Abstract is missing.
- Cybersecurity, Nuclear Security, Alan Turing, and Illogical LogicMartin E. Hellman. 1-2 [doi]
- On the Security and Performance of Proof of Work BlockchainsArthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun. 3-16 [doi]
- A Secure Sharding Protocol For Open BlockchainsLoi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, Prateek Saxena. 17-30 [doi]
- The Honey Badger of BFT ProtocolsAndrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song. 31-42 [doi]
- Differential Privacy as a Mutual Information ConstraintPaul Cuff, Lanqing Yu. 43-54 [doi]
- Advanced Probabilistic Couplings for Differential PrivacyGilles Barthe, Noémie Fong, Marco Gaboardi, Benjamin Grégoire, Justin Hsu, Pierre-Yves Strub. 55-67 [doi]
- Differentially Private Bayesian ProgrammingGilles Barthe, Gian Pietro Farina, Marco Gaboardi, Emilio Jesús Gallego Arias, Andy Gordon, Justin Hsu, Pierre-Yves Strub. 68-79 [doi]
- The Misuse of Android Unix Domain Sockets and Security ImplicationsYuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun Qian, Zhuoqing Morley Mao. 80-91 [doi]
- Call Me Back!: Attacks on System Server and System Apps in Android through Synchronous CallbackKai Wang, Yuqing Zhang, Peng Liu. 92-103 [doi]
- Draco: A System for Uniform and Fine-grained Access Control for Web Code on AndroidGuliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter. 104-115 [doi]
- Strong Non-Interference and Type-Directed Higher-Order MaskingGilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub, Rébecca Zucchini. 116-129 [doi]
- MERS: Statistical Test Generation for Side-Channel Analysis based Trojan DetectionYuanwen Huang, Swarup Bhunia, Prabhat Mishra. 130-141 [doi]
- Private Circuits III: Hardware Trojan-Resilience via Testing AmplificationStefan Dziembowski, Sebastian Faust, François-Xavier Standaert. 142-153 [doi]
- On the Instability of Bitcoin Without the Block RewardMiles Carlsten, Harry A. Kalodner, S. Matthew Weinberg, Arvind Narayanan. 154-167 [doi]
- Transparency Overlays and ApplicationsMelissa Chase, Sarah Meiklejohn. 168-179 [doi]
- EpicRec: Towards Practical Differentially Private Framework for Personalized RecommendationYilin Shen, Hongxia Jin. 180-191 [doi]
- Heavy Hitter Estimation over Set-Valued Data with Local Differential PrivacyZhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren. 192-203 [doi]
- AUDACIOUS: User-Driven Access Control with Unmodified Operating SystemsTalia Ringer, Dan Grossman, Franziska Roesner. 204-216 [doi]
- Mix&Slice: Efficient Access Revocation in the CloudEnrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati. 217-228 [doi]
- Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and ConsistencyIsaac C. Sheff, Tom Magrino, Jed Liu, Andrew C. Myers, Robbert van Renesse. 229-241 [doi]
- ProvUSB: Block-level Provenance-Based Data Protection for USB Storage DevicesDave (Jing) Tian, Adam M. Bates, Kevin R. B. Butler, Raju Rangaswami. 242-253 [doi]
- Making Smart Contracts SmarterLoi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor. 254-269 [doi]
- Town Crier: An Authenticated Data Feed for Smart ContractsFan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi. 270-282 [doi]
- The Ring of Gyges: Investigating the Future of Criminal Smart ContractsAri Juels, Ahmed E. Kosba, Elaine Shi. 283-295 [doi]
- DPSense: Differentially Private Crowdsourced Spectrum SensingXiaocong Jin, Rui Zhang, Yimin Chen, Tao Li, Yanchao Zhang. 296-307 [doi]
- Deep Learning with Differential PrivacyMartín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang 0001. 308-318 [doi]
- Membership Privacy in MicroRNA-based StudiesMichael Backes 0001, Pascal Berrang, Mathias Humbert, Praveen Manoharan. 319-330 [doi]
- TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTimeMingshen Sun, Tao Wei, John C. S. Lui. 331-342 [doi]
