Abstract is missing.
- A security framework for the analysis and design of software attestationFrederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Christian Wachsmann. 1-12 [doi]
- OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platformsEmmanuel Owusu, Jorge Guajardo, Jonathan M. McCune, James Newsome, Adrian Perrig, Amit Vasudevan. 13-24 [doi]
- BIOS chronomancy: fixing the core root of trust for measurementJohn Butterworth, Corey Kallenberg, Xeno Kovah, Amy Herzog. 25-36 [doi]
- Flexible and scalable digital signatures in TPM 2.0Liqun Chen, Jiangtao Li 0001. 37-48 [doi]
- Rethinking SSL development in an appified worldSascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, Matthew Smith. 49-60 [doi]
- Protocol misidentification made easy with format-transforming encryptionKevin P. Dyer, Scott E. Coull, Thomas Ristenpart, Thomas Shrimpton. 61-72 [doi]
- An empirical study of cryptographic misuse in android applicationsManuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel. 73-84 [doi]
- Detecting stealthy, distributed SSH brute-forcingMobin Javed, Vern Paxson. 85-96 [doi]
- A clinical study of risk factors related to malware infectionsFanny Lalonde Lévesque, Jude Nsiempba, José M. Fernandez, Sonia Chiasson, Anil Somayaji. 97-108 [doi]
- Delta: automatic identification of unknown web-based infection campaignsKevin Borgolte, Christopher Kruegel, Giovanni Vigna. 109-120 [doi]
- Beheading hydras: performing effective botnet takedownsYacin Nadji, Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee. 121-132 [doi]
- Shady paths: leveraging surfing crowds to detect malicious web pagesGianluca Stringhini, Christopher Kruegel, Giovanni Vigna. 133-144 [doi]
- Honeywords: making password-cracking detectableAri Juels, Ronald L. Rivest. 145-160 [doi]
- Quantifying the security of graphical passwords: the case of android unlock patternsSebastian Uellenbeck, Markus Dürmuth, Christopher Wolf, Thorsten Holz. 161-172 [doi]
- Measuring password guessability for an entire universityMichelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, Blase Ur. 173-186 [doi]
- SAuth: protecting user accounts from password database leaksGeorgios Kontaxis, Elias Athanasopoulos, Georgios Portokalidis, Angelos D. Keromytis. 187-198 [doi]
- Monitor integrity protection with space efficiency and separate compilationBen Niu, Gang Tan. 199-210 [doi]
- Relational abstract interpretation for the verification of 2-hypersafety propertiesMáté Kovács, Helmut Seidl, Bernd Finkbeiner. 211-222 [doi]
- Formal verification of information flow security for a simple arm-based separation kernelMads Dam, Roberto Guanciale, Narges Khakpour, Hamed Nemati, Oliver Schwarz. 223-234 [doi]
- ShadowReplica: efficient parallelization of dynamic data flow trackingKangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, Georgios Portokalidis. 235-246 [doi]
- Multi-cloud oblivious storageEmil Stefanov, Elaine Shi. 247-258 [doi]
- Policy-based secure deletionChristian Cachin, Kristiyan Haralambiev, Hsu-Chun Hsiao, Alessandro Sorniotti. 259-270 [doi]
- Secure data deletion from persistent mediaJoel Reardon, Hubert Ritzdorf, David A. Basin, Srdjan Capkun. 271-284 [doi]
- PoWerStore: proofs of writing for efficient and robust storageDan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri, Marko Vukolic. 285-298 [doi]
- Path ORAM: an extremely simple oblivious RAM protocolEmil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas. 299-310 [doi]
- PHANTOM: practical oblivious computation in a secure processorMartin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, Dawn Song. 311-324 [doi]
