Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2015.bht:"
@inproceedings{DBLP:conf/ccs/0001KMMR15, author = {Michael Backes and Simon Koch and Sebastian Meiser and Esfandiar Mohammadi and Christian Rossow}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against Tor}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1626--1628}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810115}, doi = {10.1145/2810103.2810115}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001KMMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001MSML15, author = {Manish Shukla and Sumesh Manjunath and Rohit Saxena and Sutapa Mondal and Sachin Lodha}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} WinOver Enterprise Dark Data}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1674--1676}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810131}, doi = {10.1145/2810103.2810131}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001MSML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001SS15, author = {Michael Backes and Oliver Schranz and Philipp von Styp{-}Rekowsky}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Towards Compiler-Assisted Taint Tracking on the Android Runtime {(ART)}}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1629--1631}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810129}, doi = {10.1145/2810103.2810129}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001SS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AaferZZZCWZDG15, author = {Yousra Aafer and Nan Zhang and Zhongwen Zhang and Xiao Zhang and Kai Chen and XiaoFeng Wang and Xiao{-}yong Zhou and Wenliang Du and Michael Grace}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Hare Hunting in the Wild Android: {A} Study on the Threat of Hanging Attribute References}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1248--1259}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813648}, doi = {10.1145/2810103.2813648}, timestamp = {Sun, 22 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AaferZZZCWZDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Abu-SalmaSB015, author = {Ruba Abu{-}Salma and M. Angela Sasse and Joseph Bonneau and Matthew Smith}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Secure Chat for the Masses? User-centered Security to the Rescue}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1623--1625}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810126}, doi = {10.1145/2810103.2810126}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Abu-SalmaSB015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AdrianBDGGHHSTV15, author = {David Adrian and Karthikeyan Bhargavan and Zakir Durumeric and Pierrick Gaudry and Matthew Green and J. Alex Halderman and Nadia Heninger and Drew Springall and Emmanuel Thom{\'{e}} and Luke Valenta and Benjamin VanderSloot and Eric Wustrow and Santiago Zanella B{\'{e}}guelin and Paul Zimmermann}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {5--17}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813707}, doi = {10.1145/2810103.2813707}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AdrianBDGGHHSTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AkinyeleGH15, author = {Joseph A. Akinyele and Christina Garman and Susan Hohenberger}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1370--1381}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813601}, doi = {10.1145/2810103.2813601}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AkinyeleGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Al-ShaerOR15, author = {Ehab Al{-}Shaer and Christopher S. Oehmen and Mohammad Ashiqur Rahman}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1711--1712}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812624}, doi = {10.1145/2810103.2812624}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Al-ShaerOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtBKY15, author = {Frederik Armknecht and Jens{-}Matthias Bohli and Ghassan O. Karame and Franck Youssef}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Transparent Data Deduplication in the Cloud}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {886--900}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813630}, doi = {10.1145/2810103.2813630}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtBKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AsokanBISSTW15, author = {N. Asokan and Ferdinand Brasser and Ahmad Ibrahim and Ahmad{-}Reza Sadeghi and Matthias Schunter and Gene Tsudik and Christian Wachsmann}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{SEDA:} Scalable Embedded Device Attestation}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {964--975}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813670}, doi = {10.1145/2810103.2813670}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AsokanBISSTW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseMV15, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Subversion-Resilient Signature Schemes}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {364--375}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813635}, doi = {10.1145/2810103.2813635}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BartheGS15, author = {Gilles Barthe and Benjamin Gr{\'{e}}goire and Benedikt Schmidt}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Automated Proofs of Pairing-Based Cryptography}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1156--1168}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813697}, doi = {10.1145/2810103.2813697}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BartheGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinDS15, author = {David A. Basin and Jannik Dreier and Ralf Sasse}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Automated Symbolic Proofs of Observational Equivalence}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1144--1155}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813662}, doi = {10.1145/2810103.2813662}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BasinDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BellareJK15, author = {Mihir Bellare and Joseph Jaeger and Daniel Kane}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1431--1440}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813681}, doi = {10.1145/2810103.2813681}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BellareJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BeutelAF15, author = {Alex Beutel and Leman Akoglu and Christos Faloutsos}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Fraud Detection through Graph-Based User Behavior Modeling}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1696--1697}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812702}, doi = {10.1145/2810103.2812702}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BeutelAF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BigelowHRSO15, author = {David Bigelow and Thomas Hobson and Robert Rudd and William W. Streilein and Hamed Okhravi}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Timely Rerandomization for Mitigating Memory Disclosures}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {268--279}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813691}, doi = {10.1145/2810103.2813691}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BigelowHRSO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Bindschaedler0P15, author = {Vincent Bindschaedler and Muhammad Naveed and Xiaorui Pan and XiaoFeng Wang and Yan Huang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way Forward}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {837--849}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813649}, doi = {10.1145/2810103.2813649}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Bindschaedler0P15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BogdanovI15, author = {Andrey Bogdanov and Takanori Isobe}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {White-Box Cryptography Revisited: Space-Hard Ciphers}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1058--1069}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813699}, doi = {10.1145/2810103.2813699}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BogdanovI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BonfanteFMRST15, author = {Guillaume Bonfante and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion and Benjamin Rouxel and Fabrice Sabatier and Aur{\'{e}}lien Thierry}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {745--756}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813627}, doi = {10.1145/2810103.2813627}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BonfanteFMRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrennerGRRV15, author = {Hai Brenner and Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Fast Non-Malleable Commitments}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1048--1057}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813721}, doi = {10.1145/2810103.2813721}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrennerGRRV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BroekVR15, author = {Fabian van den Broek and Roel Verdult and Joeri de