Abstract is missing.
- Systems thinking for safety and securityWilliam Young, Nancy Leveson. 1-8 [doi]
- AFrame: isolating advertisements from mobile applications in AndroidXiao Zhang, Amit Ahlawat, Wenliang Du. 9-18 [doi]
- was there: validating check-ins in location-based servicesIasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos. 19-28 [doi]
- Discovery of emergent malicious campaigns in cellular networksNathaniel Boggs, Wei Wang, Suhas Mathur, Baris Coskun, Carol Pincock. 29-38 [doi]
- Message in a bottle: sailing past censorshipLuca Invernizzi, Christopher Kruegel, Giovanni Vigna. 39-48 [doi]
- k-subscription: privacy-preserving microblogging browsing through obfuscationPanagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos. 49-58 [doi]
- MyCloud: supporting user-configured privacy protection in cloud computingMin Li, Wanyu Zang, Kun Bai, Meng Yu, Peng Liu. 59-68 [doi]
- Extraction of statistically significant malware behaviorsSirinda Palahan, Domagoj Babic, Swarat Chaudhuri, Daniel Kifer. 69-78 [doi]
- DUET: integration of dynamic and static analyses for malware clustering with cluster ensemblesXin Hu, Kang G. Shin. 79-88 [doi]
- SigMal: a static signal processing based malware triageDhilung Kirat, Lakshmanan Nataraj, Giovanni Vigna, B. S. Manjunath. 89-98 [doi]
- CPS: an efficiency-motivated attack against autonomous vehicular transportationRyan M. Gerdes, Chris Winstead, Kevin Heaslip. 99-108 [doi]
- CPS: stateful policy enforcement for control system device usageStephen McLaughlin. 109-118 [doi]
- Revisiting graphical passwords for augmenting, not replacing, text passwordsMurat Akpulat, Kemal Bicakci, Ugur Cil. 119-128 [doi]
- Pitfalls in the automated strengthening of passwordsDavid Schmidt, Trent Jaeger. 129-138 [doi]
- A building code for building code: putting what we know works to workCarl E. Landwehr. 139-147 [doi]
- PRIME: private RSA infrastructure for memory-less encryptionBehrad Garmany, Tilo Müller. 149-158 [doi]
- Do I know you?: efficient and privacy-preserving common friend-finder protocols and applicationsMarcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi. 159-168 [doi]
- GPU and CPU parallelization of honest-but-curious secure two-party computationNathaniel Husted, Steven Myers, Abhi Shelat, Paul Grubbs. 169-178 [doi]
- No attack necessary: the surprising dynamics of SSL trust relationshipsBernhard Amann, Robin Sommer, Matthias Vallentin, Seth Hall. 179-188 [doi]
- Socket overloading for fun and cache-poisoningAmir Herzberg, Haya Shulman. 189-198 [doi]
- Beehive: large-scale log analysis for detecting suspicious activity in enterprise networksTing-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda. 199-208 [doi]
- Uncovering access control weaknesses and flaws with security-discordant software clonesFrançois Gauthier, Thierry Lavoie, Ettore Merlo. 209-218 [doi]
- A portable user-level approach for system-wide integrity protectionWai-Kit Sze, R. Sekar. 219-228 [doi]
- Subverting system authentication with context-aware, reactive virtual machine introspectionYangchun Fu, Zhiqiang Lin, Kevin W. Hamlen. 229-238 [doi]
- Seeing is not believing: visual verifications through liveness analysis using mobile devicesMahmudur Rahman, Umut Topkara, Bogdan Carbunar. 239-248 [doi]
- Crossover: secure and usable user interface for mobile devices with multiple isolated OS personalitiesMatthias Lange, Steffen Liebergeld. 249-257 [doi]
- PatchDroid: scalable third-party security patches for Android devicesCollin Mulliner, Jon Oberheide, William Robertson, Engin Kirda. 259-268 [doi]
- A comprehensive black-box methodology for testing the forensic characteristics of solid-state drivesGabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero. 269-278 [doi]
- Implementation and implications of a stealth hard-drive backdoorJonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas. 279-288 [doi]
- SPIDER: stealthy binary program instrumentation and debugging via hardware virtualizationZhui Deng, Xiangyu Zhang, Dongyan Xu. 289-298 [doi]
- DR BACA: dynamic role based access control for AndroidFelix Rohrer, Yuting Zhang, Lou Chitkushev, Tanya Zlateva. 299-308 [doi]
- Control-flow restrictor: compiler-based CFI for iOSJannik Pewny, Thorsten Holz. 309-318 [doi]
- FireDroid: hardening security in almost-stock AndroidGiovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark. 319-328 [doi]
- SilverLine: preventing data leaks from compromised web applicationsYogesh Mundada, Anirudh Ramachandran, Nick Feamster. 329-338 [doi]
- Validating web content with senserJordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou. 339-348 [doi]
- Auto-FBI: a user-friendly approach for secure access to sensitive content on the webMohsen Zohrevandi, Rida A. Bazzi. 349-358 [doi]