Abstract is missing.
- Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are DangerousMax Schuchard, Christopher Thompson, Nicholas Hopper, Yongdae Kim. [doi]
- Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit DiagnosisMingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, Heng Yin. [doi]
- Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android MarketsYajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang. [doi]
- Distance Hijacking Attacks on Distance Bounding ProtocolsCas J. F. Cremers, Kasper Bonne Rasmussen, Srdjan Capkun. [doi]
- FreeMarket: Shopping for free in Android applicationsDaniel Reynaud, Dawn Xiaodong Song, Tom Magrino, Edward XueJun Wu, Eui Chul Richard Shin. [doi]
- Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate SystemsJeff Seibert, Sheila Becker, Cristina Nita-Rotaru, Radu State. [doi]
- ShortMAC: Efficient Data-Plane Fault LocalizationXin Zhang 0003, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague. [doi]
- Location leaks over the GSM air interfaceDenis Foo Kune, John Kölndorfer, Nicholas Hopper, Yongdae Kim. [doi]
- Charm: A Framework for Rapidly Prototyping CryptosystemsJoseph A. Akinyele, Matthew Green 0001, Aviel D. Rubin. [doi]
- Systematic Detection of Capability Leaks in Stock Android SmartphonesMichael C. Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang. [doi]
- You are what you like! Information leakage through users' InterestsChaabane Abdelberi, Gergely Ács, Mohamed Ali Kâafar. [doi]
- SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of TrustKarim Eldefrawy, Gene Tsudik, Aurélien Francillon, Daniele Perito. [doi]
- The Case for Prefetching and Prevalidating TLS Server CertificatesEmily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh. [doi]
- X-Vine: Secure and Pseudonymous Routing in DHTs Using Social NetworksPrateek Mittal, Matthew Caesar, Nikita Borisov. [doi]
- Chrome Extensions: Threat Analysis and CountermeasuresLei Liu, Xinwen Zhang, Guanhua Yan, Songqing Chen. [doi]
- Privacy-preserving Logarithmic-time Search on Encrypted Data in CloudYanbin Lu. [doi]
- Adaptive Password-Strength Meters from Markov ModelsClaude Castelluccia, Markus Dürmuth, Daniele Perito. [doi]
- Abuse Detection and Prevention Systems at a Large Scale Video Sharing WebsiteYu-To Chen, Pierre Grinspan, Blake Livingston, Palash Nandy, Brian Palmer. [doi]
- Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?Yan Huang, David Evans, Jonathan Katz. [doi]
- The Latent Community Model for Detecting Sybils in Social NetworksZhuhua Cai, Chris Jermaine. [doi]
- Throttling Tor Bandwidth ParasitesRob Jansen, Nicholas Hopper, Paul F. Syverson. [doi]
- Persistent OSPF AttacksGabi Nakibly, Alex Kirshon, Dima Gonikman, Dan Boneh. [doi]
- Discovering Semantic Data of Interest from Un-mappable Memory with ConfidenceZhiqiang Lin, Junghwan Rhee, Chao Wu, Xiangyu Zhang, Dongyan Xu. [doi]
- A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity HardwareKangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, Angelos D. Keromytis. [doi]
- Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile NetworksLaurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux. [doi]
- Accountable Wiretapping -or- I know they can hear you nowAdam M. Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach. [doi]
- PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web NetworksYinzhi Cao, Vinod Yegneswaran, Phillip A. Porras, Yan Chen. [doi]
- Ghost Domain Names: Revoked Yet Still ResolvableJian Jiang, Jinjin Liang, Kang Li, Jun Li, Hai-Xin Duan, Jianping Wu. [doi]
- You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular NetworksZhiyun Qian, Zhaoguang Wang, Qiang Xu, Zhuoqing Morley Mao, Ming Zhang, Yi-Min Wang. [doi]
- Using replicated execution for a more secure and reliable web browserHui Xue, Nathan Dautenhahn, Samuel T. King. [doi]
- Automated Synthesis of Secure Distributed ApplicationsMichael Backes, Matteo Maffei, Kim Pecina. [doi]
- Plaintext-Recovery Attacks Against Datagram TLSKenneth G. Paterson, Nadhem J. AlFardan. [doi]
- Access Pattern disclosure on Searchable Encryption: Ramification, Attack and MitigationMohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu. [doi]
- Insights into User Behavior in Dealing with Internet AttacksKaan Onarlioglu, Utku Ozan Yilmaz, Engin Kirda, Davide Balzarotti. [doi]
- Guess Who's Texting You? Evaluating the Security of Smartphone Messaging ApplicationsSebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, Edgar R. Weippl. [doi]
- Host Fingerprinting and Tracking on the Web: Privacy and Security ImplicationsTing-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi. [doi]
- Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow MonitoringDonghai Tian, Qiang Zeng, Dinghao Wu, Peng Liu 0005, Changzhen Hu. [doi]
- Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software EmulationLok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, Heng Yin. [doi]
- On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and UsabilityQiang Yan, Jin Han, Yingjiu Li, Robert H. Deng. [doi]
- Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid CloudsYangyi Chen, Bo Peng, Xiaofeng Wang, Haixu Tang. [doi]
- Weaponizing Femtocells: The Effect of Rogue Devices on Mobile TelecommunicationsNico Golde, Kevin Redon, Ravishankar Borgaonkar. [doi]
- MoCFI: A Framework to Mitigate Control-Flow Attacks on SmartphonesLucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, Ahmad-Reza Sadeghi. [doi]
- Towards Online Spam Filtering in Social NetworksHongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia, Alok N. Choudhary. [doi]
- Towards Taming Privilege-Escalation Attacks on AndroidSven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry. [doi]
- Towards Practical Oblivious RAMEmil Stefanov, Elaine Shi, Dawn Xiaodong Song. [doi]
- ANDaNA: Anonymous Named Data Networking ApplicationSteve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun. [doi]
- Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention SystemsJignesh Patel, Alex X. Liu, Eric Torng. [doi]
- Gatling: Automatic Attack Discovery in Large-Scale Distributed SystemsHyojeong Lee, Jeff Seibert, Charles Edwin Killian, Cristina Nita-Rotaru. [doi]
- BLACR: TTP-Free Blacklistable Anonymous Credentials with ReputationMan Ho Au, Apu Kapadia, Willy Susilo. [doi]
- Shadow: Running Tor in a Box for Accurate and Efficient ExperimentationRob Jansen, Nicholas Hopper. [doi]
- Making argument systems for outsourced computation practical (sometimes)Srinath T. V. Setty, Richard McPherson, Andrew J. Blumberg, Michael Walfish. [doi]
- SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSesKun Sun, Jiang Wang, Fengwei Zhang, Angelos Stavrou. [doi]
- WarningBird: Detecting Suspicious URLs in Twitter StreamSangho Lee, Jong Kim. [doi]
- Static detection of C++ vtable escape vulnerabilities in binary codeDavid Dewey, Jonathon T. Giffin. [doi]