Abstract is missing.
- Reflections on the evolution of internet threats: the growing imperative for a cyber secure societyFarnam Jahanian. 1-2 [doi]
- VIPER: verifying the integrity of PERipherals' firmwareYanlin Li, Jonathan M. McCune, Adrian Perrig. 3-16 [doi]
- Unicorn: two-factor attestation for data securityMohammad Mannan, Beom Heyn Kim, Afshar Ganjali, David Lie. 17-28 [doi]
- Combining control-flow integrity and static analysis for efficient and validated data sandboxingBin Zeng 0004, Gang Tan, Greg Morrisett. 29-40 [doi]
- Composition theorems without pre-established session identifiersRalf Küsters, Max Tuengerthal. 41-50 [doi]
- Composability of bellare-rogaway key exchange protocolsChristina Brzuska, Marc Fischlin, Bogdan Warinschi, Stephen C. Williams. 51-62 [doi]
- A composable computational soundness notionVéronique Cortier, Bogdan Warinschi. 63-74 [doi]
- On the requirements for successful GPS spoofing attacksNils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun. 75-86 [doi]
- Protecting consumer privacy from electric load monitoringStephen E. McLaughlin, Patrick McDaniel, William Aiello. 87-98 [doi]
- PaperSpeckle: microscopic fingerprinting of paperAshlesh Sharma, Lakshminarayanan Subramanian, Eric A. Brewer. 99-110 [doi]
- On the vulnerability of FPGA bitstream encryption against power analysis attacks: extracting keys from xilinx Virtex-II FPGAsAmir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar. 111-124 [doi]
- Text-based CAPTCHA strengths and weaknessesElie Bursztein, Matthieu Martin, John C. Mitchell. 125-138 [doi]
- An efficient user verification system via mouse movementsNan Zheng, Aaron Paloski, Haining Wang. 139-150 [doi]
- Policy auditing over incomplete logs: theory, implementation and applicationsDeepak Garg, Limin Jia, Anupam Datta. 151-162 [doi]
- Automatic error finding in access-control policiesKarthick Jayaraman, Vijay Ganesh, Mahesh V. Tripunitara, Martin C. Rinard, Steve J. Chapin. 163-174 [doi]
- Trust-based anonymous communication: adversary models and routing algorithmsAaron Johnson, Paul F. Syverson, Roger Dingledine, Nick Mathewson. 175-186 [doi]
- Cirripede: circumvention infrastructure using router redirection with plausible deniabilityAmir Houmansadr, Giang T. K. Nguyen, Matthew Caesar, Nikita Borisov. 187-200 [doi]
- Forensic investigation of the OneSwarm anonymous filesharing systemSwagatika Prusty, Brian Neil Levine, Marc Liberatore. 201-214 [doi]
- Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprintingPrateek Mittal, Ahmed Khurshid, Joshua Juen, Matthew Caesar, Nikita Borisov. 215-226 [doi]
- App isolation: get the security of multiple browsers with just oneEric Yawei Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson. 227-238 [doi]
- Crouching tiger - hidden payload: security risks of scalable vectors graphicsMario Heiderich, Tilman Frosch, Meiko Jensen, Thorsten Holz. 239-250 [doi]
- Fear the EAR: discovering and mitigating execution after redirect vulnerabilitiesAdam Doupé, Bryce Boe, Christopher Kruegel, Giovanni Vigna. 251-262 [doi]
- Automated black-box detection of side-channel vulnerabilities in web applicationsPeter Chapman, David Evans. 263-274 [doi]
- Deobfuscation of virtualization-obfuscated software: a semantics-based approachKevin Coogan, Gen Lu, Saumya K. Debray. 275-284 [doi]
- The power of procrastination: detection and mitigation of execution-stalling malicious codeClemens Kolbitsch, Engin Kirda, Christopher Kruegel. 285-296 [doi]
- MIDeA: a multi-parallel intrusion detection architectureGiorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis. 297-308 [doi]
- BitShred: feature hashing malware for scalable triage and semantic analysisJiyong Jang, David Brumley, Shobha Venkataraman. 309-320 [doi]
- Trace equivalence decision: negative tests and non-determinismVincent Cheval, Hubert Comon-Lundh, Stéphanie Delaune. 321-330 [doi]
- Extracting and verifying cryptographic models from C protocol code by symbolic executionMihhail Aizatulin, Andrew D. Gordon, Jan Jürjens. 331-340 [doi]
- Modular code-based cryptographic verificationCédric Fournet, Markulf Kohlweiss, Pierre-Yves Strub. 341-350 [doi]
- Information-flow types for homomorphic encryptionsCédric Fournet, Jérémy Planul, Tamara Rezk. 351-360 [doi]
- Cryptographic primitives for building secure and privacy respecting protocolsJan Camenisch. 361-362 [doi]
- Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoringDeepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu. 363-374 [doi]
