Abstract is missing.
- On the foundations of trust in networks of humans and computersVirgil D. Gligor. 1 [doi]
- Fides: selectively hardening software application components against kernel-level or process-level malwareRaoul Strackx, Frank Piessens. 2-13 [doi]
- A software-hardware architecture for self-protecting dataYu-Yuan Chen, Pramod A. Jamkhedkar, Ruby B. Lee. 14-27 [doi]
- Vigilare: toward snoop-based kernel integrity monitorHyungon Moon, HoJoon Lee, Jihoon Lee, Kihwan Kim, Yunheung Paek, Brent ByungHoon Kang. 28-37 [doi]
- The most dangerous code in the world: validating SSL certificates in non-browser softwareMartin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov. 38-49 [doi]
- Why eve and mallory love android: an analysis of android SSL (in)securitySascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith, Lars Baumgärtner, Bernd Freisleben. 50-61 [doi]
- A cross-protocol attack on the TLS protocolNikos Mavrogiannopoulos, Frederik Vercauteren, Vesselin Velichkov, Bart Preneel. 62-72 [doi]
- Enhancing Tor's performance using real-time traffic classificationMashael AlSabah, Kevin S. Bauer, Ian Goldberg. 73-84 [doi]
- Routing around decoysMax Schuchard, John Geddes, Christopher Thompson, Nicholas Hopper. 85-96 [doi]
- SkypeMorph: protocol obfuscation for Tor bridgesHooman Mohajeri Moghaddam, Baiyu Li, Mohammad Derakhshani, Ian Goldberg. 97-108 [doi]
- StegoTorus: a camouflage proxy for the Tor anonymity systemZachary Weinberg, Jeffrey Wang, Vinod Yegneswaran, Linda Briesemeister, Steven Cheung, Frank Wang, Dan Boneh. 109-120 [doi]
- CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsingQiyan Wang, Xun Gong, Giang T. K. Nguyen, Amir Houmansadr, Nikita Borisov. 121-132 [doi]
- Adaptive defenses for commodity software through virtual application partitioningDimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, Angelos D. Keromytis. 133-144 [doi]
- Leveraging "choice" to automate authorization hook placementDivya Muthukumaran, Trent Jaeger, Vinod Ganapathy. 145-156 [doi]
- Binary stirring: self-randomizing instruction addresses of legacy x86 binary codeRichard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin. 157-168 [doi]
- Aligot: cryptographic function identification in obfuscated binary programsJoan Calvet, José M. Fernandez, Jean-Yves Marion. 169-182 [doi]
- An historical examination of open source releases and their vulnerabilitiesNigel Edwards, Liqun Chen. 183-194 [doi]
- Mobile data charging: new attacks and countermeasuresChunyi Peng, Chi-Yu Li, Guan-Hua Tu, Songwu Lu, Lixia Zhang 0001. 195-204 [doi]
- New privacy issues in mobile telephony: fix and verificationMyrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan, Nico Golde, Kevin Redon, Ravishankar Borgaonkar. 205-216 [doi]
- PScout: analyzing the Android permission specificationKathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, David Lie. 217-228 [doi]
- CHEX: statically vetting Android apps for component hijacking vulnerabilitiesLong Lu, Zhichun Li, Zhenyu Wu, Wenke Lee, Guofei Jiang. 229-240 [doi]
- Using probabilistic generative models for ranking risks of Android appsHao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy. 241-252 [doi]
- Self-service cloud computingShakeel Butt, H. Andrés Lagar-Cavilla, Abhinav Srivastava, Vinod Ganapathy. 253-264 [doi]
- Hourglass schemes: how to prove that cloud files are encryptedMarten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, Nikos Triandopoulos. 265-280 [doi]
- Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)Venkatanathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas Ristenpart, Michael M. Swift. 281-292 [doi]
- Single round access privacy on outsourced storagePeter Williams, Radu Sion. 293-304 [doi]
- Cross-VM side channels and their use to extract private keysYinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart. 305-316 [doi]
