Abstract is missing.
- Hardware Trojans and Other Threats against Embedded SystemsChristof Paar. 1 [doi]
- Advanced Security Research in the Era of the Internet of ThingsGregory Akers. 2 [doi]
- CoverUp: Privacy Through "Forced" Participation in Anonymous Communication NetworksDavid Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, Srdjan Capkun. 3 [doi]
- Control-Flow Hijacking: Are We Making Progress?Mathias Payer. 4 [doi]
- Security in Personal Genomics: Lest We ForgetGene Tsudik. 5 [doi]
- The Case for System Command EncryptionMarc Beunardeau, Aisling Connolly, Rémi Géraud, David Naccache. 6 [doi]
- Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà VuSanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang. 7-18 [doi]
- SGX-Log: Securing System Logs With SGXVishal Karande, Erick Bauman, Zhiqiang Lin, Latifur Khan. 19-30 [doi]
- The Circle Game: Scalable Private Membership Test Using Trusted HardwareSandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas, N. Asokan. 31-44 [doi]
- To Update or Not to Update: Insights From a Two-Year Study of Android App EvolutionVincent F. Taylor, Ivan Martinovic. 45-57 [doi]
- Toward Detecting Collusive Ranking Manipulation Attackers in Mobile App MarketsHao Chen, Daojing He, Sencun Zhu, Jingshun Yang. 58-70 [doi]
- Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app CommunicationsAmiangshu Bosu, Fang Liu, Danfeng (Daphne) Yao, Gang Wang. 71-85 [doi]
- Lightweight Swarm Attestation: A Tale of Two LISA-sXavier Carpent, Karim El Defrawy, Norrathep Rattanavipanon, Gene Tsudik. 86-100 [doi]
- Model-based Attack Detection Scheme for Smart Water Distribution NetworksChuadhry Mujeeb Ahmed, Carlos Murguia, Justin Ruths. 101-113 [doi]
- Towards Formal Security Analysis of Industrial Control SystemsMarco Rocchetto, Nils Ole Tippenhauer. 114-126 [doi]
- Memory Safety for Embedded Devices with nesCheckDaniele Midi, Mathias Payer, Elisa Bertino. 127-139 [doi]
- Strict Virtual Call Integrity Checking for C++ BinariesMohamed Elsabagh, Dan Fleck, Angelos Stavrou. 140-154 [doi]
- BinSequence: Fast, Accurate and Scalable Binary Code Reuse DetectionHe Huang, Amr M. Youssef, Mourad Debbabi. 155-166 [doi]
- PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption AttacksQuan Chen, Ahmed M. Azab, Guruprasad Ganesh, Peng Ning. 167-178 [doi]
- Breaking Ad-hoc Runtime Integrity Protection Mechanisms in Android Financial AppsTaehun Kim, Hyeonmin Ha, Seoyoon Choi, Jaeyeon Jung, Byung-Gon Chun. 179-192 [doi]
- DataShield: Configurable Data Confidentiality and IntegrityScott A. Carr, Mathias Payer. 193-204 [doi]
- Functional Encryption with Oblivious HelperPierre-Alain Dupont, David Pointcheval. 205-214 [doi]
- Mis-operation Resistant Searchable Homomorphic EncryptionKeita Emura, Takuya Hayashi 0001, Noboru Kunihiro, Jun Sakuma. 215-229 [doi]
- A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast DecryptionQutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh. 230-240 [doi]
- On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness FailuresJacob C. N. Schuldt, Kazumasa Shinagawa. 241-252 [doi]
- DoS Attacks on Your Memory in CloudTianwei Zhang, Yinqian Zhang, Ruby B. Lee. 253-265 [doi]
- Side Channels in Deduplication: Trade-offs between Leakage and EfficiencyFrederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani. 266-274 [doi]
- Sharing Proofs of Retrievability across TenantsFrederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan Karame. 275-287 [doi]
- Cache-Based Application Detection in the Cloud Using Machine LearningBerk Gülmezoglu, Thomas Eisenbarth, Berk Sunar. 288-300 [doi]
- VTBPEKE: Verifier-based Two-Basis Password Exponential Key ExchangeDavid Pointcheval, Guilin Wang. 301-312 [doi]
- Boosting the Guessing Attack Performance on Android Lock Patterns with Smudge AttacksSeunghun Cha, Sungsu Kwag, Hyoungshick Kim, Jun Ho Huh. 313-326 [doi]
