern Paxson and Elie Bursztein}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1421--1434}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134067}, doi = {10.1145/3133956.3134067}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThomasLZBRIMCEM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TsaiWY17, author = {Ming{-}Hsien Tsai and Bow{-}Yaw Wang and Bo{-}Yin Yang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1973--1987}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134076}, doi = {10.1145/3133956.3134076}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TsaiWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VanhoefP17, author = {Mathy Vanhoef and Frank Piessens}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Key Reinstallation Attacks: Forcing Nonce Reuse in {WPA2}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1313--1328}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134027}, doi = {10.1145/3133956.3134027}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VanhoefP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VeenASCBG17, author = {Victor van der Veen and Dennis Andriesse and Manolis Stamatogiannakis and Xi Chen and Herbert Bos and Cristiano Giuffrida}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1675--1689}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134026}, doi = {10.1145/3133956.3134026}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VeenASCBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VissersBGJN17, author = {Thomas Vissers and Timothy Barron and Tom van Goethem and Wouter Joosen and Nick Nikiforakis}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {The Wolf of Name Street: Hijacking Domains Through Their Nameservers}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {957--970}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133988}, doi = {10.1145/3133956.3133988}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VissersBGJN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WahbyJBSTWW17, author = {Riad S. Wahby and Ye Ji and Andrew J. Blumberg and Abhi Shelat and Justin Thaler and Michael Walfish and Thomas Wies}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Full Accounting for Verifiable Outsourcing}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2071--2086}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133984}, doi = {10.1145/3133956.3133984}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WahbyJBSTWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WakabayashiMMGK17, author = {Satohiro Wakabayashi and Seita Maruyama and Tatsuya Mori and Shigeki Goto and Masahiro Kinugawa and Yu{-}ichi Hayashi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Is Active Electromagnetic Side-channel Attack Practical?}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2587--2589}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138830}, doi = {10.1145/3133956.3138830}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WakabayashiMMGK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangCPZWBTG17, author = {Wenhao Wang and Guoxing Chen and Xiaorui Pan and Yinqian Zhang and XiaoFeng Wang and Vincent Bindschaedler and Haixu Tang and Carl A. Gunter}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in {SGX}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2421--2434}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134038}, doi = {10.1145/3133956.3134038}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangCPZWBTG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangRK17, author = {Xiao Wang and Samuel Ranellucci and Jonathan Katz}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {21--37}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134053}, doi = {10.1145/3133956.3134053}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangRK17a, author = {Xiao Wang and Samuel Ranellucci and Jonathan Katz}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Global-Scale Secure Multiparty Computation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {39--56}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133979}, doi = {10.1145/3133956.3133979}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangRK17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangXH17, author = {Wenhao Wang and Xiaoyang Xu and Kevin W. Hamlen}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Object Flow Integrity}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1909--1924}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133986}, doi = {10.1145/3133956.3133986}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangXH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WayeBARC17, author = {Lucas Waye and Pablo Buiras and Owen Arden and Alejandro Russo and Stephen Chong}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Cryptographically Secure Information Flow Control on Key-Value Stores}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1893--1907}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134036}, doi = {10.1145/3133956.3134036}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WayeBARC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiaoLCZ17, author = {Yuan Xiao and Mengyuan Li and Sanchuan Chen and Yinqian Zhang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{STACCO:} Differentially Analyzing Side-Channel Traces for Detecting {SSL/TLS} Vulnerabilities in Secure Enclaves}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {859--874}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134016}, doi = {10.1145/3133956.3134016}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XiaoLCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XingWW17, author = {Qianqian Xing and Baosheng Wang and Xiaofeng Wang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} BGPCoin: {A} Trustworthy Blockchain-based Resource Management Solution for {BGP} Security}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2591--2593}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138828}, doi = {10.1145/3133956.3138828}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XingWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuKMK17, author = {Wen Xu and Sanidhya Kashyap and Changwoo Min and Taesoo Kim}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Designing New Operating Primitives to Improve Fuzzing Performance}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2313--2328}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134046}, doi = {10.1145/3133956.3134046}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuKMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuLFYSS17, author = {Xiaojun Xu and Chang Liu and Qian Feng and Heng Yin and Le Song and Dawn Song}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {363--376}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134018}, doi = {10.1145/3133956.3134018}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuLFYSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YanB17, author = {Jeff Yan and Aur{\'{e}}lien Bourquard}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Who was Behind the Camera? - Towards Some New Forensics}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2595--2597}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138848}, doi = {10.1145/3133956.3138848}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YanB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoB17, author = {Danfeng (Daphne) Yao and Elisa Bertino}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{CCS} 2017: Women in Cyber Security (CyberW) Workshop}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2631--2632}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137041}, doi = {10.1145/3133956.3137041}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YaoB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoVCZZ17, author = {Yuanshun Yao and Bimal Viswanath and Jenna Cryan and Haitao Zheng and Ben Y. Zhao}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Automated Crowdturfing Attacks and Defenses in Online Review Systems}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1143--1158}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133990}, doi = {10.1145/3133956.3133990}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YaoVCZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YasinSNARS17, author = {Muhammad Yasin and Abhrajit Sengupta and Mohammed Thari Nabeel and Mohammed Ashraf and Jeyavijayan Rajendran and Ozgur Sinanoglu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Provably-Secure Logic Locking: From Theory To Practice}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1601--1618}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133985}, doi = {10.1145/3133956.3133985}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YasinSNARS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YeGSBPA17, author = {Katherine Q. Ye and Matthew Green and Naphat Sanguansin and Lennart Beringer and Adam Petcher and Andrew W. Appel}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Verified Correctness and Security of mbedTLS {HMAC-DRBG}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2007--2020}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133974}, doi = {10.1145/3133956.3133974}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YeGSBPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YouB17, author = {Ilsun You and Elisa Bertino}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{MIST} 2017: 9th International Workshop on Managing Insider Security Threats}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2635--2636}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3148525}, doi = {10.1145/3133956.3148525}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YouB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YouZCWLBL17, author = {Wei You and Peiyuan Zong and Kai Chen and XiaoFeng Wang and Xiaojing Liao and Pan Bian and Bin Liang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2139--2154}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134085}, doi = {10.1145/3133956.3134085}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YouZCWLBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Zhang17, author = {Yinqian Zhang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Cache Side Channels: State of the Art and Research Opportunities}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2617--2619}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3136064}, doi = {10.1145/3133956.3136064}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Zhang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangDTCL17, author = {Zhangkai Zhang and Xuhua Ding and Gene Tsudik and Jinhua Cui and Zhoujun Li}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {89--102}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134094}, doi = {10.1145/3133956.3134094}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangDTCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangLZLLZZ17, author = {Ya{-}Lin Zhang and Longfei Li and Jun Zhou and Xiaolong Li and Yujiang Liu and Yuanchao Zhang and Zhi{-}Hua Zhou}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} {A} {PU} Learning based System for Potential Malicious {URL} Detection}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2599--2601}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138825}, doi = {10.1145/3133956.3138825}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangLZLLZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangT017, author = {Linghan Zhang and Sheng Tan and Jie Yang}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Hearing Your Voice is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {57--71}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133962}, doi = {10.1145/3133956.3133962}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangT017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYJZZX17, author = {Guoming Zhang and Chen Yan and Xiaoyu Ji and Tianchen Zhang and Taimin Zhang and Wenyuan Xu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {DolphinAttack: Inaudible Voice Commands}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {103--117}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134052}, doi = {10.1145/3133956.3134052}, timestamp = {Sun, 28 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYJZZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuHC17, author = {Ruiyu Zhu and Yan Huang and Darion Cassel}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Pool: Scalable On-Demand Secure Computation Service Against Malicious Adversaries}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {245--257}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134070}, doi = {10.1145/3133956.3134070}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZinzindohoueBPB17, author = {Jean Karim Zinzindohou{\'{e}} and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {HACL*: {A} Verified Modern Cryptographic Library}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1789--1806}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134043}, doi = {10.1145/3133956.3134043}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZinzindohoueBPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZuoZL17, author = {Chaoshun Zuo and Qingchuan Zhao and Zhiqiang Lin}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{AUTHSCOPE:} Towards Automatic Discovery of Vulnerable Authorizations in Online Services}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {799--813}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134089}, doi = {10.1145/3133956.3134089}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZuoZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956}, doi = {10.1145/3133956}, isbn = {978-1-4503-4946-8}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.