Abstract is missing.
- Shredder: Breaking Exploits through API SpecializationShachee Mishra, Michalis Polychronakis. 1-16 [doi]
- Type-After-Type: Practical and Complete Type-Safe Memory ReuseErik van der Kouwe, Taddeus Kroes, Chris Ouwehand, Herbert Bos, Cristiano Giuffrida. 17-27 [doi]
- On the Effectiveness of Type-based Control Flow IntegrityReza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William K. Robertson, Engin Kirda, Hamed Okhravi. 28-39 [doi]
- Practical Integrity Protection with Oblivious HashingMohsen Ahmadvand, Anahit Hayrapetyan, Sebastian Banescu, Alexander Pretschner. 40-52 [doi]
- Typing-Proof: Usable, Secure and Low-Cost Two-Factor Authentication Based on Keystroke TimingsXiming Liu, Yingjiu Li, Robert H. Deng. 53-65 [doi]
- Latent Typing Biometrics in Online Collaboration ServicesShane McCulley, Vassil Roussev. 66-76 [doi]
- Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment ProtectionZhe Zhou, Di Tang, Wenhao Wang, Xiaofeng Wang, Zhou Li, Kehuan Zhang. 77-88 [doi]
- A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern WebsitesBo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, Zhiqiang Lin. 89-100 [doi]
- Accurate Malware Detection by Extreme AbstractionFady Copty, Matan Danos, Orit Edelstein, Cindy Eisner, Dov Murik, Benjamin Zeltser. 101-111 [doi]
- Using Loops For Malware Classification Resilient to Feature-unaware PerturbationsAravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, Giovanni Vigna. 112-123 [doi]
- MADE: Security Analytics for Enterprise Threat DetectionAlina Oprea, Zhou Li, Robin Norris, Kevin D. Bowers. 124-136 [doi]
- LOBO: Evaluation of Generalization Deficiencies in Twitter Bot ClassifiersJuan Echeverría, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou. 137-146 [doi]
- Side-Channel Analysis of SM2: A Late-Stage Featurization Case StudyNicola Tuveri, Sohaib ul Hassan, Cesar Pereida García, Billy Bob Brumley. 147-160 [doi]
- MicroWalk: A Framework for Finding Side Channels in BinariesJan Wichelmann, Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar. 161-173 [doi]
- Analyzing Cache Side Channels Using Deep Neural NetworksTianwei Zhang, Yinqian Zhang, Ruby B. Lee. 174-186 [doi]
- MemCloak: Practical Access Obfuscation for Untrusted MemoryWeixin Liang, Kai Bu, Ke Li, Jinhong Li, Arya Tavakoli. 187-197 [doi]
- StateDroid: Stateful Detection of Stealthy Attacks in Android Apps via Horn-Clause VerificationMohsin Junaid, Jiang Ming, David Chenho Kung. 198-209 [doi]
- Improving Accuracy of Android Malware Detection with Lightweight Contextual AwarenessJoey Allen, Matthew Landen, Sanya Chaba, Yang Ji, Simon Pak Ho Chung, Wenke Lee. 210-221 [doi]
- A Large Scale Investigation of Obfuscation Use in Google PlayDominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl. 222-235 [doi]
- Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery AppsSze Yiu Chau, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li. 236-251 [doi]
- An Extensive Evaluation of the Internet's Open ProxiesAkshaya Mani, Tavish Vaidya, David Dworken, Micah Sherr. 252-265 [doi]
- SENSS Against Volumetric DDoS AttacksSivaramakrishnan Ramanathan, Jelena Mirkovic, Minlan Yu, Ying Zhang. 266-277 [doi]
- Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi CallingJaeJong Baek, Sukwha Kyung, Haehyun Cho, Ziming Zhao 0001, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn. 278-288 [doi]
- Tracking Users across the Web via TLS Session ResumptionErik Sy, Christian Burkert, Hannes Federrath, Mathias Fischer. 289-299 [doi]
- Towards Automated Generation of Exploitation Primitives for Web BrowsersBehrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz. 300-312 [doi]
- RAPID: Resource and API-Based Detection Against In-Browser MinersJuan D. Parra Rodriguez, Joachim Posegga. 313-326 [doi]
- A Multi-tab Website Fingerprinting AttackYixiao Xu, Tao Wang, Qi Li, Qingyuan Gong, Yang Chen, Yong Jiang. 327-341 [doi]
- Raising the Bar: Evaluating Origin-wide Security ManifestsSteven Van Acker, Daniel Hausknecht, Andrei Sabelfeld. 342-354 [doi]
- SHIELD: A Framework for Efficient and Secure Machine Learning Classification in Constrained EnvironmentsJan Henrik Ziegeldorf, Jan Metzke, Klaus Wehrle. 355-370 [doi]
- Model Extraction Warning in MLaaS ParadigmManish Kesarwani, Bhaskar Mukhoty, Vijay Arya, Sameep Mehta. 371-380 [doi]
- Poisoning Attacks to Graph-Based Recommender SystemsMinghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu. 381-392 [doi]