- SICE: a hardware-level strongly isolated computing environment for x86 multi-core platformsAhmed M. Azab, Peng Ning, Xiaolan Zhang. 375-388 [doi]
- AmazonIA: when elasticity snaps backSven Bugiel, Stefan Nürnberger, Thomas Pöppelmann, Ahmad-Reza Sadeghi, Thomas Schneider 0003. 389-400 [doi]
- Eliminating the hypervisor attack surface for a more secure cloudJakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford. 401-412 [doi]
- How to break XML encryptionTibor Jager, Juraj Somorovsky. 413-422 [doi]
- Ciphers that securely encipher their own keysMihir Bellare, David Cash, Sriram Keelveedhi. 423-432 [doi]
- Password-protected secret sharingAli Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, Yanbin Lu. 433-444 [doi]
- Practical delegation of computation using multiple serversRan Canetti, Ben Riva, Guy N. Rothblum. 445-454 [doi]
- Fashion crimes: trending-term exploitation on the webTyler Moore, Nektarios Leontiadis, Nicolas Christin. 455-466 [doi]
- SURF: detecting and measuring search poisoningLong Lu, Roberto Perdisci, Wenke Lee. 467-476 [doi]
- Cloak and dagger: dynamics of web search cloakingDavid Y. Wang, Stefan Savage, Geoffrey M. Voelker. 477-490 [doi]
- Proofs of ownership in remote storage systemsShai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg. 491-500 [doi]
- How to tell if your cloud files are vulnerable to drive crashesKevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest. 501-514 [doi]
- Sedic: privacy-aware data intensive computing on hybrid cloudsKehuan Zhang, Xiao-yong Zhou, Yangyi Chen, Xiaofeng Wang, Yaoping Ruan. 515-526 [doi]
- iSpy: automatic reconstruction of typed input from compromising reflectionsRahul Raguram, Andrew M. White 0002, Dibyendusekhar Goswami, Fabian Monrose, Jan-Michael Frahm. 527-536 [doi]
- Televisions, video privacy, and powerline electromagnetic interferenceMiro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak N. Patel. 537-550 [doi]
- (sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometersPhilip Marquardt, Arunabh Verma, Henry Carter, Patrick Traynor. 551-562 [doi]
- Predictive mitigation of timing channels in interactive systemsDanfeng Zhang, Aslan Askarov, Andrew C. Myers. 563-574 [doi]
- WAPTEC: whitebox analysis of web applications for parameter tampering exploit constructionPrithvi Bisht, Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan. 575-586 [doi]
- Context-sensitive auto-sanitization in web templating languages using type qualifiersMike Samuel, Prateek Saxena, Dawn Song. 587-600 [doi]
- SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applicationsPrateek Saxena, David Molnar, Benjamin Livshits. 601-614 [doi]
- Fortifying web-based applications automaticallyShuo Tang, Nathan Dautenhahn, Samuel T. King. 615-626 [doi]
- Android permissions demystifiedAdrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner. 627-638 [doi]
- These aren't the droids you're looking for: retrofitting android to protect data from imperious applicationsPeter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart E. Schechter, David Wetherall. 639-652 [doi]
- Privacy and accountability for location-based aggregate statisticsRaluca A. Popa, Andrew J. Blumberg, Hari Balakrishnan, Frank H. Li. 653-666 [doi]
- Auctions in do-not-track compliant internet advertisingAlexey Reznichenko, Saikat Guha, Paul Francis. 667-676 [doi]
- Practical PIR for electronic commerceRyan Henry, Femi G. Olumofin, Ian Goldberg. 677-690 [doi]
- Countering GATTACA: efficient and secure testing of fully-sequenced human genomesPierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik. 691-702 [doi]
- Automatically optimizing secure computationFlorian Kerschbaum. 703-714 [doi]
- VMCrypt: modular software architecture for scalable secure computationLior Malka. 715-724 [doi]
- Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechersFlorian Adamsky, Hassan Khan, Muttukrishnan Rajarajan, Syed Ali Khayam, Rudolf Jäger. 725-728 [doi]
- Poster: a geometric approach for multicast authentication in adversarial channelsSeyed Ali Ahmadzadeh, Gordon B. Agnew. 729-732 [doi]
- Demo: a comprehensive framework enabling data-minimizing authenticationPatrik Bichsel, Franz-Stefan Preiss. 733-736 [doi]
- f hardware prototype for privacy-preserving RFID authenticationErik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva, Olivier Savry, Cédric Vérhilac. 737-740 [doi]
- Poster: the quest for security against privilege escalation attacks on androidSven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry. 741-744 [doi]
