Abstract is missing.
- Statistical Detection of Online Drifting Twitter Spam: Invited PaperShigang Liu, Jun Zhang 0010, Yang Xiang. 1-10 [doi]
- ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory AnalysisQian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony, Heng Yin. 11-22 [doi]
- Juggling the Gadgets: Binary-level Code Randomization using Instruction DisplacementHyungjoon Koo, Michalis Polychronakis. 23-34 [doi]
- No-Execute-After-Read: Preventing Code Disclosure in Commodity SoftwareJan Werner, George Baltas, Rob Dallara, Nathan Otterness, Kevin Z. Snow, Fabian Monrose, Michalis Polychronakis. 35-46 [doi]
- ROPMEMU: A Framework for the Analysis of Complex Code-Reuse AttacksMariano Graziano, Davide Balzarotti, Alain Zidouemba. 47-58 [doi]
- Enabling Ciphertext Deduplication for Secure Cloud Storage and Access ControlHeyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng, Kui Ren. 59-70 [doi]
- Privacy-Preserving Spectral Analysis of Large Graphs in Public CloudsSagar Sharma, James Powers, Keke Chen. 71-82 [doi]
- Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted DataKaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu. 83-94 [doi]
- FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare SystemCheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin. 95-106 [doi]
- Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network CodingBinanda Sengupta, Sushmita Ruj. 107-118 [doi]
- Efficient Techniques for Publicly Verifiable Delegation of ComputationKaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva. 119-128 [doi]
- R-Droid: Leveraging Android App Analysis with Static Slice OptimizationMichael Backes 0001, Sven Bugiel, Erik Derr, Sebastian Gerling, Christian Hammer 0001. 129-140 [doi]
- Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric AuthenticationYanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou. 141-151 [doi]
- UC-secure Two-Server Password-Based Authentication Protocol and Its ApplicationsLin Zhang, Zhenfeng Zhang, Xuexian Hu. 153-164 [doi]
- Client-CASH: Protecting Master Passwords against Offline AttacksJeremiah Blocki, Anirudh Sridhar. 165-176 [doi]
- Device-Enhanced Password Protocols with Optimal Online-Offline ProtectionStanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena. 177-188 [doi]
- Friend or Foe?: Your Wearable Devices Reveal Your Personal PINChen Wang, Xiaonan Guo, Yan Wang, Yingying Chen, Bo Liu. 189-200 [doi]
- Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the PlaintextWilly Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu, Yang-Wai Chow. 201-210 [doi]
- Dealerless Corporate Key Generation for Identity-Based Encryption SchemesZhen Liu, Duncan S. Wong, Jack Poon. 211-222 [doi]
- Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong SecurityPeng Xu, Jingnan Li, Wei Wang, Hai Jin. 223-233 [doi]
- Password-Controlled Encryption with Accountable Break-Glass AccessTao Zhang, Sherman S. M. Chow, Jinyuan Sun. 235-246 [doi]
- Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext SecurityKai He, Jian Weng, Jianan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng. 247-255 [doi]
- SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the CloudQian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, Kui Ren. 257-268 [doi]
- Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable ComputationKai Zhang, Junqing Gong, Shaohua Tang, Jie Chen 0021, Xiangxue Li, Haifeng Qian, Zhenfu Cao. 269-279 [doi]
- Efficient Secure Outsourcing of Large-scale Quadratic ProgramsSergio Salinas, Changqing Luo, Weixian Liao, Pan Li 0001. 281-292 [doi]
- Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved CheckabilityYanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu. 293-303 [doi]
- NFPS: Adding Undetectable Secure Deletion to Flash Translation LayerShijie Jia, Luning Xia, Bo Chen, Peng Liu 0005. 305-315 [doi]
