Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2014.bht:"
@inproceedings{DBLP:conf/ccs/AcarEEJND14, author = {Gunes Acar and Christian Eubank and Steven Englehardt and Marc Juarez and Arvind Narayanan and Claudia D{\'{\i}}az}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {The Web Never Forgets: Persistent Tracking Mechanisms in the Wild}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {674--689}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660347}, doi = {10.1145/2660267.2660347}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AcarEEJND14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhnD14, author = {Gail{-}Joon Ahn and Anupam Datta}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{WPES} 2014: 13th Workshop on Privacy in the Electronic Society}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1546--1547}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660383}, doi = {10.1145/2660267.2660383}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AhnD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Al-ShaerK14, author = {Ehab Al{-}Shaer and Krishna Kant}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Summary Abstract for the 7th {ACM} International Workshop on Cyber Security Analytics, Intelligence and Automation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1544--1545}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660382}, doi = {10.1145/2660267.2660382}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Al-ShaerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AnanthGIS14, author = {Prabhanjan Vijendra Ananth and Divya Gupta and Yuval Ishai and Amit Sahai}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Optimizing Obfuscation: Avoiding Barrington's Theorem}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {646--658}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660342}, doi = {10.1145/2660267.2660342}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AnanthGIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AraujoHBK14, author = {Frederico Araujo and Kevin W. Hamlen and Sebastian Biedermann and Stefan Katzenbeisser}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {942--953}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660329}, doi = {10.1145/2660267.2660329}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AraujoHBK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtBKLR14, author = {Frederik Armknecht and Jens{-}Matthias Bohli and Ghassan O. Karame and Zongren Liu and Christian A. Reuter}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Outsourced Proofs of Retrievability}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {831--843}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660310}, doi = {10.1145/2660267.2660310}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtBKLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtG14, author = {Frederik Armknecht and Jorge Guajardo}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1548--1549}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660384}, doi = {10.1145/2660267.2660384}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtwaterKH14, author = {Aaron Atwater and Hassan Khan and Urs Hengartner}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} When and How to Implicitly Authenticate Smartphone Users}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1415--1417}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662373}, doi = {10.1145/2660267.2662373}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtwaterKH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AzabNSCBGMS14, author = {Ahmed M. Azab and Peng Ning and Jitesh Shah and Quan Chen and Rohan Bhutkar and Guruprasad Ganesh and Jia Ma and Wenbo Shen}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Hypervision Across Worlds: Real-time Kernel Protection from the {ARM} TrustZone Secure World}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {90--102}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660350}, doi = {10.1145/2660267.2660350}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AzabNSCBGMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesHKKNP14, author = {Michael Backes and Thorsten Holz and Benjamin Kollenda and Philipp Koppe and Stefan N{\"{u}}rnberger and Jannik Pewny}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1342--1353}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660378}, doi = {10.1145/2660267.2660378}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesHKKNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesKMM14, author = {Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {513--524}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660371}, doi = {10.1145/2660267.2660371}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BackesKMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BalliuDG14, author = {Musard Balliu and Mads Dam and Roberto Guanciale}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Automating Information Flow Analysis of Low Level Code}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1080--1091}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660322}, doi = {10.1145/2660267.2660322}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BalliuDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BanaC14, author = {Gergei Bana and Hubert Comon{-}Lundh}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A Computationally Complete Symbolic Attacker for Equivalence Properties}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {609--620}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660276}, doi = {10.1145/2660267.2660276}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BanaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BartheBCLP14, author = {Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Carlos Daniel Luna and David Pichardie}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {System-level Non-interference for Constant-time Cryptography}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1267--1279}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660283}, doi = {10.1145/2660267.2660283}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BartheBCLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BartheDFGZ14, author = {Gilles Barthe and Fran{\c{c}}ois Dupressoir and Pierre{-}Alain Fouque and Benjamin Gr{\'{e}}goire and Jean{-}Christophe Zapalowicz}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Synthesis of Fault Attacks on Cryptographic Implementations}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1016--1027}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660304}, doi = {10.1145/2660267.2660304}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BartheDFGZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BasinCKPSS14, author = {David A. Basin and Cas Cremers and Tiffany Hyun{-}Jin Kim and Adrian Perrig and Ralf Sasse and Pawel Szalachowski}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{ARPKI:} Attack Resilient Public-Key Infrastructure}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {382--393}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660298}, doi = {10.1145/2660267.2660298}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BasinCKPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BatesPNHTBA14, author = {Adam Bates and Joe Pletcher and Tyler Nichols and Braden Hollembaek and Dave Tian and Kevin R. B. Butler and Abdulrahman Alkhelaifi}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Securing {SSL} Certificate Verification through Dynamic Linking}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {394--405}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660338}, doi = {10.1145/2660267.2660338}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BatesPNHTBA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BergsmaDKSS14, author = {Florian Bergsma and Benjamin Dowling and Florian Kohlar and J{\"{o}}rg Schwenk and Douglas Stebila}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Multi-Ciphersuite Security of the Secure Shell {(SSH)} Protocol}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {369--381}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660286}, doi = {10.1145/2660267.2660286}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BergsmaDKSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BiryukovKP14, author = {Alex Biryukov and Dmitry Khovratovich and Ivan Pustogarov}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Deanonymisation of Clients in Bitcoin {P2P} Network}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {15--29}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660379}, doi = {10.1145/2660267.2660379}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BiryukovKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlassMNO14, author = {Erik{-}Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Toward Robust Hidden Volumes Using Write-Only Oblivious {RAM}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {203--214}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660313}, doi = {10.1145/2660267.2660313}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlassMNO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BordenabeCP14, author = {Nicol{\'{a}}s Emilio Bordenabe and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Optimal Geo-Indistinguishable Mechanisms for Location Privacy}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {251--262}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660345}, doi = {10.1145/2660267.2660345}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BordenabeCP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Cachin14, author = {Christian Cachin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Integrity, Consistency, and Verification of Remote Computation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1538--1539}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660575}, doi = {10.1145/2660267.2660575}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Cachin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaiNWJG14, author = {Xiang Cai and Rishab Nithyanand and Tao Wang and Rob Johnson and Ian Goldberg}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {227--238}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660362}, doi = {10.1145/2660267.2660362}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CaiNWJG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Canetti0S14, author = {Ran Canetti and Abhishek Jain and Alessandra Scafuro}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Practical {UC} security with a Global Random Oracle}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {597--608}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660374}, doi = {10.1145/2660267.2660374}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Canetti0S14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CanovaVW14, author = {Gamze Canova and Melanie Volkamer and Simon Weiler}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Password Entering and Transmission Security}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1418--1420}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662387}, doi = {10.1145/2660267.2662387}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CanovaVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CaoYYP14, author = {Qiang Cao and Xiaowei Yang and Jieqi Yu and Christopher Palow}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Uncovering Large Groups of Active Malicious Accounts in Online Social Networks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {477--488}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660269}, doi = {10.1145/2660267.2660269}, timestamp = {Fri, 23 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CaoYYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CarliSJ14, author = {Lorenzo De Carli and Robin Sommer and Somesh Jha}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Beyond Pattern Matching: {A} Concurrency Model for Stateful Deep Packet Inspection}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1378--1390}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660361}, doi = {10.1145/2660267.2660361}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CarliSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChaseMZ14, author = {Melissa Chase and Sarah Meiklejohn and Greg Zaverucha}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Algebraic MACs and Keyed-Verification Anonymous Credentials}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1205--1216}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660328}, doi = {10.1145/2660267.2660328}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChaseMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenHLSTWYY14, author = {Yu{-}Fang Chen and Chang{-}Hong Hsu and Hsin{-}Hung Lin and Peter Schwabe and Ming{-}Hsien Tsai and Bow{-}Yaw Wang and Bo{-}Yin Yang and Shang{-}Yi Yang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Verifying Curve25519 Software}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {299--309}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660370}, doi = {10.1145/2660267.2660370}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenHLSTWYY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenPCTKT14, author = {Eric Yawei Chen and Yutong Pei and Shuo Chen and Yuan Tian and Robert Kotcher and Patrick Tague}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {OAuth Demystified for Mobile Application Developers}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {892--903}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660323}, doi = {10.1145/2660267.2660323}, timestamp = {Sun, 01 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChenPCTKT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CheonLS14, author = {Jung Hee Cheon and Hyung Tae Lee and Jae Hong Seo}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A New Additive Homomorphic Encryption based on the co-ACD Problem}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {287--298}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660335}, doi = {10.1145/2660267.2660335}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CheonLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ClarkCBS14, author = {Sandy Clark and Michael Collis and Matt Blaze and Jonathan M. Smith}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Moving Targets: Security and Rapid-Release in Firefox}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1256--1266}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660320}, doi = {10.1145/2660267.2660320}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ClarkCBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Clifton14, author = {Christopher W. Clifton}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Privacy Beyond Confidentiality}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1156}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2661035}, doi = {10.1145/2660267.2661035}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Clifton14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CockGMH14, author = {David A. Cock and Qian Ge and Toby C. Murray and Gernot Heiser}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {The Last Mile: An Empirical Study of Timing Channels on seL4}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {570--581}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660294}, doi = {10.1145/2660267.2660294}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CockGMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CornejoR14, author = {Mario Cornejo and Sylvain Ruhault}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Characterization of Real-Life PRNGs under Partial State Corruption}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1004--1015}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660377}, doi = {10.1145/2660267.2660377}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CornejoR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DahseKH14, author = {Johannes Dahse and Nikolai Krein and Thorsten Holz}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Code Reuse Attacks in {PHP:} Automated {POP} Chain Generation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {42--53}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660363}, doi = {10.1145/2660267.2660363}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DahseKH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DasBC14, author = {Anupam Das and Nikita Borisov and Matthew Caesar}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Do You Hear What {I} Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {441--452}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660325}, doi = {10.1145/2660267.2660325}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DasBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DasKDH14, author = {Sauvik Das and Adam D. I. Kramer and Laura A. Dabbish and Jason I. Hong}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Increasing Security Sensitivity With Social Proof: {A} Large-Scale Experimental Confirmation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {739--749}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660271}, doi = {10.1145/2660267.2660271}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DasKDH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DefrawyL14, author = {Karim El Defrawy and Joshua Lampkins}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Founding Digital Currency on Secure Computation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1--14}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660293}, doi = {10.1145/2660267.2660293}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DefrawyL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DekaGLH14, author = {Bhaswati Deka and Ryan M. Gerdes and Ming Li and Kevin P. Heaslip}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation Systems}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1424--1426}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662364}, doi = {10.1145/2660267.2662364}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DekaGLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DimitrakakisMR14, author = {Christos Dimitrakakis and Aikaterini Mitrokotsa and Benjamin I. P. Rubinstein}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1555}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660388}, doi = {10.1145/2660267.2660388}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DimitrakakisMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DittmerT14, author = {Mark S. Dittmer and Mahesh V. Tripunitara}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {The {UNIX} Process Identity Crisis: {A} Standards-Driven Approach to Setuid}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1391--1402}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660333}, doi = {10.1145/2660267.2660333}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DittmerT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EgelmanJPLCW14, author = {Serge Egelman and Sakshi Jain and Rebecca S. Portnoff and Kerwell Liao and Sunny Consolvo and David A. Wagner}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Are You Ready to Lock?