Abstract is missing.
- Automated Analysis of Equivalence Properties for Security Protocols Using Else BranchesIvan Gazeau, Steve Kremer. 1-20 [doi]
- Quantifying Web Adblocker PrivacyArthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun. 21-42 [doi]
- More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower BoundsEssam Ghadafi. 43-61 [doi]
- Adversarial Examples for Malware DetectionKathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes 0001, Patrick D. McDaniel. 62-79 [doi]
- PerfWeb: How to Violate Web Privacy with Hardware Performance EventsBerk Gülmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar. 80-97 [doi]
- Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration')Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici. 98-115 [doi]
- DOMPurify: Client-Side Protection Against XSS and Markup InjectionMario Heiderich, Christopher Späth, Jörg Schwenk. 116-134 [doi]
- Preventing DNS Amplification Attacks Using the History of DNS Queries with SDNSoyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon (Paul) Jeong, Hyoungshick Kim. 135-152 [doi]
- A Traceability Analysis of Monero's BlockchainAmrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena. 153-173 [doi]
- Multi-rate Threshold FlipThemDavid Leslie, Chris Sherfield, Nigel P. Smart. 174-190 [doi]
- Practical Keystroke Timing Attacks in Sandboxed JavaScriptMoritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice, Stefan Mangard. 191-209 [doi]
- On-Demand Time Blurring to Support Side-Channel DefenseWeijie Liu, Debin Gao, Michael K. Reiter. 210-228 [doi]
- VuRLE: Automatic Vulnerability Detection and Repair by Learning from ExamplesSiqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert H. Deng. 229-246 [doi]
- Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS RadiosRajib Ranjan Maiti, Sandra Siby, Ragav Sridharan, Nils Ole Tippenhauer. 247-264 [doi]
- LeaPS: Learning-Based Proactive Security Auditing for CloudsSuryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi. 265-285 [doi]
- Identifying Multiple Authors in a Binary ProgramXiaozhu Meng, Barton P. Miller, Kwang-Sung Jun. 286-304 [doi]
- Secure IDS Offloading with Nested Virtualization and Deep VM IntrospectionShohei Miyama, Kenichi Kourai. 305-323 [doi]
- Privacy Implications of Room Climate DataPhilipp Morgner, Christian Müller, Matthias Ring, Björn Eskofier, Christian Riess, Frederik Armknecht, Zinaida Benenson. 324-343 [doi]
- Network Intrusion Detection Based on Semi-supervised Variational Auto-EncoderGenki Osada, Kazumasa Omote, Takashi Nishide. 344-361 [doi]
- No Sugar but All the Taste! Memory Encryption Without Architectural SupportPanagiotis Papadopoulos, Giorgos Vasiliadis, Giorgos Christou, Evangelos P. Markatos, Sotiris Ioannidis. 362-380 [doi]
- Inference-Proof Updating of a Weakened View Under the Modification of Input ParametersJoachim Biskup, Marcel Preuß. 381-401 [doi]
- Preventing Advanced Persistent Threats in Complex Control NetworksJuan Enrique Rubio, Cristina Alcaraz, Javier Lopez. 402-418 [doi]
- Shortfall-Based Optimal Placement of Security Resources for Mobile IoT ScenariosAntonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo. 419-436 [doi]
- Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT SensorsSteffen Schulz 0001, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser 0001. 437-455 [doi]
- RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency MoneroShi-Feng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen. 456-474 [doi]
- SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access ProvisionIraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel. 475-493 [doi]
- Privacy-Preserving Decision Trees Evaluation via Linear FunctionsRaymond K. H. Tai, Jack P. K. Ma, Yongjun Zhao, Sherman S. M. Chow. 494-512 [doi]
- Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented FunctionalitySam L. Thomas, Tom Chothia, Flavio D. Garcia. 513-531 [doi]
- Generic Constructions for Fully Secure Revocable Attribute-Based EncryptionKotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka. 532-551 [doi]
- Enforcing Input Correctness via Certification in Garbled Circuit EvaluationYihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani. 552-569 [doi]