Abstract is missing.
- On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed KnowledgeShouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah. [doi]
- Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplacesPedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina. [doi]
- Thwarting Cache Side-Channel Attacks Through Dynamic Software DiversityStephen Crane, Andrei Homescu, Stefan Brunthaler, Per Larsen, Michael Franz. [doi]
- Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within MinutesMohamed El Massad, Siddharth Garg, Mahesh V. Tripunitara. [doi]
- Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection MechanismsIgor Bilogrevic, Kévin Huguenin, Stefan Mihaila, Reza Shokri, Jean-Pierre Hubaux. [doi]
- EKHunter: A Counter-Offensive Toolkit for Exploit Kit InfiltrationBirhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran. [doi]
- Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinningMichael Kranch, Joseph Bonneau. [doi]
- CopperDroid: Automatic Reconstruction of Android Malware BehaviorsKimberly Tam, Salahuddin J. Khan, Aristide Fattori, Lorenzo Cavallaro. [doi]
- SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution EnvironmentJin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, Brent ByungHoon Kang. [doi]
- Efficient RAM and control flow in verifiable outsourced computationRiad S. Wahby, Srinath T. V. Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish. [doi]
- Information Flow Analysis of Android Applications in DroidSafeMichael I. Gordon, Deokhwan Kim, Jeff H. Perkins, Limei Gilham, Nguyen Nguyen, Martin C. Rinard. [doi]
- The Devil is in the Constants: Bypassing Defenses in Browser JIT EnginesMichalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, Sotiris Ioannidis. [doi]
- Mind Your Blocks: On the Stealthiness of Malicious BGP HijacksPierre-Antoine Vervier, Olivier Thonnard, Marc Dacier. [doi]
- DEFY: A Deniable, Encrypted File System for Log-Structured StorageTimothy Peters, Mark Gondree, Zachary N. J. Peterson. [doi]
- EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android FrameworkYinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen. [doi]
- Verified Contributive Channel Bindings for Compound AuthenticationKarthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti. [doi]
- Checking More and Alerting Less: Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer VotingKangjie Lu, Zhichun Li, Vasileios P. Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, Guofei Jiang. [doi]
- Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement BiometricsSimon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic. [doi]
- P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer ExecutionsYonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian. [doi]
- Spaced Repetition and Mnemonics Enable Recall of Multiple Strong PasswordsJeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta. [doi]
- I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browserXiang Pan, Yinzhi Cao, Yan Chen. [doi]
- Preventing Use-after-free with Dangling Pointers NullificationByoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee. [doi]
- Gracewipe: Secure and Verifiable Deletion under CoercionLianying Zhao, Mohammad Mannan. [doi]
- Principled Sampling for Anomaly DetectionBrendan Juba, Christopher Musco, Fan Long, Stelios Sidiroglou-Douskos, Martin C. Rinard. [doi]
- Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting AbusePieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis. [doi]
- Parking Sensors: Analyzing and Detecting Parked DomainsThomas Vissers, Wouter Joosen, Nick Nikiforakis. [doi]
- Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary FirmwareYan Shoshitaishvili, Ruoyu Wang, Christophe Hauser, Christopher Kruegel, Giovanni Vigna. [doi]
- DeepDroid: Dynamically Enforcing Enterprise Policy on Android DevicesXueqiang Wang, Kun Sun, Yuewu Wang, Jiwu Jing. [doi]
- SPHINX: Detecting Security Attacks in Software-Defined NetworksMohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann. [doi]
- Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented ProgrammingLucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose. [doi]
- Knock Yourself Out: Secure Authentication with Short Re-Usable PasswordsBenjamin Güldenring, Volker Roth, Lars Ries. [doi]
- What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External ResourcesSoteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, Xiaofeng Wang, Carl A. Gunter. [doi]
- Opaque Control-Flow IntegrityVishwath Mohan, Per Larsen, Stefan Brunthaler, Kevin W. Hamlen, Michael Franz. [doi]
- vfGuard: Strict Protection for Virtual Function Calls in COTS C++ BinariesAravind Prakash, Xunchao Hu, Heng Yin. [doi]
- Poisoning Network Visibility in Software-Defined Networks: New Attacks and CountermeasuresSungmin Hong, Lei Xu, Haopei Wang, Guofei Gu. [doi]
- Phoneypot: Data-driven Understanding of Telephony ThreatsPayas Gupta, Bharath Srinivasan, Vijay Balasubramaniyan, Mustaque Ahamad. [doi]
- Bloom Cookies: Web Search Personalization without User TrackingNitesh Mor, Oriana Riva, Suman Nath, John Kubiatowicz. [doi]
- Run-time Monitoring and Formal Analysis of Information Flows in ChromiumLujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian. [doi]
- Too LeJIT to Quit: Extending JIT Spraying to ARMWilson Lian, Hovav Shacham, Stefan Savage. [doi]
- NSEC5: Provably Preventing DNSSEC Zone EnumerationSharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv. [doi]
- FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointersYves Younan. [doi]
- Machine Learning Classification over Encrypted DataRaphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser. [doi]
- ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party ComputationDaniel Demmler, Thomas Schneider 0003, Michael Zohner. [doi]
- Exploiting and Protecting Dynamic Code GenerationChengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, David Melski. [doi]
- Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNsYazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov. [doi]
- Securing the Software Defined Network Control LayerPhillip A. Porras, Steven Cheung, Martin W. Fong, Keith Skinner, Vinod Yegneswaran. [doi]
- StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for BinariesXi Chen, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida. [doi]
- No More Gotos: Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving TransformationsKhaled Yakdan, Sebastian Eschweiler, Elmar Gerhards-Padilla, Matthew Smith. [doi]
- VTint: Protecting Virtual Function Tables' IntegrityChao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, Dawn Song. [doi]
- Identifying Cross-origin Resource Status Using Application CacheSangho Lee 0001, Hyungsub Kim, Jong Kim. [doi]