Ruiter}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Defeating {IMSI} Catchers}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {340--351}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813615}, doi = {10.1145/2810103.2813615}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BroekVR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CamenischL15, author = {Jan Camenisch and Anja Lehmann}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {(Un)linkable Pseudonyms for Governmental Databases}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1467--1479}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813658}, doi = {10.1145/2810103.2813658}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CamenischL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CamenischLN15, author = {Jan Camenisch and Anja Lehmann and Gregory Neven}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Optimal Distributed Password Verification}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {182--194}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813722}, doi = {10.1145/2810103.2813722}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CamenischLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CashGPR15, author = {David Cash and Paul Grubbs and Jason Perry and Thomas Ristenpart}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Leakage-Abuse Attacks Against Searchable Encryption}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {668--679}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813700}, doi = {10.1145/2810103.2813700}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CashGPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CassolaBN15, author = {Aldo Cassola and Erik{-}Oliver Blass and Guevara Noubir}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Authenticating Privately over Public Wi-Fi Hotspots}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1346--1357}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813647}, doi = {10.1145/2810103.2813647}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CassolaBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CatalanoF15, author = {Dario Catalano and Dario Fiore}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1518--1529}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813624}, doi = {10.1145/2810103.2813624}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CatalanoF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenABDP15, author = {Chen Chen and Daniele Enrico Asoni and David Barrera and George Danezis and Adrian Perrig}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{HORNET:} High-speed Onion Routing at the Network Layer}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1441--1454}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813628}, doi = {10.1145/2810103.2813628}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenABDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenLW0H15, author = {Yangyi Chen and Tongxin Li and XiaoFeng Wang and Kai Chen and Xinhui Han}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1260--1272}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813652}, doi = {10.1145/2810103.2813652}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenLW0H15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenQJSM15, author = {Qi Alfred Chen and Zhiyun Qian and Yunhan Jack Jia and Yuru Shao and Zhuoqing Morley Mao}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Static Detection of Packet Injection Vulnerabilities: {A} Case for Identifying Attacker-controlled Implicit Information Leaks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {388--400}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813643}, doi = {10.1145/2810103.2813643}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenQJSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenWWSZ15, author = {Peixin Chen and Xiaofeng Wang and Yilun Wu and Jinshu Su and Huan Zhou}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} iPKI: Identity-based Private Key Infrastructure for Securing {BGP} Protocol}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1632--1634}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810116}, doi = {10.1145/2810103.2810116}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenWWSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15, author = {Omar Chowdhury and Deepak Garg and Limin Jia and Anupam Datta}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1130--1143}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813638}, doi = {10.1145/2810103.2813638}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Chowdhury0JD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChudnovN15, author = {Andrey Chudnov and David A. Naumann}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Inlined Information Flow Monitoring for JavaScript}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {629--643}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813684}, doi = {10.1145/2810103.2813684}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChudnovN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ContiCDFLNLQS15, author = {Mauro Conti and Stephen Crane and Lucas Davi and Michael Franz and Per Larsen and Marco Negro and Christopher Liebchen and Mohaned Qunaibit and Ahmad{-}Reza Sadeghi}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {952--963}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813671}, doi = {10.1145/2810103.2813671}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ContiCDFLNLQS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CraneVSLLDSHSF15, author = {Stephen J. Crane and Stijn Volckaert and Felix Schuster and Christopher Liebchen and Per Larsen and Lucas Davi and Ahmad{-}Reza Sadeghi and Thorsten Holz and Bjorn De Sutter and Michael Franz}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {243--255}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813682}, doi = {10.1145/2810103.2813682}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CraneVSLLDSHSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CybenkoH15, author = {George Cybenko and Dijiang Huang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{MTD} 2015: Second {ACM} Workshop on Moving Target Defense}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1709--1710}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812623}, doi = {10.1145/2810103.2812623}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CybenkoH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DagherBBCB15, author = {Gaby G. Dagher and Benedikt B{\"{u}}nz and Joseph Bonneau and Jeremy Clark and Dan Boneh}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {720--731}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813674}, doi = {10.1145/2810103.2813674}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DagherBBCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DellAmicoF15, author = {Matteo Dell'Amico and Maurizio Filippone}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Monte Carlo Strength Evaluation: Fast and Reliable Password Checking}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {158--169}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813631}, doi = {10.1145/2810103.2813631}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DellAmicoF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DemmlerDKS0Z15, author = {Daniel Demmler and Ghada Dessouky and Farinaz Koushanfar and Ahmad{-}Reza Sadeghi and Thomas Schneider and Shaza Zeitouni}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Automated Synthesis of Optimized Circuits for Secure Computation}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1504--1517}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813678}, doi = {10.1145/2810103.2813678}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DemmlerDKS0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DengSZX15, author = {Zhui Deng and Brendan Saltaformaggio and Xiangyu Zhang and Dongyan Xu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {iRiS: Vetting Private {API} Abuse in iOS Applications}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {44--56}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813675}, doi = {10.1145/2810103.2813675}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DengSZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DimitrakakisMS15, author = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1702}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812619}, doi = {10.1145/2810103.2812619}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DimitrakakisMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DowlingFGS15, author = {Benjamin Dowling and Marc Fischlin and Felix G{\"{u}}nther and Douglas Stebila}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {A Cryptographic Analysis of the {TLS} 1.3 Handshake Protocol Candidates}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1197--1210}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813653}, doi = {10.1145/2810103.2813653}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DowlingFGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DurumericAMBH15, author = {Zakir Durumeric and David Adrian and Ariana Mirian and Michael D. Bailey