5 | -- | 6 | Jeremy Epstein. Privacy is Context Dependent |
8 | -- | 10 | Gary McGraw. Silver Bullet Talks with Lesley Carhart |
11 | -- | 13 | Terry Benzel. Selected Papers from the 2016 IEEE Symposium on Security and Privacy |
14 | -- | 23 | Lucas Silva Figueiredo, David Molnar, Margus Veanes, Benjamin Livshits. Prepose: Privacy, Security, and Reliability for Gesture-Based Programming |
24 | -- | 30 | Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash. Security Implications of Permission Models in Smart-Home Application Frameworks |
32 | -- | 41 | Sashank Narain, Triet D. Vo-Huu, Kenneth Block, Guevara Noubir. The Perils of User Tracking Using Zero-Permission Mobile Apps |
42 | -- | 49 | Xiaolong Bai, Luyi Xing, Nan Zhang, Xiaofeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu. Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos |
50 | -- | 60 | Yasemin Acar, Michael Backes 0001, Sascha Fahl, Doowon Kim, Michelle L. Mazurek, Christian Stransky. How Internet Resources Might Be Helping You Develop Faster but Less Securely |
62 | -- | 69 | Matthew Tischer, Zakir Durumeric, Elie Bursztein, Michael Bailey. The Danger of USB Drives |
70 | -- | 77 | Chaz Lever, Robert J. Walls, Yacin Nadji, David Dagon, Patrick D. McDaniel, Manos Antonakakis. Dawn of the Dead Domain: Measuring the Exploitation of Residual Trust in Domains |
78 | -- | 86 | Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad P. A. van Moorsel. Does the Online Card Payment Landscape Unwittingly Facilitate Fraud? |
88 | -- | 91 | Ahmad-Reza Sadeghi, Shaza Zeitouni. ACM CCS 2016 Interviews, Part 1 |
92 | -- | 95 | Siona Listokin. Does Industry Self-Regulation of Consumer Data Privacy Work? |
96 | -- | 100 | Marc Dacier, Hartmut König, Radoslaw Cwalinski, Frank Kargl, Sven Dietrich. Security Challenges and Opportunities of Software-Defined Networking |
102 | -- | 106 | Joshua I. James. How Businesses Can Speed Up International Cybercrime Investigation |
108 | -- | 0 | Bruce Schneier. The Internet of Things Will Upend Our Industry |