整理by: 稀饭&toby
S&P
会议相关信息
37th IEEE Symposium on Security and Privacy
MAY 23-25, 2016 AT THE FAIRMONT, SAN JOSE, CA
Following Devil’s Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS
Kai Chen (Institute of Information Engineering, Chinese Academy of Sciences), Xueqiang Wang (Indiana University), Yi Chen (Institute of Information Engineering, Chinese Academy of Sciences), Peng Wang, Yeonjoon Lee, and XiaoFeng Wang (Indiana University), Bin Ma and Aohui Wang (Institute of Information Engineering, Chinese Academy of Sciences), and Yingjun Zhang and Wei Zou (Institute of Software, Chinese Academy of Sciences)
Multiple Handshakes Security of TLS 1.3 Candidates
Xinyu Li (Trusted Computing and Information Assurance Laboratory, SKLCS, Institute of Software,Chinese Academy of Sciences, Beijing, China and CAS Key Laboratory of Electromagnetic Space Information, University of Science and Technology of China, Hefei, China), Jing Xu, Zhenfeng Zhang, and Dengguo Feng (Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences), and Honggang Hu (Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, University of Science and Technology of China)
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf
Xiaolong Bai (TNList, Tsinghua University, Beijing), Luyi Xing, Nan Zhang, and XiaoFeng Wang (Indiana University Bloomington), Xiaojing Liao (Georgia Institute of Technology), Tongxin Li (Peking University), and Shi-Min Hu (Tsinghua University)
No Pardon for the Interruption: New Inference Attacks on Android Through Interrupt Timing Analysis
Wenrui Diao and Xiangyu Liu (The Chinese University of Hong Kong), Zhou Li (IEEE Member), and Kehuan Zhang (The Chinese University of Hong Kong)
USENIX Security Symposium
会议相关信息
25th USENIX Security Symposium
August 10–12, 2016
Austin, TX
录用的中国论文列表:
The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO
Kun Du and Hao Yang, Tsinghua University; Zhou Li, IEEE Member; Haixin Duan, Tsinghua University; Kehuan Zhang, The Chinese University of Hong Kong
NDSS
会议相关信息
23rd Annual NDSS Symposium
San Diego, California
February 21 -24, 2016
Forwarding-Loop Attacks in Content Delivery Networks
Jianjun Chen, Xiaofeng Zheng, Haixin Duan and Jinjin Liang (Tsinghua University and Tsinghua National Laboratory for Information Science and Technology) and Jian Jiang (University of California, Berkeley) and Kang Li (University of Georgia) and Tao Wan (Huawei Canada) and Vern Paxson (University of California, Berkeley and International Computer Science Institute)
A Simple Generic Attack on Text Captchas
Haichang Gao (Xidian University), Jeff Yan (Lancaster University), Fang Cao, Zhengya Zhang, Lei Lei, Mengyun Tang, Ping Zhang, Xin Zhou, Xuqin Wang and Jiawei Li (Xidian University)
CCS
会议相关信息
23rd ACM Conference on Computer and Communications Security
Hofburg Palace, Vienna, Austria
October 24-28, 2016
Attacking OpenSSL Implementation of ECDSA with a Few Signatures
Shuqin Fan (State Key Laboratory of Cryptology), Wenbo Wang and Qingfeng Cheng (Luoyang University of Foreign Languages)
Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback
Kai Wang, Yuqing Zhang (University of Chinese Academy of Sciences, Beijing) and Peng Liu (The Pennsylvania State University)
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations
Jianjun Chen (Tsinghua University), Jian Jiang (University of California, Berkeley), Haixin Duan (Tsinghua University), Concordia UniversityNicholas Weaver (International Computer Science Institute), Tao Wan (Huawei Canada) and Vern Paxson (International Computer Science Institute
Identity-Concealed Authenticated Encryption and Key Exchange
Yunlei Zhao (Fudan University)
Instant and Robust Authentication and Key Agreement among Mobile Devices
Wei Xi (Xi’an Jiaotong University), Chen Qian (University of Kentucky), Jinsong Han, Kun Zhao (Xi’an Jiaotong University), Sheng Zhong (Nanjing University), Xiang-Yang Li (University of Science and Technology of China) and Jizhong Zhao (Xi’an Jiaotong University)
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication
Zhenfeng Zhang, Kang Yang (Chinese Academy of Sciences), Xuexian Hu (State Key Laboratory of Mathematical Engineering and Advanced Computing) and Yuchen Wang (Chinese Academy of Sciences)
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks
Yunlong Mao, Yuan Zhang and Sheng Zhong (Nanjing University)
Targeted Online Password Guessing: An Underestimated Threat
Ding Wang, Zijian Zhang, Ping Wang (Peking University), Jeff Yan (Lancaster University) and Xinyi Huang (Fujian Normal University)
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu (Shanghai Jiao Tong University), Xiaohui Liang (University of Massachusetts at Boston), Yao Liu (University of South Florida) and Na Ruan (Shanghai Jiao Tong University)
On Code Execution Tracking via Power Side-Channel
Yannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang (The Chinese University of Hong Kong), Wenyuan Xu (Zhejiang University) and Qiang Xu (The Chinese University of Hong Kong)
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime
Mingshen Sun (The Chinese University of Hong Kong), Tao Wei (Baidu) and John C.S. Lui (The Chinese University of Hong Kong)