- Statistical Deobfuscation of Android ApplicationsBenjamin Bichsel, Veselin Raychev, Petar Tsankov, Martin T. Vechev. 343-355 [doi]
- Reliable Third-Party Library Detection in Android and its Security ApplicationsMichael Backes 0001, Sven Bugiel, Erik Derr. 356-367 [doi]
- Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLRDaniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard. 368-379 [doi]
- Breaking Kernel Address Space Layout Randomization with Intel TSXYeongjin Jang, Sangho Lee, Taesoo Kim. 380-392 [doi]
- Enforcing Least Privilege Memory Views for Multithreaded ApplicationsTerry Ching-Hsiang Hsu, Kevin J. Hoffman, Patrick Eugster, Mathias Payer. 393-405 [doi]
- Improvements to Secure Computation with PenaltiesRanjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan. 406-417 [doi]
- Amortizing Secure Computation with PenaltiesRanjit Kumaresan, Iddo Bentov. 418-429 [doi]
- MPC-Friendly Symmetric Key PrimitivesLorenzo Grassi 0001, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart. 430-443 [doi]
- Message-Recovery Attacks on Feistel-Based Format Preserving EncryptionMihir Bellare, Viet Tung Hoang, Stefano Tessaro. 444-455 [doi]
- On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPNKarthikeyan Bhargavan, Gaëtan Leurent. 456-467 [doi]
- A Systematic Analysis of the Juniper Dual EC IncidentStephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green 0001, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham. 468-479 [doi]
- Scalable Graph-based Bug Search for Firmware ImagesQian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, Heng Yin. 480-491 [doi]
- SmartWalk: Enhancing Social Network Security via Adaptive Random WalksYushan Liu, Shouling Ji, Prateek Mittal. 492-503 [doi]
- High Fidelity Data Reduction for Big Data Security Dependency AnalysesZhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang. 504-516 [doi]
- TypeSan: Practical Type Confusion DetectionIstván Haller, Yuseok Jeon, Hui Peng, Mathias Payer, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe. 517-528 [doi]
- CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core DumpJun Xu, Dongliang Mu, Ping Chen, Xinyu Xing, Pei Wang, Peng Liu. 529-540 [doi]
- Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit PlatformsChristian Wressnegger, Fabian Yamaguchi, Alwin Maier, Konrad Rieck. 541-552 [doi]
- Alternative Implementations of Secure Real NumbersVassil Dimitrov, Liisi Kerik, Toomas Krips, Jaak Randmets, Jan Willemson. 553-564 [doi]
- Garbling Gadgets for Boolean and Arithmetic CircuitsMarshall Ball, Tal Malkin, Mike Rosulek. 565-577 [doi]
- Optimizing Semi-Honest Secure Multiparty Computation for the InternetAner Ben-Efraim, Yehuda Lindell, Eran Omri. 578-590 [doi]
- MEMS Gyroscopes as Physical Unclonable FunctionsOliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel. 591-602 [doi]
- On the Security and Usability of Segment-based Visual Cryptographic Authentication ProtocolsTianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li. 603-615 [doi]
- Instant and Robust Authentication and Key Agreement among Mobile DevicesWei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao. 616-627 [doi]
- Measurement and Analysis of Private Key Sharing in the HTTPS EcosystemFrank Cangialosi, Taejoong Chung, David R. Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson. 628-640 [doi]
- Chainsaw: Chained Automated Workflow-based Exploit GenerationAbeer Alhuzali, Birhanu Eshete, Rigel Gjomemo, V. N. Venkatakrishnan. 641-652 [doi]
- CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world WebsitesXiang Pan, Yinzhi Cao, Shuangping Liu, Yu Zhou, Yan Chen, Tingzhe Zhou. 653-665 [doi]
- How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and BehaviorElissa M. Redmiles, Sean Kross, Michelle L. Mazurek. 666-677 [doi]
