ACM Conference on Computer and Communications Security

CCS 2017 - Sessions

1A: Multi-Party Computation 1, Tuesday, 10:45am-noon
2A: Human Authentication, Tuesday, 10:45am-noon
3A: Adversarial Machine Learning, Tuesday, 10:45am-noon
4A: Browsers, Tuesday, 10:45am-noon
5A: Cryptocurrency, Tuesday, 10:45am-noon
1B: Multi-Party Computation 2, Tuesday, 1:45-3:15pm
2B: Passwords, Tuesday, 1:45-3:15pm
3B: Investigating Attacks, Tuesday, 1:45-3:15pm
4B: Privacy Policies, Tuesday, 1:45-3:15pm
5B: Blockchains, Tuesday, 1:45-3:15pm
1C: Oblivious RAM, Tuesday, 3:45-5:15pm
2C: World Wide Web of Wickedness, Tuesday, 3:45-5:15pm
3C: Machine Learning Privacy, Tuesday, 3:45-5:15pm
4C: From Verification to ABE, Tuesday, 3:45-5:15pm
5C: Using Blockchains, Tuesday, 3:45-5:15pm
1D: Functional Encryption and Obfuscation, Wednesday, 9:00-10:30am
2D: Vulnerable Mobile Apps, Wednesday, 9:00-10:30am
3D: Logical Side Channels, Wednesday, 9:00-10:30am
4D: Crypto Primitives, Wednesday, 9:00-10:30am
5D: Network Security, Wednesday, 9:00-10:30am
1E: Hardening Crypto, Wednesday, 11:00am-12:30pm
2E: Securing Mobile Apps, Wednesday, 11:00am-12:30pm
3E: Physical Side Channels, Wednesday, 11:00am-12:30pm
4E: Adversarial Social Networking, Wednesday, 11:00am-12:30pm
5E: Privacy-Preserving Analytics, Wednesday, 11:00am-12:30pm
1F: Private Set Intersection, Wednesday, 2:00-3:30pm
2F: Insights from Log(in)s, Wednesday, 2:00-3:30pm
3F: Crypto Pitfalls, Wednesday, 2:00-3:30pm
4F: Private Queries, Wednesday, 2:00-3:30pm
5F: Understanding Security Fails, Wednesday, 2:00-3:30pm
1G: Searchable Encryption, Wednesday, 4:00-5:00pm
2G: Bug-Hunting Risks and Rewards, Wednesday, 4:00-5:00pm
3G: Crypto Standards, Wednesday, 4:00-5:00pm
4G: Voting, Wednesday, 4:00-5:00pm
5G: Hardening Hardware, Wednesday, 4:00-5:00pm
1H: Crypto Attacks, Thursday, 9:00-10:30am
2H: Code Reuse Attacks, Thursday, 9:00-10:30am
3H: Web Security, Thursday, 9:00-10:30am
4H: Formal Verification, Thursday, 9:00-10:30am
1I: Post-Quantum, Thursday, 11:00am-12:30pm
2I: Information Flow, Thursday, 11:00am-12:30pm
3I: Personal Privacy, Thursday, 11:00am-12:30pm
4I: Verifying Crypto, Thursday, 11:00am-12:30pm
5I: Communication Privacy, Thursday, 11:00am-12:30pm
1J: Outsourcing, Thursday, 2:00-3:30pm
2J: Fun with Fuzzing, Thursday, 2:00-3:30pm
3J: Problematic Patches, Thursday, 2:00-3:30pm
4J: Flash Security, Thursday, 2:00-3:30pm
1K: Secure Computation, Thursday, 4:00-5:30pm
2K: Fuzzing Finer and Faster, Thursday, 4:00-5:30pm
3K: Program Analysis, Thursday, 4:00-5:30pm
4K: Secure Enclaves, Thursday, 4:00-5:30pm