Abstract is missing.
- Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional MemoryLe Guan, Jingqiang Lin, Bo Luo, Jiwu Jing, Jing Wang. 3-19 [doi]
- CHERI: A Hybrid Capability-System Architecture for Scalable Software CompartmentalizationRobert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert Norton, Michael Roe, Stacey Son, Munraj Vadera. 20-37 [doi]
- VC3: Trustworthy Data Analytics in the Cloud Using SGXFelix Schuster, Manuel Costa, Cédric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich. 38-54 [doi]
- Using Hardware Features for Increased Debugging TransparencyFengwei Zhang, Kevin Leach, Angelos Stavrou, Haining Wang, Kun Sun. 55-69 [doi]
- Virtual Proofs of Reality and their Physical ImplementationUlrich Rührmair, J. L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson. 70-85 [doi]
- The Miner's DilemmaIttay Eyal. 89-103 [doi]
- SoK: Research Perspectives and Challenges for Bitcoin and CryptocurrenciesJoseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten. 104-121 [doi]
- Bitcoin over Tor isn't a Good IdeaAlex Biryukov, Ivan Pustogarov. 122-134 [doi]
- Every Second Counts: Quantifying the Negative Externalities of Cybercrime via TyposquattingMohammad Taha Khan, Xiang Huo, Zhou Li, Chris Kanich. 135-150 [doi]
- Ad Injection at Scale: Assessing Deceptive Advertisement ModificationsKurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab. 151-167 [doi]
- Connection-Oriented DNS to Improve Privacy and SecurityLiang Zhu, Zi Hu, John S. Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya. 171-186 [doi]
- Temporal Lensing and Its Application in Pulsing Denial-of-Service AttacksRyan Rasti, Mukul Murthy, Nicholas Weaver, Vern Paxson. 187-198 [doi]
- Secure Track VerificationMatthias Schäfer 0002, Vincent Lenders, Jens B. Schmitt. 199-213 [doi]
- How Secure and Quick is QUIC? Provable Security and Performance AnalysesRobert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru. 214-231 [doi]
- SoK: Secure MessagingNik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith 0001. 232-249 [doi]
- Geppetto: Versatile Verifiable ComputationCraig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur. 253-270 [doi]
- ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated DataMichael Backes 0001, Manuel Barbosa, Dario Fiore, Raphael M. Reischuk. 271-286 [doi]
- Secure Sampling of Public Parameters for Succinct Zero Knowledge ProofsEli Ben-Sasson, Alessandro Chiesa, Matthew Green 0001, Eran Tromer, Madars Virza. 287-304 [doi]
- Forward Secure Asynchronous Messaging from Puncturable EncryptionMatthew D. Green, Ian Miers. 305-320 [doi]
- Riposte: An Anonymous Messaging System Handling Millions of UsersHenry Corrigan-Gibbs, Dan Boneh, David Mazières. 321-338 [doi]
- Privacy and Access Control for Outsourced Personal RecordsMatteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder. 341-358 [doi]
- ObliVM: A Programming Framework for Secure ComputationChang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi. 359-376 [doi]
- GraphSC: Parallel Secure Computation Made EasyKartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi. 377-394 [doi]
- Malicious-Client Security in Blind Seer: A Scalable Private DBMSBen A. Fisc, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin. 395-410 [doi]
- TinyGarble: Highly Compressed and Scalable Sequential Garbled CircuitsEbrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Farinaz Koushanfar. 411-428 [doi]
- SurroundWeb: Mitigating Privacy Concerns in a 3D Web BrowserJohn Vilk, David Molnar, Benjamin Livshits, Eyal Ofek, Chris Rossbach, Alexander Moshchuk, Helen J. Wang, Ran Gal. 431-446 [doi]
- GenoGuard: Protecting Genomic Data against Brute-Force AttacksZhicong Huang, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, Ari Juels. 447-462 [doi]
- Towards Making Systems Forget with Machine UnlearningYinzhi Cao, Junfeng Yang. 463-480 [doi]
