- Jan Camenisch, Manu Drijvers, Maria Dubovitskaya:
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain. CCS 2017: 683-699 - Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo:
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services. CCS 2017: 229-243 - Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu:
Deterministic Browser. CCS 2017: 163-178 - Shaosheng Cao, Xinxing Yang, Jun Zhou, Xiaolong Li, Yuan (Alan) Qi, Kai Xiao:
POSTER: Actively Detecting Implicit Fraudulent Transactions. CCS 2017: 2475-2477 - Brent Carmer, Alex J. Malozemoff, Mariana Raykova:
5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits. CCS 2017: 747-764 - Ethan Cecchetti, Andrew C. Myers, Owen Arden:
Nonmalleable Information Flow Control. CCS 2017: 1875-1891 - Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi:
Solidus: Confidential Distributed Ledger Transactions via PVORM. CCS 2017: 701-717 - Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala:
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case. CCS 2017: 277-294 - Chip-Hong Chang, Marten van Dijk, Farinaz Koushanfar, Ulrich Rührmair, Mark M. Tehranipoor:
ASHES 2017: Workshop on Attacks and Solutions in Hardware Security. CCS 2017: 2623-2625 - Melissa Chase, David Derler, Steven Goldfeder, Claudio Orlandi, Sebastian Ramacher, Christian Rechberger, Daniel Slamanig, Greg Zaverucha:
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. CCS 2017: 1825-1842 - Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart:
The TypTop System: Personalized Typo-Tolerant Password Checking. CCS 2017: 329-346 - Jia Chen, Yu Feng, Isil Dillig:
Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic. CCS 2017: 875-890 - Hao Chen, Kim Laine, Peter Rindal:
Fast Private Set Intersection from Homomorphic Encryption. CCS 2017: 1243-1255 - Yan Chen, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau:
PeGaSus: Data-Adaptive Differentially Private Stream Processing. CCS 2017: 1375-1388 - Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou:
Practical Attacks Against Graph-based Clustering. CCS 2017: 1125-1142 - Qi Alfred Chen, Matthew Thomas, Eric Osterweil, Yulong Cao, Jie You, Zhuoqing Morley Mao:
Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study. CCS 2017: 941-956 - Yi Chen, Wei You, Yeonjoon Lee, Kai Chen, XiaoFeng Wang, Wei Zou:
Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution. CCS 2017: 815-828 - Li Chen, Mingwei Zhang, Chih-Yuan Yang, Ravi Sahita:
POSTER: Semi-supervised Classification for Dynamic Android Malware Detection. CCS 2017: 2479-2481 - Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics. CCS 2017: 2483-2485 - Animesh Chhotaray, Adib Nahiyan, Thomas Shrimpton, Domenic Forte, Mark M. Tehranipoor:
Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property. CCS 2017: 1533-1546 - Kyong-Tak Cho, Kang G. Shin:
Viden: Attacker Identification on In-Vehicle Networks. CCS 2017: 1109-1123 - Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers:
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards. CCS 2017: 719-728 - Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna:
DIFUZE: Interface Aware Fuzzing for Kernel Drivers. CCS 2017: 2123-2138 - Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei:
A Type System for Privacy Properties. CCS 2017: 409-423 - Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe:
A Comprehensive Symbolic Analysis of TLS 1.3. CCS 2017: 1773-1788 - Mingxin Cui, Zigang Cao, Gang Xiong, Junzheng Shi:
POSTER: A Comprehensive Study of Forged Certificates in the Wild. CCS 2017: 2487-2489 - Hung Dang, Yue Huang, Ee-Chien Chang:
Evading Classifiers by Morphing in the Dark. CCS 2017: 119-133 - Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen:
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs. CCS 2017: 1193-1210 - Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes:
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android. CCS 2017: 2187-2200 - Yu Ding, Ran Duan, Long Li, Yueqiang Cheng, Yulong Zhang, Tanghui Chen, Tao Wei, Huibo Wang:
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave. CCS 2017: 2491-2493