Abstract is missing.
- TruZ-View: Developing TrustZone User Interface for Mobile OS Using Delegation Integration ModelKailiang Ying, Priyank Thavai, Wenliang Du. 1-12 [doi]
- Understanding the Responsiveness of Mobile App Developers to Software Library UpdatesTatsuhiko Yasumatsu, Takuya Watanabe 0001, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori. 13-24 [doi]
- ACMiner: Extraction and Analysis of Authorization Checks in Android's MiddlewareSigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, Alexandre Bartel. 25-36 [doi]
- REAPER: Real-time App Analysis for Augmenting the Android Permission SystemMichalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis. 37-48 [doi]
- Verifiable Round-Robin Scheme for Smart HomesNisha Panwar, Shantanu Sharma 0001, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian. 49-60 [doi]
- Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart CarsMaanak Gupta, James Benson, Farhan Patwa, Ravi Sandhu. 61-72 [doi]
- A Study of Data Store-based Home AutomationKaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk. 73-84 [doi]
- Detection of Threats to IoT Devices using Scalable VPN-forwarded HoneypotsAmit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici. 85-96 [doi]
- Deep Neural Networks Classification over Encrypted DataEhsan Hesamifard, Hassan Takabi, Mehdi Ghasemi. 97-108 [doi]
- Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data AnonymizationNikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel. 109-119 [doi]
- Curie: Policy-based Secure Data ExchangeZ. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac. 121-132 [doi]
- Result-Based Detection of Insider Threats to Relational DatabasesAsmaa Sallam, Elisa Bertino. 133-143 [doi]
- PrivStream: Differentially Private Event Detection on Data StreamsMaryam Fanaeepour, Ashwin Machanavajjhala. 145-147 [doi]
- Custom-made Anonymization by Data Analysis Program Provided by RecipientWakana Maeda, Yuji Yamaoka. 149-151 [doi]
- ABACaaS: Attribute-Based Access Control as a ServiceAugustee Meshram, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. 153-155 [doi]
- Toward Efficient Spammers Gathering in Twitter Social NetworksYihe Zhang, Hao Zhang, Xu Yuan. 157-159 [doi]
- Large Scale PoC Experiment with 57, 000 people to Accumulate Patterns for Lifestyle AuthenticationRyosuke Kobayashi, Nobuyuki Saji, Nobuo Shigeta, Rie Shigetomi Yamaguchi. 161-163 [doi]
- Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public CloudSharad Mehrotra, Shantanu Sharma 0001, Jeffrey D. Ullman. 165-167 [doi]
- Parameter Tuning and Confidence Limits of Malware ClusteringHoutan Faridi, Srivathsan Srinivasagopalan, Rakesh Verma. 169-171 [doi]
- Specification and Analysis of ABAC Policies via the Category-based MetamodelMaribel Fernández, Ian Mackie, Bhavani M. Thuraisingham. 173-184 [doi]
- Results in Workflow Resiliency: Complexity, New Formulation, and ASP EncodingPhilip W. L. Fong. 185-196 [doi]
- Efficient and Precise Information Flow Control for Machine Code through Demand-Driven Secure Multi-ExecutionTobias F. Pfeffer, Thomas Göthel, Sabine Glesner. 197-208 [doi]
- PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy ApplicationsYuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu. 209-220 [doi]
- Extracting Secrets from Encrypted Virtual MachinesMathias Morbitzer, Manuel Huber 0001, Julian Horsch. 221-230 [doi]
- Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted ComputingFlavio Toffalini, Martín Ochoa, Jun Sun 0001, Jianying Zhou 0001. 231-242 [doi]
- Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted SystemsCory Thoma, Adam J. Lee, Alexandros Labrinidis. 243-254 [doi]
- A Practical Intel SGX Setting for Linux Containers in the CloudDave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler. 255-266 [doi]
- Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without DecryptionBlake Anderson, Andrew Chi, Scott Dunlop, David A. McGrew. 267-278 [doi]
- Client Diversity Factor in HTTPS Webpage FingerprintingHasan Faik Alan, Jasleen Kaur. 279-290 [doi]
- Adversarial Authorship Attribution in Open-Source ProjectsAlina Matyukhina, Natalia Stakhanova, Mila Dalla Preda, Celine Perley. 291-302 [doi]
- Understanding and Predicting Private Interactions in Underground ForumsZhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao 0001, Tiffany Bao, Adam Doupé, Gail-Joon Ahn. 303-314 [doi]
- BootKeeper: Validating Software Integrity Properties on Boot Firmware ImagesRonny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang 0001, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi. 315-325 [doi]
- MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation LayerPeiYing Wang, Shijie Jia, Bo Chen, Luning Xia, Peng Liu. 327-338 [doi]
- BlAnC: Blockchain-based Anonymous and Decentralized Credit NetworksGaurav Panwar, Satyajayant Misra, Roopa Vishwanathan. 339-350 [doi]
- SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic TransformationLaleh Eskandarian, Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi. 351-362 [doi]