Abstract is missing.
- Automatically Identifying Security Checks for Detecting Kernel Semantic BugsKangjie Lu, Aditya Pakki, Qiushi Wu. 3-25 [doi]
- Uncovering Information Flow Policy Violations in C Programs (Extended Abstract)Darion Cassel, Yan Huang 0001, Limin Jia. 26-46 [doi]
- BinEye: Towards Efficient Binary Authorship Characterization Using Deep LearningSaed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang 0001, Mourad Debbabi. 47-67 [doi]
- Static Detection of Uninitialized Stack Variables in Binary CodeBehrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz. 68-87 [doi]
- Towards Automated Application-Specific Software StacksNicolai Davidsson, Andre Pawlowski, Thorsten Holz. 88-109 [doi]
- Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from LatticesKeita Emura, Shuichi Katsumata, Yohei Watanabe 0001. 113-133 [doi]
- Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud EmailsJianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma. 134-150 [doi]
- Feistel Structures for MPC, and MoreMartin R. Albrecht, Lorenzo Grassi 0001, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy 0005, Markus Schofnegger. 151-171 [doi]
- Arithmetic Garbling from Bilinear MapsNils Fleischhacker, Giulio Malavolta, Dominique Schröder. 172-192 [doi]
- SEPD: An Access Control Model for Resource Sharing in an IoT EnvironmentHenrique G. G. Pereira, Philip W. L. Fong. 195-216 [doi]
- Nighthawk: Transparent System Introspection from Ring -3Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang. 217-238 [doi]
- Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security EnforcementSuryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang 0001, Mourad Debbabi. 239-262 [doi]
- Enhancing Security and Dependability of Industrial Networks with Opinion DynamicsJuan Enrique Rubio, Mark Manulis, Cristina Alcaraz, Javier López. 263-280 [doi]
- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward PrivacyCong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk. 283-303 [doi]
- Towards Efficient Verifiable Forward Secure Searchable Symmetric EncryptionZhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su, Xiaofeng Chen 0001. 304-321 [doi]
- Generic Multi-keyword Ranked Search on Encrypted Cloud DataShabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld, Surya Nepal. 322-343 [doi]
- An Efficiently Searchable Encrypted Data Structure for Range QueriesFlorian Kerschbaum, Anselme Tueno. 344-364 [doi]
- GDPiRated - Stealing Personal Information On- and OfflineMatteo Cagnazzo, Thorsten Holz, Norbert Pohlmann. 367-386 [doi]
- Location Privacy-Preserving Mobile Crowd Sensing with Anonymous ReputationXun Yi, Kwok-Yan Lam, Elisa Bertino, Fang-Yu Rao. 387-411 [doi]
- OCRAM-Assisted Sensitive Data Protection on ARM-Based PlatformDawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li, Jiwu Jing, Kun Sun 0001. 412-438 [doi]
- Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time WarpingXiaoning Liu, Xun Yi. 439-460 [doi]
- IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key CryptographyGildas Avoine, Sébastien Canard, Loïc Ferreira. 463-483 [doi]
- Strongly Secure Identity-Based Key Exchange with Single Pairing OperationJunichi Tomida, Atsushi Fujioka, Akira Nagai, Koutarou Suzuki. 484-503 [doi]
- A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHopeYue Qin, Chi Cheng, Jintai Ding. 504-520 [doi]
- Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and HybridsJacqueline Brendel, Marc Fischlin, Felix Günther 0001. 521-541 [doi]
- The Risks of WebGL: Analysis, Evaluation and DetectionAlex Belkin, Nethanel Gelernter, Israel Cidon. 545-564 [doi]
- Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry AttacksStefanos Chaliasos, George Metaxopoulos, George Argyros, Dimitris Mitropoulos. 565-585 [doi]
- Fingerprint Surface-Based Detection of Web Bot DetectorsHugo Jonker, Benjamin Krumnow, Gabry Vlot. 586-605 [doi]
- Testing for Integrity Flaws in Web SessionsStefano Calzavara, Alvise Rabitti, Alessio Ragazzo, Michele Bugliesi. 606-624 [doi]