Abstract is missing.
- Emerging Security Threats and Countermeasures in IoTZhi-Kai Zhang, Michael Cheng Yi Cho, Shiuhpyng Shieh. 1-6 [doi]
- Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for AndroidHeqing Huang, Kai Chen 0012, Chuangang Ren, Peng Liu 0005, Sencun Zhu, Dinghao Wu. 7-18 [doi]
- Hybrid User-level Sandboxing of Third-party Android AppsYajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian Jiang. 19-30 [doi]
- On Designing an Efficient Distributed Black-Box Fuzzing System for Mobile DevicesLee Wang Hao, Murali Srirangam Ramanujam, S. P. T. Krishnan. 31-42 [doi]
- XiOS: Extended Application Sandboxing on iOSMihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi. 43-54 [doi]
- Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future?Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen. 55-61 [doi]
- Enabling Encrypted Cloud Media Center with Secure DeduplicationYifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui. 63-72 [doi]
- Group-oriented Proofs of StorageYujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen 0001, Xinyi Huang, Yunya Zhou. 73-84 [doi]
- Lucky 13 Strikes BackGorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar. 85-96 [doi]
- An Empirical Analysis of ZeuS C&C LifetimeCarlos Gañán, Orcun Cetin, Michel van Eeten. 97-108 [doi]
- JSDC: A Hybrid Approach for JavaScript Malware Detection and ClassificationJunjie Wang, Yinxing Xue, Yang Liu 0003, Tian Huat Tan. 109-120 [doi]
- Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware ClassificationGuanhua Yan. 121-132 [doi]
- The Process Matters: Ensuring Data Veracity in Cyber-Physical SystemsMarina Krotofil, Jason Larsen, Dieter Gollmann. 133-144 [doi]
- Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor NetworksZhe Liu 0001, Hwajeong Seo, Zhi Hu, Xinyi Hunag, Johann Großschädl. 145-153 [doi]
- Systematic Low Leakage Coding for Physical Unclonable FunctionsMatthias Hiller, Meng-Day Mandel Yu, Michael Pehl. 155-166 [doi]
- Vehicular Platooning in an Adversarial EnvironmentSoodeh Dadras, Ryan M. Gerdes, Rajnikant Sharma. 167-178 [doi]
- NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRUDavid Nuñez, Isaac Agudo, Javier Lopez. 179-189 [doi]
- Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short CiphertextYan Zhu, Xin Wang, Di Ma, Ruiqi Guo. 191-202 [doi]
- Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph IsomorphismPierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque. 203-214 [doi]
- Related Randomness Attacks for Public Key CryptosystemsTsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu. 215-223 [doi]
- TLS Record Protocol: Security Analysis and Defense-in-depth Countermeasures for HTTPSOlivier Levillain, Baptiste Gourdin, Hervé Debar. 225-236 [doi]
- Enabling IP Protection for Outsourced Integrated Circuit DesignXingliang Yuan, Cong Wang, Kui Ren. 237-247 [doi]
- A Secure Communication Protocol for Drones and Smart ObjectsJongho Won, Seung-Hyun Seo, Elisa Bertino. 249-260 [doi]
- Message Integrity Protection over Wireless Channel by Countering Signal Cancellation: Theory and PracticeYantian Hou, Ming Li, Ruchir Chauhan, Ryan M. Gerdes, Kai Zeng. 261-272 [doi]
- Formal Analysis of Enhanced Authorization in the TPM 2.0Jianxiong Shao, Yu Qin, Dengguo Feng, Weijin Wang. 273-284 [doi]
- GuardMR: Fine-grained Security Policy Enforcement for MapReduce SystemsHuseyin Ulusoy, Pietro Colombo, Elena Ferrari, Murat Kantarcioglu, Erman Pattuk. 285-296 [doi]
- Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business ProcessesClara Bertolissi, Daniel Ricardo Dos Santos, Silvio Ranise. 297-308 [doi]
- AppPolicyModules: Mandatory Access Control for Third-Party AppsEnrico Bacis, Simone Mutti, Stefano Paraboschi. 309-320 [doi]
- Now You See Me: Hide and Seek in Physical Address SpaceNing Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia. 321-331 [doi]
- TrustLogin: Securing Password-Login on Commodity Operating SystemsFengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou. 333-344 [doi]
- Efficient Virtualization-Based Application Protection Against Untrusted Operating SystemYueqiang Cheng, Xuhua Ding, Robert H. Deng. 345-356 [doi]
- Fixing Races For Good: Portable and Reliable UNIX File-System Race DetectionXiang Cai, Rucha Lale, Xin Cheng Zhang, Rob Johnson. 357-368 [doi]
- Software Watermarking using Return-Oriented ProgrammingHaoyu Ma, Kangjie Lu, Xinjie Ma, Haining Zhang, Chunfu Jia, Debin Gao. 369-380 [doi]
- The Limits of Composable Crypto with Transferable Setup DevicesIoana Boureanu, Miyako Ohkubo, Serge Vaudenay. 381-392 [doi]
- Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced DataHua Deng, Qianhong Wu, Bo Qin, Willy Susilo, Joseph K. Liu, Wenchang Shi. 393-404 [doi]
- Block Programs: Improving Efficiency of Verifiable Computation for Circuits with Repeated SubstructuresGang Xu, George T. Amariucai, Yong Guan. 405-416 [doi]
