Abstract is missing.
- From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?Moti Yung. 1-2 [doi]
- Keynote TalkEdward W. Felten. 3 [doi]
- Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeDavid Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann. 5-17 [doi]
- Ciphertext-only Cryptanalysis on Hardened Mifare Classic CardsCarlo Meijer, Roel Verdult. 18-30 [doi]
- Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOSLuyi Xing, Xiaolong Bai, Tongxin Li, Xiaofeng Wang, Kai Chen 0012, Xiaojing Liao, Shi-Min Hu, Xinhui Han. 31-43 [doi]
- iRiS: Vetting Private API Abuse in iOS ApplicationsZhui Deng, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu. 44-56 [doi]
- Seeing through Network-Protocol ObfuscationLiang Wang, Kevin P. Dyer, Aditya Akella, Thomas Ristenpart, Thomas Shrimpton. 57-69 [doi]
- CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached ContentJohn Holowczak, Amir Houmansadr. 70-83 [doi]
- Automated Analysis and Synthesis of Authenticated Encryption SchemesViet Tung Hoang, Jonathan Katz, Alex J. Malozemoff. 84-95 [doi]
- Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic PrimitivesOlivier Pereira, François-Xavier Standaert, Srinivas Vivek. 96-108 [doi]
- GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per ByteShay Gueron, Yehuda Lindell. 109-119 [doi]
- GUITAR: Piecing Together Android App GUIs from Memory ImagesBrendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu. 120-132 [doi]
- WebCapsule: Towards a Lightweight Forensic Engine for Web BrowsersChristopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, Kang Li. 133-145 [doi]
- VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory ImagesBrendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu. 146-157 [doi]
- Monte Carlo Strength Evaluation: Fast and Reliable Password CheckingMatteo Dell'Amico, Maurizio Filippone. 158-169 [doi]
- Surpass: System-initiated User-replaceable PasswordsJun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstantin Beznosov, Apurva Mohan, S. Raj Rajagopalan. 170-181 [doi]
- Optimal Distributed Password VerificationJan Camenisch, Anja Lehmann, Gregory Neven. 182-194 [doi]
- How to Use Bitcoin to Play Decentralized PokerRanjit Kumaresan, Tal Moran, Iddo Bentov. 195-206 [doi]
- Micropayments for Decentralized CurrenciesRafael Pass, Abhi Shelat. 207-218 [doi]
- Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of BitcoinsTim Ruffing, Aniket Kate, Dominique Schröder. 219-230 [doi]
- Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital ContentAggelos Kiayias, Qiang Tang. 231-242 [doi]
- It's a TRaP: Table Randomization and Protection against Function-Reuse AttacksStephen J. Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, Michael Franz. 243-255 [doi]
- Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code ReadsAdrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo. 256-267 [doi]
- Timely Rerandomization for Mitigating Memory DisclosuresDavid Bigelow, Thomas Hobson, Robert Rudd, William W. Streilein, Hamed Okhravi. 268-279 [doi]
- ASLR-Guard: Stopping Address Space Leakage for Code Reuse AttacksKangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee. 280-291 [doi]
- Location-restricted Services Access Control Leveraging Pinpoint WaveformingTao Wang, Yao Liu, Qingqi Pei, Tao Hou. 292-303 [doi]
- SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary UsersXiaocong Jin, Jingchao Sun, Rui Zhang 0007, Yanchao Zhang. 304-315 [doi]
- Insecurity of Voice Solution VoLTE in LTE Mobile NetworksChi-Yu Li, Guan-Hua Tu, Chunyi Peng, Zengwen Yuan, Yuanjie Li, Songwu Lu, Xinbing Wang. 316-327 [doi]
- Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementationsHongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, Yongdae Kim. 328-339 [doi]
- Defeating IMSI CatchersFabian van den Broek, Roel Verdult, Joeri de Ruiter. 340-351 [doi]
