ACM CCS 2016 Accepted posters & demos
23rd ACM Conference on Computer and Communication Security October 25 – 27, 2016, Hofburg Palace, Vienna, Austria
The following posters and demos were accepted to be presented at CCS 2016:
Accepted posters
A Behavioural Authentication System for Mobile Users 
 Md Morshedul Islam (University of Calgary) and Reihaneh Safavi-Naini (University of Calgary)
A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation 
 Katarzyna Kapusta (Telecom ParisTech), Gerard Memmi (Telecom ParisTech) and Hassan Noura (Telecom ParisTech)
Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning 
 Lingling Fan (East China Normal University), Minhui Xue (East China Normal University and NYU Shanghai), Sen Chen (East China Normal University), Lihua Xu (East China Normal University), Haojin Zhu (Shanghai Jiao Tong University)
An Educational Network Protocol for Covert Channel Analysis Using Patterns 
 Steffen Wendzel (Fraunhofer FKIE / Worms University of Applied Sciences) and Wojciech Mazurczyk (Warsaw University of Technology, Faculty of Electronics and Information Technology, Institute of Telecommunications)
Attack on Non-Linear Physical Unclonable Function 
 Jing Ye (State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences), Yu Hu (State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences) and Xiaowei Li (State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences)
ConcurORAM: High-Throughput Parallel Multi-Client ORAM 
 Anrin Chakraborti (Stony Brook University) and Radu Sion (Stony Brook University)
DataLair: A Storage Block Device with Plausible Deniability 
 Anrin Chakraborti (Stony Brook University), Chen Chen (Stony Brook University) and Radu Sion (Stony Brook University)
DroidShield: Protecting User Applications from Normal World Access 
 Darius Suciu (Stony Brook University) and Radu Sion (Stony Brook University)
Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party Interactions 
 Chia-Mu Yu (National Chung Hsing University)
Fingerprinting Tor Hidden Services 
 Asya Mitseva (University of Luxembourg), Andriy Panchenko (University of Luxembourg), Fabian Lanze (Huf Hülsbeck & Fürst GmbH & Co. KG), Martin Henze (RWTH Aachen University), Klaus Wehrle (RWTH Aachen University) and Thomas Engel (University of Luxembourg)
I Don’t Want That Content! On the Risks of Exploiting Bitcoin’s Blockchain as a Content Store 
 Roman Matzutt (RWTH Aachen University), Oliver Hohlfeld (RWTH Aachen University), Martin Henze (RWTH Aachen University), Robin Rawiel (RWTH Aachen University), Jan Henrik Ziegeldorf (RWTH Aachen University) and Klaus Wehrle (RWTH Aachen University)
Identifying Dynamic Data Structures in Malware 
 Thomas Rupprecht (University of Bamberg), Xi Chen (Vrije Universiteit Amsterdam), David H. White (University of Bamberg), Jan Tobias Mühlberg (KU Leuven), Herbert Bos (Vrije Universiteit Amsterdam) and Gerald Lüttgen (University of Bamberg)
Improved Markov Strength Meters for Passwords 
 Harshal Tupsamudre (TCS Research), Vijayanand Banahatti (TCS Research) and Sachin Lodha (TCS Research)
Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics Approach 
 Ignacio Martín (Universidad Carlos III de Madrid), Jose Alberto Hernandez (Universidad Carlos III de Madrid), Sergio de Los Santos (Telefónica Digital Identity & Pivacy) and Antonio Guzmán (Telefónica Digital Identity & Pivacy)
KXRay: Introspecting the Kernel for Rootkit Timing Footprints 
 Chen Chen (Stony Brook University), Darius Suciu (Stony Brook University) and Radu Sion (Stony Brook University)
Locally Virtualized Environment for Mitigating Ransomware Threat 
 Manish Shukla (TCS Research), Sutapa Mondal (TCS Research) and Sachin Lodha (TCS Research)
Mapping the Landscape of Large-Scale Vulnerability Notifications 
 Ben Stock (CISPA, Saarland University), Giancarlo Pellegrino (CISPA, Saarland University),  Christian Rossow (CISPA, Saarland University), Martin Johns (SAP SE) and Michael Backes (CISPA, Saarland University & MPI-SWS)
Phishing Website Detection with a Multiphase Framework to Find Visual Similarity 
 Omid Asudeh (University of Texas at Arlington) and Matthew Wright (Rochester Institute of Technology)
Privacy Enhanced Secure Location Verification 
