Abstract is missing.
- Taking two-factor to the next level: protecting online poker, banking, healthcare and other applicationsAviel D. Rubin. 1-5 [doi]
- Hot-hardening: getting more out of your security settingsSebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer. 6-15 [doi]
- Challenges and implications of verifiable builds for security-critical open-source softwareXavier de Carné de Carnavalet, Mohammad Mannan. 16-25 [doi]
- Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructuresSören Bleikertz, Carsten Vogel, Thomas Groß. 26-35 [doi]
- Scippa: system-centric IPC provenance on AndroidMichael Backes, Sven Bugiel, Sebastian Gerling. 36-45 [doi]
- Android security framework: extensible multi-layered access control on AndroidMichael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky. 46-55 [doi]
- Towards a scalable resource-driven approach for detecting repackaged Android applicationsYuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu, Lei Zhang 0006. 56-65 [doi]
- TroGuard: context-aware protection against web-based socially engineered trojansRui Han, Alejandro Mesa, Mihai Christodorescu, Saman A. Zonouz. 66-75 [doi]
- Spam ain't as diverse as it seems: throttling OSN spam with templates underneathHongyu Gao, Yi Yang, Kai Bu, Yan Chen, Doug Downey, Kathy Lee, Alok N. Choudhary. 76-85 [doi]
- A taste of tweets: reverse engineering Twitter spammersChao Yang, Jialong Zhang, Guofei Gu. 86-95 [doi]
- New models of cache architectures characterizing information leakage from cache side channelsTianwei Zhang, Ruby B. Lee. 96-105 [doi]
- ICE: a passive, high-speed, state-continuity schemeRaoul Strackx, Bart Jacobs 0002, Frank Piessens. 106-115 [doi]
- Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmwareSamuel Junjie Tan, Sergey Bratus, Travis Goodspeed. 116-125 [doi]
- Through the eye of the PLC: semantic security monitoring for industrial processesDina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel. 126-135 [doi]
- CPS: market analysis of attacks against demand response in the smart gridCarlos Barreto, Alvaro A. Cárdenas, Nicanor Quijano, Eduardo Mojica-Nava. 136-145 [doi]
- CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signalsMarina Krotofil, Alvaro A. Cárdenas, Bradley Manning, Jason Larsen. 146-155 [doi]
- Uncovering network tarpits with degreaserLance Alt, Robert Beverly, Alberto Dainotti. 156-165 [doi]
- Network dialog minimization and network dialog diffing: two novel primitives for network security applicationsM. Zubair Rafique, Juan Caballero, Christophe Huygens, Wouter Joosen. 166-175 [doi]
- Lightweight authentication of freshness in outsourced key-value storesYuzhe Tang, Ting Wang, Ling Liu, Xin Hu, Jiyong Jang. 176-185 [doi]
- SEER: practical memory virus scanning as a serviceJason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang. 186-195 [doi]
- MACE: high-coverage and robust memory analysis for commodity operating systemsQian Feng, Aravind Prakash, Heng Yin, Zhiqiang Lin. 196-205 [doi]
- Assisted deletion of related contentHubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun. 206-215 [doi]
- Morpheus: automatically generating heuristics to detect Android emulatorsYiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu. 216-225 [doi]
- Design and implementation of an Android host-based intrusion prevention systemMingshen Sun, Min Zheng, John C. S. Lui, Xuxian Jiang. 226-235 [doi]
- MoRePriv: mobile OS support for application personalization and privacyDrew Davidson, Matt Fredrikson, Benjamin Livshits. 236-245 [doi]
- IMSI-catch me if you can: IMSI-catcher-catchersAdrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar R. Weippl. 246-255 [doi]
- Advanced Wi-Fi attacks using commodity hardwareMathy Vanhoef, Frank Piessens. 256-265 [doi]
- Whitewash: outsourcing garbled circuit generation for mobile devicesHenry Carter, Charles Lever, Patrick Traynor. 266-275 [doi]
- Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and securityHendrik Meutzner, Viet Hung Nguyen, Thorsten Holz, Dorothea Kolossa. 276-285 [doi]
- Understanding visual perceptions of usability and security of Android's graphical password patternAdam J. Aviv, Dane Fichter. 286-295 [doi]
- It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spotsDaniela Oliveira, Marissa Rosenthal, Nicole Morin, Kuo-Chuan Yeh, Justin Cappos, Yanyan Zhuang. 296-305 [doi]
- Exploring and mitigating privacy threats of HTML5 geolocation APIHyungsub Kim, Sangho Lee, Jong Kim. 306-315 [doi]
- Differentially private data aggregation with optimal utilityFabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate. 316-325 [doi]
- On the privacy provisions of Bloom filters in lightweight bitcoin clientsArthur Gervais, Srdjan Capkun, Ghassan O. Karame, Damian Gruber. 326-335 [doi]
- OSPF vulnerability to persistent poisoning attacks: a systematic analysisGabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici. 336-345 [doi]
- Less is more: cipher-suite negotiation for DNSSECAmir Herzberg, Haya Shulman, Bruno Crispo. 346-355 [doi]
- DNS authentication as a service: preventing amplification attacksAmir Herzberg, Haya Shulman. 356-365 [doi]
- Relation extraction for inferring access control rules from natural language artifactsJohn Slankas, Xusheng Xiao, Laurie A. Williams, Tao Xie. 366-375 [doi]
- Centrality metrics of importance in access behaviors and malware detectionsWeixuan Mao, Zhongmin Cai, Xiaohong Guan, Don Towsley. 376-385 [doi]
- Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis systemTamas K. Lengyel, Steve Maresca, Bryan D. Payne, George D. Webster, Sebastian Vogl, Aggelos Kiayias. 386-395 [doi]
- Towards automated integrity protection of C++ virtual function tables in binary programsRobert Gawlik, Thorsten Holz. 396-405 [doi]
- Leveraging semantic signatures for bug search in binary programsJannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, Christian Rossow. 406-415 [doi]
- IntFlow: improving the accuracy of arithmetic error detection using information flow trackingMarios Pomonis, Theofilos Petsios, Kangkook Jee, Michalis Polychronakis, Angelos D. Keromytis. 416-425 [doi]
- CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devicesTamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno. 426-435 [doi]
- A security evaluation of AIS automated identification systemMarco Balduzzi, Alessandro Pasta, Kyle Wilhoit. 436-445 [doi]
- NodeSentry: least-privilege library integration for server-side JavaScriptWillem De Groef, Fabio Massacci, Frank Piessens. 446-455 [doi]
- TrueClick: automatically distinguishing trick banners from genuine download linksSevtap Duman, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda. 456-465 [doi]
- JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacksYinzhi Cao, Xiang Pan, Yan Chen, Jianwei Zhuge. 466-475 [doi]