Abstract is missing.
- Founding Digital Currency on Secure ComputationKarim El Defrawy, Joshua Lampkins. 1-14 [doi]
- Deanonymisation of Clients in Bitcoin P2P NetworkAlex Biryukov, Dmitry Khovratovich, Ivan Pustogarov. 15-29 [doi]
- How to Use Bitcoin to Incentivize Correct ComputationsRanjit Kumaresan, Iddo Bentov. 30-41 [doi]
- Code Reuse Attacks in PHP: Automated POP Chain GenerationJohannes Dahse, Nikolai Krein, Thorsten Holz. 42-53 [doi]
- Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified CodeJeff Seibert, Hamed Okkhravi, Eric Söderström. 54-65 [doi]
- Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and MitigationXing Jin, Xuchao Hu, Kailiang Ying, Wenliang Du, Heng Yin, Gautam Nagesh Peri. 66-77 [doi]
- Rosemary: A Robust, Secure, and High-performance Network Operating SystemSeungwon Shin, YongJoo Song, Taekyung Lee, Sangho Lee, JaeWoong Chung, Phillip A. Porras, Vinod Yegneswaran, Jiseong Noh, Brent ByungHoon Kang. 78-89 [doi]
- Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure WorldAhmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen. 90-102 [doi]
- A11y Attacks: Exploiting Accessibility in Operating SystemsYeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, Wenke Lee. 103-115 [doi]
- Private-by-Design Advertising Meets the Real WorldAlexey Reznichenko, Paul Francis. 116-128 [doi]
- Your Online Interests: Pwned! A Pollution Attack Against Targeted AdvertisingWei Meng, Xinyu Xing, Anmol Sheth, Udi Weinsberg, Wenke Lee. 129-140 [doi]
- Characterizing Large-Scale Click Fraud in ZeroAccessPaul Pearce, Vacha Dave, Chris Grier, Kirill Levchenko, Saikat Guha, Damon McCoy, Vern Paxson, Stefan Savage, Geoffrey M. Voelker. 141-152 [doi]
- DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware TrojansJie Zhang, Feng Yuan, Qiang Xu. 153-166 [doi]
- ATRA: Address Translation Redirection Attack against Hardware-based External MonitorsDaeHee Jang, HoJoon Lee, Minsu Kim, Daehyeok Kim, Daegyeong Kim, Brent ByungHoon Kang. 167-178 [doi]
- AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary AnalysisZhaoyan Xu, Antonio Nappa, Robert Baykov, Guangliang Yang, Juan Caballero, Guofei Gu. 179-190 [doi]
- SCORAM: Oblivious RAM for Secure ComputationXiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi. 191-202 [doi]
- Toward Robust Hidden Volumes Using Write-Only Oblivious RAMErik-Oliver Blass, Travis Mayberry, Guevara Noubir, Kaan Onarlioglu. 203-214 [doi]
- Oblivious Data StructuresXiao Shaun Wang, Kartik Nayak, Chang Liu, T.-H. Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang. 215-226 [doi]
- A Systematic Approach to Developing and Evaluating Website Fingerprinting DefensesXiang Cai, Rishab Nithyanand, Tao Wang, Rob Johnson, Ian Goldberg. 227-238 [doi]
- Location Privacy Protection for Smartphone UsersKassem Fawaz, Kang G. Shin. 239-250 [doi]
- Optimal Geo-Indistinguishable Mechanisms for Location PrivacyNicolás Emilio Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi. 251-262 [doi]
- A Critical Evaluation of Website Fingerprinting AttacksMarc Juárez, Sadia Afroz, Gunes Acar, Claudia Díaz, Rachel Greenstadt. 263-274 [doi]
- Optimal Average-Complexity Ideal-Security Order-Preserving EncryptionFlorian Kerschbaum, Axel Schröpfer. 275-286 [doi]
- A New Additive Homomorphic Encryption based on the co-ACD ProblemJung Hee Cheon, Hyung Tae Lee, Jae Hong Seo. 287-298 [doi]
- Verifying Curve25519 SoftwareYu-Fang Chen, Chang-Hong Hsu, Hsin-hung Lin, Peter Schwabe, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang, Shang-Yi Yang. 299-309 [doi]
- Searchable Encryption with Secure and Efficient UpdatesFlorian Hahn, Florian Kerschbaum. 310-320 [doi]
- Routing Bottlenecks in the Internet: Causes, Exploits, and CountermeasuresMin-Suk Kang, Virgil D. Gligor. 321-333 [doi]
