î•ñƒWƒ‡ƒEƒzƒEƒZƒLƒ…ƒŠƒeƒB“ÁƒgƒN˜_ƒƒ“
‹e’rƒLƒNƒ`@_–¾ƒqƒƒAƒL
‰ÎƒJƒˆƒE—jƒQƒcƒˆƒE3ŒÀƒQƒ“@313 ‹³ŽºƒLƒ‡ƒEƒVƒc@(2017”Ntƒnƒ‹ƒZƒƒXƒ^[j
No Date @ Contents Author Issue Keyword
1 2017/4/11 @ Guidance @ @ @
2 2017/4/18 @ Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries Giulia Fanti  and Vasyl Pihur and _lfar Erlingsson PETs 16 ƒvƒ‰ƒCƒoƒV[C@Šm—¦˜_ƒJƒNƒŠƒcƒƒ“
@ 2017/4/25 @ ‹xuƒLƒ…ƒEƒRƒE @ @ @
@ 2017/5/2 @ j“úƒVƒ…ƒNƒWƒc @ @ @
3 2017/5/9 @ Linking Health Records for Federated Query Processing Rinku Dewri , Toan Ong,  and Ramakrishna Thurimella  PETs 16 ˆÃ†ƒAƒ“ƒSƒEƒvƒƒgƒRƒ‹Cƒvƒ‰ƒCƒoƒV[
4 2017/5/16 @ Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites Rick Wash and Emilee Rader, Michigan State University; Ruthie Berman, Macalester College; Zac Wellmer Soups 16 ƒpƒXƒ[ƒhC’²¸ƒ`ƒ‡ƒEƒT
5 2017/5/23 @ You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors Neil Zhenqiang Gong, Iowa State University; Bin Liu, Rutgers University Usenix 16 SNS, ‘®«ƒ]ƒNƒZƒC„’èƒXƒCƒeƒC
6 2017/5/30 @ Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner, University of Washington Usenix 16 Tracking, ƒvƒ‰ƒCƒoƒV[
7 2017/6/6 @ Virtual U: Defeating Face Liveness Detection by Building Virtual Models from Your Public Photos Yi Xu, True Price, Jan-Michael Frahm, and Fabian Monrose, The University of North Carolina at Chapel Hill Usenix 16 VR, ŠçƒJƒI”FŽ¯ƒjƒ“ƒVƒL
8 2017/6/13 @ Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis Claude Fachkha, Elias Bou-Harb, Anastasis Keliris, Nasir Memon, Mustaque Ahamad NDSS 17 CPS, IoT, ƒlƒbƒgƒ[ƒNƒZƒLƒ…ƒŠƒeƒB
9 2017/6/20 @ P2P Mixing and Unlinkable Bitcoin Transactions Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate NDSS 17 ˆÃ†ƒAƒ“ƒSƒE’ʉ݃cƒEƒJC“½–¼«ƒgƒNƒƒCƒZƒC
10 2017/6/27 @ On the Instability of Bitcoin Without the Block Reward Miles Carlsten Harry Kalodner S. Matthew Weinberg Arvind Narayanan CCS 16 ƒrƒbƒgƒRƒCƒ“C’²¸ƒ`ƒ‡ƒEƒT
11 2017/7/4 @ Prepose: Privacy, Security, and Reliability for Gesture-Based Programming Lucas Silva Figueiredo; Benjamin Livshits; David Molnar; Margus Veanes IEEESP 16 ”F؃jƒ“ƒVƒ‡ƒECƒWƒFƒXƒ`ƒƒ[
@ 2017/7/11 @ ‹xuƒLƒ…ƒEƒRƒE @ @ @
12 2017/7/18 @ Users Really Do Plug in USB Drives They Find Matthew Tischer; Zakir Durumeric; Sam Foster; Sunny Duan; Alec Mori; Elie Bursztein; Michael Bailey IEEESP 16 lŠÔƒjƒ“ƒQƒ“—v‘fƒˆƒEƒ\C’²¸ƒ`ƒ‡ƒEƒT
13 2017/7/25 @ Cloak of Visibility: Detecting When Machines Browse a Different Web Luca Invernizzi; Kurt Thomas; Alexandros Kapravelos; Oxana Comanescu; Jean-Michel Picod; Elie Bursztein IEEESP 16 ƒEƒFƒuCƒNƒ[ƒLƒ“ƒO’²¸ƒ`ƒ‡ƒEƒT
14 •âuƒzƒRƒE @ Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints Pierre Laperdrix; Walter Rudametkin; Benoit Baudry IEEESP 16 ƒEƒFƒuCŽ¯•ÊƒVƒLƒxƒc
@ @ @ @ @ @ @
¦ IEEESP (IEEE Symposium on Security and Privacy)
CCS (ACM conference on computer and communications security)
KDD (ACM SIGKDD Int. Conference on Knowledge Discovery and Data Mining)
ECiInternational Cryptology Conference EUROCRYPT)
ASIACCSiACM@Symposium on InformAtion, Compuer and Communications Security)
ICISC(International Conference on Information Security and Cryptology)
CRYPTO (IACR International Cryptology Conference)
CT-RSA(RSA Security Conference Cryptographers Track)
RAID(Recent Advances in Intrusion Detection)
PAKDD (Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
CCSW (ACM workshop on Cloud computing security)