- Practical Detection of Entropy Loss in Pseudo-Random Number GeneratorsFelix Dörre, Vladimir Klebanov. 678-689 [doi]
- Build It, Break It, Fix It: Contesting Secure DevelopmentAndrew Ruef, Michael W. Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel. 690-703 [doi]
- SandScout: Automatic Detection of Flaws in iOS Sandbox ProfilesLuke Deshotels, Razvan Deaconescu, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi. 704-716 [doi]
- Computational Soundness for Dalvik BytecodeMichael Backes 0001, Robert Künnemann, Esfandiar Mohammadi. 717-730 [doi]
- SANA: Secure and Scalable Aggregate Network AttestationMoreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Gregory Neven, Ahmad-Reza Sadeghi, Matthias Schunter. 731-742 [doi]
- C-FLAT: Control-Flow Attestation for Embedded Systems SoftwareTigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik. 743-754 [doi]
- Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat IntelligenceXiaojing Liao, Kan Yuan, Xiaofeng Wang, Zhou Li, Luyi Xing, Raheem A. Beyah. 755-766 [doi]
- FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security LiteratureZiyun Zhu, Tudor Dumitras. 767-778 [doi]
- An In-Depth Study of More Than Ten Years of Java ExploitationPhilipp Holzinger, Stefan Triller, Alexandre Bartel, Eric Bodden. 779-790 [doi]
- "The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based SandboxingYaoqi Jia, Zheng-Leong Chua, Hong Hu, Shuo Chen, Prateek Saxena, Zhenkai Liang. 791-804 [doi]
- High-Throughput Semi-Honest Secure Three-Party Computation with an Honest MajorityToshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara. 805-817 [doi]
- Efficient Batched Oblivious PRF with Applications to Private Set IntersectionVladimir Kolesnikov, Ranjit Kumaresan, Mike Rosulek, Ni Trieu. 818-829 [doi]
- MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious TransferMarcel Keller, Emmanuela Orsini, Peter Scholl. 830-842 [doi]
- Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and MitigationsDmitry Evtyushkin, Dmitry V. Ponomarev. 843-857 [doi]
- Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android DevicesXiaokuan Zhang, Yuan Xiao, Yinqian Zhang. 858-870 [doi]
- A Software Approach to Defeating Side Channels in Last-Level CachesZiqiao Zhou, Michael K. Reiter, Yinqian Zhang. 871-882 [doi]
- Leave Your Phone at the Door: Side Channels that Reveal Factory Floor SecretsAvesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne S. Winslett, Carl A. Gunter, William P. King. 883-894 [doi]
- My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D PrintersChen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, Wenyao Xu. 895-907 [doi]
- The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient AudioBabins Shrestha, Maliheh Shirvanian, Prakash Shrestha, Nitesh Saxena. 908-919 [doi]
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data LeakagesKangjie Lu, Chengyu Song, Taesoo Kim, Wenke Lee. 920-932 [doi]
- iLock: Immediate and Automatic Locking of Mobile Devices against Data TheftTao Li, Yimin Chen, Jingchao Sun, Xiaocong Jin, Yanchao Zhang. 933-944 [doi]
- Hypnoguard: Protecting Secrets across Sleep-wake CyclesLianying Zhao, Mohammad Mannan. 945-957 [doi]
- 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching ProgramsKevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova 0001. 981-992 [doi]
- Λολ: Functional Lattice CryptographyEric Crockett, Chris Peikert. 993-1005 [doi]
- Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWEJoppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila. 1006-1018 [doi]
- On Code Execution Tracking via Power Side-ChannelYannan Liu, Lingxiao Wei, Zhe Zhou, Kehuan Zhang, Wenyuan Xu, Qiang Xu. 1019-1031 [doi]
- Coverage-based Greybox Fuzzing as Markov ChainMarcel Böhme, Van-Thuan Pham, Abhik Roychoudhury. 1032-1043 [doi]