and J. Alex Halderman}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {A Search Engine Backed by Internet-Wide Scanning}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {542--553}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813703}, doi = {10.1145/2810103.2813703}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DurumericAMBH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dziembowski15, author = {Stefan Dziembowski}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Introduction to Cryptocurrencies}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1700--1701}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812704}, doi = {10.1145/2810103.2812704}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dziembowski15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EvansLOSROS15, author = {Isaac Evans and Fan Long and Ulziibayar Otgonbaatar and Howard E. Shrobe and Martin C. Rinard and Hamed Okhravi and Stelios Sidiroglou{-}Douskos}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {901--913}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813646}, doi = {10.1145/2810103.2813646}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EvansLOSROS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Felten15, author = {Edward W. Felten}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Keynote Talk}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {3}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2823356}, doi = {10.1145/2810103.2823356}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Felten15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FettKS15, author = {Daniel Fett and Ralf K{\"{u}}sters and Guido Schmitz}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{SPRESSO:} {A} Secure, Privacy-Respecting Single Sign-On System for the Web}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1358--1369}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813726}, doi = {10.1145/2810103.2813726}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FettKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FosterLMSSL15, author = {Ian D. Foster and Jon Larson and Max Masich and Alex C. Snoeren and Stefan Savage and Kirill Levchenko}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Security by Any Other Name: On the Effectiveness of Provider Based Email Security}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {450--464}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813607}, doi = {10.1145/2810103.2813607}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FosterLMSSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FredriksonJR15, author = {Matt Fredrikson and Somesh Jha and Thomas Ristenpart}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1322--1333}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813677}, doi = {10.1145/2810103.2813677}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FredriksonJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GanjiKST15, author = {Fatemeh Ganji and Juliane Kr{\"{a}}mer and Jean{-}Pierre Seifert and Shahin Tajik}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Lattice Basis Reduction Attack against Physically Unclonable Functions}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1070--1080}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813723}, doi = {10.1145/2810103.2813723}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GanjiKST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GelernterH15, author = {Nethanel Gelernter and Amir Herzberg}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Cross-Site Search Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1394--1405}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813688}, doi = {10.1145/2810103.2813688}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GelernterH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GervaisRKC15, author = {Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Tampering with the Delivery of Blocks and Transactions in Bitcoin}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {692--705}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813655}, doi = {10.1145/2810103.2813655}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GervaisRKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoethemJN15, author = {Tom van Goethem and Wouter Joosen and Nick Nikiforakis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {The Clock is Still Ticking: Timing Attacks in the Modern Web}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1382--1393}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813632}, doi = {10.1145/2810103.2813632}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoethemJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Guajardo015, author = {Jorge Guajardo and Stefan Katzenbeisser}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015)}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1715--1716}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812626}, doi = {10.1145/2810103.2812626}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Guajardo015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GudkaWACDLMNR15, author = {Khilan Gudka and Robert N. M. Watson and Jonathan Anderson and David Chisnall and Brooks Davis and Ben Laurie and Ilias Marinos and Peter G. Neumann and Alex Richardson}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Clean Application Compartmentalization with {SOAAP}}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1016--1031}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813611}, doi = {10.1145/2810103.2813611}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GudkaWACDLMNR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GueronL15, author = {Shay Gueron and Yehuda Lindell}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{GCM-SIV:} Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {109--119}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813613}, doi = {10.1145/2810103.2813613}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GueronL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GueronLNP15, author = {Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Fast Garbling of Circuits Under Standard Assumptions}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {567--578}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813619}, doi = {10.1145/2810103.2813619}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GueronLNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaoBNSEEKV15, author = {Shuang Hao and Kevin Borgolte and Nick Nikiforakis and Gianluca Stringhini and Manuel Egele and Michael Eubanks and Brian Krebs and Giovanni Vigna}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Drops for Stuff: An Analysis of Reshipping Mule Scams}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1081--1092}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813620}, doi = {10.1145/2810103.2813620}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaoBNSEEKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HoangKM15, author = {Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Automated Analysis and Synthesis of Authenticated Encryption Schemes}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {84--95}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813636}, doi = {10.1145/2810103.2813636}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HoangKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HolowczakH15, author = {John Holowczak and Amir Houmansadr}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {70--83}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813696}, doi = {10.1145/2810103.2813696}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HolowczakH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HopperJ15, author = {Nicholas Hopper and Rob Jansen}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{WPES} 2015: The 14th Workshop on Privacy in the Electronic Society}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1719--1720}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812628}, doi = {10.1145/2810103.2812628}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HopperJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangZ0015, author = {Heqing Huang and Sencun Zhu and Kai Chen and Peng Liu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an App}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1236--1247}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813606}, doi = {10.1145/2810103.2813606}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuangZ0015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuhOKBMR15, author = {Jun Ho Huh and Seongyeol Oh and Hyoungshick Kim and Konstantin Beznosov and Apurva Mohan and S. Raj Rajagopalan}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Surpass: System-initiated User-replaceable Passwords}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {170--181}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813622}, doi = {10.1145/2810103.2813622}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuhOKBMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuynhNGV15, author = {Manh Huynh and Phuc Nguyen and Marco Gruteser and Tam Vu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Mobile