- Practical dynamic proofs of retrievabilityElaine Shi, Emil Stefanov, Charalampos Papamanthou. 325-336 [doi]
- Users get routed: traffic correlation on tor by realistic adversariesAaron Johnson, Chris Wacek, Rob Jansen, Micah Sherr, Paul F. Syverson. 337-348 [doi]
- PCTCP: per-circuit TCP-over-IPsec transport for anonymous communication overlay networksMashael AlSabah, Ian Goldberg. 349-360 [doi]
- Cover your ACKs: pitfalls of covert channel censorship circumventionJohn Geddes, Max Schuchard, Nicholas Hopper. 361-372 [doi]
- An analysis of the EMV channel establishment protocolChristina Brzuska, Nigel P. Smart, Bogdan Warinschi, Gaven J. Watson. 373-386 [doi]
- On the security of TLS renegotiationFlorian Giesen, Florian Kohlar, Douglas Stebila. 387-398 [doi]
- Using SMT solvers to automate design tasks for encryption and signature schemesJoseph A. Akinyele, Matthew Green 0001, Susan Hohenberger. 399-410 [doi]
- The science, engineering and business of cyber securityRavi Sandhu. 411-412 [doi]
- AVANT-GUARD: scalable and vigilant switch flow management in software-defined networksSeungwon Shin, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu. 413-424 [doi]
- MinimaLT: minimal-latency networking through better securityW. Michael Petullo, Xu Zhang, Jon A. Solworth, Daniel J. Bernstein, Tanja Lange. 425-438 [doi]
- Impact of integrity attacks on real-time pricing in smart gridsRui Tan, Varun Badrinath Krishna, David K. Y. Yau, Zbigniew Kalbarczyk. 439-450 [doi]
- Configuration-based IDS for advanced metering infrastructureMuhammad Qasim Ali, Ehab Al-Shaer. 451-462 [doi]
- Practical constructions and new proof methods for large universe attribute-based encryptionYannis Rouselakis, Brent Waters. 463-474 [doi]
- Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebayZhen Liu, Zhenfu Cao, Duncan S. Wong. 475-486 [doi]
- Obfuscation resilient binary code reuse through trace-oriented programmingJunyuan Zeng, Yangchun Fu, Kenneth A. Miller, Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu. 487-498 [doi]
- Chucky: exposing missing checks in source code for vulnerability discoveryFabian Yamaguchi, Christian Wressnegger, Hugo Gascon, Konrad Rieck. 499-510 [doi]
- Scheduling black-box mutational fuzzingMaverick Woo, Sang Kil Cha, Samantha Gottlieb, David Brumley. 511-522 [doi]
- Fast two-party secure computation with minimal assumptionsAbhi Shelat, Chih-Hao Shen. 523-534 [doi]
- More efficient oblivious transfer and extensions for faster secure computationGilad Asharov, Yehuda Lindell, Thomas Schneider 0003, Michael Zohner. 535-548 [doi]
- An architecture for practical actively secure MPC with dishonest majorityMarcel Keller, Peter Scholl, Nigel P. Smart. 549-560 [doi]
- Belief semantics of authorization logicAndrew K. Hirsch, Michael R. Clarkson. 561-572 [doi]
- Automatic verification of protocols with lists of unbounded lengthBruno Blanchet, Miriam Paiola. 573-584 [doi]
- Relational abstraction in community-based secure collaborationPhilip W. L. Fong, Pooya Mehregan, Ram Krishnan. 585-598 [doi]
- When kids' toys breach mobile phone securityAbdul Serwadda, Vir V. Phoha. 599-610 [doi]
- Vetting undesirable behaviors in android apps with permission use analysisYuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang. 611-622 [doi]
- The impact of vendor customizations on android securityLei Wu, Michael C. Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang. 623-634 [doi]
