default search action
18th CCS 2011: Chicago, Illinois, USA
- Yan Chen, George Danezis, Vitaly Shmatikov:
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011. ACM 2011, ISBN 978-1-4503-0948-6
Keynote address
- Farnam Jahanian:
Reflections on the evolution of internet threats: the growing imperative for a cyber secure society. 1-2
System security
- Yanlin Li, Jonathan M. McCune, Adrian Perrig:
VIPER: verifying the integrity of PERipherals' firmware. 3-16 - Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, David Lie:
Unicorn: two-factor attestation for data security. 17-28 - Bin Zeng, Gang Tan, Greg Morrisett:
Combining control-flow integrity and static analysis for efficient and validated data sandboxing. 29-40
Composability of cryptographic protocols
- Ralf Küsters, Max Tuengerthal:
Composition theorems without pre-established session identifiers. 41-50 - Christina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams:
Composability of bellare-rogaway key exchange protocols. 51-62 - Véronique Cortier, Bogdan Warinschi:
A composable computational soundness notion. 63-74
Hardware, SCADA, and physical security
- Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun:
On the requirements for successful GPS spoofing attacks. 75-86 - Stephen E. McLaughlin, Patrick D. McDaniel, William Aiello:
Protecting consumer privacy from electric load monitoring. 87-98 - Ashlesh Sharma, Lakshminarayanan Subramanian, Eric A. Brewer:
PaperSpeckle: microscopic fingerprinting of paper. 99-110 - Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar:
On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAs. 111-124
Authentication and access control
- Elie Bursztein, Matthieu Martin, John C. Mitchell:
Text-based CAPTCHA strengths and weaknesses. 125-138 - Nan Zheng, Aaron Paloski, Haining Wang:
An efficient user verification system via mouse movements. 139-150 - Deepak Garg, Limin Jia, Anupam Datta:
Policy auditing over incomplete logs: theory, implementation and applications. 151-162 - Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripunitara, Martin C. Rinard, Steve J. Chapin:
Automatic error finding in access-control policies. 163-174
Anonymous communications
- Aaron Johnson, Paul F. Syverson, Roger Dingledine, Nick Mathewson:
Trust-based anonymous communication: adversary models and routing algorithms. 175-186 - Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov:
Cirripede: circumvention infrastructure using router redirection with plausible deniability. 187-200 - Swagatika Prusty, Brian Neil Levine, Marc Liberatore:
Forensic investigation of the OneSwarm anonymous filesharing system. 201-214 - Prateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov:
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting. 215-226
Web security
- Eric Yawei Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson:
App isolation: get the security of multiple browsers with just one. 227-238 - Mario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz:
Crouching tiger - hidden payload: security risks of scalable vectors graphics. 239-250 - Adam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna:
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities. 251-262 - Peter Chapman, David Evans:
Automated black-box detection of side-channel vulnerabilities in web applications. 263-274
Malware and intrusion detection
- Kevin Coogan, Gen Lu, Saumya K. Debray:
Deobfuscation of virtualization-obfuscated software: a semantics-based approach. 275-284 - Clemens Kolbitsch, Engin Kirda, Christopher Kruegel:
The power of procrastination: detection and mitigation of execution-stalling malicious code. 285-296 - Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis:
MIDeA: a multi-parallel intrusion detection architecture. 297-308 - Jiyong Jang, David Brumley, Shobha Venkataraman:
BitShred: feature hashing malware for scalable triage and semantic analysis. 309-320
Formal methods and verification
- Vincent Cheval, Hubert Comon-Lundh, Stéphanie Delaune:
Trace equivalence decision: negative tests and non-determinism. 321-330 - Mihhail Aizatulin, Andrew D. Gordon, Jan Jürjens:
Extracting and verifying cryptographic models from C protocol code by symbolic execution. 331-340 - Cédric Fournet, Markulf Kohlweiss, Pierre-Yves Strub:
Modular code-based cryptographic verification. 341-350 - Cédric Fournet, Jérémy Planul, Tamara Rezk:
Information-flow types for homomorphic encryptions. 351-360
Keynote address
- Jan Camenisch:
Cryptographic primitives for building secure and privacy respecting protocols. 361-362
Virtual machines and hypervisors
- Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu:
Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring. 363-374 - Ahmed M. Azab, Peng Ning, Xiaolan Zhang:
SICE: a hardware-level strongly isolated computing environment for x86 multi-core platforms. 375-388 - Sven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider:
AmazonIA: when elasticity snaps back. 389-400 - Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford:
Eliminating the hypervisor attack surface for a more secure cloud. 401-412
Applied cryptography
- Tibor Jager, Juraj Somorovsky:
How to break XML encryption. 413-422 - Mihir Bellare, David Cash, Sriram Keelveedhi:
Ciphers that securely encipher their own keys. 423-432 - Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu:
Password-protected secret sharing. 433-444 - Ran Canetti, Ben Riva, Guy N. Rothblum:
Practical delegation of computation using multiple servers. 445-454
Wild woolly web
- Tyler Moore, Nektarios Leontiadis, Nicolas Christin:
Fashion crimes: trending-term exploitation on the web. 455-466 - Long Lu, Roberto Perdisci, Wenke Lee:
SURF: detecting and measuring search poisoning. 467-476 - David Y. Wang, Stefan Savage, Geoffrey M. Voelker:
Cloak and dagger: dynamics of web search cloaking. 477-490
Cloud computing
- Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg:
Proofs of ownership in remote storage systems. 491-500 - Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
How to tell if your cloud files are vulnerable to drive crashes. 501-514 - Kehuan Zhang, Xiao-yong Zhou, Yangyi Chen, XiaoFeng Wang, Yaoping Ruan:
Sedic: privacy-aware data intensive computing on hybrid clouds. 515-526
Side-channel attacks and defenses
- Rahul Raguram, Andrew M. White, Dibyendusekhar Goswami, Fabian Monrose, Jan-Michael Frahm:
iSpy: automatic reconstruction of typed input from compromising reflections. 527-536 - Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak N. Patel:
Televisions, video privacy, and powerline electromagnetic interference. 537-550 - Philip Marquardt, Arunabh Verma, Henry Carter, Patrick Traynor:
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. 551-562 - Danfeng Zhang, Aslan Askarov, Andrew C. Myers:
Predictive mitigation of timing channels in interactive systems. 563-574
Securing web applications
- Prithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan:
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction. 575-586 - Mike Samuel, Prateek Saxena, Dawn Song:
Context-sensitive auto-sanitization in web templating languages using type qualifiers. 587-600 - Prateek Saxena, David Molnar, Benjamin Livshits:
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications. 601-614 - Shuo Tang, Nathan Dautenhahn, Samuel T. King:
Fortifying web-based applications automatically. 615-626
Privacy and mobile security
- Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David A. Wagner:
Android permissions demystified. 627-638 - Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart E. Schechter, David Wetherall:
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. 639-652 - Raluca A. Popa, Andrew J. Blumberg, Hari Balakrishnan, Frank H. Li:
Privacy and accountability for location-based aggregate statistics. 653-666 - Alexey Reznichenko, Saikat Guha, Paul Francis:
Auctions in do-not-track compliant internet advertising. 667-676
Making secure computation practical
- Ryan Henry, Femi G. Olumofin, Ian Goldberg:
Practical PIR for electronic commerce. 677-690 - Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes. 691-702 - Florian Kerschbaum:
Automatically optimizing secure computation. 703-714 - Lior Malka:
VMCrypt: modular software architecture for scalable secure computation. 715-724
Poster and demo session
- Florian Adamsky, Hassan Khan, Muttukrishnan Rajarajan, Syed Ali Khayam, Rudolf Jäger:
Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers. 725-728 - Seyed Ali Ahmadzadeh, Gordon B. Agnew:
Poster: a geometric approach for multicast authentication in adversarial channels. 729-732 - Patrik Bichsel, Franz-Stefan Preiss:
Demo: a comprehensive framework enabling data-minimizing authentication. 733-736 - Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva, Olivier Savry, Cédric Vérhilac:
Demo: the ff hardware prototype for privacy-preserving RFID authentication. 737-740 - Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry:
Poster: the quest for security against privilege escalation attacks on android. 741-744 - Yinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen:
Poster: a path-cutting approach to blocking XSS worms in social web networks. 745-748 - Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi:
Poster: control-flow integrity for smartphones. 749-752 - Shlomi Dolev, Niv Gilboa, Ofer Hermoni:
Poster: arbitrators in the security infrastructure, supporting positive anonymity. 753-756 - Shlomi Dolev, Niv Gilboa, Marina Kopeetsky:
Poster: attribute based broadcast encryption with permanent revocation. 757-760 - Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar:
Poster: SMURFEN: a rule sharing collaborative intrusion detection network. 761-764 - Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure. 765-768 - Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary:
Poster: online spam filtering in social networks. 769-772 - Xi Gong, Ting Yu, Adam J. Lee:
Poster: on trust evaluation with missing information in reputation systems. 773-776 - Weili Han, Zheran Fang, Weifeng Chen, Wenyuan Xu, Chang Lei:
Poster: collaborative policy administration. 777-780 - Weili Han, Chenguang Shen, Yuliang Yin, Yun Gu, Chen Chen:
Poster: using quantified risk and benefit to strengthen the security of information sharing. 781-784 - Jun Hu, Hongyu Gao, Zhichun Li, Yan Chen:
Poster: CUD: crowdsourcing for URL spam detection. 785-788 - Ashar Javed:
Poster: DIEGO: a fine-grained access control for web browsers. 789-792 - Arjan Jeckmans, Qiang Tang, Pieter H. Hartel:
Poster: privacy-preserving profile similarity computation in online social networks. 793-796 - Ünal Koçabas, Ahmad-Reza Sadeghi, Christian Wachsmann, Steffen Schulz:
Poster: practical embedded remote attestation using physically unclonable functions. 797-800 - Yao Liu, Peng Ning:
Poster: mimicry attacks against wireless link signature. 801-804 - Stefano Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero:
Poster: fast, automatic iPhone shoulder surfing. 805-808 - Shah Mahmood, Yvo Desmedt:
Poster: preliminary analysis of Google+'s privacy. 809-812 - Nayantara Mallesh, Matthew K. Wright:
Poster: shaping network topology for privacy and performance. 813-816 - Ramon Francisco Pacquiao Mejia, Yuichi Kaji, Hiroyuki Seki:
Poster: trans-organizational role-based access control. 817-820 - Mohamed Nabeel, Elisa Bertino:
Poster: towards attribute based group key management. 821-824 - Rishab Nithyanand, Radu Sion, John Solis:
Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs). 825-828 - Ben Niu, Gang Tan:
Poster: uPro: a compartmentalization tool supporting fine-grained and flexible security configuration. 829-832 - Peng Liao, Xiang Cui, Shuhao Li, Chaoge Liu:
Poster: recoverable botnets: a hybrid C&C approach. 833-836 - Henning Perl, Michael Brenner, Matthew Smith:
Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system. 837-840 - Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo:
Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC. 841-844 - Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu:
Poster: inference attacks against searchable encryption protocols. 845-448 - Axel Schröpfer, Florian Kerschbaum:
Demo: secure computation in JavaScript. 849-852 - Chao Shen, Zhongmin Cai, Xiaohong Guan:
Poster: can it be more practical?: improving mouse dynamics biometric performance. 853-856 - Patrick Stewin, Jean-Pierre Seifert, Collin Mulliner:
Poster: Towards detecting DMA malware. 857-860 - Pengfei Sun, Qingni Shen, Ying Chen, Zhonghai Wu, Cong Zhang, Anbang Ruan, Liang Gu:
Poster: LBMS: load balancing based on multilateral security in cloud. 861-864 - Daniel Trivellato, Nicola Zannone, Sandro Etalle:
Poster: protecting information in systems of systems. 865-868 - Xiaoxin Wu, Lei Xu, Xinwen Zhang:
Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing. 869-872 - Zhi Yang, Lihua Yin, Miyi Duan, Shuyuan Jin:
Poster: towards formal verification of DIFC policies. 873-876 - Ji Zhu, Mudhakar Srivatsa:
Poster: on quantitative information flow metrics. 877-880 - Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong, Shimin Chen:
Poster: temporal attribute-based encryption in clouds. 881-884
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.