Abstract is missing.
- DeWiCam: Detecting Hidden Wireless Cameras via SmartphonesYushi Cheng, Xiaoyu Ji, Tianyang Lu, Wenyuan Xu. 1-13 [doi]
- Leaky Wires: Information Leakage and Covert Communication Between FPGA Long WiresIlias Giechaskiel, Kasper Bonne Rasmussen, Ken Eguro. 15-27 [doi]
- HlcAuth: Key-free and Secure Communications via Home-Limited ChannelChaohao Li, Xiaoyu Ji, Xinyan Zhou, Juchuan Zhang, Jing Tian, Yanmiao Zhang, Wenyuan Xu. 29-35 [doi]
- Ciphertext Integrity with Misuse and Leakage: Definition and Efficient Constructions with Symmetric PrimitivesFrancesco Berti, François Koeune, Olivier Pereira, Thomas Peters, François-Xavier Standaert. 37-50 [doi]
- On the Memory-Hardness of Data-Independent Password-Hashing FunctionsJoël Alwen, Peter Gazi, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolinek, Michal Rybár. 51-65 [doi]
- Non-interactive and Output Expressive Private Comparison from Homomorphic EncryptionWenjie Lu, Jun-Jie Zhou, Jun Sakuma. 67-74 [doi]
- The Personal Identification Chord: A Four ButtonAuthentication System for SmartwatchesIan Oakley, Jun Ho Huh, Junsung Cho, Geumhwan Cho, Md. Rasel Islam, Hyoungshick Kim. 75-87 [doi]
- 2MA: Verifying Voice Commands via Two Microphone AuthenticationLogan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor. 89-100 [doi]
- Beat-PIN: A User Authentication Mechanism for Wearable Devices Through Secret BeatsBen Hutchins, Anudeep Reddy, Wenqiang Jin, Michael Zhou, Ming Li, Lei Yang. 101-115 [doi]
- iOracle: Automated Evaluation of Access Control Policies in iOSLuke Deshotels, Razvan Deaconescu, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi. 117-131 [doi]
- Source Attribution of Cryptographic API Misuse in Android ApplicationsIldar Muslukhov, Yazan Boshmaf, Konstantin Beznosov. 133-146 [doi]
- Don't throw me away: Threats Caused by the Abandoned Internet Resources Used by Android AppsElkana Pariwono, Daiki Chiba 0001, Mitsuaki Akiyama, Tatsuya Mori. 147-158 [doi]
- Protecting Intellectual Property of Deep Neural Networks with WatermarkingJialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian Molloy. 159-172 [doi]
- Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification AttacksShameek Bhattacharjee, Aditya V. Thakur, Sajal K. Das. 173-185 [doi]
- Detecting Malicious PowerShell Commands using Deep Neural NetworksDanny Hendler, Shay Kels, Amir Rubin. 187-197 [doi]
- Detection under Privileged InformationZ. Berkay Celik, Patrick D. McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami. 199-206 [doi]
- Entwining Sanitization and Personalization on DatabasesSébastien Gambs, Julien Lolive, Jean-Marc Robert 0001. 207-219 [doi]
- Large-Scale Privacy-Preserving Statistical Computations for Distributed Genome-Wide Association StudiesOleksandr Tkachenko, Christian Weinert, Thomas Schneider 0003, Kay Hamacher. 221-235 [doi]
- Secure Similar Sequence Query on Outsourced Genomic DataKe Cheng, Yantian Hou, Liangmin Wang. 237-251 [doi]
- A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) ComputationLiang Zhao, Liqun Chen. 253-260 [doi]
- FBSleuth: Fake Base Station Forensics via Radio Frequency FingerprintingZhou Zhuang, Xiaoyu Ji, Taimin Zhang, Juchuan Zhang, Wenyuan Xu, Zhenhua Li, Yunhao Liu. 261-272 [doi]
- Augmenting Telephone Spam Blacklists by Mining Large CDR DatasetsJienan Liu, Babak Rahbarinia, Roberto Perdisci, Haitao Du, Li Su. 273-284 [doi]
- Towards Measuring the Role of Phone Numbers in Twitter-Advertised SpamPayas Gupta, Roberto Perdisci, Mustaque Ahamad. 285-296 [doi]
- Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email ServicesDaniel Gruss, Michael Schwarz 0001, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More, Moritz Lipp. 297-311 [doi]
- Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems SecurityXavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik. 313-327 [doi]