}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {750--761}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660273}, doi = {10.1145/2660267.2660273}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EgelmanJPLCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ElahiDG14, author = {Tariq Elahi and George Danezis and Ian Goldberg}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1068--1079}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660280}, doi = {10.1145/2660267.2660280}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ElahiDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EmmsAFHM14, author = {Martin Emms and Budi Arief and Leo Freitas and Joseph Hannon and Aad P. A. van Moorsel}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Harvesting High Value Foreign Currency Transactions from {EMV} Contactless Credit Cards Without the {PIN}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {716--726}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660312}, doi = {10.1145/2660267.2660312}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EmmsAFHM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EnckX14, author = {William Enck and Tao Xie}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Tutorial: Text Analytics for Security}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1540--1541}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660576}, doi = {10.1145/2660267.2660576}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/EnckX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ErlingssonPK14, author = {{\'{U}}lfar Erlingsson and Vasyl Pihur and Aleksandra Korolova}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{RAPPOR:} Randomized Aggregatable Privacy-Preserving Ordinal Response}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1054--1067}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660348}, doi = {10.1145/2660267.2660348}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ErlingssonPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ErnstJMDPRKBBHVW14, author = {Michael D. Ernst and Ren{\'{e}} Just and Suzanne Millstein and Werner Dietl and Stuart Pernsteiner and Franziska Roesner and Karl Koscher and Paulo Barros and Ravi Bhoraskar and Seungyeop Han and Paul Vines and Edward XueJun Wu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Collaborative Verification of Information Flow for a High-Assurance App Store}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1092--1104}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660343}, doi = {10.1145/2660267.2660343}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ErnstJMDPRKBBHVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FahlDPFSS14, author = {Sascha Fahl and Sergej Dechand and Henning Perl and Felix Fischer and Jaromir Smrcek and Matthew Smith}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Hey, {NSA:} Stay Away from my Market! Future Proofing App Markets against Powerful Attackers}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1143--1155}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660311}, doi = {10.1145/2660267.2660311}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FahlDPFSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FawazS14, author = {Kassem Fawaz and Kang G. Shin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Location Privacy Protection for Smartphone Users}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {239--250}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660270}, doi = {10.1145/2660267.2660270}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FawazS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FengS14, author = {Huan Feng and Kang G. Shin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Positioning Attack on Proximity-Based People Discovery}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1427--1429}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662389}, doi = {10.1145/2660267.2662389}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FengS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FioreGP14, author = {Dario Fiore and Rosario Gennaro and Valerio Pastro}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Efficiently Verifiable Computation on Encrypted Data}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {844--855}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660366}, doi = {10.1145/2660267.2660366}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/FioreGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FischlinG14, author = {Marc Fischlin and Felix G{\"{u}}nther}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Multi-Stage Key Exchange and the Case of Google's {QUIC} Protocol}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1193--1204}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660308}, doi = {10.1145/2660267.2660308}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FischlinG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GervaisSSCL14, author = {Arthur Gervais and Reza Shokri and Adish Singla and Srdjan Capkun and Vincent Lenders}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Quantifying Web-Search Privacy}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {966--977}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660367}, doi = {10.1145/2660267.2660367}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GervaisSSCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoethemPJN14, author = {Tom van Goethem and Frank Piessens and Wouter Joosen and Nick Nikiforakis}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {918--929}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660279}, doi = {10.1145/2660267.2660279}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoethemPJN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GuoSM14, author = {Fuchun Guo and Willy Susilo and Yi Mu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based Encryption}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1430--1432}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662372}, doi = {10.1145/2660267.2662372}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GuoSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HahnK14, author = {Florian Hahn and Florian Kerschbaum}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Searchable Encryption with Secure and Efficient Updates}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {310--320}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660297}, doi = {10.1145/2660267.2660297}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HahnK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HatadaTM14, author = {Mitsuhiro Hatada and Masato Terada and Tatsuya Mori}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Seven Years in {MWS:} Experiences of Sharing Datasets with Anti-malware Research Community in Japan}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1433--1435}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662357}, doi = {10.1145/2660267.2662357}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HatadaTM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HayashiHMAS14, author = {Yu{-}ichi Hayashi and Naofumi Homma and Mamoru Miura and Takafumi Aoki and Hideaki Sone}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using {EM} Emanation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {954--965}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660292}, doi = {10.1145/2660267.2660292}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HayashiHMAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeAJSS14, author = {Warren He and Devdatta Akhawe and Sumeet Jain and Elaine Shi and Dawn Xiaodong Song}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {ShadowCrypt: Encrypted Web Applications for Everyone}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1028--1039}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660326}, doi = {10.1145/2660267.2660326}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeAJSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HooffKZ14, author = {Jelle van den Hooff and M. Frans Kaashoek and Nickolai Zeldovich}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {VerSum: Verifiable Computations over Large Public Logs}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1304--1316}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660327}, doi = {10.1145/2660267.2660327}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HooffKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JajodiaS14, author = {Sushil Jajodia and Kun Sun}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{MTD} 2014: First {ACM} Workshop on Moving Target Defense}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1550--1551}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660385}, doi = {10.1145/2660267.2660385}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JajodiaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JangLKKKK14, author = {DaeHee Jang and Hojoon Lee and Minsu Kim and Daehyeok Kim and Daegyeong Kim and Brent ByungHoon Kang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{ATRA:} Address Translation Redirection Attack against Hardware-based External Monitors}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {167--178}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660303}, doi = {10.1145/2660267.2660303}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JangLKKKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JangSCWL14, author = {Yeongjin Jang and Chengyu Song and Simon P. Chung and Tielei Wang and Wenke Lee}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A11y Attacks: Exploiting Accessibility in Operating Systems}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {103--115}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660295}, doi = {10.1145/2660267.2660295}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JangSCWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiLSB14, author = {Shouling Ji and Weiqing Li and Mudhakar Srivatsa and Raheem A. Beyah}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Structural Data De-anonymization: Quantification, Practice, and Implications}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1040--1053}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660278}, doi = {10.1145/2660267.2660278}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiLSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangLYS14, author = {Jyun{-}Yu Jiang and Chun{-}Liang Li and Chun{-}Pai Yang and Chung{-}Tsai Su}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Scanning-free Personalized Malware Warning System by Learning Implicit Feedback from Detection Logs}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1436--1438}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662359}, doi = {10.1145/2660267.2662359}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JiangLYS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JinHYDYP14, author = {Xing Jin and Xunchao Hu and Kailiang Ying and Wenliang Du and Heng Yin and Gautam Nagesh Peri}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {66--77}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660275}, doi = {10.1145/2660267.2660275}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JinHYDYP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JinPJ14, author = {Lei Jin and Balaji Palanisamy and James B. D. Joshi}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1439--1441}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662386}, doi = {10.1145/2660267.2662386}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JinPJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuarezAADG14, author = {Marc Juarez and Sadia Afroz and Gunes Acar and Claudia D{\'{\i}}az and Rachel Greenstadt}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A Critical Evaluation of Website Fingerprinting Attacks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {263--274}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660368}, doi = {10.1145/2660267.2660368}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JuarezAADG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JubaHK14, author = {Yutaka Juba and Hung{-}Hsuan Huang and Kyoji Kawagoe}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Security Control System Enabling to Keep an Intra-LAN in a Secure State Using Security-and-Performance Ratio Control Policies}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1442--1444}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662392}, doi = {10.1145/2660267.2662392}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JubaHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KammerstetterMBPK14, author = {Markus Kammerstetter and Markus Muellner and Daniel Burian and Christian Platzer and Wolfgang Kastner}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse Engineering}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {549--557}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660301}, doi = {10.1145/2660267.2660301}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KammerstetterMBPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KangG14, author = {Min Suk Kang and Virgil D. Gligor}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {321--333}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660299}, doi = {10.1145/2660267.2660299}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KangG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KarMWCXGV14, author = {Gorkem Kar and Hossen Asiful Mustafa and Yan Wang and Yingying Chen and Wenyuan Xu and Marco Gruteser and Tam Vu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Detection of On-Road Vehicles Emanating {GPS} Interference}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {621--632}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660336}, doi = {10.1145/2660267.2660336}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KarMWCXGV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kerschbaum14, author = {Florian Kerschbaum}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Client-Controlled Cloud Encryption}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1542--1543}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660577}, doi = {10.1145/2660267.2660577}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kerschbaum14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KerschbaumS14, author = {Florian Kerschbaum and Axel Schr{\"{o}}pfer}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Optimal Average-Complexity Ideal-Security Order-Preserving Encryption}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {275--286}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660277}, doi = {10.1145/2660267.2660277}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KerschbaumS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KruppSS14, author = {Johannes Krupp and Dominique Schr{\"{o}}der and Mark Simkin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Enhancing Security and Privacy with Google Glass}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1445--1447}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662374}, doi = {10.1145/2660267.2662374}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KruppSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kumar0B14, author = {Vireshwar Kumar and Jung{-}Min Park and Kaigui Bian}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Blind Transmitter Authentication for Spectrum Security and Enforcement}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {787--798}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660318}, doi = {10.1145/2660267.2660318}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kumar0B14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KumaresanB14, author = {Ranjit Kumaresan and Iddo Bentov}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {How to Use Bitcoin to Incentivize Correct Computations}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {30--41}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660380}, doi = {10.1145/2660267.2660380}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KumaresanB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KurmusZ14, author = {Anil Kurmus and Robby Zippel}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1366--1377}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660331}, doi = {10.1145/2660267.2660331}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KurmusZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KursaweD14, author = {Klaus Kursawe and Benessa Defend}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Second Smart Energy Grid Security Workshop {(SEGS} 2014)}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1556--1557}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660389}, doi = {10.1145/2660267.2660389}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KursaweD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeLCT14, author = {Lung{-}Hao Lee and Kuei{-}Ching Lee and Hsin{-}Hsi Chen and Yuen{-}Hsien Tseng}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Proactive Blacklist Update for Anti-Phishing}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1448--1450}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662362}, doi = {10.1145/2660267.2662362}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeLCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeontiadisMC14, author = {Nektarios Leontiadis and Tyler Moore and Nicolas Christin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {A Nearly Four-Year Longitudinal Study of Search-Engine Poisoning}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {930--941}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660332}, doi = {10.1145/2660267.2660332}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeontiadisMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiLC14, author = {Ke Li and Chaoge Liu and Xiang Cui}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} {A} Lightweight Unknown {HTTP} Botnets Detecting and Characterizing System}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1454--1456}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662375}, doi = {10.1145/2660267.2662375}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiYLQZW14, author = {Xiangxue Li and Yu Yu and Qiang Li and Haifeng Qian and Yuan Zhou and Jian Weng}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Arranging the Layout of Alphanumeric Buttons-the Role of Passwords}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1457--1459}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662368}, doi = {10.1145/2660267.2662368}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiYLQZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiYLQZW14a, author = {Xiangxue Li and Yu Yu and Qiang Li and Haifeng Qian and Yuan Zhou and Jian