Device Identification by Leveraging Built-in Capacitive Signature}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1635--1637}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810118}, doi = {10.1145/2810103.2810118}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuynhNGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IliaPAMI15, author = {Panagiotis Ilia and Iasonas Polakis and Elias Athanasopoulos and Federico Maggi and Sotiris Ioannidis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Face/Off: Preventing Privacy Leakage From Photos in Social Networks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {781--792}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813603}, doi = {10.1145/2810103.2813603}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/IliaPAMI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JacksonKS15, author = {Samuel Jackson and Scott Kerlin and Jeremy Straub}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small Satellites}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1638--1640}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810114}, doi = {10.1145/2810103.2810114}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JacksonKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JagerSS15, author = {Tibor Jager and J{\"{o}}rg Schwenk and Juraj Somorovsky}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {On the Security of {TLS} 1.3 and {QUIC} Against Weaknesses in PKCS{\#}1 v1.5 Encryption}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1185--1196}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813657}, doi = {10.1145/2810103.2813657}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JagerSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JinSZZ15, author = {Xiaocong Jin and Jingchao Sun and Rui Zhang and Yanchao Zhang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {304--315}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813717}, doi = {10.1145/2810103.2813717}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JinSZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsKTT15, author = {Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Falcon Codes: Fast, Authenticated {LT} Codes (Or: Making Rapid Tornadoes Unstoppable)}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1032--1047}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813728}, doi = {10.1145/2810103.2813728}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsKTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kerschbaum15, author = {Florian Kerschbaum}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Frequency-Hiding Order-Preserving Encryption}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {656--667}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813629}, doi = {10.1145/2810103.2813629}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kerschbaum15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KerschbaumNR15, author = {Florian Kerschbaum and Cristina Nita{-}Rotaru and Indrajit Ray}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{CCSW} 2015: The 7th {ACM} Cloud Computing Security Workshop}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1703--1704}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812620}, doi = {10.1145/2810103.2812620}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KerschbaumNR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kiayias0Z15, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{DEMOS-2:} Scalable {E2E} Verifiable Elections without Random Oracles}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {352--363}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813727}, doi = {10.1145/2810103.2813727}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kiayias0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiayiasT15, author = {Aggelos Kiayias and Qiang Tang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {231--242}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813698}, doi = {10.1145/2810103.2813698}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KiayiasT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimKKHJHKK15, author = {Hongil Kim and Dongkwan Kim and Minhee Kwon and HyungSeok Han and Yeongjin Jang and Dongsu Han and Taesoo Kim and Yongdae Kim}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {328--339}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813718}, doi = {10.1145/2810103.2813718}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimKKHJHKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KiratV15, author = {Dhilung Kirat and Giovanni Vigna}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {MalGene: Automatic Extraction of Malware Analysis Evasion Signature}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {769--780}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813642}, doi = {10.1145/2810103.2813642}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KiratV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KongCJ15, author = {Deguang Kong and Lei Cen and Hongxia Jin}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{AUTOREB:} Automatically Understanding the Review-to-Behavior Fidelity in Android Applications}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {530--541}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813689}, doi = {10.1145/2810103.2813689}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KongCJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KotziasMRC15, author = {Platon Kotzias and Srdjan Matic and Richard Rivera and Juan Caballero}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Certified {PUP:} Abuse in Authenticode Code Signing}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {465--478}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813665}, doi = {10.1145/2810103.2813665}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KotziasMRC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KumarLPBY15, author = {Vireshwar Kumar and He Li and Jung{-}Min "Jerry" Park and Kaigui Bian and Yaling Yang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Group Signatures with Probabilistic Revocation: {A} Computationally-Scalable Approach for Providing Privacy-Preserving Authentication}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1334--1345}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813602}, doi = {10.1145/2810103.2813602}, timestamp = {Sat, 26 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KumarLPBY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KumarS15, author = {N. V. Narendra Kumar and R. K. Shyamasundar}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Dynamic Labelling for Analyzing Security Protocols}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1665--1667}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810113}, doi = {10.1145/2810103.2810113}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KumarS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KumaresanMB15, author = {Ranjit Kumaresan and Tal Moran and Iddo Bentov}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {How to Use Bitcoin to Play Decentralized Poker}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {195--206}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813712}, doi = {10.1145/2810103.2813712}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KumaresanMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KwonMJBD15, author = {Bum Jun Kwon and Jayanta Mondal and Jiyong Jang and Leyla Bilge and Tudor Dumitras}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {The Dropper Effect: Insights into Malware Distribution with Downloader Graph Analytics}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1118--1129}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813724}, doi = {10.1145/2810103.2813724}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KwonMJBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaudR15, author = {Peeter Laud and Jaak Randmets}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1492--1503}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813664}, doi = {10.1145/2810103.2813664}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaudR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LecuyerSSCGH15, author = {Mathias L{\'{e}}cuyer and Riley Spahn and Yannis Spiliopolous and Augustin Chaintreau and Roxana Geambasu and Daniel J. Hsu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Sunlight: Fine-grained Targeting Detection at Scale with Statistical Confidence}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {554--566}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813614}, doi = {10.1145/2810103.2813614}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LecuyerSSCGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeHKS15, author = {JungSeung Lee and HyoungMin Ham and InHwan Kim and JooSeok Song}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Page Table Manipulation Attack}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1644--1646}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810121}, doi = {10.1145/2810103.2810121}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeHKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeePBS15, author = {JungSeung Lee and Han Park and GyeongYong Bang and JooSeok Song}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} {A} Password-based Authentication by Splitting Roles of User Interface}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1641--1643}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810107}, doi = {10.1145/2810103.2810107}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LeePBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiFL15, author = {Fengjun Li and Xin Fu and Bo Luo}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} {A} Hardware Fingerprint Using {GPU} Core Frequency Variations}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1650--1652}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810105}, doi = {10.1145/2810103.2810105}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiFL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiLYKD15, author = {Yan Li and Yingjiu Li and Qiang Yan and Hancong Kong and Robert H. Deng}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1558--1569}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813612}, doi = {10.1145/2810103.2813612}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiLYKD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiS15, author = {Depeng Li and Sachin Shetty}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1647--1649}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810128}, doi = {10.1145/2810103.2810128}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiTPYLLW15, author = {Chi{-}Yu Li and Guan{-}Hua Tu and Chunyi Peng and Zengwen Yuan and Yuanjie Li and Songwu Lu and Xinbing Wang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Insecurity of Voice Solution VoLTE in {LTE} Mobile Networks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {316--327}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813618}, doi = {10.1145/2810103.2813618}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiTPYLLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LindellR15, author = {Yehuda Lindell and Ben Riva}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {579--590}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813666}, doi = {10.1145/2810103.2813666}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LindellR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuAP15, author = {Jian Liu and N. Asokan and Benny Pinkas}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Secure Deduplication of Encrypted Data without Additional Independent Servers}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {874--885}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813623}, doi = {10.1145/2810103.2813623}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuGWM15, author = {Changchang Liu and Peng Gao and Matthew K. Wright and Prateek Mittal}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Exploiting Temporal Dynamics in Sybil Defenses}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {805--816}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813693}, doi = {10.1145/2810103.2813693}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuGWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuWL15, author = {Xing Liu and Wei Wang and Jiqiang Liu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} The Popular Apps in Your Pocket Are Leaking Your Privacy}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1653--1655}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810127}, doi = {10.1145/2810103.2810127}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuZCCX15, author = {Yutao Liu and Tianyu Zhou and Kexin Chen and Haibo Chen and Yubin Xia}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1607--1619}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813690}, doi = {10.1145/2810103.2813690}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuZCCX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuZDLZ15, author = {Xiangyu Liu and Zhe Zhou and Wenrui Diao and Zhou Li and Kehuan Zhang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {When Good Becomes Evil: Keystroke Inference with Smartwatch}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1273--1285}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813668}, doi = {10.1145/2810103.2813668}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuZDLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuSLCKL15, author = {Kangjie Lu and Chengyu Song and Byoungyoung Lee and Simon P. Chung and Taesoo Kim and Wenke Lee}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {280--291}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813694}, doi = {10.1145/2810103.2813694}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuSLCKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuoNHYWW15, author = {Tianyue Luo and Chen Ni and Qing Han and Mutian Yang and JingZheng Wu and Yanjun Wu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1656--1658}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810122}, doi = {10.1145/2810103.2810122}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuoNHYWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuuTKS15, author = {Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Demystifying Incentives in the Consensus Computer}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {706--719}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813659}, doi = {10.1145/2810103.2813659}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuuTKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MashtizadehBBM15, author = {Ali Jos{\'{e}} Mashtizadeh and Andrea Bittau and Dan Boneh and David Mazi{\`{e}}res}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{CCFI:} Cryptographically Enforced Control Flow Integrity}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {941--951}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813676}, doi = {10.1145/2810103.2813676}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MashtizadehBBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaticKC15, author = {Srdjan Matic and Platon Kotzias and Juan Caballero}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{CARONTE:} Detecting Location Leaks for Deanonymizing Tor Hidden Services}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1455--1466}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813667}, doi = {10.1145/2810103.2813667}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaticKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MeijerV15, author = {Carlo Meijer and Roel Verdult}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {18--30}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813641}, doi = {10.1145/2810103.2813641}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MeijerV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MengKNK15, author = {Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{GRECS:} Graph Encryption for Approximate Shortest Distance Queries}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {504--517}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813672}, doi = {10.1145/2810103.2813672}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MengKNK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MillerKKS15, author = {Andrew Miller and Ahmed E. Kosba and Jonathan Katz and Elaine Shi}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {680--691}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813621}, doi = {10.1145/2810103.2813621}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MillerKKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MingXWW15, author = {Jiang Ming and Dongpeng Xu and Li Wang and Dinghao Wu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{LOOP:} Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {757--768}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813617}, doi = {10.1145/2810103.2813617}, timestamp = {Tue, 07 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MingXWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoatazMB15, author = {Tarik Moataz and Travis Mayberry and Erik{-}Oliver Blass}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Constant Communication {ORAM} with Small Blocksize}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {862--873}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813701}, doi = {10.1145/2810103.2813701}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoatazMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohammadiCL15, author = {Mahmoud Mohammadi and Bill Chu and Heather Richter Lipford}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Using Unit Testing to Detect Sanitization Flaws}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1659--1661}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810130}, doi = {10.1145/2810103.2810130}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MohammadiCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohasselRZ15, author = {Payman Mohassel and Mike Rosulek and Ye Zhang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Fast and Secure Three-party Computation: The Garbled Circuit Approach}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {591--602}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813705}, doi = {10.1145/2810103.2813705}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MohasselRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoonSR15, author = {Soo{-}Jin Moon and Vyas Sekar and Michael K. Reiter}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1595--1606}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813706}, doi = {10.1145/2810103.2813706}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MoonSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MukherjeeWDRH15, author = {Subhojeet Mukherjee and Sachini S. Weerawardhana and Chancey Dunn and Indrajit Ray and Adele E. Howe}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} PsychoRithm: {A} Framework for Studying How Human Traits Affect User Response to Security Situations}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1662--1664}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810125}, doi = {10.1145/2810103.2810125}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MukherjeeWDRH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MuthukumaranOPE15, author = {Divya Muthukumaran and Dan O'Keeffe and Christian Priebe and David M. Eyers and Brian Shand and Peter R. Pietzuch}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {603--615}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813639}, doi = {10.1145/2810103.2813639}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MuthukumaranOPE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaveedKW15, author = {Muhammad Naveed and Seny Kamara and Charles V. Wright}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Inference Attacks on Property-Preserving Encrypted Databases}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {644--655}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813651}, doi = {10.1145/2810103.2813651}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaveedKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NeasbittLPLSL15, author = {Christopher Neasbitt and Bo Li and Roberto Perdisci and Long Lu and Kapil Singh and Kang Li}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {WebCapsule: Towards a Lightweight Forensic Engine for Web Browsers}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {133--145}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813656}, doi = {10.1145/2810103.2813656}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NeasbittLPLSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NeupaneRSH15, author = {Ajaya Neupane and Md. Lutfor Rahman and Nitesh Saxena and Leanne M. Hirshfield}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware Warnings}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {479--491}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813660}, doi = {10.1145/2810103.2813660}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NeupaneRSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NiuT15, author = {Ben Niu and Gang Tan}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Per-Input Control-Flow Integrity}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {914--926}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813644}, doi = {10.1145/2810103.2813644}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NiuT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OhrimenkoCFGKS15, author = {Olga Ohrimenko and Manuel Costa and C{\'{e}}dric Fournet and Christos Gkantsidis and Markulf Kohlweiss and Divya Sharma}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Observing and Preventing Leakage in MapReduce}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1570--1581}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813695}, doi = {10.1145/2810103.2813695}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/OhrimenkoCFGKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OlivoDL15, author = {Oswaldo Olivo and Isil Dillig and Calvin Lin}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web Applications}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {616--628}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813680}, doi = {10.1145/2810103.2813680}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OlivoDL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OrenKSK15, author = {Yossef Oren and Vasileios P. Kemerlis and Simha Sethumadhavan and Angelos D. Keromytis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1406--1418}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813708}, doi = {10.1145/2810103.2813708}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OrenKSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PassS15, author = {Rafael Pass and Abhi Shelat}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Micropayments for Decentralized Currencies}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {207--218}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813713}, doi = {10.1145/2810103.2813713}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PassS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PereiraSV15, author = {Olivier Pereira and Fran{\c{c}}ois{-}Xavier Standaert and Srinivas Vivek}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {96--108}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813626}, doi = {10.1145/2810103.2813626}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PereiraSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PerlD0AYRFA15, author = {Henning Perl and Sergej Dechand and Matthew Smith and Daniel Arp and Fabian Yamaguchi and Konrad Rieck and Sascha Fahl and Yasemin Acar}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {426--437}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813604}, doi = {10.1145/2810103.2813604}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PerlD0AYRFA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Pistoia15, author = {Marco Pistoia}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Program Analysis for Mobile Application Integrity and Privacy Enforcement}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1698--1699}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812703}, doi = {10.1145/2810103.2812703}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Pistoia15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PolakisAPSK15, author = {Iasonas Polakis and George Argyros and Theofilos Petsios and Suphannee Sivakorn and Angelos D. Keromytis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Where's Wally?: Precise User Discovery Attacks in Location Proximity Services}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {817--828}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813605}, doi = {10.1145/2810103.2813605}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PolakisAPSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RiliskisSL15, author = {Laurynas Riliskis and Hossein Shafagh and Philip Alexander Levis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Computations on Encrypted Data in the Internet of Things Applications}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1668--1670}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810111}, doi = {10.1145/2810103.2810111}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RiliskisSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RodriguezCCONCR15, author = {Luke Rodriguez and Darren S. Curtis and Sutanay Choudhury and Kiri Oler and Peter Nordquist and Pin{-}Yu Chen and Indrajit Ray}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{DEMO:} Action Recommendation for Cyber Resilience}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1620--1622}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810104}, doi = {10.1145/2810103.2810104}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RodriguezCCONCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RuffingKS15, author = {Tim Ruffing and Aniket Kate and Dominique Schr{\"{o}}der}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {219--230}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813686}, doi = {10.1145/2810103.2813686}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RuffingKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SaltaformaggioB15, author = {Brendan Saltaformaggio and Rohit Bhatia and Zhongshu Gu and Xiangyu Zhang and Dongyan Xu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{GUITAR:} Piecing Together Android App GUIs from Memory Images}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {120--132}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813650}, doi = {10.1145/2810103.2813650}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SaltaformaggioB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SaltaformaggioB15a, author = {Brendan Saltaformaggio and Rohit Bhatia and Zhongshu Gu and Xiangyu Zhang and Dongyan Xu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{VCR:} App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {146--157}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813720}, doi = {10.1145/2810103.2813720}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SaltaformaggioB15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SanderY15, author = {Tomas Sander and Moti Yung}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {WISCS'15: The 2nd {ACM} Workshop on Information Sharing and Collaborative