- Poster: a path-cutting approach to blocking XSS worms in social web networksYinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen. 745-748 [doi]
- Poster: control-flow integrity for smartphonesLucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi. 749-752 [doi]
- Poster: arbitrators in the security infrastructure, supporting positive anonymityShlomi Dolev, Niv Gilboa, Ofer Hermoni. 753-756 [doi]
- Poster: attribute based broadcast encryption with permanent revocationShlomi Dolev, Niv Gilboa, Marina Kopeetsky. 757-760 [doi]
- Poster: SMURFEN: a rule sharing collaborative intrusion detection networkCarol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer Basar. 761-764 [doi]
- Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosureMa'ayan Gafny, Asaf Shabtai, Lior Rokach, Yuval Elovici. 765-768 [doi]
- Poster: online spam filtering in social networksHongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary. 769-772 [doi]
- Poster: on trust evaluation with missing information in reputation systemsXi Gong, Ting Yu, Adam J. Lee. 773-776 [doi]
- Poster: collaborative policy administrationWeili Han, Zheran Fang, Weifeng Chen, Wenyuan Xu, Chang Lei. 777-780 [doi]
- Poster: using quantified risk and benefit to strengthen the security of information sharingWeili Han, Chenguang Shen, Yuliang Yin, Yun Gu, Chen Chen. 781-784 [doi]
- Poster: CUD: crowdsourcing for URL spam detectionJun Hu, Hongyu Gao, Zhichun Li, Yan Chen. 785-788 [doi]
- Poster: DIEGO: a fine-grained access control for web browsersAshar Javed. 789-792 [doi]
- Poster: privacy-preserving profile similarity computation in online social networksArjan Jeckmans, Qiang Tang, Pieter H. Hartel. 793-796 [doi]
- Poster: practical embedded remote attestation using physically unclonable functionsÜnal Koçabas, Ahmad-Reza Sadeghi, Christian Wachsmann, Steffen Schulz. 797-800 [doi]
- Poster: mimicry attacks against wireless link signatureYao Liu, Peng Ning. 801-804 [doi]
- Poster: fast, automatic iPhone shoulder surfingStefano Maggi, Alberto Volpatto, Simone Gasparini, Giacomo Boracchi, Stefano Zanero. 805-808 [doi]
- Poster: preliminary analysis of Google+'s privacyShah Mahmood, Yvo Desmedt. 809-812 [doi]
- Poster: shaping network topology for privacy and performanceNayantara Mallesh, Matthew Wright. 813-816 [doi]
- Poster: trans-organizational role-based access controlRamon Francisco Pacquiao Mejia, Yuichi Kaji, Hiroyuki Seki. 817-820 [doi]
- Poster: towards attribute based group key managementMohamed Nabeel, Elisa Bertino. 821-824 [doi]
- Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs)Rishab Nithyanand, Radu Sion, John Solis. 825-828 [doi]
- Poster: uPro: a compartmentalization tool supporting fine-grained and flexible security configurationBen Niu, Gang Tan. 829-832 [doi]
- Poster: recoverable botnets: a hybrid C&C approachPeng Liao, Xiang Cui, Shuhao Li, Chaoge Liu. 833-836 [doi]
- Poster: an implementation of the fully homomorphic smart-vercauteren crypto-systemHenning Perl, Michael Brenner, Matthew Smith. 837-840 [doi]
- ERBAC: enforcing security policies in outsourced environments with encrypted RBACMuhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo. 841-844 [doi]
- Poster: inference attacks against searchable encryption protocolsMohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu. 845-448 [doi]
- Demo: secure computation in JavaScriptAxel Schröpfer, Florian Kerschbaum. 849-852 [doi]
- Poster: can it be more practical?: improving mouse dynamics biometric performanceChao Shen, Zhongmin Cai, Xiaohong Guan. 853-856 [doi]
- Poster: Towards detecting DMA malwarePatrick Stewin, Jean-Pierre Seifert, Collin Mulliner. 857-860 [doi]
- Poster: LBMS: load balancing based on multilateral security in cloudPengfei Sun, Qingni Shen, Ying Chen, Zhonghai Wu, Cong Zhang, Anbang Ruan, Liang Gu. 861-864 [doi]
- Poster: protecting information in systems of systemsDaniel Trivellato, Nicola Zannone, Sandro Etalle. 865-868 [doi]
- Poster: a certificateless proxy re-encryption scheme for cloud-based data sharingXiaoxin Wu, Lei Xu, Xinwen Zhang. 869-872 [doi]
- Poster: towards formal verification of DIFC policiesZhi Yang, Lihua Yin, MiYi Duan, Shuyuan Jin. 873-876 [doi]
- Poster: on quantitative information flow metricsJi Zhu, Mudhakar Srivatsa. 877-880 [doi]
- Poster: temporal attribute-based encryption in cloudsYan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong, Shimin Chen. 881-884 [doi]