Weng}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1460--1462}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662379}, doi = {10.1145/2660267.2662379}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiYLQZW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiZL14, author = {Dong Li and Fangjiao Zhang and Chaoge Liu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Abusing {URL} Shortening Services for Stealthy and Resilient Message Transmitting}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1451--1453}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662390}, doi = {10.1145/2660267.2662390}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiZXLNWH14, author = {Tongxin Li and Xiao{-}yong Zhou and Luyi Xing and Yeonjoon Lee and Muhammad Naveed and XiaoFeng Wang and Xinhui Han}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {978--989}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660302}, doi = {10.1145/2660267.2660302}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiZXLNWH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiangLC14, author = {Yu Liang and Zhiqiao Li and Xiang Cui}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Study of Software Plugin-based Malware}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1463--1465}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662381}, doi = {10.1145/2660267.2662381}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiangLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LinLF14, author = {Jie Lin and Chuanyi Liu and Binxing Fang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} TraceVirt: {A} Framework for Detecting the Non-tampering Attacks in the Virtual Machine}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1466--1468}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662377}, doi = {10.1145/2660267.2662377}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LinLF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuLL14, author = {Ke Liu and Shuai Lu and Chaoge Liu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Fingerprinting the Publicly Available Sandboxes}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1469--1471}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662396}, doi = {10.1145/2660267.2662396}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuWZW14, author = {Qixu Liu and Qianru Wu and Yuqing Zhang and Xiali Wang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1472--1474}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662370}, doi = {10.1145/2660267.2662370}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuWZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuZ14, author = {Zhenbang Liu and Hengming Zou}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} {A} Proactive Cloud-Based Cross-Reference Forensic Framework}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1475--1477}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662355}, doi = {10.1145/2660267.2662355}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuchaupSRJ14, author = {Daniel Luchaup and Thomas Shrimpton and Thomas Ristenpart and Somesh Jha}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Formatted Encryption Beyond Regular Languages}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1292--1303}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660351}, doi = {10.1145/2660267.2660351}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuchaupSRJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LundbergFSMCSSL14, author = {Devin Lundberg and Brown Farinholt and Edward Sullivan and Ryan A. Mast and Stephen Checkoway and Stefan Savage and Alex C. Snoeren and Kirill Levchenko}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {On The Security of Mobile Cockpit Information Systems}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {633--645}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660375}, doi = {10.1145/2660267.2660375}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LundbergFSMCSSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MekkyMZ14, author = {Hesham Mekky and Aziz Mohaisen and Zhi{-}Li Zhang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1478--1480}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662365}, doi = {10.1145/2660267.2662365}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MekkyMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MengXSWL14, author = {Wei Meng and Xinyu Xing and Anmol Sheth and Udi Weinsberg and Wenke Lee}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Your Online Interests: Pwned! {A} Pollution Attack Against Targeted Advertising}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {129--140}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2687258}, doi = {10.1145/2660267.2687258}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MengXSWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MidiOSB14, author = {Daniele Midi and Oyindamola Oluwatimi and Bilal Shebaro and Elisa Bertino}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Demo Overview: Privacy-Enhancing Features of IdentiDroid}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1481--1483}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662380}, doi = {10.1145/2660267.2662380}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MidiOSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MiettinenANSS14, author = {Markus Miettinen and N. Asokan and Thien Duc Nguyen and Ahmad{-}Reza Sadeghi and Majid Sobhani}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {880--891}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660334}, doi = {10.1145/2660267.2660334}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MiettinenANSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohsenSBJ14, author = {Fadi Mohsen and Mohamed Shehab and Emmanuel Bello{-}Ogunu and Abeer Al Jarrah}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Android System Broadcast Actions Broadcasts Your Privacy}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1484--1486}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662388}, doi = {10.1145/2660267.2662388}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MohsenSBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MonshizadehNV14, author = {Maliheh Monshizadeh and Prasad Naldurg and V. N. Venkatakrishnan}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{MACE:} Detecting Privilege Escalation Vulnerabilities in Web Applications}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {690--701}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660337}, doi = {10.1145/2660267.2660337}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MonshizadehNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MoodGBF14, author = {Benjamin Mood and Debayan Gupta and Kevin R. B. Butler and Joan Feigenbaum}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {582--596}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660285}, doi = {10.1145/2660267.2660285}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MoodGBF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Murphy-HillLCB14, author = {Emerson R. Murphy{-}Hill and Heather Richter Lipford and Bill Chu and Robert Biddle}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{SIW} 2014: First Workshop on Security Information Workers}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1554}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660387}, doi = {10.1145/2660267.2660387}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Murphy-HillLCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NarainFS14, author = {Abhinav Narain and Nick Feamster and Alex C. Snoeren}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Deniable Liaisons}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {525--536}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660340}, doi = {10.1145/2660267.2660340}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NarainFS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaveedAPWAHG14, author = {Muhammad Naveed and Shashank Agrawal and Manoj Prabhakaran and XiaoFeng Wang and Erman Ayday and Jean{-}Pierre Hubaux and Carl A. Gunter}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Controlled Functional Encryption}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1280--1291}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660291}, doi = {10.1145/2660267.2660291}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/NaveedAPWAHG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NeasbittPLN14, author = {Christopher Neasbitt and Roberto Perdisci and Kang Li and Terry Nelms}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1244--1255}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660268}, doi = {10.1145/2660267.2660268}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NeasbittPLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NilizadehKA14, author = {Shirin Nilizadeh and Apu Kapadia and Yong{-}Yeol Ahn}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Community-Enhanced De-anonymization of Online Social Networks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {537--548}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660324}, doi = {10.1145/2660267.2660324}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NilizadehKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NiuT14, author = {Ben Niu and Gang Tan}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1317--1328}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660281}, doi = {10.1145/2660267.2660281}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NiuT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ONeillRSZ14, author = {Mark O'Neill and Scott Ruoti and Kent E. Seamons and Daniel Zappala}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} {TLS} Proxies: Friend or Foe?