- VoIP Fraud: Identifying a Wolf in Sheep's ClothingHemant Sengar. 334-345 [doi]
- Mechanized Network Origin and Path Authenticity ProofsFuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig. 346-357 [doi]
- Security Vulnerability in Processor-Interconnect Router DesignWonJun Song, John Kim, Jae-Wook Lee, Dennis Abts. 358-368 [doi]
- Multi-Ciphersuite Security of the Secure Shell (SSH) ProtocolFlorian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, Douglas Stebila. 369-381 [doi]
- ARPKI: Attack Resilient Public-Key InfrastructureDavid A. Basin, Cas J. F. Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski. 382-393 [doi]
- Securing SSL Certificate Verification through Dynamic LinkingAdam M. Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi. 394-405 [doi]
- PoliCert: Secure and Flexible TLS Certificate ManagementPawel Szalachowski, Stephanos Matsumoto, Adrian Perrig. 406-417 [doi]
- Watching the Watchers: Automatically Inferring TV Content From Outdoor Light EffusionsYi Xu, Jan-Michael Frahm, Fabian Monrose. 418-428 [doi]
- Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible SoundZhe Zhou, Wenrui Diao, Xiangyu Liu, Kehuan Zhang. 429-440 [doi]
- Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic ComponentsAnupam Das, Nikita Borisov, Matthew Caesar. 441-452 [doi]
- Context-free Attacks Using Keyboard Acoustic EmanationsTong Zhu, Qiang Ma, Shanfeng Zhang, Yunhao Liu. 453-464 [doi]
- Dialing Back Abuse on Phone Verified AccountsKurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy. 465-476 [doi]
- Uncovering Large Groups of Active Malicious Accounts in Online Social NetworksQiang Cao, Xiaowei Yang, Jieqi Yu, Christopher Palow. 477-488 [doi]
- Consequences of Connectivity: Characterizing Account Hijacking on TwitterKurt Thomas, Frank Li, Chris Grier, Vern Paxson. 489-500 [doi]
- Faces in the Distorting Mirror: Revisiting Photo-based Social AuthenticationIasonas Polakis, Panagiotis Ilia, Federico Maggi, Marco Lancini, Georgios Kontaxis, Stefano Zanero, Sotiris Ioannidis, Angelos D. Keromytis. 501-512 [doi]
- (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path SelectionMichael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi. 513-524 [doi]
- Deniable LiaisonsAbhinav Narain, Nick Feamster, Alex C. Snoeren. 525-536 [doi]
- Community-Enhanced De-anonymization of Online Social NetworksShirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn. 537-548 [doi]
- Breaking Integrated Circuit Device Security through Test Mode Silicon Reverse EngineeringMarkus Kammerstetter, Markus Muellner, Daniel Burian, Christian Platzer, Wolfgang Kastner. 549-557 [doi]
- ARMlock: Hardware-based Fault Isolation for ARMYajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang. 558-569 [doi]
- The Last Mile: An Empirical Study of Timing Channels on seL4David Cock, Qian Ge, Toby C. Murray, Gernot Heiser. 570-581 [doi]
- Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted ValuesBenjamin Mood, Debayan Gupta, Kevin R. B. Butler, Joan Feigenbaum. 582-596 [doi]
- Practical UC security with a Global Random OracleRan Canetti, Abhishek Jain 0002, Alessandra Scafuro. 597-608 [doi]
- A Computationally Complete Symbolic Attacker for Equivalence PropertiesGergei Bana, Hubert Comon-Lundh. 609-620 [doi]
- Detection of On-Road Vehicles Emanating GPS InterferenceGorkem Kar, Hossen A. Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, Tam Vu. 621-632 [doi]
- On The Security of Mobile Cockpit Information SystemsDevin Lundberg, Brown Farinholt, Edward Sullivan, Ryan Mast, Stephen Checkoway, Stefan Savage, Alex C. Snoeren, Kirill Levchenko. 633-645 [doi]
- Optimizing Obfuscation: Avoiding Barrington's TheoremPrabhanjan Vijendra Ananth, Divya Gupta, Yuval Ishai, Amit Sahai. 646-658 [doi]
- Fully Secure and Fast Signing from ObfuscationKim Ramchen, Brent Waters. 659-673 [doi]