- What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart GlassesYan Li, Yao Cheng, Yingjiu Li, Robert H. Deng. 327-333 [doi]
- Pinpointing VulnerabilitiesYue Chen, Mustakimur Khandaker, Zhi Wang. 334-345 [doi]
- Extracting Conditional Formulas for Cross-Platform Bug SearchQian Feng, Minghua Wang, Mu Zhang, Rundong Zhou, Andrew Henderson, Heng Yin. 346-359 [doi]
- Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based TestingMathy Vanhoef, Domien Schepers, Frank Piessens. 360-371 [doi]
- Understanding Human-Chosen PINs: Characteristics, Distribution and SecurityDing Wang, Qianchen Gu, Xinyi Huang, Ping Wang. 372-385 [doi]
- Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and MetricsSimon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic. 386-399 [doi]
- Pass-O: A Proposal to Improve the Security of Pattern Unlock SchemeHarshal Tupsamudre, Vijayanand Banahatti, Sachin Lodha, Ketan Vyas. 400-407 [doi]
- Proofs of Data Residency: Checking whether Your Cloud Files Have Been RelocatedHung Dang, Erick Purwanto, Ee-Chien Chang. 408-422 [doi]
- EncKV: An Encrypted Key-value Store with Rich QueriesXingliang Yuan, Yu Guo, Xinyu Wang, Cong Wang, Baochun Li, Xiaohua Jia. 423-435 [doi]
- MoPS: A Modular Protection Scheme for Long-Term StorageChristian Weinert, Denise Demirel, Martín A. Gagliotti Vigil, Matthias Geihs, Johannes A. Buchmann. 436-448 [doi]
- Updatable Block-Level Message-Locked EncryptionYongjun Zhao, Sherman S. M. Chow. 449-460 [doi]
- LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and ConfidentialityJohannes Braun 0001, Johannes A. Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda. 461-468 [doi]
- Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language GenerationShahryar Baki, Rakesh M. Verma, Arjun Mukherjee, Omprakash Gnawali. 469-482 [doi]
- On the Detection of Kernel-Level Rootkits Using Hardware Performance CountersBaljit Singh, Dmitry Evtyushkin, Jesse Elwell, Ryan Riley, Iliano Cervesato. 483-493 [doi]
- Gossip: Automatically Identifying Malicious Domains from Mailing List DiscussionsCheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna. 494-505 [doi]
- Practical Black-Box Attacks against Machine LearningNicolas Papernot, Patrick D. McDaniel, Ian J. Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami. 506-519 [doi]
- Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender RevocationAlexandra Dmitrienko, David Noack, Moti Yung. 520-531 [doi]
- Privacy-preserving and Optimal Interval Release for Disease SusceptibilityKosuke Kusano, Ichiro Takeuchi, Jun Sakuma. 532-545 [doi]
- Towards Extending Noiseless Privacy: Dependent Data and More Practical ApproachKrzysztof Grining, Marek Klonowski. 546-560 [doi]
- BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted TrafficSébastien Canard, Aïda Diop, Nizar Kheir, Marie Paindavoine, Mohamed Sabt. 561-574 [doi]
- The Role of Hosting Providers in Fighting Command and Control Infrastructure of Financial MalwareSamaneh Tajalizadehkhoob, Carlos Gañán, Arman Noroozian, Michel van Eeten. 575-586 [doi]
- Automatically Inferring Malware Signatures for Anti-Virus Assisted AttacksChristian Wressnegger, Kevin Freeman, Fabian Yamaguchi, Konrad Rieck. 587-598 [doi]
- PayBreak: Defense Against Cryptographic RansomwareEugene Kolodenker, William Koch, Gianluca Stringhini, Manuel Egele. 599-611 [doi]
- SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced AndroidRuowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng. 612-624 [doi]
- Android Database Attacks RevisitedBehnaz Hassanshahi, Roland H. C. Yap. 625-639 [doi]
- TriFlow: Triaging Android Applications using Speculative Information FlowsOmid Mirzaei, Guillermo Suarez-Tangil, Juan E. Tapiador, José María de Fuentes. 640-651 [doi]
- Secure Integration of Web Content and Applications on Commodity Mobile Operating SystemsDrew Davidson, Yaohui Chen, Franklin George, Long Lu, Somesh Jha. 652-665 [doi]
- DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic LoggingXingzi Yuan, Omid Setayeshfar, Hongfei Yan, Pranav Panage, Xuetao Wei, Kyu Hyung Lee. 666-677 [doi]
