Abstract is missing.
- Extended Functionality Attacks on IoT Devices: The Case of Smart LightsEyal Ronen, Adi Shamir. 3-12 [doi]
- Explicit Secrecy: A Policy for Taint TrackingDaniel Schoepe, Musard Balliu, Benjamin C. Pierce, Andrei Sabelfeld. 15-30 [doi]
- Precisely Measuring Quantitative Information Flow: 10K Lines of Code and BeyondCelina G. Val, Michael A. Enescu, Sam Bayless, William Aiello, Alan J. Hu. 31-46 [doi]
- HornDroid: Practical and Sound Static Analysis of Android Applications by SMT SolvingStefano Calzavara, Ilya Grishchenko, Matteo Maffei. 47-62 [doi]
- Games without Frontiers: Investigating Video Games as a Covert ChannelBridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson. 63-77 [doi]
- The OPTLS Protocol and TLS 1.3Hugo Krawczyk, Hoeteck Wee. 81-96 [doi]
- A Class of Precomputation-Based Distance-Bounding ProtocolsSjouke Mauw, Jorge Toro-Pozo, Rolando Trujillo-Rasua. 97-111 [doi]
- Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure ComputationBenjamin Mood, Debayan Gupta, Henry Carter, Kevin R. B. Butler, Patrick Traynor. 112-127 [doi]
- Translingual ObfuscationPei Wang, Shuai Wang, Jiang Ming, Yufei Jiang, Dinghao Wu. 128-144 [doi]
- Reasoning about Object Capabilities with Logical Relations and Effect ParametricityDominique Devriese, Lars Birkedal, Frank Piessens. 147-162 [doi]
- Strong and Provably Secure Database Access ControlMarco Guarnieri, Srdjan Marinovic, David A. Basin. 163-178 [doi]
- Fine-Grained Control-Flow Integrity for Kernel SoftwareXinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger. 179-194 [doi]
- On the Inference of User Paths from Anonymized Mobility DataGalini Tsoukaneri, George Theodorakopoulos, Hugh Leather, Mahesh K. Marina. 199-213 [doi]
- NavigaTor: Finding Faster Paths to AnonymityRobert Annessi, Martin Schmiedecker. 214-226 [doi]
- Security Analysis of Re-Encryption RPC Mix NetsRalf Küsters, Tomasz Truderung. 227-242 [doi]
- Foundations of Hardware-Based Attested Computation and Application to SGXManuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi. 245-260 [doi]
- Highly Efficient Algorithms for AES Key Retrieval in Cache Access AttacksAshokkumar C., Ravi Prakash Giri, Bernard L. Menezes. 261-275 [doi]
- Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu. 276-291 [doi]
- Argon2: New Generation of Memory-Hard Functions for Password Hashing and Other ApplicationsAlex Biryukov, Daniel Dinu, Dmitry Khovratovich. 292-302 [doi]
- Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse AttackKartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi. 305-320 [doi]
- Do Not Trust Me: Using Malicious IdPs for Analyzing and Attacking Single Sign-onChristian Mainka, Vladislav Mladenov, Jörg Schwenk. 321-336 [doi]
- CacheKit: Evading Memory Introspection Using Cache IncoherenceNing Zhang, He Sun, Kun Sun, Wenjing Lou, Yiwei Thomas Hou. 337-352 [doi]
- ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not TechnologyAndreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Jorn Muller-Quade. 357-371 [doi]
- The Limitations of Deep Learning in Adversarial SettingsNicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami. 372-387 [doi]
- I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAsSuphannee Sivakorn, Iasonas Polakis, Angelos D. Keromytis. 388-403 [doi]
- PKI Safety Net (PKISN): Addressing the Too-Big-to-Be-Revoked Problem of the TLS EcosystemPawel Szalachowski, Laurent Chuat, Adrian Perrig. 407-422 [doi]
- It Bends But Would It Break? Topological Analysis of BGP Infrastructures in EuropeSylvain Frey, Yehia Elkhatib, Awais Rashid, Karolina Follis, John Vidler, Nicholas J. P. Race, Christopher Edwards. 423-438 [doi]
- AppScanner: Automatic Fingerprinting of Smartphone Apps from Encrypted Network TrafficVincent F. Taylor, Riccardo Spolaor, Mauro Conti, Ivan Martinovic. 439-454 [doi]
- How Secure is TextSecure?Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jörg Schwenk, Thorsten Holz. 457-472 [doi]
- To Du or Not to Du: A Security Analysis of Du-VoteSteve Kremer, Peter B. Rønne. 473-486 [doi]