{"id":302966,"date":"2016-10-10T14:52:27","date_gmt":"2016-10-10T21:52:27","guid":{"rendered":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/?post_type=msr-event&#038;p=302966"},"modified":"2025-08-06T11:59:05","modified_gmt":"2025-08-06T18:59:05","slug":"acm-ccs-2016-microsoft-research","status":"publish","type":"msr-event","link":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/event\/acm-ccs-2016-microsoft-research\/","title":{"rendered":"ACM CCS 2016 and Microsoft Research"},"content":{"rendered":"\n\n<p><strong>Venue:<\/strong>\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.hofburg-wien.at\/\" target=\"_blank\" rel=\"noopener\">Hofburg Palace<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nHeldenplatz<br \/>\n1014 Vienna<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We were delighted to be a part of the 23rd ACM Conference on Computer and Communications Security (CCS) in Vienna, Austria, October 24-28, 2016 at the Hofburg Palace. CCS is the ACM&#8217;s oldest conference in the security area. You can learn more about our research presented at CCS 2016 via the Accepted papers.<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_startdate":"2016-10-24","msr_enddate":"2016-10-28","msr_location":"Vienna, Austria","msr_expirationdate":"","msr_event_recording_link":"","msr_event_link":"","msr_event_link_redirect":false,"msr_event_time":"","msr_hide_region":false,"msr_private_event":false,"msr_hide_image_in_river":0,"footnotes":""},"research-area":[13558],"msr-region":[239178],"msr-event-type":[197941],"msr-video-type":[],"msr-locale":[268875],"msr-program-audience":[],"msr-post-option":[],"msr-impact-theme":[],"class_list":["post-302966","msr-event","type-msr-event","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-region-europe","msr-event-type-conferences","msr-locale-en_us"],"msr_about":"<!-- wp:msr\/event-details {\"title\":\"ACM CCS 2016 and Microsoft Research\",\"backgroundColor\":\"grey\"} \/-->\n\n<!-- wp:msr\/content-tabs --><!-- wp:msr\/content-tab {\"title\":\"Overview\"} --><!-- wp:freeform --><p><strong>Venue:<\/strong>\u00a0<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.hofburg-wien.at\/\" target=\"_blank\" rel=\"noopener\">Hofburg Palace<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nHeldenplatz<br \/>\n1014 Vienna<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- \/wp:msr\/content-tabs -->","tab-content":[{"id":0,"name":"","content":"We were\u00a0delighted to be a part of the 23rd ACM Conference on Computer and Communications Security (<a href=\"https:\/\/www.sigsac.org\/ccs\/CCS2016\/\" target=\"_blank\" rel=\"noopener\">CCS<\/a>) in Vienna, Austria, October 24-28, 2016 at the Hofburg Palace.\r\n\r\nCCS is the ACM's oldest conference in the security area. If you attended CCS 2016 we hope you were able to chat with our researchers about the projects and opportunities at Microsoft that involve shaping the future of computer and communications security for billions of users. You can learn more about our research presented at CCS 2016 via the Accepted papers listed below.\r\n<h2>Committee Chairs<\/h2>\r\n<ul>\r\n \t<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/helenw\/\" target=\"_blank\" rel=\"noopener\">Helen Wang<\/a>, Steering Committee Member<\/li>\r\n<\/ul>\r\n<h2>Program Committee members<\/h2>\r\n<ul>\r\n \t<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/markulf\/\" target=\"_blank\" rel=\"noopener\">Markulf Kohlweiss<\/a><\/li>\r\n \t<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/livshits\/\" target=\"_blank\" rel=\"noopener\">Ben Livshits<\/a><\/li>\r\n \t<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/parno\/\" target=\"_blank\" rel=\"noopener\">Bryan Parno<\/a><\/li>\r\n<\/ul>\r\n<h2>Microsoft Research\u00a0attendees<\/h2>\r\n<ul>\r\n \t<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/melissac\/\" target=\"_blank\" rel=\"noopener\">Melissa Chase<\/a><\/li>\r\n \t<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/fournet\/\" target=\"_blank\" rel=\"noopener\">C\u00e9dric Fournet<\/a><\/li>\r\n \t<li>Markulf Kohlweiss<\/li>\r\n \t<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/oohrim\/\" target=\"_blank\" rel=\"noopener\">Olya Ohrimenko<\/a><\/li>\r\n \t<li><a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/santiago\/\" target=\"_blank\" rel=\"noopener\">Santiago Zanella-Beguelin<\/a><\/li>\r\n<\/ul>\r\n<h2>PLAS Workshop<\/h2>\r\nACM SIGPLAN 11th <a href=\"https:\/\/plas2016.programming.systems\/\" target=\"_blank\" rel=\"noopener\">Workshop on Programming Languages and Analysis for Security<\/a>\u00a0(PLAS 2016)\r\n<ul>\r\n \t<li><strong>Steering Committee Member:<\/strong> <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/nswamy\/\" target=\"_blank\" rel=\"noopener\">Nikhil Swamy<\/a><\/li>\r\n \t<li><strong>Invited Talk:<\/strong> Verified Secure Implementations for the HTTPS Ecosystem, by C\u00e9dric Fournet, Microsoft Research<\/li>\r\n \t<li><strong>Accepted Paper:<\/strong> \"Formal Verification of Smart Contracts\" by Karthikeyan