- DEMOS-2: Scalable E2E Verifiable Elections without Random OraclesAggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang. 352-363 [doi]
- Subversion-Resilient Signature SchemesGiuseppe Ateniese, Bernardo Magri, Daniele Venturi. 364-375 [doi]
- Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to PracticeQian Wang, Kui Ren, Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou. 376-387 [doi]
- Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information LeaksQi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao. 388-400 [doi]
- Unearthing Stealthy Program Attacks Buried in Extremely Long Execution PathsXiaokui Shu, Danfeng Yao, Naren Ramakrishnan. 401-413 [doi]
- From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux KernelWen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu. 414-425 [doi]
- VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code AuditsHenning Perl, Sergej Dechand, Matthew Smith 0001, Daniel Arp, Fabian Yamaguchi, Konrad Rieck, Sascha Fahl, Yasemin Acar. 426-437 [doi]
- UCognito: Private Browsing without TearsMeng Xu, Yeongjin Jang, Xinyu Xing, Taesoo Kim, Wenke Lee. 438-449 [doi]
- Security by Any Other Name: On the Effectiveness of Provider Based Email SecurityIan D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko. 450-464 [doi]
- Certified PUP: Abuse in Authenticode Code SigningPlaton Kotzias, Srdjan Matic, Richard Rivera, Juan Caballero. 465-478 [doi]
- A Multi-Modal Neuro-Physiological Study of Phishing Detection and Malware WarningsAjaya Neupane, Md. Lutfor Rahman, Nitesh Saxena, Leanne Hirshfield. 479-491 [doi]
- Efficient Genome-Wide, Privacy-Preserving Similar Patient Query based on Private Edit DistanceXiao Shaun Wang, Yan Huang, Yongan Zhao, Haixu Tang, Xiaofeng Wang, Diyue Bu. 492-503 [doi]
- GRECS: Graph Encryption for Approximate Shortest Distance QueriesXianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios. 504-517 [doi]
- Towards Automatic Generation of Security-Centric Descriptions for Android AppsMu Zhang, Yue Duan, Qian Feng, Heng Yin. 518-529 [doi]
- AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android ApplicationsDeguang Kong, Lei Cen, Hongxia Jin. 530-541 [doi]
- A Search Engine Backed by Internet-Wide ScanningZakir Durumeric, David Adrian, Ariana Mirian, Michael Bailey, J. Alex Halderman. 542-553 [doi]
- Sunlight: Fine-grained Targeting Detection at Scale with Statistical ConfidenceMathias Lécuyer, Riley Spahn, Yannis Spiliopolous, Augustin Chaintreau, Roxana Geambasu, Daniel Hsu. 554-566 [doi]
- Fast Garbling of Circuits Under Standard AssumptionsShay Gueron, Yehuda Lindell, Ariel Nof, Benny Pinkas. 567-578 [doi]
- Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious AdversariesYehuda Lindell, Ben Riva. 579-590 [doi]
- Fast and Secure Three-party Computation: The Garbled Circuit ApproachPayman Mohassel, Mike Rosulek, Ye Zhang. 591-602 [doi]
- FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web ApplicationsDivya Muthukumaran, Dan O'Keeffe, Christian Priebe, David M. Eyers, Brian Shand, Peter R. Pietzuch. 603-615 [doi]
- Detecting and Exploiting Second Order Denial-of-Service Vulnerabilities in Web ApplicationsOswaldo Olivo, Isil Dillig, Calvin Lin. 616-628 [doi]
- Inlined Information Flow Monitoring for JavaScriptAndrey Chudnov, David A. Naumann. 629-643 [doi]
- Inference Attacks on Property-Preserving Encrypted DatabasesMuhammad Naveed, Seny Kamara, Charles V. Wright. 644-655 [doi]
- Frequency-Hiding Order-Preserving EncryptionFlorian Kerschbaum. 656-667 [doi]
- Leakage-Abuse Attacks Against Searchable EncryptionDavid Cash, Paul Grubbs, Jason Perry, Thomas Ristenpart. 668-679 [doi]
- Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining CoalitionsAndrew Miller, Ahmed E. Kosba, Jonathan Katz, Elaine Shi. 680-691 [doi]