- The Web Never Forgets: Persistent Tracking Mechanisms in the WildGunes Acar, Christian Eubank, Steven Englehardt, Marc Juárez, Arvind Narayanan, Claudia Díaz. 674-689 [doi]
- MACE: Detecting Privilege Escalation Vulnerabilities in Web ApplicationsMaliheh Monshizadeh, Prasad Naldurg, V. N. Venkatakrishnan. 690-701 [doi]
- Exciting Security Research Opportunity: Next-generation InternetAdrian Perrig. 702 [doi]
- Security Analysis of the Estonian Internet Voting SystemDrew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, J. Alex Halderman. 703-715 [doi]
- Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards Without the PINMartin Emms, Budi Arief, Leo Freitas, Joseph Hannon, Aad P. A. van Moorsel. 716-726 [doi]
- Real Threats to Your Data Bills: Security Loopholes and Defenses in Mobile Data ChargingChunyi Peng, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, Songwu Lu. 727-738 [doi]
- Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental ConfirmationSauvik Das, Adam D. I. Kramer, Laura A. Dabbish, Jason I. Hong. 739-749 [doi]
- Are You Ready to Lock?Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, David Wagner. 750-761 [doi]
- ALETHEIA: Improving the Usability of Static Security AnalysisOmer Tripp, Salvatore Guarnieri, Marco Pistoia, Aleksandr Y. Aravkin. 762-774 [doi]
- Vulnerability and Protection of Channel State Information in Multiuser MIMO NetworksYu-Chih Tung, Sihui Han, Dongyao Chen, Kang G. Shin. 775-786 [doi]
- Blind Transmitter Authentication for Spectrum Security and EnforcementVireshwar Kumar, Jung-Min Park 0001, Kaigui Bian. 787-798 [doi]
- RevCast: Fast, Private Certificate Revocation over FM RadioAaron Schulman, Dave Levin, Neil Spring. 799-810 [doi]
- Taking Authenticated Range Queries to Arbitrary DimensionsDimitrios Papadopoulos, Stavros Papadopoulos, Nikos Triandopoulos. 819-830 [doi]
- Outsourced Proofs of RetrievabilityFrederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Zongren Liu, Christian A. Reuter. 831-843 [doi]
- Efficiently Verifiable Computation on Encrypted DataDario Fiore, Rosario Gennaro, Valerio Pastro. 844-855 [doi]
- ALITHEIA: Towards Practical Verifiable Graph ProcessingYupeng Zhang, Charalampos Papamanthou, Jonathan Katz. 856-867 [doi]
- Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto PhonesMaliheh Shirvanian, Nitesh Saxena. 868-879 [doi]
- Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal DevicesMarkus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani. 880-891 [doi]
- OAuth Demystified for Mobile Application DevelopersEric Y. Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague. 892-903 [doi]
- Beware, Your Hands Reveal Your Secrets!Diksha Shukla, Rajesh Kumar, Abdul Serwadda, Vir V. Phoha. 904-917 [doi]
- Clubbing Seals: Exploring the Ecosystem of Third-party Security SealsTom van Goethem, Frank Piessens, Wouter Joosen, Nick Nikiforakis. 918-929 [doi]
- A Nearly Four-Year Longitudinal Study of Search-Engine PoisoningNektarios Leontiadis, Tyler Moore, Nicolas Christin. 930-941 [doi]
- From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and DisinformationFrederico Araujo, Kevin W. Hamlen, Sebastian Biedermann, Stefan Katzenbeisser. 942-953 [doi]
- A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM EmanationYu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, Hideaki Sone. 954-965 [doi]
- Quantifying Web-Search PrivacyArthur Gervais, Reza Shokri, Adish Singla, Srdjan Capkun, Vincent Lenders. 966-977 [doi]
- Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging ServicesTongxin Li, Xiao-yong Zhou, Luyi Xing, Yeonjoon Lee, Muhammad Naveed, Xiaofeng Wang, Xinhui Han. 978-989 [doi]
- Cross-Tenant Side-Channel Attacks in PaaS CloudsYinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart. 990-1003 [doi]