Security}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1717--1718}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812627}, doi = {10.1145/2810103.2812627}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SanderY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Schage15, author = {Sven Sch{\"{a}}ge}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{TOPAS:} 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication Complexity}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1224--1235}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813683}, doi = {10.1145/2810103.2813683}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Schage15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShibaharaYATY15, author = {Toshiki Shibahara and Takeshi Yagi and Mitsuaki Akiyama and Yuta Takata and Takeshi Yada}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Detecting Malicious Web Pages based on Structural Similarity of Redirection Chains}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1671--1673}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810112}, doi = {10.1145/2810103.2810112}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShibaharaYATY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShokriS15, author = {Reza Shokri and Vitaly Shmatikov}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Privacy-Preserving Deep Learning}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1310--1321}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813687}, doi = {10.1145/2810103.2813687}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShokriS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShoukryMYDS15, author = {Yasser Shoukry and Paul Martin and Yair Yona and Suhas N. Diggavi and Mani B. Srivastava}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1004--1015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813679}, doi = {10.1145/2810103.2813679}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShoukryMYDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShuYR15, author = {Xiaokui Shu and Danfeng Yao and Naren Ramakrishnan}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {401--413}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813654}, doi = {10.1145/2810103.2813654}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShuYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SinghalLW15, author = {Anoop Singhal and Changwei Liu and Duminda Wijesekera}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} {A} Logic Based Network Forensics Model for Evidence Analysis}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1677}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810106}, doi = {10.1145/2810103.2810106}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SinghalLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SinhaRSV15, author = {Rohit Sinha and Sriram K. Rajamani and Sanjit A. Seshia and Kapil Vaswani}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Moat: Verifying Confidentiality of Enclave Programs}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1169--1184}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813608}, doi = {10.1145/2810103.2813608}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SinhaRSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SonchackAKS15, author = {John Sonchack and Adam J. Aviv and Eric Keller and Jonathan M. Smith}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} {OFX:} Enabling OpenFlow Extensions for Switch-Level Security Applications}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1678--1680}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810120}, doi = {10.1145/2810103.2810120}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SonchackAKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SongLK15, author = {Jonghyuk Song and Sangho Lee and Jong Kim}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {CrowdTarget: Target-based Detection of Crowdturfing in Online Social Networks}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {793--804}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813661}, doi = {10.1145/2810103.2813661}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SongLK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SoniBS15, author = {Pratik Soni and Enrico Budianto and Prateek Saxena}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {The {SICILIAN} Defense: Signature-based Whitelisting of Web JavaScript}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1542--1557}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813710}, doi = {10.1145/2810103.2813710}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SoniBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StockPKLJ15, author = {Ben Stock and Stephan Pfistner and Bernd Kaiser and Sebastian Lekies and Martin Johns}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1419--1430}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813625}, doi = {10.1145/2810103.2813625}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/StockPKLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Straub15, author = {Jeremy Straub}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Blackboard-Based Electronic Warfare System}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1681--1683}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810109}, doi = {10.1145/2810103.2810109}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Straub15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunSWJ15, author = {He Sun and Kun Sun and Yuewu Wang and Jiwu Jing}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {976--988}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813692}, doi = {10.1145/2810103.2813692}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunSWJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TangSS15, author = {Adrian Tang and Simha Sethumadhavan and Salvatore J. Stolfo}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {256--267}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813685}, doi = {10.1145/2810103.2813685}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TangSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasCB15, author = {Roshan K. Thomas and Alvaro A. C{\'{a}}rdenas and Rakesh B. Bobba}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {First Workshop on Cyber-Physical Systems Security and PrivaCy {(CPS-SPC):} Challenges and Research Directions}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1705--1706}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812621}, doi = {10.1145/2810103.2812621}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ThomasCB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TramerHHA15, author = {Florian Tram{\`{e}}r and Zhicong Huang and Jean{-}Pierre Hubaux and Erman Ayday}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association Studies}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1286--1297}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813610}, doi = {10.1145/2810103.2813610}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TramerHHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UngerG15, author = {Nik Unger and Ian Goldberg}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Deniable Key Exchanges for Secure Messaging}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1211--1223}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813616}, doi = {10.1145/2810103.2813616}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/UngerG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VeenAGGSSBG15, author = {Victor van der Veen and Dennis Andriesse and Enes G{\"{o}}ktas and Ben Gras and Lionel Sambuc and Asia Slowinska and Herbert Bos and Cristiano Giuffrida}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Practical Context-Sensitive {CFI}}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {927--940}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813673}, doi = {10.1145/2810103.2813673}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VeenAGGSSBG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VissersGJN15, author = {Thomas Vissers and Tom van Goethem and Wouter Joosen and Nick Nikiforakis}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Maneuvering Around Clouds: Bypassing Cloud-based Security Providers}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1530--1541}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813633}, doi = {10.1145/2810103.2813633}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VissersGJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wang15, author = {Zheng Wang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Pseudonymizing Client as a Privacy-Preserving Service: {A} Case Study of {CDN}}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1687--1689}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810124}, doi = {10.1145/2810103.2810124}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangCS15, author = {Xiao Wang and T.