CCS 2016 Program Guide (PDF)
Overview Schedule & Floor map (PDF)
Floor Maps (PDF)
CCS 2016 Proceedings (main conference) – OpenTOC
Pre-Conference Workshops on Monday, October 24, 2016 (09.00-17.00)
SPSM 2016DETAILED PROGRAM 
  | 
WPES 2016DETAILED PROGRAM 
  | 
WISCS 2016DETAILED PROGRAM 
  | 
MTD 2016detailed program 
  | 
SafeConfig 2016DETAILED PROGRAM 
  | 
TIs 2016Detailed program 
  | 
PLAS 2016DETAILED PROGRAM 
  | 
|
|---|---|---|---|---|---|---|---|
| 07.30-09.00 | 
Registration & Early Bird Coffee | 
||||||
| 08.30/09.00-10.30 | 
SPSM 109.00-10.30  | 
WPES 108.25-10.30  | 
WISCS 109.00-10.30  | 
MTD 108.50-11.00  | 
SafeConfig 109.00-10.35  | 
TIs 109.00-10.30  | 
PLAS 108.50-10.30  | 
| 10.30-11.00 | 
Coffee Break | 
||||||
| 11.00-12.30 | 
SPSM 2 | 
WPES 2 | 
WISCS 2 | 
MTD 2 | 
SafeConfig 2 | 
TIs 2 | 
PLAS 2 | 
| 12.30-14.00 | 
Lunch Break | 
||||||
| 14.00-15.30 | 
SPSM 3 | 
WPES 3 | 
WISCS 3 | 
MTD 3 | 
SafeConfig 3 | 
TIs 3 | 
PLAS 3 | 
| 15.30-16.00 | 
Coffee Break | 
||||||
| 16.00-17.30/18.00 | 
SPSM 416.00-17.40  | 
WPES 416.00-18.10  | 
WISCS 416.00-17.30  | 
MTD 416.05-17.40  | 
SafeConfig 416.00-17.30  | 
TIs 416.00-17.30  | 
PLAS 416.00-18.10  | 
CCS 2016 Main Conference, Tuesday, October 25, 2016
CCS 2016 Proceedings (main conference) – OpenTOC
Track 1cryptographic mechanisms
 Lecture Hall A  | 
Track 2differential privacy / cryptography / attacks
 Lecture Hall B  | 
Track 3web/mobile security
 Lecture Hall C  | 
Track 4secure code and systems
 Lecture Hall D  | 
Track 5Tutorials & Talks
 Lecture Hall E  | 
|
|---|---|---|---|---|---|
| 07.30-08.40 | 
Registration & Early Bird Coffee | 
||||
| 08.40-08.50 | 
OpeningLecture Hall C  | 
||||
| 08.50-09.50 | 
KeynoteLecture Hall C Cybersecurity, Nuclear Security, Alan Turing, and Illogical Logic
 | 
||||
| 10.00-11.30 | 
Session 1ABlockchain I
  Session Chair:  | 
Session 1BDifferential Privacy
  Session Chair:  | 
Session 1CAndroid Security
  Session Chair:  | 
Session 1DHardware Protection
  Session Chair:  | 
Tutorial | 
| 
  On the Security and Performance of Proof of Work Blockchains  | 
  Differential Privacy as a Mutual Information Constraint  | 
  The Misuse of Android Unix Domain Sockets and Security Implications  | 
  Strong Non-Interference and Type-Directed Higher-Order Masking  | 
 Program Anomaly Detection: Methodology and Practices  | 
|
| 11.30-12.00 | 
Coffee Break | 
||||
| 12.00-13.00 | 
Session 2ABlockchain II
  Session Chair:  | 
Session 2BDifferentially Private Systems I
  Session Chair:  | 
Session 2CAccess Control
  Session Chair:  | 
Session 2DSecurity and Persistence
  Session Chair:  | 
Invited Talk | 
| 
  On the Instability of Bitcoin Without the Block Reward  | 
  A EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation  | 
  AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems  | 
  Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency  | 
 Colorful like a Chameleon: Security Nightmares of Embedded Systems  | 
|
| 13.00-14.30 | 
Lunch Break | 
||||
| 14.30-16.00 | 
Session 3ASmart Contracts
  Session Chair:  | 
Session 3BDifferentially Private Systems II
  Session Chair:  | 
Session 3CMobile Software Analysis
  Session Chair:  | 
Session 3DKernel Memory Security
  Session Chair:  | 
Tutorial | 
| 
  Making Smart Contracts Smarter  | 
  DPSense: Differentially Private Crowdsourced Spectrum Sensing  | 
  TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime  | 
  Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR  | 
 Security on Wheels: Security and Privacy for Vehicular Communication Systems  | 
|
| 16.00-16.30 | 
Coffee Break | 
||||
| 16.30-18.00 | 
Session 4ASecure MPC I
  Session Chair:  | 
Session 4BAttacks on Ciphers
  Session Chair:  | 
Session 4CBig Data Meets Security
  Session Chair:  | 
Session 4DTypes and Memory Safety
  Session Chair:  | 
Tutorial | 
| 
  Improvements to Secure Computation with Penalties  | 
  Message-Recovery Attacks on Feistel-Based Format Preserving Encryption  | 
  Scalable Graph-based Bug Search for Firmware Images  | 
  TypeSanitizer: Practical Type Confusion Detection  | 
 Security on Wheels: Security and Privacy for Vehicular Communication Systems  | 
|
| 18.30-23.00 | 
Mayor’s Dinner @ Vienna City HallPoster / Demo Session & Award Ceremony 
 18.15 Meeting point in front of the Conference Venue entrance (or you join us directly at the City Hall) 
  | 
||||
CCS 2016 Main Conference, Wednesday, October 26, 2016
CCS 2016 Proceedings (main conference) – OpenTOC
Track 1cryptographic mechanisms
 Lecture Hall A  | 
Track 2differential privacy / cryptography / attacks
 Lecture Hall B  | 
Track 3web/mobile security
 Lecture Hall C  | 
Track 4secure code and systems
 Lecture Hall D  | 
Track 5Tutorials & Talks
 Lecture Hall E  | 
|
|---|---|---|---|---|---|
| 07.30-08.50 | 
Registration & Early Bird Coffee | 
||||
| 08.50-09.50 | 
KeynoteLecture Hall C Is it practical to build a truly distributed payment system?