- Kargus: a highly-scalable software-based intrusion detection systemMuhammad Asim Jamshed, Jihyung Lee, Sangwoo Moon, Insu Yun, Deokjin Kim, Sungryoul Lee, Yung Yi, KyoungSoo Park. 317-328 [doi]
- Populated IP addresses: classification and applicationsChi-Yao Hong, Fang Yu, Yinglian Xie. 329-340 [doi]
- Blacksheep: detecting compromised hosts in homogeneous crowdsAntonio Bianchi, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. 341-352 [doi]
- Innocent by association: early recognition of legitimate usersYinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao. 353-364 [doi]
- Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogsCristian Bravo-Lillo, Lorrie Faith Cranor, Julie S. Downs, Saranga Komanduri, Stuart E. Schechter, Manya Sleeper. 365-377 [doi]
- The devil is in the (implementation) details: an empirical analysis of OAuth SSO systemsSan-Tsai Sun, Konstantin Beznosov. 378-390 [doi]
- OTO: online trust oracle for user-centric trust establishmentTiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason I. Hong, Adrian Perrig, Debin Gao. 391-403 [doi]
- Strengthening user authentication through opportunistic cryptographic identity assertionsAlexei Czeskis, Michael Dietz, Tadayoshi Kohno, Dan S. Wallach, Dirk Balfanz. 404-414 [doi]
- Minimizing private data disclosures in the smart gridWeining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick McDaniel. 415-427 [doi]
- How secure are power network signature based time stamps?Wei-Hong Chuang, Ravi Garg, Min Wu 0001. 428-438 [doi]
- SABOT: specification-based payload generation for programmable logic controllersStephen E. McLaughlin, Patrick McDaniel. 439-449 [doi]
- GPS software attacksTyler Nighswander, Brent M. Ledvina, Jonathan Diamond, Robert Brumley, David Brumley. 450-461 [doi]
- Neighborhood watch: security and privacy analysis of automatic meter reading systemsIshtiaq Rouf, Hossen A. Mustafa, Miao Xu, Wenyuan Xu, Robert D. Miller, Marco Gruteser. 462-473 [doi]
- Machine-generated algorithms, proofs and software for the batch verification of digital signature schemesJoseph A. Akinyele, Matthew Green 0001, Susan Hohenberger, Matthew W. Pagano. 474-487 [doi]
- Full proof cryptography: verifiable compilation of efficient zero-knowledge protocolsJosé Bacelar Almeida, Manuel Barbosa, Endre Bangerter, Gilles Barthe, Stephan Krenn, Santiago Zanella Béguelin. 488-500 [doi]
- Publicly verifiable delegation of large polynomials and matrix computations, with applicationsDario Fiore, Rosario Gennaro. 501-512 [doi]
- Secure two-party computation in sublinear (amortized) timeS. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova 0001, Yevgeniy Vahlis. 513-524 [doi]
- Practical yet universally composable two-server password-authenticated secret sharingJan Camenisch, Anna Lysyanskaya, Gregory Neven. 525-536 [doi]
- Provable security of S-BGP and other path vector protocols: model, analysis and extensionsAlexandra Boldyreva, Robert Lychev. 541-552 [doi]
- Towards a bayesian network game framework for evaluating DDoS attacks and defenseGuanhua Yan, Ritchie Lee, Alex Kent, David H. Wolpert. 553-566 [doi]
- DCast: sustaining collaboration in overlay multicast despite rational collusionHaifeng Yu, Phillip B. Gibbons, Chenwei Shi. 567-580 [doi]
- PeerPress: utilizing enemies' P2P strength against themZhaoyan Xu, Lingfeng Chen, Guofei Gu, Christopher Kruegel. 581-592 [doi]
- Collaborative TCP sequence number inference attack: how to crack sequence number under a secondZhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie. 593-604 [doi]
- Touching from a distance: website fingerprinting attacks and defensesXiang Cai, Xin Cheng Zhang, Brijesh Joshi, Rob Johnson. 605-616 [doi]
