ACM Conference on Computer and Communications Security

CCS 2017 - Papers on Mobile security and privacy

Topics · Papers

Mobile security and privacy

Hearing Your Voice Is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice Authentication
Linghan Zhang (Florida State University), Sheng Tan (Florida State University), Jie Yang (Florida State University)
[PDF]
Session: 2A
Hindsight: Understanding the Evolution of UI Vulnerabilities in Mobile Browsers
Meng Luo (Stony Brook University), Oleksii Starov (Stony Brook University), Nima Honarmand (Stony Brook University), Nick Nikiforakis (Stony Brook University)
[PDF]
Session: 4A
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR
Syed Mahbub Hafiz (Indiana University), Ryan Henry (Indiana University)
DEFTL: Implementing Plausibly Deniable Encryption in Flash Translation Layer
Shijie Jia (Chinese Academy of Sciences, Institute of Information Engineering), Luning Xia (Chinese Academy of Sciences, Institute of Information Engineering), Bo Chen (Michigan Technological University), Peng Liu (The Pennsylvania State University, College of Information Sciences and Technology)
[PDF]
Session: 4J
DolphinAttack: Inaudible Voice Commands
Guoming Zhang (Zhejiang University), Chen Yan (Zhejiang University), Xiaoyu Ji (Zhejiang University), Tianchen Zhang (Zhejiang University), Taimin Zhang (Zhejiang University), Wenyuan Xu (Zhejiang University)
(Award Finalist)
[PDF]
[Paper]
Session: 3A
The ART of App Compartmentalization: Compiler-based Library Privilege Separation on Stock Android
Jie Huang (CISPA, Saarland University), Oliver Schranz (CISPA, Saarland University), Sven Bugiel (CISPA, Saarland University), Michael Backes (CISPA, Saarland University)
[PDF]
Session: 2E
DIFUZE: Interface Aware Fuzzing for Kernel Drivers
Jake Corina (University of California, Santa Barbara), Aravind Machiry (University of California, Santa Barbara), Christopher Salls (University of California, Santa Barbara), Yan Shoshitaishvili (Arizona State University), Shuang Hao (University of Texas at Dallas), Christopher Kruegel (University of California, Santa Barbara), Giovanni Vigna (University of California, Santa Barbara)
Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study
Qi Alfred Chen (University of Michigan), Matthew Thomas (Verisign Labs), Eric Osterweil (Verisign Labs), Yulong Cao (University of Michigan), Jie You (University of Michigan), Z. Morley Mao (University of Michigan)
walk2friends: Inferring Social Links from Mobility Profiles
Michael Backes (CISPA, Saarland University), Mathias Humbert (Swiss Data Science Center, ETH/EPFL), Jun Pang (University of Luxembourg), Yang Zhang (CISPA, Saarland University)
Vulnerable Implicit Service: A Revisit
Lingguang Lei (Chinese Academy of Sciences, Institute of Information Engineering / George Mason University), Yi He (Tsinghua University), Kun Sun (George Mason University), Jiwu Jing (Chinese Academy of Sciences, Institute of Information Engineering), Yuewu Wang (Chinese Academy of Sciences, Institute of Information Engineering), Qi Li (Tsinghua University), Jian Weng (Jinan University)
[PDF]
Session: 2E
Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution
Yi Chen (University of Chinese Academy of Sciences), Wei You (Indiana University), Yeonjoon Lee (Indiana University), Kai Chen (University of Chinese Academy of Sciences), XiaoFeng Wang (Indiana University), Wei Zou (University of Chinese Academy of Sciences)
[PDF]
Session: 2D
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through
Maliheh Shirvanian (University of Alabama at Birmingham), Nitesh Saxena (University of Alabama at Birmingham)
[PDF]
Session: 3F
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
Joel Alwen (IST Austria), Jeremiah Blocki (Purdue University), Ben Harsha (Purdue University)
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android
Erik Derr (CISPA, Saarland University), Sven Bugiel (CISPA, Saarland University), Sascha Fahl (Leibniz University Hannover), Yasemin Acar (Leibniz University Hannover), Michael Backes (CISPA, Saarland University)
A Stitch in Time: Supporting Android Developers in Writing Secure Code
Duc Cuong Nguyen (CISPA, Saarland University), Dominik Wermke (Leibniz University Hannover), Yasemin Acar (Leibniz University Hannover), Michael Backes (CISPA, Saarland University), Charles Weir (Security Lancaster, Lancaster University), Sascha Fahl (Leibniz University Hannover)
[PDF]
Session: 2E
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews
Tongxin Li (Peking University), Xueqiang Wang (Indiana University), Mingming Zha (Chinese Academy of Sciences), Kai Chen (Chinese Academy of Sciences), XiaoFeng Wang (Indiana University), Luyi Xing (Indiana University), Xiaolong Bai (Tsinghua University), Nan Zhang (Indiana University), Xinhui Han (Peking University)
[PDF]
Session: 2D