 | 
||||
| 10.00-11.30 | 
Session 5ASecure MPC II
 
  Session Chair:  | 
Session 5BPhysically Based Authentication
 
  Session Chair:  | 
Session 5CWeb Security
 
  Session Chair:  | 
Session 5DSecurity Bug Finding
 
  Session Chair:  | 
Tutorial(CCS)^2 – Crypto-Currencies Special @ CCS 2016 (Part I) | 
| 
  Alternative Implementations of Secure Real Numbers  | 
  MEMS Gyroscopes as Physical Unclonable Functions  | 
  Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem  | 
  How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior  | 
 Cryptographic Currencies Crash Course (C5)  | 
|
| 11.30-12.00 | 
Coffee Break | 
||||
| 12.00-13.00 | 
Session 6APhone security using formal methods
  Session Chair:  | 
Session 6BAttestation
  Session Chair:  | 
Session 6CMine your Literature
  Session Chair:  | 
Session 6DSecurity Studies
  Session Chair:  | 
Tutorial(CCS)^2 – Crypto-Currencies Special @ CCS 2016 (Part II) | 
| 
  SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles  | 
  SANA: Secure and Scalable Aggregate Network Attestation  | 
  Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence  | 
  An In-Depth Study of More Than Ten Years of Java Exploitation  | 
 Introduction to Credit Networks (12.00 – 13.15)  | 
|
| 13.00-14.30 | 
Lunch Break | 
||||
| 14.30-16.00 | 
Session 7ASecure MPC III
  Session Chair:  | 
Session 7BSide-Channel Attacks
  Session Chair: 
  | 
Session 7CAcoustic attacks
  Session Chair:  | 
Session 7DProtection Across Executions
  Session Chair: 
  | 
Tutorial(CCS)^2 – Crypto-Currencies Special @ CCS 2016 (Part III) | 
| 
  High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority  | 
  Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations  | 
  Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets  | 
  UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages  | 
 On the Security and Scalability of Bitcoin’s Blockchain  | 
|
| 16.00-16.30 | 
Coffee Break | 
||||
| 16.30-18.00 | 
Session 8ALattices and Obfuscation
  Session Chair:  | 
Session 8BAttacks and Defences
  Session Chair:  | 
Session 8CPhone Security
  Session Chair:  | 
Session 8DInfrastructure attacks
  Session Chair:  | 
Invited Talk | 
| 
  5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs  | 
  On Code Execution Tracking via Power Side-Channel  | 
  Using Reflexive Eye Movements For Fast Challenge-Response Authentication  | 
  Limiting the Impact of Stealthy Attacks on Industrial Control Systems  | 
 Thorsten Borrmann, DB Netz AG, Germany (16.30 – 17.15) Experiences in Securing Smart Grids and their Operations (17.15 – 18.00)  | 
|
| 18.05-19.00 | 
Panel DiscussionLecture Hall C Impact of Academic Security Research: Frogs in Wells, Storms in Teacups, or Raw Diamonds?
 Chair: Ahmad-Reza Sadeghi, TU Darmstadt, CYSEC, Germany 
 Panelists:  | 
||||
| 19.05-24.00 | 
Traditional Viennese Dinner @ Heuriger
 The Dinner will take place at a “Heuriger” (traditional wine tavern), located on the outskirts of Vienna. 
