FORTH - Institute of Computer Science

Accepted Papers

ESORICS 2016 Accepted Papers

Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong and Jie Chen. Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently

Carter Yagemann and Wenliang Du. Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook

Céline Chevalier, Fabien Laguillaumie and Damien Vergnaud. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions

Gábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi and Levente Buttyán. Membrane: A posteriori detection of malicious code loading by memory paging analysis

Xiao Zhang, Yousra Aafer, Kailiang Ying and Wenliang Du. Hey, You, Get Off of My Image: Detecting Data Residue in Android Images

Luka Malisa, Kari Kostiainen, Srdjan Capkun and Michael Och. Mobile Application Impersonation Detection Using Dynamic User Interface Extraction

Joachim Biskup and Marcel Preuß. Information Control by PolicyBased Relational Weakening Templates

Andreea-Ina Radu and Flavio D. Garcia. LeiA: A Lightweight Authentication Protocol for CAN

Marco Rocchetto and Nils Ole Tippenhauer. On Attacker Models and Profiles for CyberPhysical Systems

Nataliia Bielova and Tamara Rezk. Spot the Difference: Secure MultiExecution and Multiple Facets

Roel Peeters and Tobias Pulls. Insynd: Improved Privacy-Preserving Transparency Logging

Daniel Schoepe, Musard Balliu, Frank Piessens and Andrei Sabelfeld. Let's Face It: Faceted Values for Taint Tracking

Spandan Veggalam, Sanjay Rawat, Istvan Haller and Herbert Bos. IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming

David J. Wu, Ankur Taly, Asim Shankar and Dan Boneh. Privacy, Discovery, and Authentication for the Internet of Things

Nesrine Kaaniche and Maryline Laurent. Attribute-based Signatures for supporting Anonymous Certification

Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Vincent Lenders and Srdjan Capkun. Quantifying Location Privacy Leakage from Transaction Prices

Vivek Nigam, Carolyn Talcott and Abraão Aires Urquiza. Towards the Automated Verification of Cyber-Physical Security Protocols: Bounding the Number of Timed Intruders

Weining Yang, Ninghui Li, Ian Molloy, Youngja Park and Suresh Chari. Comparing Password Ranking Algorithms on Realworld Password Datasets

Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu and Guanxing Wen. A Machine Learning Approach for Detecting Third-Party Trackers on the Web

Yongge Wang and Qutaibah Malluhi. Privacy Preserving Computation in Cloud Using NoiseFree Fully Homomorphic Encryption (FHE) Schemes

Hui Cui, Robert H. Deng, Yingjiu Li and Baodong Qin. Server-Aided Revocable Attribute-Based Encryption

Jia Xu, Anjia Yang, Jianying Zhou and Duncan Wong. Lightweight Delegatable Proofs of Storage

Ilias Giechaskiel, Cas Cremers and Kasper B. Rasmussen. On Bitcoin Security in the Presence of Broken Cryptographic Primitives

Tobias Nilges, Joern Mueller-Quade and Valerie Fetzer. A Formal Treatment of Privacy in Video Data

Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin and Kaitai Liang. Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control

Andreas Zankl, Katja Miller, Johann Heyszl and Georg Sigl. Towards Efficient Evaluation of a Time-Driven Cache Attack on Modern Processors

Benjamin Dowling, Felix Günther, Udyani Herath and Douglas Stebila. Secure Logging Schemes and Certificate Transparency

Florian Kohnhäuser and Stefan Katzenbeisser. Secure Code Updates for Mesh Networked Commodity Low-End Embedded Devices

Michel Abdalla, Mario Cornejo, Anca Nitulescu and David Pointcheval. Robust Password-Protected Secret Sharing

Bharat Srinivasan, Payas Gupta, Manos Antonakakis and Mustaque Ahamad. Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution

Siamak Shahandashti and Feng Hao. DREip: A Verifiable EVoting Scheme without Tallying Authorities

Jun Zhou, Zhenfu Cao and Xiaolei Dong. PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching

Niklas Buescher, Andreas Holzer, Alina Weber and Stefan Katzenbeisser. Compiling Low Depth Circuits for Practical Secure Computation

Aldar CF. Chan, Jianying Zhou, Jun Wen Wong and Joseph C. M. Teo. Scalable Two-factor Authentication using Historical Data

Michael Goodrich, Evgenios Kornaropoulos, Michael Mitzenmacher and Roberto Tamassia. More Practical and Secure History-Independent Hash Tables

Cristina Alcaraz and Javier Lopez. Safeguarding Structural Controllability in Cyber-Physical Control Systems

Myrto Arapinis, Véronique Cortier and Steve Kremer. Three voters are enough for privacy properties

Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld and Tsz Hon Yuen. An Efficient NonInteractive Multiclient Searchable Encryption with Support for Boolean Queries

Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis and Angelos Keromytis. NaClDroid: Native Code Isolation for Android Applications

Johanna Ullrich and Edgar Weippl. The Beauty or The Beast? Attacking Rate Limits of the Xen Hypervisor

Kim Thuat Nguyen, Nouha Oualha and Maryline Laurent. Authenticated Key Agreement mediated by a Proxy Re-encryptor for the Internet of Things

Oliver Woizekowski and Ron van der Meyden. Nondeterministic Multi-Domain Noninterference via Policy Reduction

Ding Wang and Ping Wang. On the Implications of Zipf's Law in Passwords

Marc Juarez, Mohsen Imani, Mike Perry, Claudia Diaz and Matthew Wright. Toward an Efficient Website Fingerprinting Defense

Nico Weichbrodt, Anil Kurmus, Peter Pietzuch and Rüdiger Kapitza. AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves

Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang and Mourad Debbabi. Proactive Verification of Security Compliance for Clouds through Pre-Computation: Application to OpenStack

Fabo Wang, Yuqing Zhang, Kai Wang, Peng Liu and Wenjie Wang. Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android

Marco Vassena, Pablo Buiras, Lucas Waye and Alejandro Russo. Flexible Manipulation of Labeled Values for Information-Flow Control Libraries

Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda and Thorsten Holz. Automated Multi-Architectural Discovery of CFI-Resistant Code Gadgets

Nethanel Gelernter and Amir Herzberg. Autocomplete Injection Attack

Mohamed Sabt and Jacques Traoré. Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore

Wacław Banasik, Stefan Dziembowski and Daniel Malinowski. Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts

Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang and Bing Wang. Efficient Encrypted Keyword Search for MultiUser Data Sharing

Michael Backes, Amir Herzberg, Aniket Kate and Ivan Pryvalov. Anonymous RAM

Brendan Sheridan and Micah Sherr. On Manufacturing Resilient Opaque Constructs Against Static Analysis

Xiao Wang, S. Dov Gordon, Allen McIntosh and Jonathan Katz. Secure Computation of MIPS Machine Code

Bahman Rashidi, Carol Fung, Anh Nguyen and Tam Vu. Enhancing Android User's Privacy through Experts Seeking and Permission Recommendation

Aron Laszka, Mingyi Zhao and Jens Grossklags. Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms

Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow and Dominique Schröder. Efficient Sanitizable Signatures without Random Oracles

Mhr Khouzani, Pasquale Malacaria, Chris Hankin, Andrew Fielder and Fabrizio Smeraldi. Efficient Numerical Frameworks for MultiObjective Cyber Security Planning