- Cracking-Resistant Password Vaults Using Natural Language EncodersRahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart. 481-498 [doi]
- SoK: A Comprehensive Analysis of Game-Based Ballot Privacy DefinitionsDavid Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi. 499-516 [doi]
- Vetting SSL Usage in Applications with SSLINTBoyuan He, Vaibhav Rastogi, Yinzhi Cao, Yan Chen, V. N. Venkatakrishnan, Runqing Yang, Zhenrui Zhang. 519-534 [doi]
- A Messy State of the Union: Taming the Composite State Machines of TLSBenjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Alfredo Pironti, Pierre-Yves Strub, Jean Karim Zinzindohoue. 535-552 [doi]
- Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors ProblemJoppe W. Bos, Craig Costello, Michael Naehrig, Douglas Stebila. 553-570 [doi]
- Security of the J-PAKE Password-Authenticated Key Exchange ProtocolMichel Abdalla, Fabrice Benhamouda, Philip Mackenzie. 571-587 [doi]
- S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AESGorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar. 591-604 [doi]
- Last-Level Cache Side-Channel Attacks are PracticalFangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser, Ruby B. Lee. 605-622 [doi]
- On Subnormal Floating Point and Abnormal TimingMarc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, Hovav Shacham. 623-639 [doi]
- Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating SystemsYuanzhong Xu, Weidong Cui, Marcus Peinado. 640-656 [doi]
- SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time PackersXabier Ugarte-Pedrero, Davide Balzarotti, Igor Santos, Pablo Garcia Bringas. 659-673 [doi]
- A Generic Approach to Automatic Deobfuscation of Executable CodeBabak Yadegari, Brian Johannesmeyer, Ben Whitely, Saumya Debray. 674-691 [doi]
- The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability PatchingAntonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, Tudor Dumitras. 692-708 [doi]
- Cross-Architecture Bug Search in Binary ExecutablesJannik Pewny, Behrad Garmany, Robert Gawlik, Christian Rossow, Thorsten Holz. 709-724 [doi]
- Program-Adaptive Mutational FuzzingSang Kil Cha, Maverick Woo, David Brumley. 725-741 [doi]
- Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ ApplicationsFelix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz. 745-762 [doi]
- Readactor: Practical Code Randomization Resilient to Memory DisclosureStephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz. 763-780 [doi]
- Missing the Point(er): On the Effectiveness of Code Pointer IntegrityIsaac Evans, Sam Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard Shrobe, Stelios Sidiroglou-Douskos, Martin Rinard, Hamed Okhravi. 781-796 [doi]
- Automatic Inference of Search Patterns for Taint-Style VulnerabilitiesFabian Yamaguchi, Alwin Maier, Hugo Gascon, Konrad Rieck. 797-812 [doi]
- Micro-Policies: Formally Verified, Tag-Based Security MonitorsArthur Azevedo de Amorim, Maxime Dénès, Nick Giannarakis, Catalin Hritcu, Benjamin C. Pierce, Antal Spector-Zabusky, Andrew P. Tolmach. 813-830 [doi]
- Securing Multiparty Online Services Via Certification of Symbolic TransactionsEric Y. Chen, Shuo Chen, Shaz Qadeer, Rui Wang 0010. 833-849 [doi]
- Understanding and Monitoring Embedded Web ScriptsYuchen Zhou, David Evans. 850-865 [doi]
- High System-Code Security with Low OverheadJonas Wagner, Volodymyr Kuznetsov, George Candea, Johannes Kinder. 866-879 [doi]
- Caelus: Verifying the Consistency of Cloud Services with Battery-Powered DevicesBeom Heyn Kim, David Lie. 880-896 [doi]
- Effective Real-Time Android Application AuditingMingyuan Xia, Lu Gong, Yuanhao Lyu, Zhengwei Qi, Xue Liu. 899-914 [doi]
- Leave Me Alone: App-Level Protection against Runtime Information Gathering on AndroidNan Zhang, Kan Yuan, Muhammad Naveed 0001, Xiao-yong Zhou, Xiaofeng Wang. 915-930 [doi]
- What the App is That? Deception and Countermeasures in the Android User InterfaceAntonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna. 931-948 [doi]