{-}H. Hubert Chan and Elaine Shi}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Circuit {ORAM:} On Tightness of the Goldreich-Ostrovsky Lower Bound}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {850--861}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813634}, doi = {10.1145/2810103.2813634}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangDARS15, author = {Liang Wang and Kevin P. Dyer and Aditya Akella and Thomas Ristenpart and Thomas Shrimpton}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Seeing through Network-Protocol Obfuscation}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {57--69}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813715}, doi = {10.1145/2810103.2813715}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangDARS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangHKWNM15, author = {Lihua Wang and Takuya Hayashi and Sachiko Kanamori and Atsushi Waseda and Ryo Nojima and Shiho Moriai}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} {PRINCESS:} {A} Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1684--1686}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810123}, doi = {10.1145/2810103.2810123}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangHKWNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangHZTWB15, author = {Xiao Shaun Wang and Yan Huang and Yongan Zhao and Haixu Tang and XiaoFeng Wang and Diyue Bu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit Distance}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {492--503}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813725}, doi = {10.1145/2810103.2813725}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangHZTWB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangLPH15, author = {Tao Wang and Yao Liu and Qingqi Pei and Tao Hou}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Location-restricted Services Access Control Leveraging Pinpoint Waveforming}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {292--303}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813709}, doi = {10.1145/2810103.2813709}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangLPH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangRLXCWZ15, author = {Qian Wang and Kui Ren and Guancheng Li and Chenbo Xia and Xiaobing Chen and Zhibo Wang and Qin Zou}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {376--387}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813702}, doi = {10.1145/2810103.2813702}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangRLXCWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuWYWLW15, author = {JingZheng Wu and Yanjun Wu and Mutian Yang and Zhifei Wu and Tianyue Luo and Yongji Wang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1690--1692}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810108}, doi = {10.1145/2810103.2810108}, timestamp = {Sat, 25 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WuWYWLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WursterL15, author = {Glenn Wurster and David Lie}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{SPSM} 2015: 5th Annual {ACM} {CCS} Workshop on Security and Privacy in Smartphones and Mobile Devices}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1713--1714}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812625}, doi = {10.1145/2810103.2812625}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WursterL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiaoRZ15, author = {Qiuyu Xiao and Michael K. Reiter and Yinqian Zhang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Mitigating Storage Side Channels Using Statistical Privacy Mechanisms}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1582--1594}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813645}, doi = {10.1145/2810103.2813645}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XiaoRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiaoX15, author = {Yonghui Xiao and Li Xiong}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Protecting Locations with Differential Privacy under Temporal Correlations}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1298--1309}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813640}, doi = {10.1145/2810103.2813640}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XiaoX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XingBLW0LHH15, author = {Luyi Xing and Xiaolong Bai and Tongxin Li and XiaoFeng Wang and Kai Chen and Xiaojing Liao and Shi{-}Min Hu and Xinhui Han}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on {MAC} OS{\textasciitilde}X and iOS}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {31--43}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813609}, doi = {10.1145/2810103.2813609}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XingBLW0LHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuJXKL15, author = {Meng Xu and Yeongjin Jang and Xinyu Xing and Taesoo Kim and Wenke Lee}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {UCognito: Private Browsing without Tears}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {438--449}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813716}, doi = {10.1145/2810103.2813716}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuJXKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuLSYXZG15, author = {Wen Xu and Juanru Li and Junliang Shu and Wenbo Yang and Tianyi Xie and Yuanyuan Zhang and Dawu Gu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {414--425}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813637}, doi = {10.1145/2810103.2813637}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuLSYXZG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YadegariD15, author = {Babak Yadegari and Saumya Debray}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Symbolic Execution of Obfuscated Code}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {732--744}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813663}, doi = {10.1145/2810103.2813663}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YadegariD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YouB15, author = {Ilsun You and Elisa Bertino}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{MIST} 2015: 7th International Workshop on Managing Insider Security Threats}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1707--1708}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812622}, doi = {10.1145/2810103.2812622}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YouB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Yu15, author = {Chia{-}Mu Yu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Lightweight Streaming Authenticated Data Structures}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1693--1695}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810117}, doi = {10.1145/2810103.2810117}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Yu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuGZ15, author = {Miao Yu and Virgil D. Gligor and Zongwei Zhou}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Trusted Display on Untrusted Commodity Platforms}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {989--1003}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813719}, doi = {10.1145/2810103.2813719}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YuGZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Yung15, author = {Moti Yung}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1--2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812701}, doi = {10.1145/2810103.2812701}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Yung15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangDFY15, author = {Mu Zhang and Yue Duan and Qian Feng and Heng Yin}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Towards Automatic Generation of Security-Centric Descriptions for Android Apps}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {518--529}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813669}, doi = {10.1145/2810103.2813669}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangDFY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangKP15, author = {Yupeng Zhang and Jonathan Katz and Charalampos Papamanthou}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {IntegriDB: Verifiable {SQL} for Outsourced Databases}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1480--1491}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813711}, doi = {10.1145/2810103.2813711}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangSQ15, author = {Hang Zhang and Dongdong She and Zhiyun Qian}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Android Root and its Providers: {A} Double-Edged Sword}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1093--1104}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813714}, doi = {10.1145/2810103.2813714}, timestamp = {Tue, 03 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangSQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoGL15, author = {Mingyi Zhao and Jens Grossklags and Peng Liu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {An Empirical Study of Web Vulnerability Discovery Ecosystems}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1105--1117}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813704}, doi = {10.1145/2810103.2813704}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2810103}, isbn = {978-1-4503-3832-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.