Abstract is missing.
- Formal security analysis of smart embedded systemsFarid Molazem Tabrizi, Karthik Pattabiraman. 1-15 [doi]
- An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devicesYang Shi, Wujing Wei, Zongjian He, Hongfei Fan. 16-29 [doi]
- A multi-cloud based privacy-preserving data publishing scheme for the internet of thingsLei Yang, Abdulmalik Humayed, FengJun Li. 30-39 [doi]
- ELAR: extremely lightweight auditing and repairing for cloud securityTran Phuong Thao, Kazumasa Omote. 40-51 [doi]
- Pileus: protecting user resources from vulnerable cloud servicesYuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger. 52-64 [doi]
- Bootstrapping and maintaining trust in the cloudNabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd. 65-77 [doi]
- Decomposition of MAC address structure for granular device inferenceJeremy Martin, Erik C. Rye, Robert Beverly. 78-88 [doi]
- Timing-based reconnaissance and defense in software-defined networksJohn Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller. 89-100 [doi]
- RevProbe: detecting silent reverse proxies in malicious server infrastructuresAntonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero. 101-112 [doi]
- Life-experience passwords (LEPs)Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic. 113-126 [doi]
- Using image saliency and regions of interest to encourage stronger graphical passwordsMohammad N. AlShehri, Heather Crawford. 127-138 [doi]
- CPAC: securing critical infrastructure with cyber-physical access controlSriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler. 139-152 [doi]
- Catching predators at watering holes: finding and understanding strategically compromised websitesSumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, Xiaofeng Wang, Zhou Li. 153-166 [doi]
- The Achilles heel of OAuth: a multi-platform study of OAuth-based authenticationHui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu. 167-176 [doi]
- Adaptive encrypted traffic fingerprinting with bi-directional dependenceKhaled Al-Naami, Swarup Chandra, Ahmad M. Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani M. Thuraisingham. 177-188 [doi]
- Code obfuscation against symbolic execution attacksSebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner. 189-200 [doi]
- VulPecker: an automated vulnerability detection system based on code similarity analysisZhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Hanchao Qi, Jie Hu. 201-213 [doi]
- EvilCoder: automated bug insertionJannik Pewny, Thorsten Holz. 214-225 [doi]
- On the (in)security of the latest generation implantable cardiac defibrillators and how to secure themEduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel. 226-236 [doi]
- Multi-receiver GPS spoofing detection: error models and realizationKai Jansen, Nils Ole Tippenhauer, Christina Pöpper. 237-250 [doi]
- Location-enhanced authentication using the IoT: because you cannot be in two places at onceIoannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis. 251-264 [doi]
- Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometricsBabins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena. 265-276 [doi]
- Gametrics: towards attack-resilient behavioral authentication with simple cognitive gamesManar Mohamed, Nitesh Saxena. 277-288 [doi]
- Device fingerprinting for augmenting web authentication: classification and analysis of methodsFurkan Alaca, Paul C. van Oorschot. 289-301 [doi]
- Practical and secure dynamic searchable encryption via oblivious access on distributed data structureThang Hoang, Attila Altay Yavuz, Jorge Guajardo. 302-313 [doi]
- CoKey: fast token-based cooperative cryptographyJulian Horsch, Sascha Wessel, Claudia Eckert. 314-323 [doi]
- The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of HeliosNicholas Chang-Fong, Aleksander Essex. 324-335 [doi]
- ShieldFS: a self-healing, ransomware-aware filesystemAndrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi. 336-347 [doi]
- Cypider: building community-based cyber-defense infrastructure for android malware detectionElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb. 348-362 [doi]
- Intelligent, automated red team emulationAndy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf. 363-373 [doi]
- You can promote, but you can't hide: large-scale abused app detection in mobile app storesZhen Xie, Sencun Zhu, Qing Li, Wenjing Wang. 374-385 [doi]
- Swords and shields: a study of mobile game hacks and existing defensesYuan Tian, Eric Y. Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague. 386-397 [doi]
- Understanding and defending the binder attack surface in AndroidHuan Feng, Kang G. Shin. 398-409 [doi]
- Inferring browser activity and status through remote monitoring of storage usageHyungsub Kim, Sangho Lee 0001, Jong Kim 0001. 410-421 [doi]
- Amplifying side channels through performance degradationThomas Allan, Billy Bob Brumley, Katrina E. Falkner, Joop van de Pol, Yuval Yarom. 422-435 [doi]
- Efficient, adversarial neighbor discovery using logical channels on Microsoft AzureMehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar. 436-447 [doi]
- VTPin: practical VTable hijacking protection for binariesPawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos. 448-459 [doi]
- LMP: light-weighted memory protection with hardware assistanceWei Huang, Zhen Huang, Dhaval Miyani, David Lie. 460-470 [doi]
- FASE: functionality-aware security enforcementPetar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara. 471-483 [doi]
- Reliably determining data leakage in the presence of strong attackersRiccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel. 484-495 [doi]
- Sanitizing data is not enough!: towards sanitizing structural artifacts in flash mediaBo Chen, Shijie Jia, Luning Xia, Peng Liu. 496-507 [doi]
- Auror: defending against poisoning attacks in collaborative deep learning systemsShiqi Shen, Shruti Tople, Prateek Saxena. 508-519 [doi]
- A security analysis of automated chinese turing testsAbdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan. 520-532 [doi]
- The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interfaceMark R. Beaumont, Jim McCarthy, Toby C. Murray. 533-545 [doi]
- CASTLE: CA signing in a touch-less environmentStephanos Matsumoto, Samuel Steffen, Adrian Perrig. 546-557 [doi]
- Spicy: a unified deep packet inspection framework for safely dissecting all your dataRobin Sommer, Johanna Amann, Seth Hall. 558-569 [doi]
- Trace-free memory data structure forensics via past inference and future speculationsPengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz. 570-582 [doi]
- HERCULE: attack story reconstruction via community discovery on correlated log graphKexin Pei, Zhongshu Gu, Brendan Saltaformaggio, ShiQing Ma, Fei Wang 0001, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu. 583-595 [doi]