- I Know What You See: Power Side-Channel Attack on Convolutional Neural Network AcceleratorsLingxiao Wei, Bo Luo, Yu Li, Yannan Liu, Qiang Xu 0001. 393-406 [doi]
- Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine IntrospectionSergej Proskurin, Tamas K. Lengyel, Marius Momeu, Claudia Eckert, Apostolis Zarras. 407-417 [doi]
- A Measurement Study on Linux Container Security: Attacks and CountermeasuresXin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun 0001, Quan Zhou. 418-429 [doi]
- Secure Out-of-band Remote Management of Virtual Machines with Transparent PassthroughShota Futagami, Tomoya Unoki, Kenichi Kourai. 430-440 [doi]
- Prime+Count: Novel Cross-world Covert Channels on ARM TrustZoneHaehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn. 441-452 [doi]
- Comparing Video Based Shoulder Surfing with Live SimulationAdam J. Aviv, Flynn Wolf, Ravi Kuber. 453-466 [doi]
- Do Social Disorders Facilitate Social Engineering?: A Case Study of Autism and Phishing AttacksAjaya Neupane, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, Haley Johnson Bishop. 467-477 [doi]
- I Need this Back, Later!: An Exploration of Practical Secret SharingOliver Wiese, Christoph Weinhold, Jan-Ole Malchow, Volker Roth 0002. 478-489 [doi]
- Take It or Leave It: A Survey Study on Operating System Upgrade PracticesSadegh Farhang, Jake Weidman, Mohammad Mahdi Kamani, Jens Grossklags, Peng Liu 0005. 490-504 [doi]
- TIFF: Using Input Type Inference To Improve FuzzingVivek Jain, Sanjay Rawat 0001, Cristiano Giuffrida, Herbert Bos. 505-517 [doi]
- Mapping to Bits: Efficiently Detecting Type Confusion ErrorsChengbin Pang, Yunlan Du, Bing Mao, Shanqing Guo. 518-528 [doi]
- A Heuristic Framework to Detect Concurrency VulnerabilitiesChangming Liu, Deqing Zou, Peng Luo, Bin B. Zhu, Hai Jin 0001. 529-541 [doi]
- ICSD: An Automatic System for Insecure Code Snippet Detection in Stack Overflow over Heterogeneous Information NetworkYanfang Ye, Shifu Hou, Lingwei Chen, Xin Li, Liang Zhao 0002, Shouhuai Xu, Jiabin Wang, Qi Xiong. 542-552 [doi]
- Crystal (ball): I Look at Physics and Predict Control Flow! Just-Ahead-Of-Time Controller RecoverySriharsha Etigowni, Shamina Hossain-McKenzie, Maryam Kazerooni, Katherine R. Davis, Saman A. Zonouz. 553-565 [doi]
- Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate sensors in CPSChuadhry Mujeeb Ahmed, Jianying Zhou 0001, Aditya P. Mathur. 566-581 [doi]
- Finding Dependencies between Cyber-Physical Domains for Security Testing of Industrial Control SystemsJohn Henry Castellanos, Martín Ochoa, Jianying Zhou 0001. 582-594 [doi]
- Pointing in the Right Direction - Securing Memory Accesses in a Faulty WorldRobert Schilling, Mario Werner, Pascal Nasahl, Stefan Mangard. 595-604 [doi]
- Lprov: Practical Library-aware Provenance TracingFei Wang, Yonghwi Kwon, ShiQing Ma, Xiangyu Zhang, Dongyan Xu. 605-617 [doi]
- Now You See Me: Real-time Dynamic Function Call DetectionFranck de Goër, Sanjay Rawat 0001, Dennis Andriesse, Herbert Bos, Roland Groz. 618-628 [doi]
- An Historical Analysis of the SEAndroid Policy EvolutionBumjin Im, Ang Chen, Dan S. Wallach. 629-640 [doi]
- IAC: On the Feasibility of Utilizing Neural Signals for Access ControlMd. Lutfor Rahman, Ajaya Neupane, Chengyu Song. 641-652 [doi]
- Finding The Greedy, Prodigal, and Suicidal Contracts at ScaleIvica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor. 653-663 [doi]
- Osiris: Hunting for Integer Bugs in Ethereum Smart ContractsChristof Ferreira Torres, Julian Schütte, Radu State. 664-676 [doi]
- SmarTor: Smarter Tor with Smart Contracts: Improving resilience of topology distribution in the Tor networkGreubel Andre, Dmitrienko Alexandra, Kounev Samuel. 677-691 [doi]
- Obscuro: A Bitcoin Mixer using Trusted Execution EnvironmentsMuoi Tran, Loi Luu, Min-Suk Kang, Iddo Bentov, Prateek Saxena. 692-701 [doi]
- There's a Hole in that Bucket!: A Large-scale Analysis of Misconfigured S3 BucketsAndrea Continella, Mario Polino, Marcello Pogliani, Stefano Zanero. 702-711 [doi]
- DeDoS: Defusing DoS with Dispersion Oriented SoftwareHenri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Bob DiMaiolo, Jingyu Qian, Chirag Shah, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, Wenchao Zhou. 712-722 [doi]
- Improving security and usability of passphrases with guided word choiceNikola K. Blanchard, Clément Malaingre, Ted Selker. 723-732 [doi]
- On The Systematic Development and Evaluation Of Password Security Awareness-Raising MaterialsPeter Mayer, Christian Schwartz, Melanie Volkamer. 733-748 [doi]