Topics · Papers
Authentication and authorization
Hearing Your Voice Is Not Enough: An Articulatory Gesture Based Liveness Detection for Voice AuthenticationLinghan Zhang (Florida State University), Sheng Tan (Florida State University), Jie Yang (Florida State University)
Let’s go in for a closer look: Observing passwords in their natural habitatSarah Pearman (Carnegie Mellon University), Jeremy Thomas (Carnegie Mellon University), Pardis Emami Naeini (Carnegie Mellon University), Hana Habib (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Serge Egelman (University of California, Berkeley), Alain Forget (Google)
T/Key: Second-Factor Authentication From Secure Hash ChainsDmitry Kogan (Stanford University), Nathan Manohar (Stanford University), Dan Boneh (Stanford University)
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key PrimitivesMelissa Chase (Microsoft Research), David Derler (Graz University of Technology), Steven Goldfeder (Princeton University), Claudio Orlandi (Aarhus University), Sebastian Ramacher (Graz University of Technology), Christian Rechberger (Graz University of Technology / Denmark Technical University), Daniel Slamanig (AIT Austrian Institute of Technology), Greg Zaverucha (Microsoft Research)
Detecting Structurally Anomalous Logins Within Enterprise NetworksHossein Siadati (New York University), Nasir Memon (New York University)
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Access Control in Online ServicesChaoshun Zuo (University of Texas at Dallas), Qingchuan Zhao (University of Texas at Dallas), Zhiqiang Lin (University of Texas at Dallas)
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical VibrationJian Liu (Rutgers University), Chen Wang (Rutgers University), Yingying Chen (Rutgers University), Nitesh Saxena (University of Alabama at Birmingham)
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard FunctionsJoel Alwen (IST Austria), Jeremiah Blocki (Purdue University), Ben Harsha (Purdue University)
Data breaches, phishing, or malware? Understanding the risks of stolen credentialsKurt Thomas (Google), Frank Li (University of California, Berkeley), Ali Zand (Google), Jake Barrett (Google), Juri Ranieri (Google), Luca Invernizzi (Google), Yarik Markov (Google), Oxana Comanescu (Google), Vijay Eranti (Google), Angelika Moscicki (Google), Dan Margolis (Google), Vern Paxson (University of California, Berkeley), Elie Bursztein (Google)
Why Do Developers Get Password Storage Wrong? A Qualitative Usability StudyAlena Naiakshina (University of Bonn), Anastasia Danilova (University of Bonn), Christian Tiefenau (University of Bonn), Marco Herzog (University of Bonn), Sergej Dechand (University of Bonn), Matthew Smith (University of Bonn)
Iron: Functional Encryption using Intel SGXBen Fisch (Stanford University), Dhinakaran Vinayagamurthy (University of Waterloo), Dan Boneh (Stanford University), Sergey Gorbunov (University of Waterloo)
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey PredictionMihir Bellare (University of California, San Diego), Wei Dai (University of California, San Diego)
Presence Attestation: The Missing Link In Dynamic Trust BootstrappingZhangkai Zhang (Beihang University), Xuhua Ding (Singapore Management University), Gene Tsudik (University of California, Irvine), Jinhua Cui (Singapore Management University), Zhoujun Li (Beihang University)