- Characterization of Real-Life PRNGs under Partial State CorruptionMario Cornejo, Sylvain Ruhault. 1004-1015 [doi]
- Synthesis of Fault Attacks on Cryptographic ImplementationsGilles Barthe, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Jean-Christophe Zapalowicz. 1016-1027 [doi]
- ShadowCrypt: Encrypted Web Applications for EveryoneWarren He, Devdatta Akhawe, Sumeet Jain, Elaine Shi, Dawn Xiaodong Song. 1028-1039 [doi]
- Structural Data De-anonymization: Quantification, Practice, and ImplicationsShouling Ji, Weiqing Li, Mudhakar Srivatsa, Raheem A. Beyah. 1040-1053 [doi]
- RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal ResponseÚlfar Erlingsson, Vasyl Pihur, Aleksandra Korolova. 1054-1067 [doi]
- PrivEx: Private Collection of Traffic Statistics for Anonymous Communication NetworksTariq Elahi, George Danezis, Ian Goldberg. 1068-1079 [doi]
- Automating Information Flow Analysis of Low Level CodeMusard Balliu, Mads Dam, Roberto Guanciale. 1080-1091 [doi]
- Collaborative Verification of Information Flow for a High-Assurance App StoreMichael D. Ernst, René Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, Edward XueJun Wu. 1092-1104 [doi]
- Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency GraphsMu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao. 1105-1116 [doi]
- An Epidemiological Study of Malware Encounters in a Large EnterpriseTing-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels. 1117-1130 [doi]
- PixelVault: Using GPUs for Securing Cryptographic OperationsGiorgos Vasiliadis, Elias Athanasopoulos, Michalis Polychronakis, Sotiris Ioannidis. 1131-1142 [doi]
- Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful AttackersSascha Fahl, Sergej Dechand, Henning Perl, Felix Fischer, Jaromir Smrcek, Matthew Smith. 1143-1155 [doi]
- Privacy Beyond ConfidentialityChristopher W. Clifton. 1156 [doi]
- Fail-Secure Access ControlPetar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin. 1157-1168 [doi]
- World-Driven Access Control for Continuous SensingFranziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, Helen J. Wang. 1169-1181 [doi]
- Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access DecisionsWen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick Lawlor, David M. Liebovitz, Bradley Malin. 1182-1192 [doi]
- Multi-Stage Key Exchange and the Case of Google's QUIC ProtocolMarc Fischlin, Felix Günther. 1193-1204 [doi]
- Algebraic MACs and Keyed-Verification Anonymous CredentialsMelissa Chase, Sarah Meiklejohn, Greg Zaverucha. 1205-1216 [doi]
- Security Analyses of Click-based Graphical Passwords via Image Point MemorabilityBin B. Zhu, Jeff Yan, Dongchen Wei, Maowei Yang. 1217-1231 [doi]
- S3: A Symbolic String Solver for Vulnerability Detection in Web ApplicationsMinh-Thai Trinh, Duc-Hiep Chu, Joxan Jaffar. 1232-1243 [doi]
- ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network TracesChristopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms. 1244-1255 [doi]
- Moving Targets: Security and Rapid-Release in FirefoxSandy Clark, Michael Collis, Matt Blaze, Jonathan M. Smith. 1256-1266 [doi]
- System-level Non-interference for Constant-time CryptographyGilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Daniel Luna, David Pichardie. 1267-1279 [doi]
- Controlled Functional EncryptionMuhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter. 1280-1291 [doi]
- Formatted Encryption Beyond Regular LanguagesDaniel Luchaup, Thomas Shrimpton, Thomas Ristenpart, Somesh Jha. 1292-1303 [doi]
- VerSum: Verifiable Computations over Large Public LogsJelle van den Hooff, M. Frans Kaashoek, Nickolai Zeldovich. 1304-1316 [doi]
- RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow IntegrityBen Niu, Gang Tan. 1317-1328 [doi]
- Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android AppsFengguo Wei, Sankardas Roy, Xinming Ou, Robby. 1329-1341 [doi]
