Abstract is missing.
- Information Leakage in Encrypted Deduplication via Frequency AnalysisJingwei Li, Chuan Qin, Patrick P. C. Lee, Xiaosong Zhang. 1-12 [doi]
- Privacy Disclosure through Smart Meters: Reactive Power Based Attack and DefenseJingyao Fan, Qinghua Li, Guohong Cao. 13-24 [doi]
- What Can We Learn from Four Years of Data Center Hardware Failures?Guosai Wang, Lifei Zhang, Wei Xu. 25-36 [doi]
- Fast Atomic MulticastPaulo R. Coelho, Nicolas Schiper, Fernando Pedone. 37-48 [doi]
- Speeding up Consensus by Chasing Fast DecisionsBalaji Arun, Sebastiano Peluso, Roberto Palmieri, Giuliano Losa, Binoy Ravindran. 49-60 [doi]
- Secure Causal Atomic Broadcast, RevisitedSisi Duan, Michael K. Reiter, Haibin Zhang. 61-72 [doi]
- Reducing the "Tax" of Reliability: A Hardware-Aware Method for Agile Data Persistence in Mobile DevicesMeng Wang, Huixiang Chen, Tao Li. 73-84 [doi]
- Exploring the Potential for Collaborative Data Compression and Hard-Error Tolerance in PCM MemoriesAmin Jadidi, Mohammad Arjomand, Mohammad Khavari Tavana, David R. Kaeli, Mahmut T. Kandemir, Chita R. Das. 85-96 [doi]
- One Bit is (Not) Enough: An Empirical Study of the Impact of Single and Multiple Bit-Flip ErrorsBehrooz Sangchoolie, Karthik Pattabiraman, Johan Karlsson. 97-108 [doi]
- StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic ExecutionFan Yao, Yongbo Li, Yurong Chen, Hongfa Xue, Tian Lan, Guru Venkataramani. 109-120 [doi]
- Dependability-Aware Design Space Exploration for Optimal Synthesis Parameters TuningIlya Tuzov, David de Andrés, Juan Carlos Ruiz. 121-132 [doi]
- pbSE: Phase-Based Symbolic ExecutionQixue Xiao, Yu Chen, Chengang Wu, Kang Li, Junjie Mao, Shize Guo, Yuanchun Shi. 133-144 [doi]
- IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZoneChen Tian, Yazhe Wang, Peng Liu, Qihui Zhou, Chengyi Zhang, Zhen Xu. 145-156 [doi]
- Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective MemoryMarcus Brandenburger, Christian Cachin, Matthias Lorenz, Rüdiger Kapitza. 157-168 [doi]
- Secure Tera-scale Data Crunching with a Small TCBBruno Vavala, Nuno Neves, Peter Steenkiste. 169-180 [doi]
- Concolic Execution on Small-Size Binaries: Challenges and Empirical StudyHui Xu, Yangfan Zhou, Yu Kang, Michael R. Lyu. 181-188 [doi]
- Towards Automated Discovery of Crash-Resistant Primitives in Binary ExecutablesBenjamin Kollenda, Enes Göktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, Herbert Bos, Thorsten Holz. 189-200 [doi]
- Function Interface Analysis: A Principled Approach for Function Recognition in COTS BinariesRui Qiao, R. Sekar. 201-212 [doi]
- Multimodal Indexable Encryption for Mobile Cloud-Based ApplicationsBernardo Ferreira, João Leitão, Henrique Domingos. 213-224 [doi]
- Secure Live Migration of SGX Enclaves on Untrusted CloudJinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, Jinming Li. 225-236 [doi]
- ContainerLeaks: Emerging Security Threats of Information Leakages in Container CloudsXing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang. 237-248 [doi]
- Athena: A Framework for Scalable Anomaly Detection in Software-Defined NetworksSeunghyeon Lee, Jinwoo Kim, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran. 249-260 [doi]
- Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM NetworksCheng Feng, Tingting Li, Deeph Chana. 261-272 [doi]
- Random Walk Based Fake Account Detection in Online Social NetworksJinyuan Jia, Binghui Wang, Neil Zhenqiang Gong. 273-284 [doi]
- Towards Secure and Verifiable Database-Driven Spectrum SharingZhili Chen, Lin Chen 0002, Hong Zhong. 285-296 [doi]
- Implicit Smartphone User Authentication with Sensors and Contextual Machine LearningWei-Han Lee, Ruby B. Lee. 297-308 [doi]
- Sensor-Based Implicit Authentication of Smartphone UsersWei-Han Lee, Ruby B. Lee. 309-320 [doi]
- REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor NetworksVarun Badrinath Krishna, Michael Rausch, Benjamin E. Ujcich, Indranil Gupta, William H. Sanders. 321-332 [doi]