- Preventing Page Faults from Telling Your SecretsShweta Shinde, Zheng-Leong Chua, Viswesh Narayanan, Prateek Saxena. 317-328 [doi]
- Identifying and Utilizing Dependencies Across Cloud Security ServicesAhmed Taha, Patrick Metzler, Rubén Trapero, Jesus Luna, Neeraj Suri. 329-340 [doi]
- Hardening OpenStack Cloud Platforms against Compute Node CompromisesWai-Kit Sze, Abhinav Srivastava, R. Sekar. 341-352 [doi]
- Cross Processor Cache AttacksGorka Irazoqui, Thomas Eisenbarth, Berk Sunar. 353-364 [doi]
- Mystique: Evolving Android Malware for Auditing Anti-Malware ToolsGuozhu Meng, Yinxing Xue, Mahinthan Chandramohan, Annamalai Narayanan, Yang Liu 0003, Jie Zhang, Tieming Chen. 365-376 [doi]
- StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android MalwareSen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu. 377-388 [doi]
- FLEX: A Flexible Code Authentication Framework for Delegating Mobile App CustomizationGabriele Costa, Paolo Gasti, Alessio Merlo, Shunt-Hsi Yu. 389-400 [doi]
- DroidDisintegrator: Intra-Application Information Flow Control in Android AppsEran Tromer, Roei Schuster. 401-412 [doi]
- Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery MechanismsMathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens. 413-424 [doi]
- Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver RecognitionIan D. Markwood, Yao Liu. 425-436 [doi]
- Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web InterfacesAndrei Costin, Apostolis Zarras, Aurélien Francillon. 437-448 [doi]
- Distributed Detection of Single-Stage Multipoint Cyber Attacks in a Water Treatment PlantSridhar Adepu, Aditya Mathur. 449-460 [doi]
- Smart Locks: Lessons for Securing Commodity Internet of Things DevicesGrant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, David Wagner. 461-472 [doi]
- Binary Analysis for Autonomous Hacking: Invited AbstractGiovanni Vigna. 473 [doi]
- The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication SchemesDing Wang, Qianchen Gu, Haibo Cheng, Ping Wang. 475-486 [doi]
- Homomorphic Linear Authentication Schemes from (ε)-Authentication CodesShuai Han, Shengli Liu, Fangguo Zhang, Kefei Chen. 487-498 [doi]
- Forgery-Resistant Touch-based Authentication on Mobile DevicesNeil Zhenqiang Gong, Mathias Payer, Reza Moazzezi, Mario Frank. 499-510 [doi]
- Practical "Signatures with Efficient Protocols" from Simple AssumptionsBenoît Libert, Fabrice Mouhartem, Thomas Peters, Moti Yung. 511-522 [doi]
- Bilateral-secure Signature by Key EvolvingTao Xiang, Xiaoguo Li, Fei Chen, Yi Mu. 523-533 [doi]
- Secure Dynamic SSE via Access Indistinguishable StorageTianhao Wang, Yunlei Zhao. 535-546 [doi]
- Building an Encrypted, Distributed, and Searchable Key-value StoreXingliang Yuan, Xinyu Wang, Cong Wang, Chen Qian, Jianxiong Lin. 547-558 [doi]
- Anonymous Role-Based Access Control on E-Health RecordsXingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong Wu. 559-570 [doi]
- Gait-Based Wi-Fi Signatures for Privacy-PreservingYan Li, Ting Zhu. 571-582 [doi]
- Anonymous Identification for Ad Hoc GroupXingye Lu, Man Ho Au. 583-591 [doi]
- Efficient Authenticated Multi-Pattern MatchingZhe Zhou, Tao Zhang, Sherman S. M. Chow, Yupeng Zhang, Kehuan Zhang. 593-604 [doi]
- Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted DataNgoc Hieu Tran, HweeHwa Pang, Robert H. Deng. 605-616 [doi]
- Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended AbstractSungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin. 617-628 [doi]
- Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and CountermeasureChong Guan, Kun Sun, Zhan Wang, Wen Tao Zhu. 629-640 [doi]
- Fault Attacks on Efficient Pairing ImplementationsPierre-Alain Fouque, Chen Qian. 641-650 [doi]
- Model-based Security Testing: An Empirical Study on OAuth 2.0 ImplementationsRonghai Yang, Guanchen Li, Wing Cheong Lau, Kehuan Zhang, Pili Hu. 651-662 [doi]