Bhargavan, INRIA; <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/antdl\/\" target=\"_blank\" rel=\"noopener\">Antoine Delignat-Lavaud<\/a> and C\u00e9dric Fournet, Microsoft Research; Anitha Gollamudi, Harvard University; Georges Gonthier, Microsoft Research; Nadim Kobeissi, INRIA; <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/aseemr\/\" target=\"_blank\" rel=\"noopener\">Aseem Rastogi<\/a>, Microsoft Research; Thomas Sibut-Pinote, INRIA; Nikhil Swamy and Santiago Zanella-B\u00e9guelin, Microsoft Research<\/li>\r\n<\/ul>\r\n<h2>Accepted papers<\/h2>\r\n<ul>\r\n \t<li>\"Differentially Private Bayesian Programming\" by Gilles Barthe, IMDEA Software Institute; Gian Pietro Farina and Marco Gaboardi, University at Buffalo, SUNY; Emilio Jes\u00fas Gallego Arias, CRI Mines \u2013 ParisTech; <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/adg\/\" target=\"_blank\" rel=\"noopener\">Andrew D. Gordon<\/a>, Microsoft Research; Justin Hsu, University of Pennsylvania; and Pierre-Yves Strub, IMDEA Software Institute<\/li>\r\n \t<li>\"Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE\" by Joppe Bos, NXP Semiconductors; <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/craigco\/\" target=\"_blank\" rel=\"noopener\">Craig Costello<\/a>, Microsoft Research; L\u00e9o Ducas, CWI; Ilya Mironov, Google; <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/mnaehrig\/\" target=\"_blank\" rel=\"noopener\">Michael Naehrig<\/a>, Microsoft Research; Valeria Nikolaenko, Stanford University; Ananth Raghunathan, Google; Douglas Stebila, McMaster University<\/li>\r\n \t<li>\"Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data\" by Dario Fiore, IMDEA Software Institute; C\u00e9dric Fournet, Microsoft Research; Esha Ghosh, Brown University; Markulf Kohlweiss, Olya Ohrimenko, and Bryan Parno, Microsoft Research<\/li>\r\n \t<li>\"The \u201cWeb\/Local\u201d Boundary Is Fuzzy \u2013 A Security Study of Chrome\u2019s Process-based Sandboxing\" by Yaoqi Jia, Zheng Leong Chua, and Hong Huang, National University of Singapore; <a href=\"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/people\/shuochen\/\" target=\"_blank\" rel=\"noopener\">Shuo Chen<\/a>, Microsoft Research; Prateek Saxena and Zhenkai Liang, National University of Singapore<\/li>\r\n \t<li>\"Transparency Overlays and Applications\" by Melissa Chase, Microsoft Research Redmond; Sarah Meiklejohn, University College London<\/li>\r\n<\/ul>"}],"msr_startdate":"2016-10-24","msr_enddate":"2016-10-28","msr_event_time":"","msr_location":"Vienna, Austria","msr_event_link":"","msr_event_recording_link":"","msr_startdate_formatted":"October 24, 2016","msr_register_text":"Watch now","msr_cta_link":"","msr_cta_text":"","msr_cta_bi_name":"","featured_image_thumbnail":null,"event_excerpt":"We were delighted to be a part of the 23rd ACM Conference on Computer and Communications Security (CCS) in Vienna, Austria, October 24-28, 2016 at the Hofburg Palace. CCS is the ACM's oldest conference in the security area. You can learn more about our research presented at CCS 2016 via the Accepted papers.","msr_research_lab":[],"related-researchers":[{"type":"user_nicename","display_name":"Antoine Delignat-Lavaud","user_id":31056,"people_section":"Group 1","alias":"antdl"},{"type":"user_nicename","display_name":"Aseem Rastogi","user_id":36021,"people_section":"Group 1","alias":"aseemr"},{"type":"user_nicename","display_name":"C\u00e9dric Fournet","user_id":31819,"people_section":"Group 1","alias":"fournet"},{"type":"user_nicename","display_name":"Melissa Chase","user_id":32878,"people_section":"Group 1","alias":"melissac"},{"type":"user_nicename","display_name":"Nikhil Swamy","user_id":33138,"people_section":"Group 1","alias":"nswamy"},{"type":"user_nicename","display_name":"Santiago Zanella-B\u00e9guelin","user_id":33518,"people_section":"Group 1","alias":"santiago"}],"msr_impact_theme":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-opportunities":[],"related-publications":[367715,368810],"related-videos":[],"related-posts":[],"_links":{"self":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/302966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-event"}],"about":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-event"}],"version-history":[{"count":3,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/302966\/revisions"}],"predecessor-version":[{"id":1147235,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/302966\/revisions\/1147235"}],"wp:attachment":[{"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media?parent=302966"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=302966"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=302966"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=302966"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=302966"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=302966"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=302966"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=302966"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/cm-edgetun.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=302966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}