- Secure Bilinear Pairing Outsourcing Made More Efficient and FlexibleHaibo Tian, Fangguo Zhang, Kun Ren. 417-426 [doi]
- On Information-theoretic Measures for Quantifying Privacy Protection of Time-series DataChris Y. T. Ma, David K. Y. Yau. 427-438 [doi]
- Privacy-Preserving Association Rule Mining in Cloud ComputingXun Yi, Fang-Yu Rao, Elisa Bertino, Athman Bouguettaya. 439-450 [doi]
- Differentially Private Publishing of High-dimensional Data Using Sensitivity ControlWei-Yen Day, Ninghui Li. 451-462 [doi]
- Enpublic Apps: Security Threats Using iOS Enterprise and Developer CertificatesMin Zheng, Hui Xue, Yulong Zhang, Tao Wei, John C. S. Lui. 463-474 [doi]
- A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption SystemKenneth G. Paterson, Mario Strefler. 475-482 [doi]
- Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow VulnerabilityHao Sun, Xiangyu Zhang, Chao Su, Qingkai Zeng. 483-494 [doi]
- Anonymizing Social Graphs via Uncertainty SemanticsHiep H. Nguyen, Abdessamad Imine, Michaël Rusinowitch. 495-506 [doi]
- Social Networks Meet Distributed Systems: Towards a Robust Sybil Defense under ChurnNitin Chiluka, Nazareno Andrade, Johan A. Pouwelse, Henk J. Sips. 507-518 [doi]
- k-Anonymization by Freeform GeneralizationKaterina Doka, Mingqiang Xue, Dimitrios Tsoumakos, Panagiotis Karras. 519-530 [doi]
- A Near Real-Time Algorithm for Autonomous Identification and Characterization of Honeypot AttacksPhilippe Owezarski. 531-542 [doi]
- Discover and Tame Long-running Idling Processes in Enterprise SystemsJun Wang, Zhiyun Qian, Zhichun Li, Zhenyu Wu, Junghwan Rhee, Xia Ning, Peng Liu, Guofei Jiang. 543-554 [doi]
- The Performance Cost of Shadow Stacks and Stack CanariesThurston H. Y. Dang, Petros Maniatis, David Wagner. 555-566 [doi]
- I Know Where You are: Proofs of Presence Resilient to Malicious ProversMarkus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula. 567-577 [doi]
- Bittersweet ADB: Attacks and DefensesSungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu. 579-584 [doi]
- Android Implicit Information Flow DemystifiedWei You, Bin Liang, Jingzhe Li, Wenchang Shi, Xiangyu Zhang. 585-590 [doi]
- Automatically Detecting SSL Error-Handling Vulnerabilities in Hybrid Mobile Web AppsChaoshun Zuo, Jianliang Wu, Shanqing Guo. 591-596 [doi]
- Torben: A Practical Side-Channel Attack for Deanonymizing Tor CommunicationDaniel Arp, Fabian Yamaguchi, Konrad Rieck. 597-602 [doi]
- Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-ProveLucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski. 603-608 [doi]
- Mind Your Nonces Moving: Template-Based Partially-Sharing Nonces Attack on SM2 Digital Signature AlgorithmJiazhe Chen, Mingjie Liu, Hexin Li, Hongsong Shi. 609-614 [doi]
- Anonymous Yoking-Group ProofsNan Li, Yi Mu, Willy Susilo, Vijay Varadharajan. 615-620 [doi]
- Verifiable Searchable Symmetric Encryption from Indistinguishability ObfuscationRong Cheng, Jingbo Yan, Chaowen Guan, Fangguo Zhang, Kui Ren. 621-626 [doi]
- The Power of Whispering: Near Field Assertions via Acoustic CommunicationsLingjun Li, Guoliang Xue, Xinxin Zhao. 627-632 [doi]
- Detecting Fingerprinted Data in TLS TrafficKonstantin Böttinger, Dieter Schuster, Claudia Eckert. 633-638 [doi]
- LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS AttacksMoreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran. 639-644 [doi]
- Measuring Botnets in the Wild: Some New TrendsWentao Chang, Aziz Mohaisen, an Wang, Songqing Chen. 645-650 [doi]
- CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic ConfidentialityChung Hwan Kim, Sungjin Park, Junghwan Rhee, Jong-Jin Won, Taisook Han, Dongyan Xu. 651-656 [doi]
- Access Control in Publicly Verifiable Outsourced ComputationJames Alderman, Christian Janson, Carlos Cid, Jason Crampton. 657-662 [doi]
- Albatross: A Privacy-Preserving Location Sharing SystemGökay Saldamli, Richard Chow, Hongxia Jin. 663 [doi]
- Practical Private One-way Anonymous Message RoutingAnirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Yung Shin Van Der Sype, Yutaka Miyake. 665 [doi]
- Disavowable Public Key Encryption with Non-interactive OpeningAi Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka. 667 [doi]
- iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the ChannelGirish Revadigar, Chitra Javali, Hassan Jameel Asghar, Kasper Bonne Rasmussen, Sanjay Jha. 669 [doi]
- A Single Query Forgery Attack on Raviyoyla v1Yuan Yao, Bin Zhang, Wenling Wu. 671 [doi]
- TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScriptMaryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao. 673 [doi]
- Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware DevicesPaul-Edmond Berthier, Stéphane Cauchie, Zonghua Zhang. 675 [doi]
- Attribute-Based Access Control Models and BeyondRavi Sandhu. 677 [doi]