- DroidPill: Pwn Your Daily-Use AppsChaoting Xuan, Gong Chen, Erich Stuntebeck. 678-689 [doi]
- Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected PrimitivesThomas Unterluggauer, Mario Werner, Stefan Mangard. 690-702 [doi]
- Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IPAlberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik. 703-715 [doi]
- Hit by the Bus: QoS Degradation Attack on AndroidMehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar. 716-727 [doi]
- DRIVE: Dynamic Runtime Integrity Verification and EvaluationAndre Rein. 728-742 [doi]
- An Attack Against Message Authentication in the ERTMS Train to Trackside Communication ProtocolsTom Chothia, Mihai Ordean, Joeri de Ruiter, Richard J. Thomas. 743-756 [doi]
- Using Program Analysis to Synthesize Sensor Spoofing AttacksIvan Pustogarov, Thomas Ristenpart, Vitaly Shmatikov. 757-770 [doi]
- SCM: Secure Code Memory ArchitectureRuan de Clercq, Ronald De Keulenaer, Pieter Maene, Bart Preneel, Bjorn De Sutter, Ingrid Verbauwhede. 771-776 [doi]
- Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient ConstructionKeita Emura, Takuya Hayashi 0001, Ai Ishida. 777-788 [doi]
- Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption AlgorithmsJiqiang Lu. 789-799 [doi]
- A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding ProtocolGildas Avoine, Xavier Bultel, Sébastien Gambs, David Gérault, Pascal Lafourcade 0001, Cristina Onete, Jean-Marc Robert. 800-814 [doi]
- Heterogeneous Rainbow Table Widths Provide Faster CryptanalysesGildas Avoine, Xavier Carpent. 815-822 [doi]
- An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard AssumptionJongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au, Surya Nepal. 823-834 [doi]
- SECRET: On the Feasibility of a Secure, Efficient, and Collaborative Real-Time Web EditorDennis Felsch, Christian Mainka, Vladislav Mladenov, Jörg Schwenk. 835-848 [doi]
- WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined NetworksArash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha. 849-861 [doi]
- The Case for In-Network Replay SuppressionTaeho Lee, Christos Pappas, Adrian Perrig, Virgil D. Gligor, Yih-Chun Hu. 862-873 [doi]
- Taming Asymmetric Network Delays for Clock Synchronization Using Power Grid VoltageDima Rabadi, Rui Tan, David K. Y. Yau, Sreejaya Viswanathan. 874-886 [doi]
- Accurate Manipulation of Delay-based Internet GeolocationAbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot. 887-898 [doi]
- BRIDEMAID: An Hybrid Tool for Accurate Detection of Android MalwareFabio Martinelli, Francesco Mercaldo, Andrea Saracino. 899-901 [doi]
- How Discover a Malware using Model CheckingFabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone. 902-904 [doi]
- POSTER: Enabling End-Users to Protect their PrivacyMahmoud Barhamgi, Mu Yang, Chia-Mu Yu, Yijun Yu, Arosha K. Bandara, Djamal Benslimane, Bashar Nuseibeh. 905-907 [doi]
- POSTER: Detecting Inter-App Information Leakage PathsShweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur. 908-910 [doi]
- POSTER: Detection of Information Leaks via Reflection in Android AppsJyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti. 911-913 [doi]
- POSTER: Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance SystemKai Jansen, Matthias Schäfer 0002, Vincent Lenders, Christina Pöpper, Jens B. Schmitt. 914-916 [doi]
- POSTER: Traffic Analysis Attacks in Anonymity NetworksKatharina Siobhan Kohls, Christina Pöpper. 917-919 [doi]
- POSTER: Quantitative Security Assessment Method based on Entropy for Moving Target DefenseDuohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li. 920-922 [doi]
- POSTER: A Behavioral Biometric Authentication Framework on SmartphonesAhmed Mahfouz, Tarek M. Mahmoud, Ahmed Sharaf Eldin. 923-925 [doi]
- POSTER: A Secure, Practical & Safe Packet Spoofing ServiceWill Scott. 926-928 [doi]