Abstract is missing.
- Research Issues and Approaches for Connected and Automated VehiclesKang G. Shin. 1 [doi]
- Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System AccessesShagufta Mehnaz, Elisa Bertino. 3-14 [doi]
- Mining Attributed Graphs for Threat IntelligenceHugo Gascon, Bernd Grobauer, Thomas Schreck, Lukas Rist, Daniel Arp, Konrad Rieck. 15-22 [doi]
- Decompression Quines and Anti-VirusesMargaux Canet, Amrit Kumar 0001, Cédric Lauradoux, Mary-Andréa Rakotomanga, Reihaneh Safavi-Naini. 23-34 [doi]
- Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering InfrastructureShameek Bhattacharjee, Aditya Thakur, Simone Silvestri, Sajal K. Das. 35-45 [doi]
- Canonical Completeness in Lattice-Based Languages for Attribute-Based Access ControlJason Crampton, Conrad Williams. 47-58 [doi]
- Classifying and Comparing Attribute-Based and Relationship-Based Access ControlTahmina Ahmed, Ravi S. Sandhu, Jaehong Park. 59-70 [doi]
- SAMPAC: Socially-Aware collaborative Multi-Party Access ControlPanagiotis Ilia, Barbara Carminati, Elena Ferrari, Paraskevi Fragopoulou, Sotiris Ioannidis. 71-82 [doi]
- Privacy-Preserving HMM Forward ComputationJan Henrik Ziegeldorf, Jan Metzke, Jan Rüth, Martin Henze, Klaus Wehrle. 83-94 [doi]
- Share a pie?: Privacy-Preserving Knowledge Base Export through Count-min SketchesDaniele Ucci, Leonardo Aniello, Roberto Baldoni. 95-106 [doi]
- Efficient Commodity Matching for Privacy-Preserving Two-Party BarteringFabian Foerg, Susanne Wetzel, Ulrike Meyer. 107-114 [doi]
- Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star NetworksVincent Bindschaedler, Shantanu Rane, Alejandro E. Brito, Vanishree Rao, Ersin Uzun. 115-125 [doi]
- "If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud AppsHamza Harkous, Karl Aberer. 127-138 [doi]
- Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web ApplicationsAbdelouahab Amira, Abdelraouf Ouadjaout, Abdelouahid Derhab, Nadjib Badache. 139-141 [doi]
- A New Bloom Filter Structure for Searchable Encryption SchemesChi Sing Chum, Xiaowen Zhang. 143-145 [doi]
- Seamless and Secure Bluetooth LE Connection MigrationSyed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino. 147-149 [doi]
- Differentially-Private Big Data Analytics for High-Speed Research Network Traffic MeasurementOana-Georgiana Niculaescu, Mihai Maruseac, Gabriel Ghinita. 151-153 [doi]
- Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User ParticipationRakesh Verma, Ayman El Aassal. 155-157 [doi]
- Prioritized Analysis of Inter-App Communication RisksFang Liu, Haipeng Cai, Gang Wang, Danfeng (Daphne) Yao, Karim O. Elish, Barbara G. Ryder. 159-161 [doi]
- The Authorization Policy Existence ProblemPierre Bergé, Jason Crampton, Gregory Gutin, Rémi Watrigant. 163-165 [doi]
- Towards Practical Privacy-Preserving Life Cycle Assessment ComputationsCetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi. 167-169 [doi]
- The Human Capital Model for Security Research: New Insights into Technology TransitionS. Raj Rajagopalan. 171-172 [doi]
- PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor TraceYufei Gu, Qingchuan Zhao, Yinqian Zhang, Zhiqiang Lin. 173-184 [doi]
- Detecting Patching of Executables without System CallsSebastian Banescu, Mohsen Ahmadvand, Alexander Pretschner, Robert Shield, Chris Hamilton. 185-196 [doi]
- Fault Attacks on Encrypted General Purpose Compute PlatformsRobert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter. 197-204 [doi]
- Analysis of Exception-Based Control TransfersBabak Yadegari, Jon Stephens, Saumya Debray. 205-216 [doi]
- Panel: Trustworthy Data ScienceAdam Doupé. 217 [doi]
- Detecting ROP with Statistical Learning of Program CharacteristicsMohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou. 219-226 [doi]
- Large-Scale Identification of Malicious Singleton FilesBo Li, Kevin A. Roundy, Chris Gates, Yevgeniy Vorobeychik. 227-238 [doi]
- Scalable Function Call Graph-based Malware ClassificationMehadi Hassen, Philip K. Chan. 239-248 [doi]
- All Your VMs are Disconnected: Attacking Hardware Virtualized NetworkZhe Zhou, Zhou Li, Kehuan Zhang. 249-260 [doi]
- SGXIO: Generic Trusted I/O Path for Intel SGXSamuel Weiser, Mario Werner. 261-268 [doi]
- A Study of Security Vulnerabilities on Docker HubRui Shu, Xiaohui Gu, William Enck. 269-280 [doi]
- Ripple: Reflection Analysis for Android Apps in Incomplete Information EnvironmentsYifei Zhang, Tian Tan, Yue Li, Jingling Xue. 281-288 [doi]
- Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity PerceptionLuka Malisa, Kari Kostiainen, Srdjan Capkun. 289-300 [doi]
- Deep Android Malware DetectionNiall McLaughlin, Jesús Martínez del Rincón, Boojoong Kang, Suleiman Y. Yerima, Paul C. Miller, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao, Adam Doupé, Gail-Joon Ahn. 301-308 [doi]
- DroidSieve: Fast and Accurate Classification of Obfuscated Android MalwareGuillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, Lorenzo Cavallaro. 309-320 [doi]
- Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web ApplicationsLuca Compagna, Daniel Ricardo Dos Santos, Serena Elisa Ponta, Silvio Ranise. 321-328 [doi]
- Discovering Browser Extensions via Web Accessible ResourcesAlexander Sjösten, Steven Van Acker, Andrei Sabelfeld. 329-336 [doi]
- Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF)Zhiyuan Lin, Mahesh Tripunitara. 337-348 [doi]
- Secure Free-Floating Car Sharing for Offline CarsAlexandra Dmitrienko, Christian Plappert. 349-360 [doi]
- Identifying HTTPS-Protected Netflix Videos in Real-TimeAndrew Reed, Michael Kranch. 361-368 [doi]