23. CCS 2016: Vienna, Austria

Keynote

Paper Session 1A: Blockchain I

Paper Session 1B: Differential Privacy

Paper Session 1C: Android Security

Paper Session 1D: Hardware Protection

Paper Session 2A: Blockchain II

Paper Session 2B: Differentially Private Systems I

Paper Session 2C: Access Control

Paper Session 2D: Security and Persistence

Paper Session 3A: Smart Contracts

Paper Session 3B: Differentially Private Systems II

Paper Session 3C: Mobile Software Analysis

Paper Session 3D: Kernel Memory Security

Paper Session 4A: Secure MPC I

Paper Session 4B: Attacks on Ciphers

Paper Session 4C: Big Data Meets Security

Paper Session 4D: Types and Memory Safety

Paper Session 5A: Secure MPC II

Paper Session 5B: Physically Based Authentication

Paper Session 5C: Web Security

Paper Session 5D: Security Bug Finding

Paper Session 6A: Phone Security using Formal Methods

Paper Session 6B: Attestation

Paper Session 6C: Mine your Literature

Paper Session 6D: Security Studies

Paper Session 7A: Secure MPC III

Paper Session 7B: Side-Channel Attacks

Paper Session 7C: Acoustic Attacks

Paper Session 7D: Protection Across Executions

Paper Session 8A: Lattices and Obfuscation

Paper Session 8B: Attacks and Defenses

Paper Session 8C: Phone Security

Paper Session 8D: Infrastructure Attacks

Paper Session 9A: Order-Revealing and Searchable Encryption

Paper Session 9B: Authentication

Paper Session 9C: Passwords

Paper Session 9D: Internet Security

Paper Session 10A: Specialized Crypto Tools

Paper Session 11B: Attacks using a Little Leakage

Paper Session 10C: Measuring Security in the Wild

Paper Session 10D: Network Security I

Paper Session 11A: Key Exchange

Paper Session 10B: Crypto Implementations

Paper Session 11C: More Attacks

Paper Session 11D: Network Security II

Paper Session 12A: Secure Protocols

Paper Session 12B: DSA/ECDSA

Paper Session 12C: Even more Attacks