- Tampering with the Delivery of Blocks and Transactions in BitcoinArthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun. 692-705 [doi]
- Demystifying Incentives in the Consensus ComputerLoi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena. 706-719 [doi]
- Provisions: Privacy-preserving Proofs of Solvency for Bitcoin ExchangesGaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh. 720-731 [doi]
- Symbolic Execution of Obfuscated CodeBabak Yadegari, Saumya Debray. 732-744 [doi]
- CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping InstructionsGuillaume Bonfante, José M. Fernandez, Jean-Yves Marion, Benjamin Rouxel, Fabrice Sabatier, Aurélien Thierry. 745-756 [doi]
- LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary CodeJiang Ming, Dongpeng Xu, Li Wang, Dinghao Wu. 757-768 [doi]
- MalGene: Automatic Extraction of Malware Analysis Evasion SignatureDhilung Kirat, Giovanni Vigna. 769-780 [doi]
- Face/Off: Preventing Privacy Leakage From Photos in Social NetworksPanagiotis Ilia, Iasonas Polakis, Elias Athanasopoulos, Federico Maggi, Sotiris Ioannidis. 781-792 [doi]
- CrowdTarget: Target-based Detection of Crowdturfing in Online Social NetworksJonghyuk Song, Sangho Lee 0001, Jong Kim. 793-804 [doi]
- Exploiting Temporal Dynamics in Sybil DefensesChangchang Liu, Peng Gao, Matthew K. Wright, Prateek Mittal. 805-816 [doi]
- Where's Wally?: Precise User Discovery Attacks in Location Proximity ServicesIasonas Polakis, George Argyros, Theofilos Petsios, Suphannee Sivakorn, Angelos D. Keromytis. 817-828 [doi]
- Practicing Oblivious Access on Cloud Storage: the Gap, the Fallacy, and the New Way ForwardVincent Bindschaedler, Muhammad Naveed 0001, Xiaorui Pan, Xiaofeng Wang, Yan Huang. 837-849 [doi]
- Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower BoundXiao Wang, T.-H. Hubert Chan, Elaine Shi. 850-861 [doi]
- Constant Communication ORAM with Small BlocksizeTarik Moataz, Travis Mayberry, Erik-Oliver Blass. 862-873 [doi]
- Secure Deduplication of Encrypted Data without Additional Independent ServersJian Liu, N. Asokan, Benny Pinkas. 874-885 [doi]
- Transparent Data Deduplication in the CloudFrederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef. 886-900 [doi]
- Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow IntegrityIsaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard Shrobe, Martin C. Rinard, Hamed Okhravi, Stelios Sidiroglou-Douskos. 901-913 [doi]
- Per-Input Control-Flow IntegrityBen Niu, Gang Tan. 914-926 [doi]
- Practical Context-Sensitive CFIVictor van der Veen, Dennis Andriesse, Enes Göktas, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, Cristiano Giuffrida. 927-940 [doi]
- CCFI: Cryptographically Enforced Control Flow IntegrityAli José Mashtizadeh, Andrea Bittau, Dan Boneh, David Mazières. 941-951 [doi]
- Losing Control: On the Effectiveness of Control-Flow Integrity under Stack AttacksMauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Marco Negro, Christopher Liebchen, Mohaned Qunaibit, Ahmad-Reza Sadeghi. 952-963 [doi]
- SEDA: Scalable Embedded Device AttestationN. Asokan, Franz Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann. 964-975 [doi]
- TrustOTP: Transforming Smartphones into Secure One-Time Password TokensHe Sun, Kun Sun, Yuewu Wang, Jiwu Jing. 976-988 [doi]
- Trusted Display on Untrusted Commodity PlatformsMiao Yu, Virgil D. Gligor, Zongwei Zhou. 989-1003 [doi]
- PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing AttacksYasser Shoukry, Paul Martin, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava. 1004-1015 [doi]
- Clean Application Compartmentalization with SOAAPKhilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, Alex Richardson. 1016-1031 [doi]
- Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos. 1032-1047 [doi]
- Fast Non-Malleable CommitmentsHai Brenner, Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald. 1048-1057 [doi]
