Abstract is missing.
- Evaluating the Flexibility of the Java SandboxZack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, Joshua Sunshine. 1-10 [doi]
- Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay AttacksSong Gao, Manar Mohamed, Nitesh Saxena, Chengcui Zhang. 11-20 [doi]
- On the Security and Usability of Crypto PhonesMaliheh Shirvanian, Nitesh Saxena. 21-30 [doi]
- Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric NetworksMariana Raykova, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani. 31-40 [doi]
- Know Your Achilles' Heel: Automatic Detection of Network Critical ServicesAli Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel. 41-50 [doi]
- Proactive Security Analysis of Changes in Virtualized InfrastructuresSören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim. 51-60 [doi]
- Vulnerability Assessment of OAuth Implementations in Android ApplicationsHui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu. 61-70 [doi]
- BareDroid: Large-Scale Analysis of Android Apps on Real DevicesSimone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna. 71-80 [doi]
- Experimental Study with Real-world Data for Android App Security Analysis using Machine LearningSankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li, Nicolais Guevara. 81-90 [doi]
- Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP AttacksMingwei Zhang, R. Sekar. 91-100 [doi]
- A Principled Approach for ROP DefenseRui Qiao, Mingwei Zhang, R. Sekar. 101-110 [doi]
- Defeating ROP Through Denial of Stack PivotAravind Prakash, Heng Yin. 111-120 [doi]
- Handling Reboots and Mobility in 802.15.4 SecurityKonrad-Felix Krentz, Christoph Meinel. 121-130 [doi]
- Using Channel State Information for Tamper Detection in the Internet of ThingsIbrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, Matthias Hollick. 131-140 [doi]
- Using Visual Challenges to Verify the Integrity of Security CamerasJunia Valente, Alvaro A. Cárdenas. 141-150 [doi]
- JaTE: Transparent and Efficient JavaScript ConfinementTung Tran, Riccardo Pelizzi, R. Sekar. 151-160 [doi]
- Cross-Site Framing AttacksNethanel Gelernter, Yoel Grinstein, Amir Herzberg. 161-170 [doi]
- Covert Botnet Command and Control Using TwitterNick Pantic, Mohammad Iftekhar Husain. 171-180 [doi]
- AuDroid: Preventing Attacks on Audio Channels in Mobile DevicesGiuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli. 181-190 [doi]
- On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms?Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto. 191-200 [doi]
- Grab 'n Run: Secure and Practical Dynamic Code Loading for Android ApplicationsLuca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi. 201-210 [doi]
- Provenance-based Integrity Protection for WindowsWai-Kit Sze, R. Sekar. 211-220 [doi]
- MOSE: Live Migration Based On-the-Fly Software EmulationJinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim. 221-230 [doi]
- Privacy-preserving Virtual MachineTianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan. 231-240 [doi]
- Soteria: Offline Software Protection within Low-cost Embedded DevicesJohannes Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede. 241-250 [doi]
- PIE: Parser Identification in Embedded SystemsLucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti. 251-260 [doi]
- Defending Against Malicious USB Firmware with GoodUSBJing (Dave) Tian, Adam M. Bates, Kevin R. B. Butler. 261-270 [doi]
- Proximity Verification for Contactless Access Control and Authentication SystemsAanjhan Ranganathan, Boris Danev, Srdjan Capkun. 271-280 [doi]
- Scalable and Secure Concurrent Evaluation of History-based Access Control PoliciesMaarten Decat, Bert Lagaisse, Wouter Joosen. 281-290 [doi]
- Entity-Based Access Control: supporting more expressive access control policiesJasper Bogaerts, Maarten Decat, Bert Lagaisse, Wouter Joosen. 291-300 [doi]
- Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern UnlockAdam J. Aviv, Devon Budzitowski, Ravi Kuber. 301-310 [doi]
- ErsatzPasswords: Ending Password Cracking and Detecting Password LeakageMohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah, Eugene H. Spafford. 311-320 [doi]
- PARS: A Uniform and Open-source Password Analysis and Research SystemShouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem A. Beyah. 321-330 [doi]
- Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped BinariesMinghua Wang, Heng Yin, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng. 331-340 [doi]
- ShrinkWrap: VTable Protection without Loose EndsIstván Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos. 341-350 [doi]
- DynaGuard: Armoring Canary-based Protections against Brute-force AttacksTheofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis. 351-360 [doi]
- Towards Analyzing the Input Validation Vulnerabilities associated with Android System ServicesChen Cao, Neng Gao, Peng Liu 0005, Ji Xiang. 361-370 [doi]
- MorphDroid: Fine-grained Privacy VerificationPietro Ferrara, Omer Tripp, Marco Pistoia. 371-380 [doi]
- MobiPluto: File System Friendly Deniable Storage for Mobile DevicesBing Chang, Zhan Wang, Bo Chen, Fengwei Zhang. 381-390 [doi]
- Analyzing and Modeling Longitudinal Security Data: Promise and PitfallsBenjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten. 391-400 [doi]
- Accurate, Low Cost and Instrumentation-Free Security Audit Logging for WindowsShiQing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu. 401-410 [doi]
- SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databasesSimone Mutti, Enrico Bacis, Stefano Paraboschi. 411-420 [doi]
- Combining Differential Privacy and Secure Multiparty ComputationMartin Pettai, Peeter Laud. 421-430 [doi]
- Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret SharingPeter Mayer, Melanie Volkamer. 431-440 [doi]
- Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data UnitAndriana Gkaniatsou, Fiona McNeill, Alan Bundy, Graham Steel, Riccardo Focardi, Claudio Bozzato. 441-450 [doi]
- Logical Partitions on Many-Core PlatformsRamya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun. 451-460 [doi]
- Hardware-assisted Memory Tracing on New SoCs Embedding FPGA FabricsLetitia W. Li, Guillaume Duc, Renaud Pacalet. 461-470 [doi]