- Protecting location privacy: optimal strategy against localization attacksReza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec. 617-627 [doi]
- Deanonymizing mobility traces: using social network as a side-channelMudhakar Srivatsa, Mike Hicks. 628-637 [doi]
- Differentially private sequential data publication via variable-length n-gramsRui Chen, Gergely Ács, Claude Castelluccia. 638-649 [doi]
- On significance of the least significant bits for differential privacyIlya Mironov. 650-661 [doi]
- Privacy-aware personalization for mobile advertisingMichaela Hardt, Suman Nath. 662-673 [doi]
- Knowing your enemy: understanding and detecting malicious web advertisingZhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, Xiaofeng Wang. 674-686 [doi]
- Non-tracking web analyticsIstemi Ekin Akkus, Ruichuan Chen, Michaela Hardt, Paul Francis, Johannes Gehrke. 687-698 [doi]
- Computational soundness without protocol restrictionsMichael Backes, Ankit Malik, Dominique Unruh. 699-711 [doi]
- Computational verification of C protocol implementations by symbolic executionMihhail Aizatulin, Andrew D. Gordon, Jan Jürjens. 712-723 [doi]
- Verified security of redundancy-free encryption from Rabin and RSAGilles Barthe, David Pointcheval, Santiago Zanella Béguelin. 724-735 [doi]
- You are what you include: large-scale evaluation of remote javascript inclusionsNick Nikiforakis, Luca Invernizzi, Alexandros Kapravelos, Steven Van Acker, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna. 736-747 [doi]
- FlowFox: a web browser with flexible and precise information flow controlWillem De Groef, Dominique Devriese, Nick Nikiforakis, Frank Piessens. 748-759 [doi]
- Scriptless attacks: stealing the pie without touching the sillMario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk. 760-771 [doi]
- Secure two-party computations in ANSI CAndreas Holzer, Martin Franz, Stefan Katzenbeisser, Helmut Veith. 772-783 [doi]
- Foundations of garbled circuitsMihir Bellare, Viet Tung Hoang, Phillip Rogaway. 784-796 [doi]
- Salus: a system for server-aided secure function evaluationSeny Kamara, Payman Mohassel, Ben Riva. 797-808 [doi]
- Vanity, cracks and malware: insights into the anti-copy protection ecosystemMarkus Kammerstetter, Christian Platzer, Gilbert Wondracek. 809-820 [doi]
- Manufacturing compromise: the emergence of exploit-as-a-serviceChris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. Voelker. 821-832 [doi]
- Before we knew it: an empirical study of zero-day attacks in the real worldLeyla Bilge, Tudor Dumitras. 833-844 [doi]
- Priceless: the role of payments in abuse-advertised goodsDamon McCoy, Hitesh Dharmdasani, Christian Kreibich, Geoffrey M. Voelker, Stefan Savage. 845-856 [doi]
- On the parameterized complexity of the workflow satisfiability problemJason Crampton, Gregory Gutin, Anders Yeo. 857-868 [doi]
- Intransitive noninterference in nondeterministic systemsKai Engelhardt, Ron van der Meyden, Chenyi Zhang. 869-880 [doi]
- Precise enforcement of progress-sensitive securityScott Moore, Aslan Askarov, Stephen Chong. 881-893 [doi]
- TreeDroid: a tree automaton based approach to enforcing data processing policiesMads Dam, Gurvan Le Guernic, Andreas Lundblad. 894-905 [doi]
- Double-spending fast payments in bitcoinGhassan Karame, Elli Androulaki, Srdjan Capkun. 906-917 [doi]
- Revoke and let live: a secure key revocation api for cryptographic devicesVéronique Cortier, Graham Steel, Cyrille Wiedling. 918-928 [doi]
- PERM: practical reputation-based blacklisting without TTPSMan Ho Au, Apu Kapadia. 929-940 [doi]
- Measuring vote privacy, revisitedDavid Bernhard, Véronique Cortier, Olivier Pereira, Bogdan Warinschi. 941-952 [doi]
- Verifiable data streamingDominique Schröder, Heike Schröder. 953-964 [doi]
- Dynamic searchable symmetric encryptionSeny Kamara, Charalampos Papamanthou, Tom Roeder. 965-976 [doi]