- White-Box Cryptography Revisited: Space-Hard CiphersAndrey Bogdanov, Takanori Isobe. 1058-1069 [doi]
- Lattice Basis Reduction Attack against Physically Unclonable FunctionsFatemeh Ganji, Juliane Krämer, Jean-Pierre Seifert, Shahin Tajik. 1070-1080 [doi]
- Drops for Stuff: An Analysis of Reshipping Mule ScamsShuang Hao, Kevin Borgolte, Nick Nikiforakis, Gianluca Stringhini, Manuel Egele, Michael Eubanks, Brian Krebs, Giovanni Vigna. 1081-1092 [doi]
- Android Root and its Providers: A Double-Edged SwordHang Zhang, Dongdong She, Zhiyun Qian. 1093-1104 [doi]
- An Empirical Study of Web Vulnerability Discovery EcosystemsMingyi Zhao, Jens Grossklags, Peng Liu. 1105-1117 [doi]
- The Dropper Effect: Insights into Malware Distribution with Downloader Graph AnalyticsBum Jun Kwon, Jayanta Mondal, Jiyong Jang, Leyla Bilge, Tudor Dumitras. 1118-1129 [doi]
- Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy AuditsOmar Chowdhury, Deepak Garg 0001, Limin Jia, Anupam Datta. 1130-1143 [doi]
- Automated Symbolic Proofs of Observational EquivalenceDavid A. Basin, Jannik Dreier, Ralf Sasse. 1144-1155 [doi]
- Automated Proofs of Pairing-Based CryptographyGilles Barthe, Benjamin Grégoire, Benedikt Schmidt. 1156-1168 [doi]
- Moat: Verifying Confidentiality of Enclave ProgramsRohit Sinha, Sriram K. Rajamani, Sanjit S. Seshia, Kapil Vaswani. 1169-1184 [doi]
- On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 EncryptionTibor Jager, Jörg Schwenk, Juraj Somorovsky. 1185-1196 [doi]
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol CandidatesBenjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila. 1197-1210 [doi]
- Deniable Key Exchanges for Secure MessagingNik Unger, Ian Goldberg. 1211-1223 [doi]
- TOPAS: 2-Pass Key Exchange with Full Perfect Forward Secrecy and Optimal Communication ComplexitySven Schäge. 1224-1235 [doi]
- From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an AppHeqing Huang, Sencun Zhu, Kai Chen 0012, Peng Liu 0005. 1236-1247 [doi]
- Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute ReferencesYousra Aafer, Nan Zhang, Zhongwen Zhang, Xiao Zhang, Kai Chen 0012, Xiaofeng Wang, Xiao-yong Zhou, Wenliang Du, Michael Grace. 1248-1259 [doi]
- Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging IntegrationsYangyi Chen, Tongxin Li, Xiaofeng Wang, Kai Chen 0012, Xinhui Han. 1260-1272 [doi]
- When Good Becomes Evil: Keystroke Inference with SmartwatchXiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang. 1273-1285 [doi]
- Differential Privacy with Bounded Priors: Reconciling Utility and Privacy in Genome-Wide Association StudiesFlorian Tramèr, Zhicong Huang, Jean-Pierre Hubaux, Erman Ayday. 1286-1297 [doi]
- Protecting Locations with Differential Privacy under Temporal CorrelationsYonghui Xiao, Li Xiong. 1298-1309 [doi]
- Privacy-Preserving Deep LearningReza Shokri, Vitaly Shmatikov. 1310-1321 [doi]
- Model Inversion Attacks that Exploit Confidence Information and Basic CountermeasuresMatt Fredrikson, Somesh Jha, Thomas Ristenpart. 1322-1333 [doi]
- Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving AuthenticationVireshwar Kumar, He Li, Jung-Min "Jerry" Park, Kaigui Bian, Yaling Yang. 1334-1345 [doi]
- Authenticating Privately over Public Wi-Fi HotspotsAldo Cassola, Erik-Oliver Blass, Guevara Noubir. 1346-1357 [doi]
- SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the WebDaniel Fett, Ralf Küsters, Guido Schmitz. 1358-1369 [doi]
- Automating Fast and Secure Translations from Type-I to Type-III Pairing SchemesJoseph A. Akinyele, Christina Garman, Susan Hohenberger. 1370-1381 [doi]
- The Clock is Still Ticking: Timing Attacks in the Modern WebTom van Goethem, Wouter Joosen, Nick Nikiforakis. 1382-1393 [doi]
- Cross-Site Search AttacksNethanel Gelernter, Amir Herzberg. 1394-1405 [doi]