- You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable CodeMichael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny. 1342-1353 [doi]
- AutoCog: Measuring the Description-to-permission Fidelity in Android ApplicationsZhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen. 1354-1365 [doi]
- A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split KernelAnil Kurmus, Robby Zippel. 1366-1377 [doi]
- Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet InspectionLorenzo De Carli, Robin Sommer, Somesh Jha. 1378-1390 [doi]
- The UNIX Process Identity Crisis: A Standards-Driven Approach to SetuidMark S. Dittmer, Mahesh V. Tripunitara. 1391-1402 [doi]
- Blind Recognition of Touched Keys on Mobile DevicesQinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao. 1403-1414 [doi]
- POSTER: When and How to Implicitly Authenticate Smartphone UsersAaron Atwater, Hassan Khan, Urs Hengartner. 1415-1417 [doi]
- POSTER: Password Entering and Transmission SecurityGamze Canova, Melanie Volkamer, Simon Weiler. 1418-1420 [doi]
- POSTER: A Hybrid Botnet Ecological EnvironmentDai Yumei, Liang Yu, Li Ke. 1421-1423 [doi]
- POSTER: Analysis and Comparison of Secure Localization Schemes for Intelligent Transportation SystemsBhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin Heaslip. 1424-1426 [doi]
- POSTER: Positioning Attack on Proximity-Based People DiscoveryHuan Feng, Kang G. Shin. 1427-1429 [doi]
- POSTER: Euclidean Distance Based Encryption: How to Embed Fuzziness in Biometric Based EncryptionFuchun Guo, Willy Susilo, Yi Mu. 1430-1432 [doi]
- POSTER: Seven Years in MWS: Experiences of Sharing Datasets with Anti-malware Research Community in JapanMitsuhiro Hatada, Masato Terada, Tatsuya Mori. 1433-1435 [doi]
- POSTER: Scanning-free Personalized Malware Warning System by Learning Implicit Feedback from Detection LogsJyun-Yu Jiang, Chun-Liang Li, Chun-Pai Yang, Chung-Tsai Su. 1436-1438 [doi]
- POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection AttacksLei Jin, Balaji Palanisamy, James B. D. Joshi. 1439-1441 [doi]
- POSTER: Security Control System Enabling to Keep an Intra-LAN in a Secure State Using Security-and-Performance Ratio Control PoliciesYutaka Juba, Hung-Hsuan Huang, Kyoji Kawagoe. 1442-1444 [doi]
- POSTER: Enhancing Security and Privacy with Google GlassJohannes Krupp, Dominique Schröder, Mark Simkin. 1445-1447 [doi]
- POSTER: Proactive Blacklist Update for Anti-PhishingLung-Hao Lee, Kuei-Ching Lee, Hsin-Hsi Chen, Yuen-Hsien Tseng. 1448-1450 [doi]
- POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message TransmittingDong Li, Fangjiao Zhang, Chaoge Liu. 1451-1453 [doi]
- POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing SystemKe Li, Chaoge Liu, Xiang Cui. 1454-1456 [doi]
- POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of PasswordsXiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng. 1457-1459 [doi]
- POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical ResultsXiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng. 1460-1462 [doi]
- POSTER: Study of Software Plugin-based MalwareYu Liang, Zhiqiao Li, Xiang Cui. 1463-1465 [doi]
- POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual MachineJie Lin, Chuanyi Liu, Binxing Fang. 1466-1468 [doi]
- POSTER: Fingerprinting the Publicly Available SandboxesKe Liu, Shuai Lu, Chaoge Liu. 1469-1471 [doi]
- POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with PersonalizationQixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang. 1472-1474 [doi]
- POSTER: A Proactive Cloud-Based Cross-Reference Forensic FrameworkZhenbang Liu, Hengming Zou. 1475-1477 [doi]
- POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family ClassificationHesham Mekky, Aziz Mohaisen, Zhi-Li Zhang. 1478-1480 [doi]
