Abstract is missing.
- Fighting malicious code: an eternal struggleChristopher Kruegel. 1 [doi]
- Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperatureFabian Lanze, Andriy Panchenko, Benjamin Braatz, Thomas Engel. 3-14 [doi]
- Covert ephemeral communication in named data networkingMoreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik. 15-26 [doi]
- Scanner hunter: understanding HTTP scanning trafficGuowu Xie, Huy Hang, Michalis Faloutsos. 27-38 [doi]
- Detection of stealthy malware activities with traffic causality and scalable triggering relation discoveryHao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan. 39-50 [doi]
- Towards automated protocol reverse engineering using semantic informationGeorges Bossert, Frédéric Guihéry, Guillaume Hiet. 51-62 [doi]
- 3: relay reliability reputation for anonymity systemsAnupam Das, Nikita Borisov, Prateek Mittal, Matthew Caesar. 63-74 [doi]
- Design and evaluation of persea, a sybil-resistant DHTMahdi Nasrullah Al-Ameen, Matthew Wright. 75-86 [doi]
- OTIT: towards secure provenance modeling for location proofsRasib Khan, Shams Zawoad, Munirul M. Haque, Ragib Hasan. 87-98 [doi]
- Privacy-preserving distance computation and proximity testing on earth, done rightJaroslav Sedenka, Paolo Gasti. 99-110 [doi]
- Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based indexBoyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li. 111-122 [doi]
- Privacy of outsourced k-means clusteringDongxi Liu, Elisa Bertino, Xun Yi. 123-134 [doi]
- PIDGIN: privacy-preserving interest and content sharing in opportunistic networksMuhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello. 135-146 [doi]
- S-ORAM: a segmentation-based oblivious RAMJinsheng Zhang, Wensheng Zhang 0001, Daji Qiao. 147-158 [doi]
- Differential privacy with δ-neighbourhood for spatial and dynamic datasetsChengfang Fang, Ee-Chien Chang. 159-170 [doi]
- On the effectiveness of risk prediction based on users browsing behaviorDavide Canali, Leyla Bilge, Davide Balzarotti. 171-182 [doi]
- Protecting users against XSS-based password manager abuseBen Stock, Martin Johns. 183-194 [doi]
- A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usabilityManar Mohamed, Niharika Sachdeva, Michael Georgescu, Song Gao, Nitesh Saxena, Chengcui Zhang, Ponnurangam Kumaraguru, Paul C. van Oorschot, Wei-bang Chen. 195-206 [doi]
- Modelling after-the-fact leakage for key exchangeJanaka Alawatugoda, Douglas Stebila, Colin Boyd. 207-216 [doi]
- Practical secret key agreement for full-duplex near field communicationsRong Jin, Xianru Du, Zi Deng, Kai Zeng, Jing Xu. 217-228 [doi]
- Multi-recipient encryption, revisitedAlexandre Pinto, Bertram Poettering, Jacob C. N. Schuldt. 229-238 [doi]
- Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryptionJunzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng. 239-248 [doi]
- Improved anonymous proxy re-encryption with CCA securityQingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang. 249-258 [doi]
- Efficient, context-aware privacy leakage confinement for android applications without firmware moddingMu Zhang, Heng Yin. 259-270 [doi]
- Malware detection with quantitative data flow graphsTobias Wüchner, Martín Ochoa, Alexander Pretschner. 271-282 [doi]
- Abstract model counting: a novel approach for quantification of information leaksQuoc-Sang Phan, Pasquale Malacaria. 283-292 [doi]
- ConXsense: automated context classification for context-aware access controlMarkus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan. 293-304 [doi]
- On the feasibility of software attacks on commodity virtual machine monitors via direct device assignmentGábor Pék, Andrea Lanzi, Abhinav Srivastava, Davide Balzarotti, Aurélien Francillon, Christoph Neumann. 305-316 [doi]
- After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloudSu Zhang, Xinwen Zhang, Xinming Ou. 317-328 [doi]
- Prospect: peripheral proxying supported embedded code testingMarkus Kammerstetter, Christian Platzer, Wolfgang Kastner. 329-340 [doi]
- Scanning of real-world web applications for parameter tampering vulnerabilitiesAdonis P. H. Fung, Tielei Wang, K.-W. Cheung, T. Y. Wong. 341-352 [doi]
- The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscapeGianluca Stringhini, Oliver Hohlfeld, Christopher Kruegel, Giovanni Vigna. 353-364 [doi]
- pTwitterRec: a privacy-preserving personalized tweet recommendation frameworkBisheng Liu, Urs Hengartner. 365-376 [doi]
- Shades of gray: a closer look at emails in the gray areaJelena Isacenkova, Davide Balzarotti. 377-388 [doi]
- Practical user authentication leveraging channel state information (CSI)Hongbo Liu, Yan Wang, Jian Liu, Jie Yang 0003, Yingying Chen. 389-400 [doi]
- Outsourceable two-party privacy-preserving biometric authenticationHu Chun, Yousef Elmehdwi, Feng Li, Prabir Bhattacharya, Wei Jiang. 401-412 [doi]
- Understanding OSN-based facial disclosure against face authentication systemsYan Li, Ke Xu, Qiang Yan, Yingjiu Li, Robert H. Deng. 413-424 [doi]
- Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced dataHua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi. 425-434 [doi]
- Sufficient conditions for vertical composition of security protocolsSebastian Mödersheim, Luca Viganò. 435-446 [doi]
- Evading android runtime analysis via sandbox detectionTimothy Vidas, Nicolas Christin. 447-458 [doi]
- VirtualSwindle: an automated attack against in-app billing on androidCollin Mulliner, William K. Robertson, Engin Kirda. 459-470 [doi]
- DroidRay: a security evaluation system for customized android firmwaresMin Zheng, Mingshen Sun, John C. S. Lui. 471-482 [doi]
- APKLancet: tumor payload diagnosis and purification for android applicationsWenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu. 483-494 [doi]
- How many down?: toward understanding systematic risk in networksBenjamin Johnson, Aron Laszka, Jens Grossklags. 495-500 [doi]
- Prover anonymous and deniable distance-bounding authenticationSébastien Gambs, Cristina Onete, Jean-Marc Robert. 501-506 [doi]
- Why eve and mallory (also) love webmasters: a study on the root causes of SSL misconfigurationsSascha Fahl, Yasemin Acar, Henning Perl, Matthew Smith. 507-512 [doi]
- YourPassword: applying feedback loops to improve security behavior of managing multiple passwordsTiffany Hyun-Jin Kim, H. Colleen Stuart, Hsu-Chun Hsiao, Yue-Hsun Lin, Leon Zhang, Laura Dabbish, Sara B. Kiesler. 513-518 [doi]
- Cyber defenses for physical attacks and insider threats in cloud computingJakub Szefer, Pramod A. Jamkhedkar, Diego Perez-Botero, Ruby B. Lee. 519-524 [doi]
- Monkey-in-the-browser: malware and vulnerabilities in augmented browsing script marketsSteven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen. 525-530 [doi]
- IntentFuzzer: detecting capability leaks of android applicationsKun Yang, Jianwei Zhuge, Yongke Wang, Lujue Zhou, Haixin Duan. 531-536 [doi]
- Remotely wiping sensitive data on stolen smartphonesXingjie Yu, Zhan Wang, Kun Sun, Wen Tao Zhu, Neng Gao, Jiwu Jing. 537-542 [doi]