Abstract is missing.
- Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure AttributionBharat Srinivasan, Payas Gupta, Manos Antonakakis, Mustaque Ahamad. 3-26 [doi]
- Toward an Efficient Website Fingerprinting DefenseMarc Juárez, Mohsen Imani, Mike Perry, Claudia Díaz, Matthew Wright. 27-46 [doi]
- Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStackSuryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi. 47-66 [doi]
- Comparing Password Ranking Algorithms on Real-World Password DatasetsWeining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari. 69-90 [doi]
- Scalable Two-Factor Authentication Using Historical DataAldar C.-F. Chan, Jun Wen Wong, Jianying Zhou, Joseph Chee Ming Teo. 91-110 [doi]
- On the Implications of Zipf's Law in PasswordsDing Wang, Ping Wang. 111-131 [doi]
- PPOPM: More Efficient Privacy Preserving Outsourced Pattern MatchingJun Zhou, Zhenfu Cao, Xiaolei Dong. 135-153 [doi]
- An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean QueriesShifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen. 154-172 [doi]
- Efficient Encrypted Keyword Search for Multi-user Data SharingAggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang 0005, Bing Wang. 173-195 [doi]
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging AnalysisGábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi, Levente Buttyán. 199-216 [doi]
- Mobile Application Impersonation Detection Using Dynamic User Interface ExtractionLuka Malisa, Kari Kostiainen, Michael Och, Srdjan Capkun. 217-237 [doi]
- A Machine Learning Approach for Detecting Third-Party Trackers on the WebQianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen. 238-258 [doi]
- Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal ConstructionsCéline Chevalier, Fabien Laguillaumie, Damien Vergnaud. 261-278 [doi]
- Attribute-Based Signatures for Supporting Anonymous CertificationNesrine Kaaniche, Maryline Laurent. 279-300 [doi]
- Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) SchemesYongge Wang, Qutaibah M. Malluhi. 301-323 [doi]
- Lightweight Delegatable Proofs of StorageJia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong. 324-343 [doi]
- Anonymous RAMMichael Backes 0001, Amir Herzberg, Aniket Kate, Ivan Pryvalov. 344-362 [doi]
- Efficient Sanitizable Signatures Without Random OraclesRussell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder. 363-380 [doi]
- Intentio Ex Machina: Android Intent Access Control via an Extensible Application HookCarter Yagemann, Wenliang Du. 383-400 [doi]
- Hey, You, Get Off of My Image: Detecting Data Residue in Android ImagesXiao Zhang, Yousra Aafer, Kailiang Ying, Wenliang Du. 401-421 [doi]
- NaClDroid: Native Code Isolation for Android ApplicationsElias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis. 422-439 [doi]
- AsyncShock: Exploiting Synchronisation Bugs in Intel SGX EnclavesNico Weichbrodt, Anil Kurmus, Peter Pietzuch, Rüdiger Kapitza. 440-457 [doi]
- Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on AndroidFabo Wang, Yuqing Zhang, Kai Wang, Peng Liu 0005, Wenjie Wang. 458-476 [doi]
- Android Permission Recommendation Using Transitive Bayesian Inference ModelBahman Rashidi, Carol J. Fung, Anh Nguyen, Tam Vu. 477-497 [doi]
- Spot the Difference: Secure Multi-execution and Multiple FacetsNataliia Bielova, Tamara Rezk. 501-519 [doi]
- On Reductions from Multi-Domain Noninterference to the Two-Level CaseOliver Woizekowski, Ron van der Meyden. 520-537 [doi]
- Flexible Manipulation of Labeled Values for Information-Flow Control LibrariesMarco Vassena, Pablo Buiras, Lucas Waye, Alejandro Russo. 538-557 [doi]
- Let's Face It: Faceted Values for Taint TrackingDaniel Schoepe, Musard Balliu, Frank Piessens, Andrei Sabelfeld. 561-580 [doi]
- IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic ProgrammingSpandan Veggalam, Sanjay Rawat, István Haller, Herbert Bos. 581-601 [doi]
- Automated Multi-architectural Discovery of CFI-Resistant Code GadgetsPatrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz. 602-620 [doi]