- Error Handling of In-vehicle Networks Makes Them VulnerableKyong-Tak Cho, Kang G. Shin. 1044-1055 [doi]
- Using Reflexive Eye Movements for Fast Challenge-Response AuthenticationIvo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic. 1056-1067 [doi]
- When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi SignalsMengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan. 1068-1079 [doi]
- VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on SmartphonesLinghan Zhang, Sheng Tan, Jie Yang 0003, Yingying Chen 0001. 1080-1091 [doi]
- Limiting the Impact of Stealthy Attacks on Industrial Control SystemsDavid I. Urbina, Jairo Alonso Giraldo, Alvaro A. Cárdenas, Nils Ole Tippenhauer, Junia Valente, Mustafa Amir Faisal, Justin Ruths, Richard Candell, Henrik Sandberg. 1092-1105 [doi]
- Over-The-Top Bypass: Study of a Recent Telephony FraudMerve Sahin, Aurélien Francillon. 1106-1117 [doi]
- New Security Threats Caused by IMS-based SMS Service in 4G LTE NetworksGuan-Hua Tu, Chi-Yu Li, Chunyi Peng, Yuanjie Li, Songwu Lu. 1118-1130 [doi]
- POPE: Partial Order Preserving EncodingDaniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich. 1131-1142 [doi]
- ∑oφoς: Forward Secure Searchable EncryptionRaphael Bost. 1143-1154 [doi]
- What Else is Revealed by Order-Revealing Encryption?F. Betül Durak, Thomas M. DuBuisson, David Cash. 1155-1166 [doi]
- Order-Revealing Encryption: New Constructions, Applications, and Lower BoundsKevin Lewi, David J. Wu. 1167-1178 [doi]
- Practical Anonymous Password Authentication and TLS with Anonymous Client AuthenticationZhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang. 1179-1191 [doi]
- Efficient Cryptographic Password Hardening Services from Partially Oblivious CommitmentsJonas Schneider, Nils Fleischhacker, Dominique Schröder, Michael Backes 0001. 1192-1203 [doi]
- A Comprehensive Formal Security Analysis of OAuth 2.0Daniel Fett, Ralf Küsters, Guido Schmitz. 1204-1215 [doi]
- An Empirical Study of Mnemonic Sentence-based Password Generation StrategiesWeining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor. 1216-1229 [doi]
- On the Security of Cracking-Resistant Password VaultsMaximilian Golla, Benedict Beuscher, Markus Dürmuth. 1230-1241 [doi]
- Targeted Online Password Guessing: An Underestimated ThreatDing Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang. 1242-1254 [doi]
- PIPSEA: A Practical IPsec Gateway on Embedded APUsJung-Ho Park, Wookeun Jung, Gangwon Jo, Ilkoo Lee, Jaejin Lee. 1255-1267 [doi]
- MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the InternetZhuotao Liu, Hao Jin, Yih-Chun Hu, Michael Bailey. 1268-1279 [doi]
- Protecting Insecure Communications with Topology-aware Network TunnelsGeorgios Kontaxis, Angelos D. Keromytis. 1280-1291 [doi]
- Function Secret Sharing: Improvements and ExtensionsElette Boyle, Niv Gilboa, Yuval Ishai. 1292-1303 [doi]
- Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced DataDario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno. 1304-1316 [doi]
- Practical Non-Malleable Codes from l-more Extractable Hash FunctionsAggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis. 1317-1328 [doi]
- Generic Attacks on Secure Outsourced DatabasesGeorgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill. 1329-1340 [doi]
- The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable EncryptionDavid Pouliot, Charles V. Wright. 1341-1352 [doi]
- Breaking Web Applications Built On Top of Encrypted DataPaul Grubbs, Richard McPherson, Muhammad Naveed, Thomas Ristenpart, Vitaly Shmatikov. 1353-1364 [doi]
- Content Security Problems?: Evaluating the Effectiveness of Content Security Policy in the WildStefano Calzavara, Alvise Rabitti, Michele Bugliesi. 1365-1375 [doi]
- CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security PolicyLukas Weichselbaum, Michele Spagnuolo, Sebastian Lekies, Artur Janc. 1376-1387 [doi]
- Online Tracking: A 1-million-site Measurement and AnalysisSteven Englehardt, Arvind Narayanan. 1388-1401 [doi]
- PhishEye: Live Monitoring of Sandboxed Phishing KitsXiao Han, Nizar Kheir, Davide Balzarotti. 1402-1413 [doi]
- All Your DNS Records Point to Us: Understanding the Security Threats of Dangling DNS RecordsDaiping Liu, Shuai Hao, Haining Wang. 1414-1425 [doi]
- Identifying the Scan and Attack Infrastructures Behind Amplification DDoS AttacksJohannes Krupp, Michael Backes 0001, Christian Rossow. 1426-1437 [doi]
- A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)Hugo Krawczyk. 1438-1450 [doi]
- Attribute-based Key Exchange with General PoliciesVladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin. 1451-1463 [doi]
- Identity-Concealed Authenticated Encryption and Key ExchangeYunlei Zhao. 1464-1479 [doi]
- A Surfeit of SSH Cipher SuitesMartin R. Albrecht, Jean Paul Degabriele, Torben Brandt Hansen, Kenneth G. Paterson. 1480-1491 [doi]
- Systematic Fuzzing and Testing of TLS LibrariesJuraj Somorovsky. 1492-1504 [doi]
- Attacking OpenSSL Implementation of ECDSA with a Few SignaturesShuqin Fan, Wenbo Wang, Qingfeng Cheng. 1505-1515 [doi]
- Host of Troubles: Multiple Host Ambiguities in HTTP ImplementationsJianjun Chen, Jian Jiang, Hai-Xin Duan, Nicholas Weaver, Tao Wan, Vern Paxson. 1516-1527 [doi]
- Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face RecognitionMahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter. 1528-1540 [doi]
- Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious ServiceXiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, Xiaofeng Wang, Shuang Hao, Raheem A. Beyah. 1541-1552 [doi]
- Safely Measuring TorRob Jansen, Aaron Johnson. 1553-1567 [doi]
- PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-RegistrationShuang Hao, Alex Kantchelian, Brad Miller, Vern Paxson, Nick Feamster. 1568-1579 [doi]
- Stemming Downlink Leakage from Training Sequences in Multi-User MIMO NetworksYunlong Mao, Yuan Zhang, Sheng Zhong. 1580-1590 [doi]
- A Protocol for Privately Reporting Ad Impressions at ScaleMatthew Green 0001, Watson Ladd, Ian Miers. 1591-1601 [doi]
- Secure Stable Matching at ScaleJack Doerner, David Evans, Abhi Shelat. 1602-1613 [doi]
- BeleniosRF: A Non-interactive Receipt-Free Electronic Voting SchemePyrros Chaidos, Véronique Cortier, Georg Fuchsbauer, David Galindo. 1614-1625 [doi]
- ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side ChannelsDaniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom. 1626-1638 [doi]
- "Make Sure DSA Signing Exponentiations Really are Constant-Time"Cesar Pereida García, Billy Bob Brumley, Yuval Yarom. 1639-1650 [doi]
- On the Provable Security of (EC)DSA SignaturesManuel Fersch, Eike Kiltz, Bertram Poettering. 1651-1662 [doi]
- Android ION Hazard: the Curse of Customizable Memory Management SystemHang Zhang, Dongdong She, Zhiyun Qian. 1663-1674 [doi]
- Drammer: Deterministic Rowhammer Attacks on Mobile PlatformsVictor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida. 1675-1689 [doi]
- SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata LearningGeorge Argyros, Ioannis Stais, Suman Jana, Angelos D. Keromytis, Aggelos Kiayias. 1690-1701 [doi]
- Slitheen: Perfectly Imitated Decoy Routing through Traffic ReplacementCecylia Bocovich, Ian Goldberg. 1702-1714 [doi]
- Practical Censorship Evasion Leveraging Content Delivery NetworksHadi Zolfaghari, Amir Houmansadr. 1715-1726 [doi]
- GAME OF DECOYS: Optimal Decoy Routing Through Game TheoryMilad Nasr, Amir Houmansadr. 1727-1738 [doi]
- POSTER: An Educational Network Protocol for Covert Channel Analysis Using PatternsSteffen Wendzel, Wojciech Mazurczyk. 1739-1741 [doi]