- Unauthorized origin crossing on mobile platforms: threats and mitigationRui Wang 0010, Luyi Xing, Xiaofeng Wang, Shuo Chen. 635-646 [doi]
- Security analysis of pseudo-random number generators with input: /dev/random is not robustYevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs. 647-658 [doi]
- Predictability of Android OpenSSL's pseudo random number generatorSoo Hyeon Kim, Daewan Han, Dong Hoon Lee 0002. 659-668 [doi]
- Delegatable pseudorandom functions and applicationsAggelos Kiayias, Stavros Papadopoulos, Nikos Triandopoulos, Thomas Zacharias. 669-684 [doi]
- Ensuring high-quality randomness in cryptographic key generationHenry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford. 685-696 [doi]
- FANCI: identification of stealthy malicious logic using boolean functional analysisAdam Waksman, Matthew Suozzo, Simha Sethumadhavan. 697-708 [doi]
- Security analysis of integrated circuit camouflagingJeyavijayan Rajendran, Michael Sam, Ozgur Sinanoglu, Ramesh Karri. 709-720 [doi]
- Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based securityAlbert Kwon, Udit Dhawan, Jonathan M. Smith, Thomas F. Knight Jr., André DeHon. 721-732 [doi]
- Breaking and entering through the siliconClemens Helfmeier, Dmitry Nedospasov, Christopher Tarnovsky, Jan Starbug Krissler, Christian Boit, Jean-Pierre Seifert. 733-744 [doi]
- Polyglots: crossing origins by crossing formatsJonas Magazinius, Billy K. Rios, Andrei Sabelfeld. 753-764 [doi]
- ViceROI: catching click-spam in search ad networksVacha Dave, Saikat Guha, Yin Zhang. 765-776 [doi]
- mXSS attacks: attacking well-secured web-applications by using innerHTML mutationsMario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang. 777-788 [doi]
- When private set intersection meets big data: an efficient and scalable protocolChangyu Dong, Liqun Chen, Zikai Wen. 789-800 [doi]
- Privacy-preserving matrix factorizationValeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, Marc Joye, Nina Taft, Dan Boneh. 801-812 [doi]
- PICCO: a general-purpose compiler for private distributed computationYihua Zhang, Aaron Steele, Marina Blanton. 813-826 [doi]
- Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloudYinqian Zhang, Michael K. Reiter. 827-838 [doi]
- Tappan Zee (north) bridge: mining memory accesses for introspectionBrendan Dolan-Gavitt, Tim Leek, Josh Hodosh, Wenke Lee. 839-850 [doi]
- Towards reducing the attack surface of software backdoorsFelix Schuster, Thorsten Holz. 851-862 [doi]
- Verifiable delegation of computation on outsourced dataMichael Backes, Dario Fiore, Raphael M. Reischuk. 863-874 [doi]
- Outsourced symmetric private information retrievalStanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin Rosu, Michael Steiner. 875-888 [doi]
- Membership privacy: a unifying framework for privacy definitionsNinghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang. 889-900 [doi]
- Geo-indistinguishability: differential privacy for location-based systemsMiguel E. Andrés, Nicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi. 901-914 [doi]
- Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and educationTamara Denning, Adam Lerner, Adam Shostack, Tadayoshi Kohno. 915-928 [doi]
- Security analysis of a widely deployed locking systemMichael Weiner, Maurice Massar, Erik Tews, Dennis Giese, Wolfgang Wieser. 929-940 [doi]
- The cyber arms raceMikko Hypponen. 941-942 [doi]
- How to keep a secret: leakage deterring public-key cryptosystemsAggelos Kiayias, Qiang Tang. 943-954 [doi]
- Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficientlyMarek Jawurek, Florian Kerschbaum, Claudio Orlandi. 955-966 [doi]