- Agora: A Dependable High-Performance Coordination Service for Multi-coresRainer Schiekofer, Johannes Behl, Tobias Distler. 333-344 [doi]
- Load-Optimal Local Fast Rerouting for Resilient NetworksYvonne Anne Pignolet, Stefan Schmid, Gilles Trédan. 345-356 [doi]
- JMake: Dependable Compilation for Kernel JanitorsJulia Lawall, Gilles Muller. 357-366 [doi]
- Counting in the Dark: DNS Caches Discovery and Enumeration in the InternetAmit Klein, Haya Shulman, Michael Waidner. 367-378 [doi]
- Entropy-Based Security Analytics: Measurements from a Critical Information SystemMarcello Cinque, Raffaele Della Corte, Antonio Pecchia. 379-390 [doi]
- Exploring the Long Tail of (Malicious) Software DownloadsBabak Rahbarinia, Marco Balduzzi, Roberto Perdisci. 391-402 [doi]
- Ghost Installer in the Shadow: Security Analysis of App Installation on AndroidYeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, Xiaofeng Wang, Kai Chen, Xiao-yong Zhou, Xinhui Han, Michael Grace. 403-414 [doi]
- DyDroid: Measuring Dynamic Code Loading and Its Security Implications in Android ApplicationsZhengyang Qu, Shahid Alam, Yan Chen, Xiaoyong Zhou, Wangjun Hong, Ryan Riley. 415-426 [doi]
- JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in AndroidYacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng. 427-438 [doi]
- I Know Nothing about You But Here is What You Might LikeRachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, Mahammad Valiyev, Jingjing Wang. 439-450 [doi]
- What You See is Not What You Get! Thwarting Just-in-Time ROP with ChameleonPing Chen, Jun Xu, Zhisheng Hu, Xinyu Xing, Minghui Zhu, Bing Mao, Peng Liu 0005. 451-462 [doi]
- DynaMiner: Leveraging Offline Infection Analytics for On-the-Wire Malware DetectionBirhanu Eshete, V. N. Venkatakrishnan. 463-474 [doi]
- Statistical Model Checking for Hybrid Petri Nets with Multiple General TransitionsCarina Pilch, Anne Remke. 475-486 [doi]
- Deadline-Aware Multipath Communication: An Optimization ProblemLaurent Chuat, Adrian Perrig, Yih-Chun Hu. 487-498 [doi]
- Regular: Attacker-Induced Traffic Flow Instability in a Stream of Semi-Automated VehiclesDaniel D. Dunn, Samuel A. Mitchell, Imran Sajjad, Ryan M. Gerdes, Rajnikant Sharma, Ming Li. 499-510 [doi]
- Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT SystemYan Liu, Yue Wu, Zbigniew Kalbarczyk. 511-518 [doi]
- RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart MetersJinkyu Koo, Xiaojun Lin, Saurabh Bagchi. 519-530 [doi]
- Compromising Security of Economic Dispatch in Power System OperationsDevendra Shelar, Pengfei Sun, Saurabh Amin, Saman A. Zonouz. 531-542 [doi]
- Fex: A Software Systems EvaluatorOleksii Oleksenko, Dmitrii Kuvaiskii, Pramod Bhatotia, Christof Fetzer. 543-550 [doi]
- Demonstrating a Tool for Injection Attack Prevention in MySQLIberia Medeiros, Miguel Beatriz, Nuno Ferreira Neves, Miguel Correia. 551-558 [doi]
- Zipr: Efficient Static Binary Rewriting for SecurityWilliam H. Hawkins, Jason D. Hiser, Michele Co, Anh Nguyen-Tuong, Jack W. Davidson. 559-566 [doi]
- ATTAIN: An Attack Injection Framework for Software-Defined NetworkingBenjamin E. Ujcich, Uttam Thakore, William H. Sanders. 567-578 [doi]
- The Balance Attack or Why Forkable Blockchains are Ill-Suited for ConsortiumChristopher Natoli, Vincent Gramoli. 579-590 [doi]
- Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETsYuan Yao, Bin Xiao 0001, Gaofei Wu, Xue Liu, Zhiwen Yu, Kailong Zhang, Xingshe Zhou. 591-602 [doi]
- Analysing Selfishness Flooding with SEINEGuido Lena Cota, Sonia Ben Mokhtar, Gabriele Gianini, Ernesto Damiani, Julia Lawall, Gilles Muller, Lionel Brunie. 603-614 [doi]
- Detecting Passive Cheats in Online Games via Performance-Skillfulness InconsistencyDaiping Liu, Xing Gao, Mingwei Zhang, Haining Wang, Angelos Stavrou. 615-626 [doi]
- Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic BugsMd. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li. 627-638 [doi]