- POSTER: A Behavioural Authentication System for Mobile UsersMd. Morshedul Islam, Reihaneh Safavi-Naini. 1742-1744 [doi]
- POSTER: A Keyless Efficient Algorithm for Data Protection by Means of FragmentationKatarzyna Kapusta, Gérard Memmi, Hassan Noura. 1745-1747 [doi]
- POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble PruningLingling Fan, Minhui Xue, Sen Chen, Lihua Xu, Haojin Zhu. 1748-1750 [doi]
- POSTER: Attack on Non-Linear Physical Unclonable FunctionJing Ye, Yu Hu, Xiaowei Li 0001. 1751-1753 [doi]
- POSTER: ConcurORAM: High-Throughput Parallel Multi-Client ORAMAnrin Chakraborti, Radu Sion. 1754-1756 [doi]
- POSTER: DataLair: A Storage Block Device with Plausible DeniabilityAnrin Chakraborti, Chen Chen, Radu Sion. 1757-1759 [doi]
- POSTER: DroidShield: Protecting User Applications from Normal World AccessDarius Suciu, Radu Sion. 1760-1762 [doi]
- POSTER: Efficient Cross-User Chunk-Level Client-Side Data Deduplication with Symmetrically Encrypted Two-Party InteractionsChia-Mu Yu. 1763-1765 [doi]
- POSTER: Fingerprinting Tor Hidden ServicesAsya Mitseva, Andriy Panchenko, Fabian Lanze, Martin Henze, Klaus Wehrle, Thomas Engel. 1766-1768 [doi]
- POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content StoreRoman Matzutt, Oliver Hohlfeld, Martin Henze, Robin Rawiel, Jan Henrik Ziegeldorf, Klaus Wehrle. 1769-1771 [doi]
- POSTER: Identifying Dynamic Data Structures in MalwareThomas Rupprecht, Xi Chen, David H. White 0001, Jan Tobias Mühlberg, Herbert Bos, Gerald Lüttgen. 1772-1774 [doi]
- POSTER: Improved Markov Strength Meters for PasswordsHarshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha. 1775-1777 [doi]
- POSTER: Insights of Antivirus Relationships when Detecting Android Malware: A Data Analytics ApproachIgnacio Martín, José Alberto Hernández, Sergio de los Santos, Antonio Guzmán. 1778-1780 [doi]
- POSTER: KXRay: Introspecting the Kernel for Rootkit Timing FootprintsChen Chen, Darius Suciu, Radu Sion. 1781-1783 [doi]
- POSTER: Locally Virtualized Environment for Mitigating Ransomware ThreatManish Shukla 0001, Sutapa Mondal, Sachin Lodha. 1784-1786 [doi]
- POSTER: Mapping the Landscape of Large-Scale Vulnerability NotificationsBen Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes 0001. 1787-1789 [doi]
- POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual SimilarityOmid Asudeh, Mathew Wright. 1790-1792 [doi]
- POSTER: Privacy Enhanced Secure Location VerificationMd. Mamunur Rashid Akand, Reihaneh Safavi-Naini. 1793-1795 [doi]
- POSTER: Re-Thinking Risks and Rewards for Trusted Third PartiesJan-Ole Malchow, Benjamin Güldenring, Volker Roth 0002. 1796-1798 [doi]
- POSTER: RIA: an Audition-based Method to Protect the Runtime Integrity of MapReduce ApplicationsYongzhi Wang, Yulong Shen. 1799-1801 [doi]
- POSTER: Security Enhanced Administrative Role Based Access Control ModelsP. V. Rajkumar, Ravi S. Sandhu. 1802-1804 [doi]
- POSTER: (Semi)-Supervised Machine Learning Approaches for Network Security in High-Dimensional Network DataPedro Casas, Alessandro D'Alconzo, Giuseppe Settanni, Pierdomenico Fiadino, Florian Skopik. 1805-1807 [doi]
- POSTER: Static ROP Chain Detection Based on Hidden Markov Model Considering ROP Chain IntegrityToshinori Usui, Tomonori Ikuse, Makoto Iwamura, Takeshi Yada. 1808-1810 [doi]
- POSTER: The ART of App CompartmentalizationMichael Backes 0001, Sven Bugiel, Jie Huang, Oliver Schranz. 1811-1813 [doi]
- POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox LogsBo Sun, Akinori Fujino, Tatsuya Mori. 1814-1816 [doi]
- POSTER: Towards Collaboratively Supporting Decision Makers in Choosing Suitable Authentication SchemesPeter Mayer, Stephan Neumann, Melanie Volkamer. 1817-1819 [doi]