- PrivateFS: a parallel oblivious file systemPeter Williams, Radu Sion, Alin Tomescu. 977-988 [doi]
- Towards measuring warning readabilityMarian Harbach, Sascha Fahl, Thomas Muders, Matthew Smith. 989-991 [doi]
- Context-aware web security threat preventionLung-Hao Lee, Yen-Cheng Juan, Kuei-Ching Lee, Wei-Lin Tseng, Hsin-Hsi Chen, Yuen-Hsien Tseng. 992-994 [doi]
- Understanding new anonymity networks from a user's perspectiveÉrik Archambault, Craig Shue. 995-997 [doi]
- Demonstrating the effectiveness of MOSES for separation of execution modesGiovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes, Yury Zhauniarovich. 998-1000 [doi]
- Protecting access privacy of cached contents in information centric networksAbedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim. 1001-1003 [doi]
- Network-based intrusion detection systems go active!Eitan Menahem, Gabi Nakibly, Yuval Elovici. 1004-1006 [doi]
- Real-time continuous iris recognition for authentication using an eye trackerKenrick J. Mock, Bogdan Hoanca, Justin Weaver, Mikal Milton. 1007-1009 [doi]
- ReasONets: a fuzzy-based approach for reasoning on network incidentsGiuseppe Petracca, Anna Cinzia Squicciarini, William Horne, Marco Casassa Mont. 1010-1012 [doi]
- How privacy leaks from bluetooth mouse?Xian Pan, Zhen Ling, Aniket Pingley, Wei Yu, Nan Zhang 0004, Xinwen Fu. 1013-1015 [doi]
- Marlin: making it harder to fish for gadgetsAditi Gupta 0002, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino. 1016-1018 [doi]
- Advanced triple-channel botnets: model and implementationXiang Cui, Binxing Fang, Peng Liao, Chaoge Liu. 1019-1021 [doi]
- Demonstrating a lightweight data provenance for sensor networksBilal Shebaro, Salmin Sultana, Shakthidhar Reddy Gopavaram, Elisa Bertino. 1022-1024 [doi]
- Location privacy leaking from spectrum utilization information in database-driven cognitive radio networkZhaoyu Gao, Haojin Zhu, Yao Liu, Muyuan Li, Zhenfu Cao. 1025-1027 [doi]
- Authenticated secret key extraction using channel characteristics for body area networksJiawei Yuan, Lu Shi, Shucheng Yu, Ming Li. 1028-1030 [doi]
- Privacy preserving boosting in the cloud with secure half-space queriesShumin Guo, Keke Chen. 1031-1033 [doi]
- Detecting money-stealing apps in alternative Android marketsChao Yang, Vinod Yegneswaran, Phillip A. Porras, Guofei Gu. 1034-1036 [doi]
- Automatic generation of vaccines for malware immunizationZhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin. 1037-1039 [doi]
- A covert channel construction in a virtualized environmentJidong Xiao, Zhang Xu, Hai Huang, Haining Wang. 1040-1042 [doi]
- Robust dynamic remote data checking for public cloudsBo Chen, Reza Curtmola. 1043-1045 [doi]
- Model-based context privacy for personal data streamsSupriyo Chakraborty, Kasturi Rangan Raghavan, Mani B. Srivastava, Harris Teague. 1046-1048 [doi]
- Query encrypted databases practicallyDongxi Liu, Shenlu Wang. 1049-1051 [doi]
- Hardware enhanced securityRuby Lee, Simha Sethumadhavan, G. Edward Suh. 1052 [doi]
- The state and evolution of privacy by designStuart S. Shapiro. 1053 [doi]
- Large-scale DNS data analysisDavid Dagon. 1054-1055 [doi]
- Fifth ACM workshop on artificial intelligence and security (AISec 2012)Alvaro A. Cárdenas, Blaine Nelson, Benjamin I. P. Rubinstein. 1056-1057 [doi]
- STC 2012: the seventh ACM workshop on scalable trusted computingXinwen Zhang, Xuhua Ding. 1058-1059 [doi]
- 4th cloud computing security workshop (CCSW 2012)Srdjan Capkun, Seny Kamara. 1060-1061 [doi]
- CCS'12 co-located workshop summary for SPSM 2012William Enck, Xuxian Jiang. 1062-1063 [doi]
- 11th workshop on privacy in the electronic societyNikita Borisov. 1064-1065 [doi]
- Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12)Mihai Christodorescu. 1066-1067 [doi]