- The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their ImplicationsYossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis. 1406-1418 [doi]
- From Facepalm to Brain Bender: Exploring Client-Side Cross-Site ScriptingBen Stock, Stephan Pfistner, Bernd Kaiser, Sebastian Lekies, Martin Johns. 1419-1430 [doi]
- Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution AttacksMihir Bellare, Joseph Jaeger, Daniel Kane. 1431-1440 [doi]
- HORNET: High-speed Onion Routing at the Network LayerChen Chen, Daniele Enrico Asoni, David Barrera, George Danezis, Adrian Perrig. 1441-1454 [doi]
- CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden ServicesSrdjan Matic, Platon Kotzias, Juan Caballero. 1455-1466 [doi]
- (Un)linkable Pseudonyms for Governmental DatabasesJan Camenisch, Anja Lehmann. 1467-1479 [doi]
- IntegriDB: Verifiable SQL for Outsourced DatabasesYupeng Zhang, Jonathan Katz, Charalampos Papamanthou. 1480-1491 [doi]
- A Domain-Specific Language for Low-Level Secure Multiparty Computation ProtocolsPeeter Laud, Jaak Randmets. 1492-1503 [doi]
- Automated Synthesis of Optimized Circuits for Secure ComputationDaniel Demmler, Ghada Dessouky, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Shaza Zeitouni. 1504-1517 [doi]
- Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted DataDario Catalano, Dario Fiore. 1518-1529 [doi]
- Maneuvering Around Clouds: Bypassing Cloud-based Security ProvidersThomas Vissers, Tom van Goethem, Wouter Joosen, Nick Nikiforakis. 1530-1541 [doi]
- The SICILIAN Defense: Signature-based Whitelisting of Web JavaScriptPratik Soni, Enrico Budianto, Prateek Saxena. 1542-1557 [doi]
- Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face AuthenticationYan Li, Yingjiu Li, Qiang Yan, Hancong Kong, Robert H. Deng. 1558-1569 [doi]
- Observing and Preventing Leakage in MapReduceOlga Ohrimenko, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Markulf Kohlweiss, Divya Sharma. 1570-1581 [doi]
- Mitigating Storage Side Channels Using Statistical Privacy MechanismsQiuyu Xiao, Michael K. Reiter, Yinqian Zhang. 1582-1594 [doi]
- Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted MigrationSoo-Jin Moon, Vyas Sekar, Michael K. Reiter. 1595-1606 [doi]
- Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain IsolationYutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia. 1607-1619 [doi]
- DEMO: Action Recommendation for Cyber ResilienceLuke Rodriguez, Darren Curtis, Sutanay Choudhury, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray. 1620-1622 [doi]
- POSTER: Secure Chat for the Masses? User-centered Security to the RescueRuba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Matthew Smith 0001. 1623-1625 [doi]
- POSTER: In the Net of the Spider: Measuring the Anonymity-Impact of Network-level Adversaries Against TorMichael Backes 0001, Simon Koch, Sebastian Meiser, Esfandiar Mohammadi, Christian Rossow. 1626-1628 [doi]
- POSTER: Towards Compiler-Assisted Taint Tracking on the Android Runtime (ART)Michael Backes 0001, Oliver Schranz, Philipp von Styp-Rekowsky. 1629-1631 [doi]
- POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP ProtocolPeixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su, Huan Zhou. 1632-1634 [doi]
- POSTER: Mobile Device Identification by Leveraging Built-in Capacitive SignatureManh Huynh, Phuc Nguyen, Marco Gruteser, Tam Vu. 1635-1637 [doi]
- POSTER: Implementing and Testing a Novel Chaotic Cryptosystem for Use in Small SatellitesSamuel Jackson, Scott Kerlin, Jeremy Straub. 1638-1640 [doi]
- POSTER: A Password-based Authentication by Splitting Roles of User InterfaceJungSeung Lee, Han Park, GyeongYong Bang, JooSeok Song. 1641-1643 [doi]
- POSTER: Page Table Manipulation AttackJungSeung Lee, Hyoungmin Ham, InHwan Kim, JooSeok Song. 1644-1646 [doi]
- POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy UseDepeng Li, Sachin Shetty. 1647-1649 [doi]
- POSTER: A Hardware Fingerprint Using GPU Core Frequency VariationsFengJun Li, Xin Fu, Bo Luo. 1650-1652 [doi]
- POSTER: The Popular Apps in Your Pocket Are Leaking Your PrivacyXing Liu, Wei Wang, Jiqiang Liu. 1653-1655 [doi]
- POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day VulnerabilitiesTianyue Luo, Chen Ni, Qing Han, Mutian Yang, JingZheng Wu, Yanjun Wu. 1656-1658 [doi]
- POSTER: Using Unit Testing to Detect Sanitization FlawsMahmoud Mohammadi, Bill Chu, Heather Richter Lipford. 1659-1661 [doi]
- POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security SituationsSubhojeet Mukherjee, Sachini S. Weerawardhana, Chancey Dunn, Indrajit Ray, Adele E. Howe. 1662-1664 [doi]
- POSTER: Dynamic Labelling for Analyzing Security ProtocolsN. V. Narendra Kumar, R. K. Shyamasundar. 1665-1667 [doi]
- POSTER: Computations on Encrypted Data in the Internet of Things ApplicationsLaurynas Riliskis, Hossein Shafagh, Philip Levis. 1668-1670 [doi]
- POSTER: Detecting Malicious Web Pages based on Structural Similarity of Redirection ChainsToshiki Shibahara, Takeshi Yagi, Mitsuaki Akiyama, Yuta Takata, Takeshi Yada. 1671-1673 [doi]
- POSTER: WinOver Enterprise Dark DataManish Shukla 0001, Sumesh Manjunath, Rohit Saxena, Sutapa Mondal, Sachin Lodha. 1674-1676 [doi]
- POSTER: A Logic Based Network Forensics Model for Evidence AnalysisAnoop Singhal, Changwei Liu, Duminda Wijesekera. 1677 [doi]
- POSTER: OFX: Enabling OpenFlow Extensions for Switch-Level Security ApplicationsJohn Sonchack, Adam J. Aviv, Eric Keller, Jonathan M. Smith. 1678-1680 [doi]
- POSTER: Blackboard-Based Electronic Warfare SystemJeremy Straub. 1681-1683 [doi]
- POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of SensitivityLihua Wang, Takuya Hayashi, Sachiko Kanamori, Atsushi Waseda, Ryo Nojima, Shiho Moriai. 1684-1686 [doi]
- POSTER: Pseudonymizing Client as a Privacy-Preserving Service: A Case Study of CDNZheng Wang. 1687-1689 [doi]
- POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android ApplicationJingZheng Wu, Yanjun Wu, Mutian Yang, Zhifei Wu, Tianyue Luo, Yongji Wang. 1690-1692 [doi]
- POSTER: Lightweight Streaming Authenticated Data StructuresChia-Mu Yu. 1693-1695 [doi]
- Fraud Detection through Graph-Based User Behavior ModelingAlex Beutel, Leman Akoglu, Christos Faloutsos. 1696-1697 [doi]
- Program Analysis for Mobile Application Integrity and Privacy EnforcementMarco Pistoia. 1698-1699 [doi]
- Introduction to CryptocurrenciesStefan Dziembowski. 1700-1701 [doi]
- Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and SecurityChristos Dimitrakakis, Aikaterini Mitrokotsa, Arunesh Sinha. 1702 [doi]
- CCSW 2015: The 7th ACM Cloud Computing Security WorkshopFlorian Kerschbaum, Cristina Nita-Rotaru, Indrajit Ray. 1703-1704 [doi]
- First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research DirectionsRoshan K. Thomas, Alvaro A. Cárdenas, Rakesh B. Bobba. 1705-1706 [doi]
- MIST 2015: 7th International Workshop on Managing Insider Security ThreatsIlsun You, Elisa Bertino. 1707-1708 [doi]
- MTD 2015: Second ACM Workshop on Moving Target DefenseGeorge Cybenko, Dijiang Huang. 1709-1710 [doi]
- SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber DefenseEhab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman. 1711-1712 [doi]
- SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile DevicesGlenn Wurster, David Lie. 1713-1714 [doi]
- Fifth International Workshop on Trustworthy Embedded Devices (TrustED 2015)Jorge Guajardo, Stefan Katzenbeisser 0001. 1715-1716 [doi]
- WISCS'15: The 2nd ACM Workshop on Information Sharing and Collaborative SecurityTomas Sander, Moti Yung. 1717-1718 [doi]
- WPES 2015: The 14th Workshop on Privacy in the Electronic SocietyNicholas Hopper, Rob Jansen. 1719-1720 [doi]