}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1487--1489}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662393}, doi = {10.1145/2660267.2662393}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ONeillRSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OpreaS14, author = {Alina Oprea and Reihaneh Safavi{-}Naini}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{CCSW} 2014: Sixth {ACM} Cloud Computing Security Workshop}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1560--1561}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660391}, doi = {10.1145/2660267.2660391}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OpreaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PapadopoulosPT14, author = {Dimitrios Papadopoulos and Stavros Papadopoulos and Nikos Triandopoulos}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Taking Authenticated Range Queries to Arbitrary Dimensions}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {819--830}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660373}, doi = {10.1145/2660267.2660373}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PapadopoulosPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PearceDGLGMPSV14, author = {Paul Pearce and Vacha Dave and Chris Grier and Kirill Levchenko and Saikat Guha and Damon McCoy and Vern Paxson and Stefan Savage and Geoffrey M. Voelker}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Characterizing Large-Scale Click Fraud in ZeroAccess}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {141--152}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660369}, doi = {10.1145/2660267.2660369}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PearceDGLGMPSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PengLWTL14, author = {Chunyi Peng and Chi{-}Yu Li and Hongyi Wang and Guan{-}Hua Tu and Songwu Lu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data Charging}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {727--738}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660346}, doi = {10.1145/2660267.2660346}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PengLWTL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Perrig14, author = {Adrian Perrig}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Exciting Security Research Opportunity: Next-generation Internet}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {702}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2661034}, doi = {10.1145/2660267.2661034}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Perrig14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PhuongYS14, author = {Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear Assumption}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1490--1492}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662358}, doi = {10.1145/2660267.2662358}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PhuongYS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PolakisIMLKZIK14, author = {Iasonas Polakis and Panagiotis Ilia and Federico Maggi and Marco Lancini and Georgios Kontaxis and Stefano Zanero and Sotiris Ioannidis and Angelos D. Keromytis}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {501--512}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660317}, doi = {10.1145/2660267.2660317}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PolakisIMLKZIK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QuRZCZC14, author = {Zhengyang Qu and Vaibhav Rastogi and Xinyi Zhang and Yan Chen and Tiantian Zhu and Zhong Chen}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {AutoCog: Measuring the Description-to-permission Fidelity in Android Applications}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1354--1365}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660287}, doi = {10.1145/2660267.2660287}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/QuRZCZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RamchenW14, author = {Kim Ramchen and Brent Waters}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Fully Secure and Fast Signing from Obfuscation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {659--673}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660306}, doi = {10.1145/2660267.2660306}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RamchenW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReznichenkoF14, author = {Alexey Reznichenko and Paul Francis}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Private-by-Design Advertising Meets the Real World}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {116--128}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660305}, doi = {10.1145/2660267.2660305}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ReznichenkoF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RoesnerMMKW14, author = {Franziska Roesner and David Molnar and Alexander Moshchuk and Tadayoshi Kohno and Helen J. Wang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {World-Driven Access Control for Continuous Sensing}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1169--1181}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660319}, doi = {10.1145/2660267.2660319}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RoesnerMMKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SallamB14, author = {Asmaa Sallam and Elisa Bertino}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Protecting Against Data Exfiltration Insider Attacks Through Application Programs}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1493--1495}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662384}, doi = {10.1145/2660267.2662384}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SallamB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Sander14, author = {Tomas Sander}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{WISCS} 2014: The First {ACM} Workshop on Information Sharing {\&} Collaborative Security}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1552--1553}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660386}, doi = {10.1145/2660267.2660386}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Sander14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchulmanLS14, author = {Aaron Schulman and Dave Levin and Neil Spring}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {RevCast: Fast, Private Certificate Revocation over {FM} Radio}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {799--810}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660376}, doi = {10.1145/2660267.2660376}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchulmanLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SeibertOS14, author = {Jeff Seibert and Hamed Okkhravi and Eric S{\"{o}}derstr{\"{o}}m}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {54--65}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660309}, doi = {10.1145/2660267.2660309}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SeibertOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Sengar14, author = {Hemant Sengar}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {VoIP Fraud: Identifying a Wolf in Sheep's Clothing}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {334--345}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660284}, doi = {10.1145/2660267.2660284}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Sengar14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShabtaiE14, author = {Asaf Shabtai and Yuval Elovici}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Misuseablity Analysis for {IT} Infrastructure}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1496--1498}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662385}, doi = {10.1145/2660267.2662385}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShabtaiE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShinSLLCPYNK14, author = {Seungwon Shin and YongJoo Song and Taekyung Lee and Sangho Lee and Jaewoong Chung and Phillip A. Porras and Vinod Yegneswaran and Jiseong Noh and Brent ByungHoon Kang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Rosemary: {A} Robust, Secure, and High-performance Network Operating System}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {78--89}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660353}, doi = {10.1145/2660267.2660353}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShinSLLCPYNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShirvanianS14, author = {Maliheh Shirvanian and Nitesh Saxena}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {868--879}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660274}, doi = {10.1145/2660267.2660274}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShirvanianS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShuklaKSP14, author = {Diksha Shukla and Rajesh Kumar and Abdul Serwadda and Vir V. Phoha}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Beware, Your Hands Reveal Your Secrets!