- SALAD: Secure and Lightweight Attestation of Highly Dynamic and Disruptive NetworksFlorian Kohnhäuser, Niklas Büscher, Stefan Katzenbeisser 0001. 329-342 [doi]
- Can You Trust Your Encrypted Cloud?: An Assessment of SpiderOakONE's SecurityAnders P. K. Dalskov, Claudio Orlandi. 343-355 [doi]
- On the Strategy and Behavior of Bitcoin Mining with N-attackersHanqing Liu, Na Ruan, Rongtian Du, Weijia Jia. 357-368 [doi]
- A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow IntegrityPhilipp Zieris, Julian Horsch. 369-380 [doi]
- CUP: Comprehensive User-Space Protection for C/C++Nathan Burow, Derrick McKee, Scott A. Carr, Mathias Payer. 381-392 [doi]
- BCD: Decomposing Binary Code Into Components Using Graph-Based ClusteringVishal Karande, Swarup Chandra, Zhiqiang Lin, Juan Caballero, Latifur Khan, Kevin W. Hamlen. 393-398 [doi]
- To Intercept or Not to Intercept: Analyzing TLS Interception in Network AppliancesLouis Waked, Mohammad Mannan, Amr M. Youssef. 399-412 [doi]
- Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security ControlShang Gao, Zecheng Li, Yuan Yao, Bin Xiao 0001, Songtao Guo, Yuanyuan Yang. 413-424 [doi]
- Where's Wally?: How to Privately Discover your Friends on the InternetPanagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos. 425-430 [doi]
- You Are Your Photographs: Detecting Multiple Identities of Vendors in the Darknet MarketplacesXiangwen Wang, Peng Peng, Chun Wang, Gang Wang. 431-442 [doi]
- Investigating Web Defacement Campaigns at LargeFederico Maggi, Marco Balduzzi, Ryan Flores, Lion Gu, Vincenzo Ciancaglini. 443-456 [doi]
- Hardware Performance Counters Can Detect Malware: Myth or Fact?Boyou Zhou, Anmol Gupta, Rasoul Jahanshahi, Manuel Egele, Ajay Joshi. 457-468 [doi]
- le-git-imate: Towards Verifiable Web-based Git RepositoriesHammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos. 469-482 [doi]
- NoisePrint: Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical SystemsChuadhry Mujeeb Ahmed, Martín Ochoa, Jianying Zhou, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia, Justin Ruths. 483-497 [doi]
- Electromagnetic Induction Attacks Against Embedded SystemsJayaprakash Selvaraj, Gökçen Y?lmaz Dayanikli, Neelam Prabhu Gaunkar, David Ware, Ryan M. Gerdes, Mani Mina. 499-510 [doi]
- Sensor CON-Fusion: Defeating Kalman Filter in Signal Injection AttackShoei Nashimoto, Daisuke Suzuki, Takeshi Sugawara, Kazuo Sakiyama. 511-524 [doi]
- TABOR: A Graphical Model-based Approach for Anomaly Detection in Industrial Control SystemsQin Lin, Sridhar Adepu, Sicco Verwer, Aditya Mathur. 525-536 [doi]
- SecSAKE: Towards Secure and Efficient Outsourcing of Clinical MRI ReconstructionZihao Shan, Zhan Qin, Leslie Ying, Kui Ren 0001. 537-550 [doi]
- Highly-Efficient Fully-Anonymous Dynamic Group SignaturesDavid Derler, Daniel Slamanig. 551-565 [doi]
- Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription SystemVireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati. 567-574 [doi]
- Single Trace Attack Against RSA Key Generation in Intel SGX SSLSamuel Weiser, Raphael Spreitzer, Lukas Bodner. 575-586 [doi]
- Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU FeaturesMichael Schwarz 0001, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard. 587-600 [doi]
- Leveraging Hardware Transactional Memory for Cache Side-Channel DefensesSanchuan Chen, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, Xiaofeng Wang. 601-608 [doi]
- Cybercrime After the Sunrise: A Statistical Analysis of DNS Abuse in New gTLDsMaciej Korczynski, Maarten Wullink, Samaneh Tajalizadehkhoob, Giovane C. M. Moura, Arman Noroozian, Drew Bagley, Cristian Hesselman. 609-623 [doi]
- Who is knocking on the Telnet Port: A Large-Scale Empirical Study of Network ScanningHwanjo Heo, Seungwon Shin. 625-636 [doi]
- Towards Sustainable Evolution for the TLS Public-Key InfrastructureTaeho Lee, Christos Pappas, Pawel Szalachowski, Adrian Perrig. 637-649 [doi]
