CCS 2016 - CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump
CCS 2016 Tutorial - Adversarial Data Mining: Big Data Meets Cyber Security
CCS 2016 - When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
CCS 2016 - On the Security of Cracking-Resistant Password Vaults
CCS 2016 Tutorial - Privacy and Security in the Genomic Era
CCS 2016 - Coverage-based Greybox Fuzzing as Markov Chain
CCS 2016 Tutorial - Introduction to Credit Networks
CCS 2016 - „Make Sure DSA Signing Exponentiations Really Are Constant-Time“
CCS 2016 - A Secure Sharding Protocol For Open Blockchains
CCS 2016 - What Else is Revealed by Order Revealing Encryption?
CCS 2016 - Safely Measuring Tor
CCS 2016 - Breaking Web Applications Built On Top of Encrypted Data
CCS 2016 - Secure Stable Matching at Scale
Session - 19 - CCS ( Revised Pay Rules ), 2016 & Fixation Pay
Keynote by Martin Hellman at CCS 2016
CCS 2016 - C-FLAT: Control-FLow Attestation for Embedded Systems Software
CCS 2016 - Differential Privacy as a Mutual Information Constraint
Keynote by Ross Anderson at CCS 2016
CCS 2016 - Limiting the Impact of Stealthy Attacks on Industrial Control Systems
CCS 2016 - Σoφoς – Forward Secure Searchable Encryption