- Discovering Malicious Domains through Passive DNS Data Graph AnalysisIssa Khalil, Ting Yu, Bei Guan. 663-674 [doi]
- Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern WebYogesh Mundada, Nick Feamster, Balachander Krishnamurthy. 675-685 [doi]
- Attestation Transparency: Building secure Internet services for legacy clientsJethro G. Beekman, John L. Manferdelli, David Wagner. 687-698 [doi]
- CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating AttacksYu-Ming Ke, Chih-Wei Chen, Hsu-Chun Hsiao, Adrian Perrig, Vyas Sekar. 699-710 [doi]
- CDRep: Automatic Repair of Cryptographic Misuses in Android ApplicationsSiqi Ma, David Lo, Teng Li, Robert H. Deng. 711-722 [doi]
- MobiPot: Understanding Mobile Telephony Threats with HoneycardsMarco Balduzzi, Payas Gupta, Lion Gu, Debin Gao, Mustaque Ahamad. 723-734 [doi]
- Checking Intent-based Communication in Android with Intent Space AnalysisYiming Jing, Gail-Joon Ahn, Adam Doupé, Jeong Hyun Yi. 735-746 [doi]
- revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android AppsZheran Fang, Weili Han, Dong Li, Zeqing Guo, Danhao Guo, Xiaoyang Sean Wang, Zhiyun Qian, Hao Chen. 747-758 [doi]
- Attacks and Defence on Android Free Floating WindowsLingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, Dengguo Feng. 759-770 [doi]
- MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis TestingPhani Vadrevu, Roberto Perdisci. 771-782 [doi]
- Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph MiningBabak Rahbarinia, Marco Balduzzi, Roberto Perdisci. 783-794 [doi]
- Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection MechanismsAnindya Maiti, Oscar Armbruster, Murtuza Jadliwala, Jibo He. 795-806 [doi]
- Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel AnalysisZeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, Yuan Zhao. 807-818 [doi]
- Error Tolerance based Single Interesting Point Side Channel CPA DistinguisherChanghai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, Victor DeBrunner. 819-827 [doi]
- Privacy and Utility of Inference Control Mechanisms for Social Computing ApplicationsSeyed Hossein Ahmadinejad, Philip W. L. Fong, Reihaneh Safavi-Naini. 829-840 [doi]
- Privacy Preserving Disease Treatment & Complication Prediction System (PDTCPS)Qinghan Xue, Mooi Choo Chuah, Yingying Chen. 841-852 [doi]
- Data Exfiltration in the Face of CSPSteven Van Acker, Daniel Hausknecht, Andrei Sabelfeld. 853-864 [doi]
- StemJail: Dynamic Role CompartmentalizationMickaël Salaün, Marion Daubignard, Hervé Debar. 865-876 [doi]
- SkypeLine: Robust Hidden Data Transmission for VoIPKatharina Kohls, Thorsten Holz, Dorothea Kolossa, Christina Pöpper. 877-888 [doi]
- Generic Construction of Publicly Verifiable Predicate EncryptionChuting Tan, Zoe L. Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang. 889-894 [doi]
- Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable FamilyJing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu. 895-900 [doi]
- Efficient Construction of Completely Non-Malleable CCA Secure Public Key EncryptionShifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen. 901-906 [doi]
- (Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small ModulusFuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue. 907-912 [doi]
- Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic CloudsPeng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, Deqing Zou. 913-918 [doi]
- RamCrypt: Kernel-based Address Space Encryption for User-mode ProcessesJohannes Götzfried, Tilo Müller, Gabor Drescher, Stefan Nürnberger, Michael Backes 0001. 919-924 [doi]
- Your Credentials Are Compromised, Do Not Panic: You Can Be Well ProtectedIssa Khalil, Zuochao Dou, Abdallah Khreishah. 925-930 [doi]
- Inside Attack Filtering for Robust Sensor LocalizationJongho Won, Elisa Bertino. 931-936 [doi]