- No One In The Middle: Enabling Network Access Control Via Transparent AttributionJeremy Erickson, Qi Alfred Chen, Xiaochen Yu, Erinjen Lin, Robert Levy, Zhuoqing Morley Mao. 651-658 [doi]
- Achieving Flexibility for ABE with Outsourcing via Proxy Re-EncryptionZuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu. 659-672 [doi]
- Pseudoentropic Isometries: A New Framework for Fuzzy Extractor ReusabilityQuentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri. 673-684 [doi]
- Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssemblyNuttapong Attrapadung, Goichiro Hanaoka, Shigeo Mitsunari, Yusuke Sakai 0001, Kana Shimizu, Tadanori Teruya. 685-697 [doi]
- Isogrammic-Fusion ORAM: Improved Statistically Secure Privacy-Preserving Cloud Data Access for Thin ClientsMichael T. Goodrich. 699-706 [doi]
- Chameleon: A Hybrid Secure Computation Framework for Machine Learning ApplicationsM. Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M. Songhori, Thomas Schneider 0003, Farinaz Koushanfar. 707-721 [doi]
- A Data-driven Attack against Support Vectors of SVMShigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou, Yang Xiang 0001, Olivier Y. de Vel. 723-734 [doi]
- Efficient Repair of Polluted Machine Learning Systems via Causal UnlearningYinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, Junfeng Yang. 735-747 [doi]
- ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on AndroidRaphael Spreitzer, Felix Kirchengast, Daniel Gruss, Stefan Mangard. 749-763 [doi]
- Droid M+: Developer Support for Imbibing Android's New Permission ModelIoannis Gasparis, Azeem Aqil, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy, Rajiv Gupta 0001, Edward Colbert. 765-776 [doi]
- Dazed Droids: A Longitudinal Study of Android Inter-App VulnerabilitiesRyan Johnson 0002, Mohamed Elsabagh, Angelos Stavrou, Jeff Offutt. 777-791 [doi]
- POSTER: Understanding the Hidden Cost of Software Vulnerabilities: Measurements and PredictionsAfsah Anwar, Aminollah Khormali, Aziz Mohaisen. 793-795 [doi]
- POSTER: DeepCRACk: Using Deep Learning to Automatically CRack Audio CAPTCHAsWilliam Aiken, Hyoungshick Kim. 797-799 [doi]
- POSTER: Undetectable Task Bypassing OS Scheduler via Hardware Task SwitchingKyeong Joo Jung, Bang Hun Lee, Yeon Nam Gung, Jun-Seok Kim, Hyung-Suk Kim, Ju Seong Han, Tomaspeter Kim, Bong Jun (David) Choi. 801-803 [doi]
- POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and DefenseHyun Kwon, Hyunsoo Yoon, Daeseon Choi. 805-807 [doi]
- POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool OptimizationMuhammad Saad, My T. Thai, Aziz Mohaisen. 809-811 [doi]
- POSTER: Can We Use Biometric Authentication on Cloud?: Fingerprint Authentication Using Homomorphic EncryptionTaeyun Kim, Hyoungshick Kim. 813-815 [doi]
- POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymizationYuchen Zhao, Isabel Wagner. 817-819 [doi]
- Poster: Physics-Based Attack Detection for an Insider Threat Model in a Cyber-Physical SystemAnand Agrawal, Chuadhry Mujeeb Ahmed, Ee-Chien Chang. 821-823 [doi]
- POSTER: A Framework for Phylogenetic Analysis in Mobile EnvironmentFabio Martinelli, Francesco Mercaldo, Andrea Saracino. 825-827 [doi]
- POSTER: CPS Security Testbed Development Using Controller-in-the-MiddleSeungoh Choi, Woomyo Lee, Hyeok-Ki Shin, Jeong-Han Yun, Sin-Kyu Kim. 829-831 [doi]
- POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA SystemJusop Choi, Taekkyung Oh, William Aiken, Simon S. Woo, Hyoungshick Kim. 833-835 [doi]
- POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things DevicesHyuksang Kwon, Shahid Raza, JeongGil Ko. 837-839 [doi]
- POSTER: Mining with Proof-of-Probability in BlockchainSungmin Kim, Joongheon Kim. 841-843 [doi]
- POSTER: Address Authentication Based on Location HistoryHosung Park, Daeyong Kwon, Seungsoo Nam, Daeseon Choi. 845-847 [doi]
- POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPSHarishma Boyapally, Sikhar Patranabis, Urbi Chatterjee, Debdeep Mukhopadhyay. 849-851 [doi]