Abstract is missing.
- Managing the Crossroads of Academia and IndustryBrad Wardman. 1 [doi]
- Minimizing Privilege Assignment Errors in Cloud ServicesMatthew W. Sanders, Chuan Yue. 2-12 [doi]
- Secure Storage with Replication and Transparent DeduplicationIraklis Leontiadis, Reza Curtmola. 13-23 [doi]
- Server-Based Manipulation Attacks Against Machine Learning ModelsCong Liao, Haoti Zhong, Sencun Zhu, Anna Cinzia Squicciarini. 24-34 [doi]
- SmartProvenance: A Distributed, Blockchain Based DataProvenance SystemAravind Ramachandran, Murat Kantarcioglu. 35-42 [doi]
- Cross-App Tracking via Nearby Bluetooth Low Energy DevicesAleksandra Korolova, Vinod Sharma. 43-52 [doi]
- Privacy-Preserving Certification of Sustainability MetricsCetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi. 53-63 [doi]
- Capacity: an Abstract Model of Control over Personal DataDaniel Le Métayer, Pablo Rauzy. 64-75 [doi]
- An Empirical Study on Online Price DifferentiationThomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz. 76-83 [doi]
- Remote Attestation for Low-End Prover Devices with Post-Quantum CapabilitiesXiruo Liu, Rafael Misoczki, Manoj R. Sastry. 84-94 [doi]
- IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client ApplicationsKhalid Alghamdi, Ali Alqazzaz, Anyi Liu, Hua Ming. 95-102 [doi]
- Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking DefensesS. Abhishek Anand, Nitesh Saxena. 103-110 [doi]
- SPEED: Secure Provable Erasure for Class-1 IoT DevicesMahmoud Ammar, Wilfried Daniels, Bruno Crispo, Danny Hughes 0001. 111-118 [doi]
- Identifying Relevant Information Cues for Vulnerability Assessment Using CVSSLuca Allodi, Sebastian Banescu, Henning Femmer, Kristian Beckers. 119-126 [doi]
- Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention MechanismHiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma. 127-134 [doi]
- Automated Generation of Attack Graphs Using NVDM. Ugur Aksu, Kemal Bicakci, M. Hadi Dilek, A. Murat Ozbayoglu, Emin Islam Tatli. 135-142 [doi]
- Effectiveness of Android Obfuscation on Evading Anti-malwareMelissa Chua, Vivek Balachandran. 143-145 [doi]
- AEON: Android Encryption based ObfuscationD. Geethanjali, Tan Li Ying, Chua Wan Jun Melissa, Vivek Balachandran. 146-148 [doi]
- An Empirical Study of Differentially-Private Analytics for High-Speed Network DataOana-Georgiana Niculaescu, Gabriel Ghinita. 149-151 [doi]
- A Low Energy Profile: Analysing Characteristic Security on BLE PeripheralsPallavi Sivakumaran, Jorge Blasco Alís. 152-154 [doi]
- Secure Display for FIDO Transaction ConfirmationYongxian Zhang, Xinluo Wang, Ziming Zhao, Hui Li. 155-157 [doi]
- Misusing Sensory Channel to Attack Industrial Control SystemsFarhad Rasapour, Hoda Mehrpouyan. 158-160 [doi]
- SeCore: Continuous Extrospection with High Visibility on Multi-core ARM PlatformsPenghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn. 161-163 [doi]
- Model Checking of Security Properties in Industrial Control Systems (ICS)Roshan Shrestha, Hoda Mehrpouyan, Dianxiang Xu. 164-166 [doi]
- Privacy-aware Data Assessment of Online Social Network Registration ProcessesChristine Schuppler, Maria Leitner, Stefanie Rinderle-Ma. 167-169 [doi]
- CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?Juan D. Parra Rodriguez, Joachim Posegga. 170-172 [doi]
- Code Obfuscation: Why is This Still a Thing?Christian S. Collberg. 173-174 [doi]
- Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of ThingsAsma Alshehri, James Benson, Farhan Patwa, Ravi Sandhu. 175-185 [doi]
- Security Analysis of Relationship-Based Access Control PoliciesAmirreza Masoumzadeh. 186-195 [doi]
- The Next Domino to Fall: Empirical Analysis of User Passwords across Online ServicesChun Wang, Steve T. K. Jan, Hang Hu, Douglas Bossart, Gang Wang. 196-203 [doi]
- Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC ModelSyed Zain R. Rizvi, Philip W. L. Fong. 204-211 [doi]
- Hyperagents: Migrating Host Agents to the HypervisorMicah Bushouse, Douglas S. Reeves. 212-223 [doi]
- CacheShield: Detecting Cache Attacks through Self-ObservationSamira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth. 224-235 [doi]
- Secure, Consistent, and High-Performance Memory SnapshottingGuilherme Cox, Zi Yan, Abhishek Bhattacharjee, Vinod Ganapathy. 236-247 [doi]
- Fidelius Charm: Isolating Unsafe Rust CodeHussain M. J. Almohri, David Evans 0001. 248-255 [doi]
- A Multi-Enterprise Containerization Approach with an Interoperable Position-Based SystemOyindamola Oluwatimi, Elisa Bertino. 256-266 [doi]
- DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication SchemeAttaullah Buriro, Bruno Crispo, Sandeep Gupta, Filippo Del Frari. 267-276 [doi]
- Authorship Attribution of Android AppsHugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani. 277-286 [doi]
- Securing Wireless NeurostimulatorsEduard Marin, Dave Singelée, Bohan Yang 0001, Vladimir Volskiy, Guy A. E. Vandenbosch, Bart Nuttin, Bart Preneel. 287-298 [doi]
- SCLib: A Practical and Lightweight Defense against Component Hijacking in Android ApplicationsDaoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng. 299-306 [doi]
- SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPANMd. Mahmud Hossain, Yasser Karim, Ragib Hasan. 307-318 [doi]
- Denial of Engineering Operations Attacks in Industrial Control SystemsSaranyan Senthivel, Shrey Dhungana, Hyunguk Yoo, Irfan Ahmed, Vassil Roussev. 319-329 [doi]
- A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph InferenceIssa M. Khalil, Bei Guan, Mohamed Nabeel, Ting Yu. 330-341 [doi]
- Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital ForgettingGhous Amjad, Muhammad Shujaat Mirza, Christina Pöpper. 342-353 [doi]
- Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary AnalysisFabio Pagani, Matteo Dell'Amico, Davide Balzarotti. 354-365 [doi]
- From Debugging-Information Based Binary-Level Type Inference to CFG GenerationDongrui Zeng, Gang Tan. 366-376 [doi]
- MASCAT: Preventing Microarchitectural Attacks Before DistributionGorka Irazoqui, Thomas Eisenbarth, Berk Sunar. 377-388 [doi]