SecDr

致力于信息安全科研交流平台

2016年四大安全顶级会议接收的中国论文汇总

| Comments

整理by: 稀饭&toby

S&P

会议相关信息

37th IEEE Symposium on Security and Privacy
MAY 23-25, 2016 AT THE FAIRMONT, SAN JOSE, CA
  1. Following Devil’s Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS

    Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences), Xueqiang Wang (Indiana University), Yi Chen (Institute of Information Engineering, Chinese Academy of Sciences), Peng Wang, Yeonjoon Lee, and XiaoFeng Wang (Indiana University), Bin Ma and Aohui Wang (Institute of Information Engineering, Chinese Academy of Sciences), and Yingjun Zhang and Wei Zou (Institute of Software, Chinese Academy of Sciences)

  2. Multiple Handshakes Security of TLS 1.3 Candidates
    Xinyu Li (Trusted Computing and Information Assurance Laboratory, SKLCS, Institute of Software,

    Chinese Academy of Sciences, Beijing, China and CAS Key Laboratory of Electromagnetic Space Information, University of Science and Technology of China, Hefei, China), Jing Xu, Zhenfeng Zhang, and Dengguo Feng (Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences), and Honggang Hu (Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China)

  3. Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf

    Xiaolong Bai (TNList, Tsinghua University, Beijing), Luyi Xing, Nan Zhang, and XiaoFeng Wang (Indiana University Bloomington), Xiaojing Liao (Georgia Institute of Technology), Tongxin Li (Peking University), and Shi-Min Hu (Tsinghua University)

  4. No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis

    Wenrui Diao and Xiangyu Liu (The Chinese University of Hong Kong), Zhou Li (IEEE Member), and Kehuan Zhang (The Chinese University of Hong Kong)

USENIX Security Symposium

会议相关信息

25th USENIX Security Symposium
August 10–12, 2016
Austin, TX

录用的中国论文列表:

  1. The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO

    Kun Du and Hao Yang, Tsinghua University; Zhou Li, IEEE Member; Haixin Duan, Tsinghua University; Kehuan Zhang, The Chinese University of Hong Kong

NDSS

会议相关信息

23rd Annual NDSS Symposium
San Diego, California
February 21 -24, 2016
  1. Forwarding-Loop Attacks in Content Delivery Networks

    Jianjun Chen, Xiaofeng Zheng, Haixin Duan and Jinjin Liang (Tsinghua University and Tsinghua National Laboratory for Information Science and Technology) and Jian Jiang (University of California, Berkeley) and Kang Li (University of Georgia) and Tao Wan (Huawei Canada) and Vern Paxson (University of California, Berkeley and International Computer Science Institute)

  2. A Simple Generic Attack on Text Captchas

    Haichang Gao (Xidian University), Jeff Yan (Lancaster University), Fang Cao, Zhengya Zhang, Lei Lei, Mengyun Tang, Ping Zhang, Xin Zhou, Xuqin Wang and Jiawei Li (Xidian University)

CCS

会议相关信息

23rd ACM Conference on Computer and Communications Security 
Hofburg Palace, Vienna, Austria
October 24-28, 2016
  1. Attacking OpenSSL Implementation of ECDSA with a Few Signatures

    Shuqin Fan (State Key Laboratory of Cryptology), Wenbo Wang and Qingfeng Cheng (Luoyang University of Foreign Languages)

  2. Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback

    Kai Wang, Yuqing Zhang (University of Chinese Academy of Sciences, Beijing) and Peng Liu (The Pennsylvania State University)

  3. Host of Troubles: Multiple Host Ambiguities in HTTP Implementations

    Jianjun Chen (Tsinghua University), Jian Jiang (University of California, Berkeley), Haixin Duan (Tsinghua University), Concordia UniversityNicholas Weaver (International Computer Science Institute), Tao Wan (Huawei Canada) and Vern Paxson (International Computer Science Institute

  4. Identity-Concealed Authenticated Encryption and Key Exchange

    Yunlei Zhao (Fudan University)

  5. Instant and Robust Authentication and Key Agreement among Mobile Devices

    Wei Xi (Xi’an Jiaotong University), Chen Qian (University of Kentucky), Jinsong Han, Kun Zhao (Xi’an Jiaotong University), Sheng Zhong (Nanjing University), Xiang-Yang Li (University of Science and Technology of China) and Jizhong Zhao (Xi’an Jiaotong University)

  6. Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication

    Zhenfeng Zhang, Kang Yang (Chinese Academy of Sciences), Xuexian Hu (State Key Laboratory of Mathematical Engineering and Advanced Computing) and Yuchen Wang (Chinese Academy of Sciences)

  7. Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks

    Yunlong Mao, Yuan Zhang and Sheng Zhong (Nanjing University)

  8. Targeted Online Password Guessing: An Underestimated Threat

    Ding Wang, Zijian Zhang, Ping Wang (Peking University), Jeff Yan (Lancaster University) and Xinyi Huang (Fujian Normal University)

  9. When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals

    Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu (Shanghai Jiao Tong University), Xiaohui Liang (University of Massachusetts at Boston), Yao Liu (University of South Florida) and Na Ruan (Shanghai Jiao Tong University)

  10. On Code Execution Tracking via Power Side-Channel

    Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang (The Chinese University of Hong Kong), Wenyuan Xu (Zhejiang University) and Qiang Xu (The Chinese University of Hong Kong)

  11. TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime

    Mingshen Sun (The Chinese University of Hong Kong), Tao Wei (Baidu) and John C.S. Lui (The Chinese University of Hong Kong)

参考链接

评论