 Md Mamunur Rashid Akand (University of Calgary) and Rei Safavi-Naini (University of Calgary)
Re-Thinking Risks and Rewards for Trusted Third Parties 
 Jan-Ole Malchow (Freie Universität Berlin), Benjamin Güldenring (Freie Universität Berlin) and Volker Roth (Freie Universität Berlin)
RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce Applications 
 Yongzhi Wang (Xidian University) and Yulong Shen (Xidian University)
Security Enhanced Administrative Role Based Access Control Models 
 Rajkumar P.V. (Texas Southern University) and Ravi Sandhu (University of Texas at San Antonio)
(Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network Data 
 Pedro Casas (AIT Austrian Institute of Technology), Alessandro D’Alconzo (AIT Austrian Institute of Technology), Giuseppe Settanni (AIT Austrian Institute of Technology), Pierdomenico Fiadino (Eurecat Technology Centre of Catalonia) and Florian Skopik (AIT Austrian Institute of Technology)
Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain Integrity 
 Toshinori Usui (NTT Secure Platform Laboratories), Tomonori Ikuse (NTT Security(Japan)KK), Makoto Iwamura (NTT Secure Platform Laboratories), Takeshi Yada (NTT Secure Platform Laboratories)
The ART of App Compartmentalization 
 Michael Backes (CISPA, Saarland University & MPI-SWS), Sven Bugiel (CISPA, Saarland University), Jie Huang (CISPA, Saarland University); Oliver Schranz (CISPA, Saarland University)
Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs 
  Bo Sun (Waseda University), Akinori Fujino (Waseda University) and Tatsuya Mori (Waseda University)
Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication Schemes 
 Peter Mayer, Stephan Neumann (Technische Universität Darmstadt) and Melanie Volkamer (Technische Universität Darmstadt & Karlstad University)
Towards Exposing Internet of Things: A Roadmap 
 Vinay Sachidananda (Singapore University of Technology and Design), Jinghui Toh (Singapore University of Technology and Design), Shachar Siboni (Ben-Gurion University of the Negev), Asaf Shabtai (Ben-Gurion University of the Negev) and Yuval Elovici (Singapore University of Technology and Design)
Towards Highly Interactive Honeypots for Industrial Control Systems 
  Stephan Lau (Freie Universität Berlin), Johannes Klick (Freie Universität Berlin), Stephan Arndt (Freie Universität Berlin) and Volker Roth (Freie Universität Berlin)
Towards Privacy-Preserving Biometric Identification in Cloud Computing 
  Changhee Hahn (Department of Computer Science and Engineering, Korea University) and Junbeom Hur (Department of Computer Science and Engineering, Korea University)
VUDEC – A Framework for Vulnerability Management in Decentralized Communication Networks 
 Michael Steinke (Universität der Bundeswehr), Stefan Metzger (Leibniz Supercomputing Centre) and Wolfgang Hommel (Universität der Bundeswehr)
Weighing in eHealth Security – A Security and Privacy Study of Smart Scales 
 Martin Krämer (University of Edinburgh), David Aspinall (University of Edinburgh) and Maria Wolters (University of Edinburgh)
WiPING: Wi-Fi signal-based PIN Guessing attack Seunghun Cha (Sungkyunkwan University), Jaewoo Park (Sungkyunkwan University), Geumhwan Cho (Sungkyunkwan University), Jun Ho Huh (Honeywell ACS Labs) and Hyoungshick Kim (Sungkyunkwan University)
Accepted demos
Easy Deployment of a Secure Internet Architecture for the 21st Century – How hard can it be to build a secure Internet? Ercan Ucan, Raphael M. Reischuk and Adrian Perrig (ETH Zurich) High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation Toshinori Araki (NEC Corporation), Assaf Barak (Bar-Ilan University), Jun Furukawa (NEC Corporation), Yehuda Lindell (Bar-Ilan University), Ariel Nof (Bar-Ilan University) and Kazuma Ohara (NEC Corporation) Integrating MPC in Big Data Workflows Nikolaj Volgushev (Boston University), Malte Schwarzkopf (MIT CSAIL), Andrei Lapets (Boston University), Mayank Varia (Boston University) and Azer Bestavros (Boston University) OffPAD — Offline Personal Authenticating Device with Applications in Hospitals and e-Banking Denis Migdal (ENSICAEN), Christian Johansen (University of Oslo) and Audun Jøsang (University of Oslo) Starving Permission-Hungry Android Apps Using SecuRank Vincent Taylor (University of Oxford) and Ivan Martinovic (University of Oxford)