}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {904--917}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660360}, doi = {10.1145/2660267.2660360}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShuklaKSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShulmanE14, author = {Haya Schulmann and Shiran Ezra}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} On the Resilience of {DNS} Infrastructure}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1499--1501}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662376}, doi = {10.1145/2660267.2662376}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShulmanE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Simeonovski14, author = {Milivoj Simeonovski}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Quasi-ID: In fact, {I} am a human}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1502--1504}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662378}, doi = {10.1145/2660267.2662378}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Simeonovski14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SinghL14, author = {Kapil Singh and Zhenkai Liang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {CCS'14 Co-Located Workshop Summary for {SPSM} 2014}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1558--1559}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660390}, doi = {10.1145/2660267.2660390}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SinghL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SongKLA14, author = {WonJun Song and John Kim and Jae W. Lee and Dennis Abts}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Security Vulnerability in Processor-Interconnect Router Design}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {358--368}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660290}, doi = {10.1145/2660267.2660290}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SongKLA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SpringallFDKHMH14, author = {Drew Springall and Travis Finkenauer and Zakir Durumeric and Jason Kitcat and Harri Hursti and Margaret MacAlpine and J. Alex Halderman}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Security Analysis of the Estonian Internet Voting System}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {703--715}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660315}, doi = {10.1145/2660267.2660315}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SpringallFDKHMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SzalachowskiMP14, author = {Pawel Szalachowski and Stephanos Matsumoto and Adrian Perrig}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {PoliCert: Secure and Flexible {TLS} Certificate Management}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {406--417}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660355}, doi = {10.1145/2660267.2660355}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SzalachowskiMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasIBPGM14, author = {Kurt Thomas and Dmytro Iatskiv and Elie Bursztein and Tadek Pietraszek and Chris Grier and Damon McCoy}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Dialing Back Abuse on Phone Verified Accounts}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {465--476}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660321}, doi = {10.1145/2660267.2660321}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThomasIBPGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThomasLGP14, author = {Kurt Thomas and Frank Li and Chris Grier and Vern Paxson}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Consequences of Connectivity: Characterizing Account Hijacking on Twitter}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {489--500}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660282}, doi = {10.1145/2660267.2660282}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ThomasLGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TonellaCSC14, author = {Paolo Tonella and Mariano Ceccato and Bjorn De Sutter and Bart Coppens}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} {A} Measurement Framework to Quantify Software Protections}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1505--1507}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662360}, doi = {10.1145/2660267.2662360}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TonellaCSC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TrinhCJ14, author = {Minh{-}Thai Trinh and Duc{-}Hiep Chu and Joxan Jaffar}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{S3:} {A} Symbolic String Solver for Vulnerability Detection in Web Applications}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1232--1243}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660372}, doi = {10.1145/2660267.2660372}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TrinhCJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TrippGPA14, author = {Omer Tripp and Salvatore Guarnieri and Marco Pistoia and Aleksandr Y. Aravkin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{ALETHEIA:} Improving the Usability of Static Security Analysis}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {762--774}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660339}, doi = {10.1145/2660267.2660339}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TrippGPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TsankovMDB14, author = {Petar Tsankov and Srdjan Marinovic and Mohammad Torabi Dashti and David A. Basin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Fail-Secure Access Control}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1157--1168}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660307}, doi = {10.1145/2660267.2660307}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TsankovMDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TungHCS14, author = {Yu{-}Chih Tung and Sihui Han and Dongyao Chen and Kang G. Shin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Vulnerability and Protection of Channel State Information in Multiuser {MIMO} Networks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {775--786}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660272}, doi = {10.1145/2660267.2660272}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TungHCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TurkmenHZ14, author = {Fatih Turkmen and Jerry den Hartog and Nicola Zannone}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Analyzing Access Control Policies with {SMT}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1508--1510}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662366}, doi = {10.1145/2660267.2662366}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TurkmenHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VasiliadisAPI14, author = {Giorgos Vasiliadis and Elias Athanasopoulos and Michalis Polychronakis and Sotiris Ioannidis}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {PixelVault: Using GPUs for Securing Cryptographic Operations}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1131--1142}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660316}, doi = {10.1145/2660267.2660316}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VasiliadisAPI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wang14, author = {Zheng Wang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} On the Capability of {DNS} Cache Poisoning Attacks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1523--1525}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662363}, doi = {10.1145/2660267.2662363}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangCMC14, author = {An Wang and Wentao Chang and Aziz Mohaisen and Songqing Chen}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} How Distributed Are Today's DDoS Attacks?}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1511--1513}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662382}, doi = {10.1145/2660267.2662382}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangCMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangDDLH14, author = {Dongqi Wang and Shuaifu Dai and Yu Ding and Tongxin Li and Xinhui Han}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} AdHoneyDroid - Capture Malicious Android Advertisements}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1514--1516}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662395}, doi = {10.1145/2660267.2662395}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangDDLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangHCSS14, author = {Xiao Shaun Wang and Yan Huang and T.{-}H. Hubert Chan and Abhi Shelat and Elaine Shi}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{SCORAM:} Oblivious {RAM} for Secure Computation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {191--202}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660365}, doi = {10.1145/2660267.2660365}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangHCSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangNLCSSH14, author = {Xiao Shaun Wang and Kartik Nayak and Chang Liu and T.