- Elligator: elliptic-curve points indistinguishable from uniform random stringsDaniel J. Bernstein, Mike Hamburg, Anna Krasnova, Tanja Lange. 967-980 [doi]
- ASIST: architectural support for instruction set randomizationAntonis Papadogiannakis, Laertis Loutsis, Vassilis Papaefstathiou, Sotiris Ioannidis. 981-992 [doi]
- Librando: transparent code randomization for just-in-time compilersAndrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz. 993-1004 [doi]
- LogGC: garbage collecting audit logKyu Hyung Lee, Xiangyu Zhang, Dongyan Xu. 1005-1016 [doi]
- Identity, location, disease and more: inferring your secrets from android public resourcesXiao-yong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, Xiaofeng Wang, Carl A. Gunter, Klara Nahrstedt. 1017-1028 [doi]
- Preventing accidental data disclosure in modern operating systemsAdwait Nadkarni, William Enck. 1029-1042 [doi]
- AppIntent: analyzing sensitive data transmission in android for privacy leakage detectionZhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang. 1043-1054 [doi]
- Cross-origin pixel stealing: timing attacks using CSS filtersRobert Kotcher, Yutong Pei, Pranjal Jumde, Collin Jackson. 1055-1062 [doi]
- Seeing double: reconstructing obscured typed input from repeated compromising reflectionsYi Xu, Jared Heinly, Andrew M. White 0002, Fabian Monrose, Jan-Michael Frahm. 1063-1074 [doi]
- The robustness of hollow CAPTCHAsHaichang Gao, Wei Wang, Jiao Qi, Xuqin Wang, Xiyang Liu, Jeff Yan. 1075-1086 [doi]
- Anonymous credentials lightFoteini Baldimtsi, Anna Lysyanskaya. 1087-1098 [doi]
- Heart-to-heart (H2H): authentication for implanted medical devicesMasoud Rostami, Ari Juels, Farinaz Koushanfar. 1099-1112 [doi]
- OAKE: a new family of implicitly authenticated diffie-hellman protocolsAndrew Chi-Chih Yao, Yunlei Zhao. 1113-1128 [doi]
- FPDetective: dusting the web for fingerprintersGunes Acar, Marc Juárez, Nick Nikiforakis, Claudia Díaz, Seda F. Gürses, Frank Piessens, Bart Preneel. 1129-1140 [doi]
- Addressing the concerns of the lacks family: quantification of kin genomic privacyMathias Humbert, Erman Ayday, Jean-Pierre Hubaux, Amalio Telenti. 1141-1152 [doi]
- Hang with your buddies to resist intersection attacksDavid Isaac Wolinsky, Ewa Syta, Bryan Ford. 1153-1166 [doi]
- Content-based isolation: rethinking isolation policy design on client systemsAlexander Moshchuk, Helen J. Wang, Yunxin Liu. 1167-1180 [doi]
- Diglossia: detecting code injection attacks with precision and efficiencySooel Son, Kathryn S. McKinley, Vitaly Shmatikov. 1181-1192 [doi]
- 25 million flows later: large-scale detection of DOM-based XSSSebastian Lekies, Ben Stock, Martin Johns. 1193-1204 [doi]
- deDacota: toward preventing server-side XSS via automatic code and data separationAdam Doupé, Weidong Cui, Mariusz H. Jakubowski, Marcus Peinado, Christopher Kruegel, Giovanni Vigna. 1205-1216 [doi]
- Certified computer-aided cryptography: efficient provably secure machine code from high-level implementationsJosé Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir. 1217-1230 [doi]
- Computationally complete symbolic attacker and key exchangeGergei Bana, Koji Hasebe, Mitsuhiro Okada. 1231-1246 [doi]
- Fully automated analysis of padding-based encryption in the computational modelGilles Barthe, Juan Manuel Crespo, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Benedikt Schmidt, Santiago Zanella Béguelin. 1247-1260 [doi]
- Deduction soundness: prove one, get five for freeFlorian Böhl, Véronique Cortier, Bogdan Warinschi. 1261-1272 [doi]