 19.05 Meeting point in front of the Conference Venue entrance 
  | 
||||
CCS 2016 Main Conference, Thursday, October 27, 2016
CCS 2016 Proceedings (main conference) – OpenTOC
Track 1cryptographic mechanisms
 Lecture Hall A  | 
Track 2differential privacy / cryptography / attacks
 Lecture Hall B  | 
Track 3web/mobile security
 Lecture Hall C  | 
Track 4secure code and systems
 Lecture Hall D  | 
Track 5Tutorials & Talks
 Lecture Hall E  | 
|
|---|---|---|---|---|---|
| 08.15-09.30 | 
Registration & Early Bird Coffee | 
||||
| 09.00/09.30-11.00 | 
Session 9AOrder-Revealing and Searchable Encryption
  Session Chair: (09.00 – 11.00)  | 
Session 9BAuthentication
  Session Chair: (09.30 – 11.00)  | 
Session 9CPasswords
  Session Chair: (09.30 – 11.00)  | 
Session 9DInternet security
  Session Chair: (09.30 – 11.00)  | 
|
| 
  POPE: Partial Order Preserving Encoding  | 
  Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication  | 
  An Empirical Study of Mnemonic Sentence-based Password Generation Strategies  | 
  PIPSEA: A Practical IPsec Gateway on Embedded APUs  | 
||
| 11.00-11.30 | 
Coffee Break | 
||||
| 11.30-13.00 | 
Session 10ASpecialized crypto tools
  Session Chair:  | 
Session 10BCrypto Implementations
  Session Chair:  | 
Session 10CMeasuring security in the wild
  Session Chair:  | 
Session 10DNetwork security I
  Session Chair:  | 
Tutorial | 
| 
  Function Secret Sharing: Improvements and Extensions  | 
  A Surfeit of SSH Cipher Suites  | 
  Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild  | 
  PhishEye: Live Monitoring of Sandboxed Phishing Kits  | 
 Privacy and Security in the Genomic Era  | 
|
| 13.00-14.30 | 
Lunch Break | 
||||
| 14.30-16.00 | 
Session 11AKey Exchange
  Session Chair:  | 
Session 11BAttacks using a little leakage
  Session Chair:  | 
Session 11CMore attacks
  Session Chair:  | 
Session 11DNetwork security II
  Session Chair:  | 
Tutorial | 
| 
  A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)  | 
  Generic Attacks on Secure Outsourced Databases  | 
  Host of Troubles: Multiple Host Ambiguities in HTTP Implementations  | 
  Safely Measuring Tor  | 
 Adversarial Data Mining: Big Data Meets Cyber Security  | 
|
| 16.00-16.30 | 
Coffee Break | 
||||
| 16.30-18.00 | 
Session 12ASecure Protocols
  Session Chair:  | 
Session 12BDSA/ECDSA
  Session Chair:  | 
Session 12CEven more attacks
  Session Chair:  | 
Session 12DCensorship Resistance
  Session Chair:  | 
Tutorial | 
| 
  A Protocol for Privately Reporting Ad Impressions at Scale  | 
  ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels  | 
  Android ION Hazard: the Curse of Customizable Memory Management System  | 
  Slitheen: Perfectly imitated decoy routing through traffic replacement  | 
 Adversarial Data Mining: Big Data Meets Cyber Security  | 
|
| 18.00-19.00 | 
CCS Business MeetingLecture Hall C  | 
||||
| 19.10-20.30 | 
optional Sightseeing Tour(For ticket holders only!)  | 
||||
Post-Conference Workshops on Friday, October 28, 2016 (09.00-17.00)
CCSW 2016Open TOC CCSW  | 
CPS-SPC 2016Open TOC CPS-SPC  | 
TRUSTED 2016Open TOC TrustED  | 
FEAST 2016DETAILED PROGRAM  | 
MIST 2016Open TOC MIST  | 
SPRO 2016Open TOC SPRO  | 
Aisec 2016Open TOC AISec  | 
|
|---|---|---|---|---|---|---|---|
| 07.30-09.00 | 
Registration & Early Bird Coffee | 
||||||
| 08.30/09.00-10.30 | 
CCSW 109.00-10.30  | 
CPS-SPC 108.50-10.30  | 
TrustED 109.00-10.30  | 
FEAST 108.30-10.30  | 
MIST 108.50-10.30  | 
SPRO 108.30-10.30  | 
AIsec 108.50-10.30  | 
| 10.30-11.00 | 
Coffee Break | 
||||||
| 11.00-12.30 | 
CCSW 2 | 
CPS-SPC 2 | 
TrustED 2 | 
FEAST 2 | 
MIST 2 | 
SPRO 2 | 
AIsec 2 | 
| 12.30-14.00 | 
Lunch Break | 
||||||
| 14.00-15.30 | 
CCSW 3 | 
CPS-SPC 3 | 
TrustED 3 | 
FEAST 3 | 
MIST 3 | 
SPRO 3 | 
AIsec 3 | 
| 15.30-16.00 | 
Coffee Break | 
||||||
| 16.00-17.30/18.00 | 
CCSW 416.00-18.00  | 
CPS-SPC 416.00-17.30  | 
TrustED 416.00-17.30  | 
FEAST 416.00-18.00  | 
MIST 416.00-17.30  | 
SPRO 416.00-18.00  | 
AIsec 416.00-17.45  | 