{-}H. Hubert Chan and Elaine Shi and Emil Stefanov and Yan Huang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Oblivious Data Structures}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {215--226}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660314}, doi = {10.1145/2660267.2660314}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangNLCSSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangZSZY14, author = {Xiaofeng Wang and Huan Zhou and Jinshu Su and Bofeng Zhang and Fan Yang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} {T-IP:} {A} Self-Trustworthy and Secure Internet Protocol with Full Compliance to {TCP/IP}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1520--1522}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662371}, doi = {10.1145/2660267.2662371}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangZSZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangZZYYZH14, author = {Juan Wang and Bo Zhao and Huanguo Zhang and Fei Yan and Fajiang Yu and Liqiang Zhang and Hongxin Hu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} An {E2E} Trusted Cloud Infrastructure}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1517--1519}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662383}, doi = {10.1145/2660267.2662383}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangZZYYZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WeiROR14, author = {Fengguo Wei and Sankardas Roy and Xinming Ou and Robby}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Amandroid: {A} Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1329--1341}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660357}, doi = {10.1145/2660267.2660357}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WeiROR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XiaoCYLZLR14, author = {Qiuyu Xiao and Jiayi Chen and Le Yu and Huaxin Li and Haojin Zhu and Muyuan Li and Kui Ren}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} LocMask: {A} Location Privacy Protection Framework in Android System}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1526--1528}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662367}, doi = {10.1145/2660267.2662367}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/XiaoCYLZLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuFM14, author = {Yi Xu and Jan{-}Michael Frahm and Fabian Monrose}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Watching the Watchers: Automatically Inferring {TV} Content From Outdoor Light Effusions}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {418--428}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660358}, doi = {10.1145/2660267.2660358}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuFM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuNBYCG14, author = {Zhaoyan Xu and Antonio Nappa and Robert Baykov and Guangliang Yang and Juan Caballero and Guofei Gu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{AUTOPROBE:} Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {179--190}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660352}, doi = {10.1145/2660267.2660352}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuNBYCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YeZH14, author = {Jiayi Ye and Chao Zhang and Xinhui Han}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} UAFChecker: Scalable Static Detection of Use-After-Free Vulnerabilities}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1529--1531}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662394}, doi = {10.1145/2660267.2662394}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YeZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YenHORJ14, author = {Ting{-}Fang Yen and Victor Heorhiadi and Alina Oprea and Michael K. Reiter and Ari Juels}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {An Epidemiological Study of Malware Encounters in a Large Enterprise}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1117--1130}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660330}, doi = {10.1145/2660267.2660330}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YenHORJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YuZXGLW14, author = {Hongliang Yu and Yong Zhao and Gang Xiong and Li Guo and Zhen Li and Yong Wang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Mining Elephant Applications in Unknown Traffic by Service Clustering}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1532--1534}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662391}, doi = {10.1145/2660267.2662391}, timestamp = {Wed, 08 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YuZXGLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YueLFLRZ14, author = {Qinggang Yue and Zhen Ling and Xinwen Fu and Benyuan Liu and Kui Ren and Wei Zhao}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Blind Recognition of Touched Keys on Mobile Devices}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1403--1414}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660288}, doi = {10.1145/2660267.2660288}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YueLFLRZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YumeiYK14, author = {Dai Yumei and Liang Yu and Li Ke}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} {A} Hybrid Botnet Ecological Environment}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1421--1423}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662369}, doi = {10.1145/2660267.2662369}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YumeiYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangCCFGLLM14, author = {Wen Zhang and You Chen and Thaddeus Cybulski and Daniel Fabbri and Carl A. Gunter and Patrick Lawlor and David M. Liebovitz and Bradley A. Malin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1182--1192}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660341}, doi = {10.1145/2660267.2660341}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangCCFGLLM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangDYZ14, author = {Mu Zhang and Yue Duan and Heng Yin and Zhiruo Zhao}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Semantics-Aware Android Malware Classification Using Weighted Contextual {API} Dependency Graphs}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1105--1116}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660359}, doi = {10.1145/2660267.2660359}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangDYZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangJBKHP14, author = {Fuyuan Zhang and Limin Jia and Cristina Basescu and Tiffany Hyun{-}Jin Kim and Yih{-}Chun Hu and Adrian Perrig}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Mechanized Network Origin and Path Authenticity Proofs}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {346--357}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660349}, doi = {10.1145/2660267.2660349}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangJBKHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangJRR14, author = {Yinqian Zhang and Ari Juels and Michael K. Reiter and Thomas Ristenpart}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Cross-Tenant Side-Channel Attacks in PaaS Clouds}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {990--1003}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660356}, doi = {10.1145/2660267.2660356}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangJRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangL14, author = {Yu Zhang and Songfeng Lu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted Data}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1535--1537}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662361}, doi = {10.1145/2660267.2662361}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangPK14, author = {Yupeng Zhang and Charalampos Papamanthou and Jonathan Katz}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{ALITHEIA:} Towards Practical Verifiable Graph Processing}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {856--867}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660354}, doi = {10.1145/2660267.2660354}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYX14, author = {Jie Zhang and Feng Yuan and Qiang Xu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {153--166}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660289}, doi = {10.1145/2660267.2660289}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouDLZ14, author = {Zhe Zhou and Wenrui Diao and Xiangyu Liu and Kehuan Zhang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Acoustic Fingerprinting Revisited: Generate Stable Device {ID} Stealthily with Inaudible Sound}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {429--440}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660300}, doi = {10.1145/2660267.2660300}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouDLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhouWCW14, author = {Yajin Zhou and Xiaoguang Wang and Yue Chen and Zhi Wang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {ARMlock: Hardware-based Fault Isolation for {ARM}}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {558--569}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660344}, doi = {10.1145/2660267.2660344}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhouWCW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuMZL14, author = {Tong Zhu and Qiang Ma and Shanfeng Zhang and Yunhao Liu}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Context-free Attacks Using Keyboard Acoustic Emanations}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {453--464}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660296}, doi = {10.1145/2660267.2660296}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuMZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuYWY14, author = {Bin B. Zhu and Jeff Yan and Dongchen Wei and Maowei Yang}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Security Analyses of Click-based Graphical Passwords via Image Point Memorability}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1217--1231}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660364}, doi = {10.1145/2660267.2660364}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuYWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2660267}, isbn = {978-1-4503-2957-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.