- Demo Overview: Privacy-Enhancing Features of IdentiDroidDaniele Midi, Oyindamola Oluwatimi, Bilal Shebaro, Elisa Bertino. 1481-1483 [doi]
- POSTER: Android System Broadcast Actions Broadcasts Your PrivacyFadi Mohsen, Mohamed Shehab, Emmanuel Bello-Ogunu, Abeer Al Jarrah. 1484-1486 [doi]
- POSTER: TLS Proxies: Friend or Foe?Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala. 1487-1489 [doi]
- POSTER: Efficient Ciphertext Policy Attribute Based Encryption Under Decisional Linear AssumptionTran Viet Xuan Phuong, Guomin Yang, Willy Susilo. 1490-1492 [doi]
- POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application ProgramsAsmaa Sallam, Elisa Bertino. 1493-1495 [doi]
- POSTER: Misuseablity Analysis for IT InfrastructureAsaf Shabtai, Yuval Elovici. 1496-1498 [doi]
- POSTER: On the Resilience of DNS InfrastructureHaya Shulman, Shiran Ezra. 1499-1501 [doi]
- POSTER: Quasi-ID: In fact, I am a humanMilivoj Simeonovski. 1502-1504 [doi]
- POSTER: A Measurement Framework to Quantify Software ProtectionsPaolo Tonella, Mariano Ceccato, Bjorn De Sutter, Bart Coppens. 1505-1507 [doi]
- POSTER: Analyzing Access Control Policies with SMTFatih Turkmen, Jerry den Hartog, Nicola Zannone. 1508-1510 [doi]
- POSTER: How Distributed Are Today's DDoS Attacks?an Wang, Wentao Chang, Aziz Mohaisen, Songqing Chen. 1511-1513 [doi]
- POSTER: AdHoneyDroid - Capture Malicious Android AdvertisementsDongqi Wang, Shuaifu Dai, Yu Ding, Tongxin Li, Xinhui Han. 1514-1516 [doi]
- POSTER: An E2E Trusted Cloud InfrastructureJuan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu. 1517-1519 [doi]
- POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IPXiaofeng Wang, Huan Zhou, Jinshu Su, Bofeng Zhang, Fan Yang. 1520-1522 [doi]
- POSTER: On the Capability of DNS Cache Poisoning AttacksZheng Wang. 1523-1525 [doi]
- POSTER: LocMask: A Location Privacy Protection Framework in Android SystemQiuyu Xiao, Jiayi Chen, Le Yu, Huaxin Li, Haojin Zhu, Muyuan Li, Kui Ren. 1526-1528 [doi]
- POSTER: UAFChecker: Scalable Static Detection of Use-After-Free VulnerabilitiesJiayi Ye, Chao Zhang, Xinhui Han. 1529-1531 [doi]
- POSTER: Mining Elephant Applications in Unknown Traffic by Service ClusteringHongliang Yu, Yong Zhao, Gang Xiong, Li Guo, Zhen Li, Yong Wang. 1532-1534 [doi]
- POSTER: Efficient Method for Disjunctive and Conjunctive Keyword Search over Encrypted DataYu Zhang, Songfeng Lu. 1535-1537 [doi]
- Integrity, Consistency, and Verification of Remote ComputationChristian Cachin. 1538-1539 [doi]
- Tutorial: Text Analytics for SecurityWilliam Enck, Tao Xie. 1540-1541 [doi]
- Client-Controlled Cloud EncryptionFlorian Kerschbaum. 1542-1543 [doi]
- Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and AutomationEhab Al-Shaer, Krishna Kant. 1544-1545 [doi]
- WPES 2014: 13th Workshop on Privacy in the Electronic SocietyGail-Joon Ahn, Anupam Datta. 1546-1547 [doi]
- Fourth International Workshop on Trustworthy Embedded Devices (TrustED 2014)Frederik Armknecht, Jorge Guajardo. 1548-1549 [doi]
- MTD 2014: First ACM Workshop on Moving Target DefenseSushil Jajodia, Kun Sun. 1550-1551 [doi]
- WISCS 2014: The First ACM Workshop on Information Sharing & Collaborative SecurityTomas Sander. 1552-1553 [doi]
- SIW 2014: First Workshop on Security Information WorkersEmerson R. Murphy-Hill, Heather Richter Lipford, Bill Chu, Robert Biddle. 1554 [doi]
- Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and SecurityChristos Dimitrakakis, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein. 1555 [doi]
- Second Smart Energy Grid Security Workshop (SEGS 2014)Klaus Kursawe, Benessa Defend. 1556-1557 [doi]
- CCS'14 Co-Located Workshop Summary for SPSM 2014Kapil Singh, Zhenkai Liang. 1558-1559 [doi]
- CCSW 2014: Sixth ACM Cloud Computing Security WorkshopAlina Oprea, Reihaneh Safavi-Naini. 1560-1561 [doi]