- POSTER: Towards Exposing Internet of Things: A RoadmapVinay Sachidananda, Jinghui Toh, Shachar Siboni, Asaf Shabtai, Yuval Elovici. 1820-1822 [doi]
- POSTER: Towards Highly Interactive Honeypots for Industrial Control SystemsStephan Lau, Johannes Klick, Stephan Arndt, Volker Roth 0002. 1823-1825 [doi]
- POSTER: Towards Privacy-Preserving Biometric Identification in Cloud ComputingChanghee Hahn, Junbeom Hur. 1826-1828 [doi]
- POSTER: VUDEC: A Framework for Vulnerability Management in Decentralized Communication NetworksMichael Steinke, Stefan Metzger, Wolfgang Hommel. 1829-1831 [doi]
- POSTER: Weighing in eHealth SecurityMartin Krämer, David Aspinall 0001, Maria Wolters. 1832-1834 [doi]
- POSTER: WiPING: Wi-Fi signal-based PIN Guessing attackSeunghun Cha, Jaewoo Park, Geumhwan Cho, Jun Ho Huh, Hyoungshick Kim. 1835-1837 [doi]
- DEMO: Easy Deployment of a Secure Internet Architecture for the 21st Century: How hard can it be to build a secure Internet?Ercan Ucan, Raphael M. Reischuk, Adrian Perrig. 1838-1840 [doi]
- DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket GenerationToshinori Araki, Assaf Barak, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara. 1841-1843 [doi]
- DEMO: Integrating MPC in Big Data WorkflowsNikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, Azer Bestavros. 1844-1846 [doi]
- DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-BankingDenis Migdal, Christian Johansen, Audun Jøsang. 1847-1849 [doi]
- DEMO: Starving Permission-Hungry Android Apps Using SecuRankVincent F. Taylor, Ivan Martinovic. 1850-1852 [doi]
- Program Anomaly Detection: Methodology and PracticesXiaokui Shu, Danfeng Yao. 1853-1854 [doi]
- Security on Wheels: Security and Privacy for Vehicular Communication SystemsPanos Papadimitratos. 1855-1856 [doi]
- Condensed Cryptographic Currencies Crash Course (C5)Aljosha Judmayer, Edgar R. Weippl. 1857-1858 [doi]
- Introduction to Credit Networks: Security, Privacy, and ApplicationsAniket Kate. 1859-1860 [doi]
- On the Security and Scalability of Bitcoin's BlockchainGhassan Karame. 1861-1862 [doi]
- Privacy and Security in the Genomic EraErman Ayday, Jean-Pierre Hubaux. 1863-1865 [doi]
- Adversarial Data Mining: Big Data Meets Cyber SecurityMurat Kantarcioglu, Bowei Xi. 1866-1867 [doi]
- MTD 2016: Third ACM Workshop on Moving Target DefensePeng Liu 0005, Cliff Wang. 1868-1869 [doi]
- PLAS'16: ACM SIGPLAN 11th Workshop on Programming Languages and Analysis for SecurityToby C. Murray, Deian Stefan. 1870 [doi]
- SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber SystemsNicholas J. Multari, Anoop Singhal, David O. Manz. 1871-1872 [doi]
- Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016)Long Lu, Mohammad Mannan. 1873-1874 [doi]
- Theory of Implementation Security Workshop (TIs 2016)Begül Bilgin, Svetla Nikova, Vincent Rijmen. 1875-1876 [doi]
- WISCS'16: The 3rd ACM Workshop on Information Sharing and Collaborative SecurityFlorian Kerschbaum, Erik-Oliver Blass, Tomas Sander. 1877-1878 [doi]
- 15th Workshop on Privacy in the Electronic Society (WPES 2016)Sabrina De Capitani di Vimercati. 1879-1880 [doi]
- 9th International Workshop on Artificial Intelligence and Security: AISec 2016David Mandell Freeman, Katerina Mitrokotsa, Arunesh Sinha. 1881 [doi]
- CCSW'16: 8th ACM Cloud Computing Security WorkshopElli Androulaki, Michael K. Reiter. 1882-1883 [doi]
- Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16)Alvaro A. Cérdenas, Rakesh B. Bobba. 1884-1885 [doi]
- 2nd International Workshop on Software Protection: SPRO 2016Brecht Wyseur, Bjorn De Sutter. 1886-1887 [doi]
- Sixth International Workshop on Trustworthy Embedded Devices (TrustED 2016)Xinxin Fan, Tim Güneysu. 1888-1890 [doi]
- MIST 2016: 8th International Workshop on Managing Insider Security ThreatsIlsun You, Elisa Bertino. 1890-1891 [doi]