- Efficient targeted key subset retrieval in fractal hash sequencesKelsey Cairns, Thoshitha Gamage, Carl Hauser. 1273-1284 [doi]
- HIFS: history independence for file systemsSumeet Bajaj, Radu Sion. 1285-1296 [doi]
- AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web contentShruti Tople, Shweta Shinde, Zhaofeng Chen, Prateek Saxena. 1297-1310 [doi]
- Protecting sensitive web content from client-side vulnerabilities with CRYPTONSXinshu Dong, Zhaofeng Chen, Hossein Siadati, Shruti Tople, Prateek Saxena, Zhenkai Liang. 1311-1324 [doi]
- Adjustably encrypted in-memory column-storeFlorian Kerschbaum, Patrick Grofig, Isabelle Hang, Martin Härterich, Mathias Kohler, Andreas Schaad, Axel Schröpfer, Walter Tighzert. 1325-1328 [doi]
- Demonstrating a trust framework for evaluating GNSS signal integrityXihui Chen, Carlo Harpes, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang. 1329-1332 [doi]
- Inherent PUFs and secure PRNGs on commercial off-the-shelf microcontrollersAnthony Van Herrewege, André Schaller, Stefan Katzenbeisser, Ingrid Verbauwhede. 1333-1336 [doi]
- An IDS framework for internet of things empowered by 6LoWPANPrabhakaran Kasinathan, Gianfranco Costamagna, Hussein Khaleel, Claudio Pastrone, Maurizio A. Spirito. 1337-1340 [doi]
- Secure and customizable web development in the safe activation frameworkRaphael M. Reischuk, Florian Schröder, Johannes Gehrke. 1341-1344 [doi]
- Enabling trusted stores for androidYury Zhauniarovich, Olga Gadyatskaya, Bruno Crispo. 1345-1348 [doi]
- Gradiant asymmetric encryption and verification systems based on handwritten signatureEnrique Argones-Rúa, Francisco Javier García Salomón, Luis Pérez-Freire. 1349-1350 [doi]
- On the real-time masking of the sound of credit cards using hot patchingManish Shukla, Purushotam G. Radadia, Shirish Subhash Karande, Sachin Lodha. 1351-1354 [doi]
- Critique of the CISSP common body of knowledge of cryptographyStephan Neuhaus, Gabriela Gheorghe. 1355-1358 [doi]
- Preserving privacy and accountability for personal devicesGabriela Gheorghe, Stephan Neuhaus. 1359-1362 [doi]
- Caching oblivious memory access: an extension to the HCRYPT virtual machineMichael Brenner, Matthew Smith. 1363-1366 [doi]
- Data quality evaluation: integrating security and accuracyLeon Reznik, Elisa Bertino. 1367-1370 [doi]
- Graphical password using object-based image rankingCuong Xuan Nguyen, Hung-Hsuan Huang, Kyoji Kawagoe. 1371-1374 [doi]
- A semantic-aware approach to reasoning about network traffic relationsHao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan. 1375-1378 [doi]
- Detecting malware through temporal function-based featuresEitan Menahem, Asaf Shabtai, Adi Levhar. 1379-1382 [doi]
- Event-based isolation of critical data in the cloudSebastian Biedermann, Stefan Katzenbeisser. 1383-1386 [doi]
- BotFlex: a community-driven tool for botnetdetectionSheharbano Khattak, Zaafar Ahmed, Affan Syed, Syed Ali Khayam. 1387-1390 [doi]
- Signal anomaly based attack detection in wireless sensor networksJeton Bacaj, Leon Reznik. 1391-1394 [doi]
- Enhanced embedded device security by combining hardware-based trust mechanismsMartin Schramm, Karl Leidl, Andreas Grzemba, Nicolai Kuntze. 1395-1398 [doi]
- On the anonymity of Israel's general electionsTomer Ashur, Orr Dunkelman. 1399-1402 [doi]
- Secure authentication from facial attributeswith no privacy lossOrr Dunkelman, Margarita Osadchy, Mahmood Sharif. 1403-1406 [doi]
- Performance signatures of mobile phone browsersBilal Shebaro, Di Jin, Elisa Bertino. 1407-1410 [doi]
