Abstract is missing.
- WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection AttacksTimothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu. 3-18 [doi]
- Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell KnowledgeFlorian Tramèr, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi. 19-34 [doi]
- Privacy Threats through Ultrasonic Side Channels on Mobile DevicesDaniel Arp, Erwin Quiring, Christian Wressnegger, Konrad Rieck. 35-47 [doi]
- Use of Simulators for Side-Channel AnalysisNikita Veshchikov, Sylvain Guilley. 51-59 [doi]
- Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake CandidatesMarc Fischlin, Felix Günther 0001. 60-75 [doi]
- A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair ExchangeMichael Backes 0001, Jannik Dreier, Steve Kremer, Robert Künnemann. 76-91 [doi]
- Refining Authenticated Key Agreement with Strong AdversariesJoseph Lallemand, David A. Basin, Christoph Sprenger. 92-107 [doi]
- Redactable Blockchain - or - Rewriting History in Bitcoin and FriendsGiuseppe Ateniese, Bernardo Magri, Daniele Venturi 0001, Ewerton R. Andrade. 111-126 [doi]
- Secure Queries on Encrypted Multi-writer TablesAngelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta. 127-141 [doi]
- Towards Practical Attacks on Argon2i and Balloon HashingJoël Alwen, Jeremiah Blocki. 142-157 [doi]
- An Expressive (Zero-Knowledge) Set AccumulatorYupeng Zhang, Jonathan Katz, Charalampos Papamanthou. 158-173 [doi]
- Compiler-Agnostic Function Detection in BinariesDennis Andriesse, Asia Slowinska, Herbert Bos. 177-189 [doi]
- Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security ImplicationsYunhan Jack Jia, Qi Alfred Chen, Yikai Lin, Chao Kong, Zhuoqing Morley Mao. 190-203 [doi]
- LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine LearningMichael Backes 0001, Mohammad Nauman. 204-217 [doi]
- 9-1-1 DDoS: Attacks, Analysis and MitigationMordechai Guri, Yisroel Mirsky, Yuval Elovici. 218-232 [doi]
- SoK: Fraud in Telephony NetworksMerve Sahin, Aurélien Francillon, Payas Gupta, Mustaque Ahamad. 235-250 [doi]
- SoK: Single Sign-On Security - An Evaluation of OpenID ConnectChristian Mainka, Vladislav Mladenov, Jörg Schwenk, Tobias Wich. 251-266 [doi]
- Privacy-Preserving User-Auditable Pseudonym SystemsJan Camenisch, Anja Lehmann. 269-284 [doi]
- Auditable Data StructuresMichael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia. 285-300 [doi]
- Accumulators with Applications to Anonymity-Preserving RevocationFoteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov. 301-315 [doi]
- Block Me If You Can: A Large-Scale Study of Tracker-Blocking ToolsGeorg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl. 319-333 [doi]
- Efficient and Flexible Discovery of PHP Application VulnerabilitiesMichael Backes 0001, Konrad Rieck, Malte Skoruppa, Ben Stock, Fabian Yamaguchi. 334-349 [doi]
- Large-Scale Analysis & Detection of Authentication Cross-Site Request ForgeriesAvinash Sudhodanan, Roberto Carbone, Luca Compagna, Nicolas Dolgin, Alessandro Armando, Umberto Morelli. 350-365 [doi]
- Revisiting Browser Security in the Modern Era: New Data-Only Attacks and DefensesRoman Rogowski, Micah Morton, Forrest Li, Fabian Monrose, Kevin Z. Snow, Michalis Polychronakis. 366-381 [doi]
- Confidante: Usable Encrypted Email: A Case Study with Lawyers and JournalistsAdam Lerner, Eric Zeng, Franziska Roesner. 385-400 [doi]
- FairTest: Discovering Unwarranted Associations in Data-Driven ApplicationsFlorian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel J. Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin. 401-416 [doi]
- Internet Censorship in Thailand: User Practices and Potential ThreatsGenevieve Gebhart, Tadayoshi Kohno. 417-432 [doi]
- Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational ApproachNadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet. 435-450 [doi]
- A Formal Security Analysis of the Signal Messaging ProtocolKatriel Cohn-Gordon, Cas J. F. Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila. 451-466 [doi]
- Designing and Proving an EMV-Compliant Payment Protocol for Mobile DevicesVéronique Cortier, Alicia Filipiak, Jan Florent, Said Gharout, Jacques Traoré. 467-480 [doi]
- ARTist: The Android Runtime Instrumentation and Security ToolkitMichael Backes 0001, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber. 481-495 [doi]
- Reasoning about Probabilistic Defense Mechanisms against Remote AttacksMartín Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh. 499-513 [doi]
- CodeArmor: Virtualizing the Code Space to Counter Disclosure AttacksXi Chen, Herbert Bos, Cristiano Giuffrida. 514-529 [doi]
- Symbolic Models for Isolated Execution EnvironmentsCharlie Jacomme, Steve Kremer, Guillaume Scerri. 530-545 [doi]
- On the Effectiveness of Virtualization Based Memory Isolation on Multicore PlatformsSiqi Zhao, Xuhua Ding. 546-560 [doi]
- Outsmarting Network Security with SDN TeleportationKashyap Thimmaraju, Liron Schiff, Stefan Schmid. 563-578 [doi]
- Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDsMaciej Korczynski, Samaneh Tajalizadehkhoob, Arman Noroozian, Maarten Wullink, Cristian Hesselman, Michel van Eeten. 579-594 [doi]
- When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular NetworksHyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, Yongdae Kim. 595-609 [doi]
- When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular NetworksKarthikeyan Bhargavan, Ioana Boureanu, Pierre-Alain Fouque, Cristina Onete, Benjamin Richard. 595-609 [doi]