- A new framework against privilege escalation attacks on androidWenming Zhou, Yuqing Zhang, Xuefeng Liu. 1411-1414 [doi]
- TRIPLEX: verifying data minimisation in communication systemsMeilof Veeningen, Mayla Brusò, Jerry den Hartog, Nicola Zannone. 1415-1418 [doi]
- SHAMROCK: self contained cryptography and key management processorDaniil M. Utin, Roger Kazan, Joshua Kramer, Michael Vai, David Whelihan. 1419-1420 [doi]
- trend of online flash XSS vulnerabilitiesQixu Liu, Yuqing Zhang, Huan Yang. 1421-1424 [doi]
- Cross-platform malware: write once, infect everywhereMartina Lindorfer, Matthias Neumayr, Juan Caballero, Christian Platzer. 1425-1428 [doi]
- Introducing pathogen: a real-time virtualmachine introspection frameworkAnthony Roberts, Richard McClatchey, Saad Liaquat, Nigel Edwards, Mike Wray. 1429-1432 [doi]
- PnP: improving web browsing performance over tor using web resource prefetch-and-pushGiang T. K. Nguyen, Xun Gong, Anupam Das, Nikita Borisov. 1433-1436 [doi]
- Sniffing and propagating malwares through WPAD deception in LANsDan Li, Chaoge Liu, Xu Cui, Xiang Cui. 1437-1440 [doi]
- A footprint of third-party tracking on mobile webAshar Javed. 1441-1444 [doi]
- Dr. Watson provides data for post-breach analysisWasim Ahmad Bhat, S. M. K. Quadri. 1445-1448 [doi]
- Reflected attacks abusing honeypotsMartin Husák, Martin Vizváry. 1449-1452 [doi]
- TouchCtrl: fine-grained access control for collaborative environmentsBenjamin Güldenring, Volker Roth. 1453-1456 [doi]
- CRYPTSERVER: strong data protection in commodity LAMP serversZhaofeng Chen, Xinshu Dong, Prateek Saxena, Zhenkai Liang. 1457-1460 [doi]
- Identity-based steganography and its applications to censorship resistanceTim Ruffing, Jonas Schneider, Aniket Kate. 1461-1464 [doi]
- Sechduler: a security-aware kernel schedulerParisa Haghani, Saman A. Zonouz. 1465-1468 [doi]
- Passwords on flexible display devicesSana Maqsood, Sonia Chiasson, Audrey Girouard. 1469-1472 [doi]
- Revisiting anomaly detection system design philosophyAyesha Binte Ashfaq, Muhammad Qasim Ali, Ehab Al-Shaer, Syed Ali Khayam. 1473-1476 [doi]
- 12th workshop on privacy in the electronic society (WPES 2013)Sara Foresti. 1477-1478 [doi]
- Third international workshop on trustworthy embedded devices (TrustED 2013)Frederik Armknecht, Jean-Pierre Seifert. 1479-1480 [doi]
- CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehiclesArslan Munir, Farinaz Koushanfar, Hervé Seudie, Ahmad-Reza Sadeghi. 1481-1482 [doi]
- Summary/overview for artificial intelligence and security (AISec'13)Blaine Nelson, Christos Dimitrakakis, Elaine Shi. 1483-1484 [doi]
- The first workshop on language support for privacy-enhancing technologies (PETShop'13)Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith. 1485-1486 [doi]
- Fifth ACM cloud computing security workshop (CCSW 2013)Ari Juels, Bryan Parno. 1487-1488 [doi]
- CCS'13 co-located workshop summary for SPSM 2013Adrienne Porter Felt, N. Asokan. 1489-1490 [doi]
- Smart energy grid security workshop (SEGS'13)Klaus Kursawe, Benessa Defend. 1491-1492 [doi]
- Eighth ACM workshop on digital identity management (DIM 2013): identity at the crossroadsThomas Groß, Marit Hansen. 1493-1494 [doi]
- Constructive and destructive aspects of embedded security in the internet of thingsChristof Paar. 1495-1496 [doi]
- Trusted execution environments on mobile devicesJan-Erik Ekberg, Kari Kostiainen, N. Asokan. 1497-1498 [doi]
- Easily instrumenting android applications for security purposesEric Bodden. 1499-1502 [doi]